You are on page 1of 8

CHARISE YANCY T.

ZULUETA POINTERS FOR INTRODUCTION TO COMPUTING

LESSON 1

*What is COMPUTING

*And to PROCESS what?


-Computing industry, also known as the information technology (IT)

- is the foundation of modern technology and plays a pivotal role in our interconnected digital world

- involves the use of software and hardware

-use of computers and computational techniques to process:

• store

• manipulate data

• to perform various tasks

• solve complex problems

*What is SOFTWARE

*SOFTWARE parts and their function

SOFTWARE

-refers to a set of instructions which enable the hardware to perform a specific set of tasks.

(SOFTWARE includes; programs and applications)

 Programs are collection of instructions executed by computer.


 Application are programs designed for end users. It is used to provide ability to computer and user to perform specific
tasks on computer. It is used to allow user to perform various coordinated activities, functions, operations

SOFTWARE use to perform operations, automate processes, and facilitate communication in various domains, including science,
engineering, business, entertainment, and daily life.

*What is HARDWARE

*HARDWARE parts and their function

HARDWARE

-refers to the physical and visible components of the system such as a monitor, CPU, keyboard and mouse.

(HARDWARE includes; personal computers and servers)

Personal computer

 individual use

Servers

 multiple CPU sockets


 that provides functionality for other programs or devices, called "clients".

*HOW TECHNOLOGY IMPACTS YOU

*In DIGITAL LITERACY

-DIGITAL LITERACY/ known as COMPUTER LITERACY

-means having a current knowledge and understanding of computers, mobile devices, the web, and related technology.
BACKBONE OF DIGITAL LITERACY

• Computer

• Memory

• Internet

• Network

• Wi-Fi

• Server

• Online Social Network

• Big Data

*HOW TECHNOLOGY IMPACTS YOU

*As a DIGITAL CITIZEN; aspect of being one

A digital citizen

-is a person familiar with how to use technology to become an educated and productive member of the digital world.

Aspects of being a digital citizen include the ethical, legal, and productive use of technology.

*HOW TECHNOLOGY IMPACTS SOCIETY

*The HISTORY of COMPUTERS (first ancient tools they used, in 20th cen.)

*As technology advanced

First ancient tools

 abacus for simple calculations.

In the 20th century (emerge of electronic com.)

 like ENIAC, leading to the development of personal computers in the 1970s.

As technology advanced, computers became smaller and more powerful, giving rise to embedded systems used in various
devices today,

 such as smartphones
 IoT devices
 facilitating automation and connectivity in modern life.

*DIGITAL SECURITY AND PRIVACY

*TECHNIQUES AND EXPLANATION


Dumpster Diving:

Definition: involves searching through discarded materials (like trash bins or dumpsters) to find information that could be used for
malicious purposes.
Example: A cyber attacker rummaging through a company's garbage to find sensitive documents or discarded devices containing
important data.

Phishing:

Definition: a type of cyber-attack where malicious actors impersonates legitimate entities to trick individuals into revealing sensitive
information, such as passwords or credit card details.

Example: Sending an email that appears to be from a bank, asking the recipient to click a link to update their account information.

Change of Address Form:

Definition: A change of address form in computing can refer to a fraudulent request to change personal information associated with
an account, aiming to redirect communications or gain unauthorized access.

Example: Filling out a fake change of address form for an online account to gain access to someone else's account and steal their
information.

Pretexting:

Definition: Pretexting involves creating a fabricated scenario or pretext to manipulate individuals into revealing sensitive information
or performing certain actions.

Example: Posing as a customer service representative to trick someone into sharing their account credentials under the guise of
helping them resolve an issue.

Stealing:

Definition: Stealing in computing refers to unauthorized acquisition of data, identities, or access rights with malicious intent.

Example: Illegally obtaining credit card information from an unsecured database to make fraudulent transactions.

Data Mining:

Definition: Data mining involves the process of extracting valuable patterns and insights from large sets of data to support decision-
making and business strategies.

Example: Analyzing customer purchase histories to identify trends and tailor marketing strategies for a business.

TECHNOLOGY IN EDUCATION:

• Learning Management System

• Online Learning Platforms

• Interactive Whiteboards

• Educational Apps

TECHNOLOGI IN HEALTH CARE:

• Telemedicine

• Wearable Health Devices

• Augmented Reality (AR) and Virtual Reality (VR) for simulation


TECHNOLOGY IN TRANSPORTATION INDUSTRY:

• Ride- Sharing Apps


• Autonomous Vehicles
• GPS and Navigation Systems
• Electronic Toll Collection

TECHNOLOGY IN MANUFACTURING:

• Nanotechnology
• Blockchain for Supply Chain Transparency
• Supply Chain Management Software

OVERVIEW OF COMPUTING AS AN INDUSTRY:

 The computing industry is diverse, including software development, hardware manufacturing, networking, cybersecurity,
and more.
 It drives innovation, shapes economies, and transforms industries globally.

THE COMPUTING PROFESSION:

 The computing profession offers various roles and specializations, such as software development, data science,
cybersecurity, and project management.
 Professionals in this field contribute to technology advancement, problem-solving, and innovation.

THE COMPUTING PROFESSION:

SOFTWARE DEVELOPER/ ENGINEER

-Design, develop, and test software applications, websites, and systems. Collaborate with stakeholders to define requirements and
ensure software meets user needs.

SYSTEM ADMINISTRATOR

-Manage and maintain an organization's IT infrastructure, including servers, networks, and databases. Ensure system reliabilit y,
security, and performance.

NETWORK ENGINEER

-Design, implement, and manage computer networks. Optimize network performance, troubleshoot issues, and ensure data
security.

DATA SCIENTIST

-Analyze large datasets to extract valuable insights. Develop machine learning models, data visualizations, and predictive analytics
to inform decision-making.

CYBERSECURITY ANALYST/ ENGINEER

-Protect computer systems and networks from cyber threats. Monitor for security breaches, implement security measures, and
conduct penetration testing.

DATABASE ADMINISTRATOR

-Manage databases, including data storage, organization, and access control. Ensure data integrity, backup, and recovery.

CLOUD ARCHITECT

-Design and implement cloud-based solutions using platforms like AWS, Azure, or Google Cloud. Optimize cloud infrastructure for
scalability and cost-effectiveness.
UX/ UI DESIGNER

-Create user-friendly and visually appealing interfaces for websites and applications. Conduct user research, wireframing, and
usability testing.

DevOps ENGINEER

-Bridge the gap between development and IT operations. Automate deployment, monitoring, and scaling of applications for
continuous integration and delivery.

IT PROJECT MANAGER

-Lead and coordinate IT projects, ensuring they are delivered on time and within budget. Manage teams, resources, and project
stakeholders.

DATA ENGINEER

-Develop and maintain data pipelines and ETL (Extract, Transform, Load) processes. Prepare data for analysis and reporting.

PROMINENT FIGURES IN THE COMPUTING WORLD


ADA LOVELACE (1815-1852)

-The world’s first computer woman programmer

ALAN TURING (1912- 1954)

-Father of Computer Science and Artificial Intelligence

CLAUDE SHANNON (1916- 2001)

-Father of Modern Cryptology

GRACE HOPPER (1906-1992)

-Key figure in the development of the COBOL programming language

JOHN VON NEUMANN (1903- 1957)

-Developed the Von Neumann Architecture

TIM BERNERS- LEE (BORN 1955)

-Developed the first we browser and Web server software

LINUS TORVALDS (BORN 1969)

-Created the Linux Kernel

STEVE JOBS (1955- 2011)

-Development of Personal computers

Mobile devices

Innovative user interfaces

BILL GATES (BORN 1955)

-Popularizing personal computing

LARRY PAGE and SERGEY BRIN (BORN 1973 RESPECTIVELY)

-Created the world’s most widely used search engine


LESSON 2

MORALITY

 a set of rules of right conduct; a system used to modify and regulate our behavior
 a quality system by which we judge human acts right or wrong

MORAL THEORIES

 Morality needs to be justified, especially to people who are not members of the society in which the set of moral codes are
accepted.
 For one to be morally good, one must practice the qualities of being good.
 These guidelines are moral codes.

MORAL CODES

 rules or norms within a group for what is proper behavior for that group

IT SHOULD BE FREEDOM WITH RESTRAINT, in a world where there is absolute freedom, ANARCHY exists.

 anarchy- don’t recognized authority.

But we have this one special gift: The ability to REASON

 Freedom with reason is the foundation of morality.

ETHICS

 the study of right and wrong in human conduct.


 A theoretical examination of morality or "theory of morals"
 The role of ethics is to help societies distinguish between right and wrong and to give each society a basis for justifying
the judgement of human actions

“THE UNEXAMINED LIFE IS NOT WORTH LIVING”


Socrates, Philosopher
Socrates was put to death because of asking people why they exist. (they’ve seen it as a threat)
Socrates's pursuit was a result of the Greeks' curiosity and their desire to learn about themselves, human life and society.

INTRODUCTION TO ETHICS IN COMPUTING

Ethics in computing is a branch of applied ethics that deals with the moral and ethical issues arising from the use of comput er
technology, information systems, and the digital realm.

ETHICAL FRAMEWORKS

 utilitarianism - maximizing overall good, FAIRNESS


 deontology - duty-based ethics

 virtue ethics - emphasizing character and virtues

SCENARIO: UTILITARIAN APPROACH

A software company is developing a new product that will greatly benefit a large number of users worldwide. However, to meet a
tight deadline and ensure profitability, the development team decides to cut corners on security, potentially leading to vulnerabilities
that could be exploited by malicious hackers.

Iinvolve evaluating the consequences of the actions and determining the course of action that maximizes overall utility or happiness
for the greatest number of people. In this case, we have to weigh the benefits of the new product against the potential harm caused
by cutting corners on security.

Let's break it down:


1. Benefits of the New Product: The software will greatly benefit a large number of users worldwide, potentially enhancing their
lives or experiences.
2. Harms of Cutting Corners on Security: Potential vulnerabilities may lead to security breaches, putting users' data, privacy, and
potentially even their safety at risk. - Exploitation of vulnerabilities could cause financial losses, reputational damage, and emotional
distress to users. To apply the utilitarian approach, we would need to compare the aggregate benefits (enhanced us er experiences)
against the aggregate harms (potential security risks). If the benefits outweigh the harms significantly and contribute to a net
increase in overall happiness and well-being for a larger number of users, the utilitarian approach might support proceeding with the
product development while addressing the security concerns in a reasonable manner.
However, it's important to emphasize that the utilitarian approach also considers fairness and ensuring that the benefits and harms
are distributed fairly among all affected parties. So, any decision made should also take into account minimizing harm and
addressing security concerns to the best extent possible. Balancing benefits and potential harms in a way that maximizes
overall well-being should be the ultimate goal in applying the utilitarian approach.

SCENARIO: DEONTOLOGICAL APPROACH

A software engineer working for a government agency is instructed to create a program that would allow the agency to access
citizens' private emails without their knowledge or consent, citing national security concerns.

1. Identify the Action: The action is creating a program to access citizens' private emails without their knowledge or consent.

2. Examine the Moral Duty: Consider whether there are ethical duties or principles that apply to this action. For example,
respecting privacy, honoring consent, and upholding individual rights are key moral duties.

3. Apply the Golden Rule: Reflect on how you would feel if your own privacy were violated in this manner. Would you want your
emails accessed without consent?

4. Evaluate Alignment with Moral Principles: Determine whether creating the program aligns with the moral duties and the
Golden Rule. In this case, creating a program that violates privacy and consent is likely to contradict these moral principles.

In a deontological approach, the focus is on the action's inherent rightness or wrongness based on moral principles. Creating a
program to invade citizens' privacy without consent is likely to be viewed as ethically wrong, as it violates fundamental principles of
respect for privacy, consent, and individual rights.

SCENARIO - VIRTUE ETHICS APPROACH

A senior software developer witnesses a junior colleague plagiarizing code from an online community to meet project deadlines. The
junior colleague argues that it's common practice in the industry to save time.

We would consider the ethical character and virtues of the senior software developer. Virtue ethics focuses on the moral character of
an individual and the virtues they embody.

1.Identify Relevant Virtues: Virtues like honesty, integrity, responsibility, and professionalism are relevant in this scenario.

2. Deliberation and Reflection: The senior developer should reflect on what virtues are essential in this situation and how they can
best uphold those virtues.

3. Consider the Consequences: Reflect on the potential outcomes of different courses of action. Upholding virtues often leads to
positive consequences in the long run.

4. Decision and Action: Based on a virtuous approach, the senior developer should choose a course of action that aligns with
virtues such as honesty and integrity.

Possible Actions:

a. Confront the Junior Colleague: Engage in a respectful conversation with the junior colleague, expressing concern about
plagiarism and emphasizing the importance of honesty and integrity in the profession. Offer assistance and guidance to help t he
junior developer learn and grow.

b. Report to Higher Authority: If the issue persists, consider reporting the situation to a supervisor or appropriate authority within
the organization, maintaining the focus on upholding ethical standards.

5. Reflect on the Action: After taking action, reflect on whether the decision aligned with virtuous behavior and brought about a
positive impact on the work environment and the junior colleague. In this approach, the emphasis is on fostering moral charac ter
and virtues, promoting ethical behavior, and contributing to a culture of honesty and integrity within the workplace.

PROFESSIONAL CODE OF ETHICS

 Association for Computing Machinery (ACM)


 Institute of Electrical and Electronics Engineers (IEEE)
ASSOCIATION FOR COMPUTING MACHINERY (ACM)

 US-based international learned society for computing.


 founded in 1947
 highly influential professional organization in the field of computing

IMPORTANCE OF ACM

Professional Networking - global platform for professionals, researchers, educators, and students in the computing field to connect
and collaborate

Research Advancement - publishes a vast array of high-impact journals, magazines, and conference proceedings, making it a
valuable resource for researchers and academics

Education and Outreach - offers educational resources, curriculum recommendations, and support for computing educators at all
levels

Ethical Guidelines - provides ethical guidelines and a code of ethics for computing professionals, emphasizing the importance of
responsible and ethical computing practices.

Conference and Events - organizes numerous conferences, including some of the most prestigious in the field, where professionals
can present research, share knowledge, and stay updated on the latest trends and technologies.

Advocacy - advocates for policies and initiatives that promote the interests of the computing community.

Awards and Recognition - awards prestigious honors, such as the ACM Turing Award, often referred to as the "Nobel Prize of
Computing," to individuals who have made outstanding contributions to the field.

ETHICAL CONSIDERATIONS IN COMPUTING

• Privacy and Data Protection

• Security and Cybersecurity

• Intellectual Property and Copyright

• Accessibility

• Artificial Intelligence (AI) and Bias

• Surveillance and Privacy Rights

• Emerging Technologies and Ethical Use

• Global Perspective and Cultural Differences

• Ethical Decision-Making

• Education and Awareness

REAL-WORLD ETHICAL DILEMMAS

• Data Privacy vs Public Health

• Algorithmic Bias on Hiring

• Social Media Content Moderation

• Autonomous Vehicles and Ethical Decision Making

• Government Surveillance vs National Securitu

• Ethics in AI Research

• Data Breach Disclosure

• Online Harassment and Free Speech

• Use of AI in Criminal Justice

• Worker Surveillance in Remote Work

You might also like