ITATB Learning Module Week 1 To 7 PM
ITATB Learning Module Week 1 To 7 PM
COURSE INFORMATION
Course Number ITATB 12 Course Title IT Application Tools in Business
Course Code Instructor Geneva Caingles Medina
Course Credit 3 units Email Address [email protected] Consultation Hours By appointment
School Year 2020-2021 Class Schedule 01:00 – 03:00 PM (TThS) Room TBA
COURSE DESCRIPTION
This course presents an overview of the IT Fundamentals and Tools used in business environments. This includes computer terminology, hardware, software, operating
systems, and information and application systems. This course will also explore business applications of software, including spreadsheets, databases, presentation graphics,
word processing and business-oriented utilization of the internet.
COURSE LEARNING OUTCOMES
At the end of the course, the students should be able to
• distinguish concepts and principles in Information and Communication Technology (CO1);
• develop a sense of IT culture and an appreciation of the range and power of computer applications (CO2);
• develop and awareness of how computers work and how they are used in the society (CO3);
• adapt skills in using common IT tools and computer software to accomplish tasks (CO4); and
• manage different computer and mobile applications (CO5).
TEACHING STRATEGIES / DELIVERY MODES
Online (Hybrid Model Blended (Asynchronous Model) Offline (Flex Model)
Online teleconferencing lecture/discussion is conducted There will be no classroom meet-ups. Classroom lecture and discussion meet-ups is
only once a week for MWF Classes and once a week for However, web content resources are provided at regular conducted only once a week for MWF Classes and once
TThS classes with two (2) hours per meeting. intervals. a week for TThS classes with two (2) hours per meeting.
Self-directed learning and/or home assignments are to Self-directed learning and/or home assignments are to
be spent with allocated two (2) hours per week. be spent with allocated two (2) hours per week.
The remaining two (2) hours per week is to be devoted Assessment and evaluation will be done at regular The remaining two (2) hours per week is to be devoted
in checking the materials submitted/sent by the students intervals depending on the promptness of the in checking the materials submitted/sent by the students
and giving feedbacks, discussions, and clarifications. compliance of students to every assessment given. and giving feedbacks, discussions, and clarifications.
GRADING SYSTEM
Blended (Asynchronous
Description Online (Hybrid Model Offline (Flex Model)
Model)
COURSE OUTLINE
Preliminary Term Midterm Semi-Final Term Final Term
Preliminary Term Major Examination Midterm Major Examination Semi-Final Term Major Examination Final Term Major Examination
(1 day) (1 day) (1 day) (1 day)
INDUSTRY IN THE PROFESSION / APPRECIATION OF COMPUTING IN DIFFERENT FIELDS
Time Duration and Allotment: Week 1-2; 12 hours
Lesson Objectives:
As a result of completing this learning module, students will be able to
• determine the functions that computers do;
• compare data and information;
• distinguish the characteristics of computers;
• determine the various generations of computers;
• determine the effects of the changes brought by Information Technology to your Life; and
• distinguish the advantages and disadvantages of computers.
Topics:
The World of Computers
The Information Technology in your Life: Your Future Now
Advantage and Disadvantage of Computers
Module Guide:
2. Answer the exercises presented after the topic content below. (ACTIVITY)
TOPIC CONTENTS:
A. Introduction to Computers
Many people believe that knowing how to use a computer, is one of the basic skills needed to succeed in the workplace. In order to use the computer, it is necessary to
understand how the computers works.
Piece by piece. Each of these pieces should be a well-delineated portion of the system, with carefully defined inputs, outputs, and functions.
B. What is Computer?
The computer is an electronic device that accepts data, performs operations on that data, presents the results, and stores the data or results as needed. And give you desired
result. It performs four primary operations, and these are:
1. INPUT – entering data into the computer
2. PROCESSING – performing operations on the data
3. OUTPUT – presenting the results
4. STORAGE – saving the data, or output for future use.
B. Disadvantages of Computer
• Unemployment
• Cyber-crimes
• Computer can perform only what it is programmed to do.
• Computer need well defined instructions to perform any operation.
ACTIVITY
Answer the following questions below:
1. Describe computers and their features. (5 points)
2. Compare the differences of data and information (5 points)
3. Explain the various generations of computers. (5 points)
4. As a student, how are you affected by the changes brought by Information Technology to your life? (5 points)
5. What are the pros and cons of computers? Name at list 2 pros and 2 cons. (5 points)
Activities, Resources, and Assessment
Online (Hybrid Model) Blended (Asynchronous Model) Offline (Flex Model)
Resources: Resources: Resources:
Schoology App/Messenger Schoology App/Messenger Schoology App/Messenger
E-book: Fundamentals of Computers E-book: Fundamentals of Computers E-book: Fundamentals of Computers
REFERENCES:
Lesson Objectives:
As a result of completing this learning module, students will be able to
• compare the varieties of computers; and
• determine the types of computers.
Topics:
“All Purpose Machine”: The Varieties of Computers
Types of Computers
Module Guide:
2. Answer the exercises presented after the topic content below. (ACTIVITY)
TOPIC CONTENTS:
A. Supercomputers
Supercomputer is the most powerful and fastest, and also very expensive. It was developed in 1980s. It is used to process large amount of data and to solve the complicated
scientific problems. It can perform more than one trillion calculations per second. It has large number of processors connected parallel. So, parallel processing is done in
this computer. In a single supercomputer thousands of users can be connected at the same time and the supercomputer handles the work of each user separately.
Supercomputer are mainly used for: (1) weather forecasting, (2) nuclear energy research, (3) aircraft design, and (4) to control industrial units.
B. Mainframe Computers
Mainframe computers are also large-scale computers but supercomputers are larger than mainframe. These are also very expensive. The mainframe computer specially
requires a very large clean room with air-conditioner. This makes it very expensive to buy and operate. It can support a large number of various equipment. It also has
multiple processors. Large mainframe systems can handle the input and output requirements of several thousands of users. For example, IBM, S/390 mainframe can
support 50,000 users simultaneously. There are basically two types of terminals used with mainframe systems. These are: (1) dumb terminal (Dumb terminal does not
have its own CPU and storage devices. This type of terminal uses the CPU and storage devices of mainframe system. Typically, a dumb terminal consists of monitor and
a keyboard (or mouse).), and (2) intelligent terminal (Intelligent terminal has its own processor and can perform some processing operations. Usually, this type of terminal
does not have its own storage.). The mainframe computers are specially used as servers on the World Wide Web. The mainframe computers are used in large organizations
such as Banks, Airlines and Universities etc. where many people (users) need frequent access to the same data, which is usually organized into one or more huge databases.
IBM is the major manufacturer of mainframe computers.
C. Minicomputers
These are smaller in size, have lower processing speed and storage capacity as compared to mainframe. They are also less expensive than mainframe. Hence, their
performance also will be less than that of mainframes. The minicomputers are used in business, education and many other government departments. Although some
minicomputers are designed for a single user but most are designed to handle multiple terminals. Minicomputers are commonly used as servers in network environment
and hundreds of personal computers can be connected to the network with a minicomputer acting as server like mainframes, minicomputers are used as web servers.
D. Microcomputers
The invention of microprocessor (single chip CPU) gave birth to the much cheaper microcomputers. They are further classified into: (1) desktop computers (Desktop
computers are also known as personal computers or simply PCs. They are usually easier to use and more affordable. They are normally intended for individual users for
their word processing and other small application requirements.), (2) laptop computers (Laptop computers are portable computers. They are lightweight computers with a
thin screen. They are also called as notebook computers because of their small size. They can operate on batteries and hence are very popular with travelers. The screen
folds down onto the keyboard when not in use.), and (3) handheld computers (Handheld computers or Personal Digital Assistants (PDAs) are pen-based and also battery-
powered. They are small and can be carried anywhere. They use a pen like stylus and accept handwritten input directly on the screen. They are not as powerful as desktops
or laptops but they are used for scheduling appointments, storing addresses and playing games. They have touch screens which we use with a finger or a stylus.).
E. Microcontrollers
It is a tiny computer on a single metal-oxide semiconductor integrated circuit chip. These are also referred to specialized microprocessors installed in “smart” appliances
and automobiles. They are also called as embedded computers which contains one or more CPUS (processor cores) along with memory and programmable input/output
peripherals.
A. Analog Computers
The word "Analog" means continuously varying in quantity. The analog computers accept input data in continuous form and output is obtained in the form of graphs. It
means that these computers accept input and give output in the form of analog signals. The output is measured on a scale. The voltage, current, sound, speed, temperature,
pressure etc. values are examples of analog data. These values continuously increase and decrease. The analog computers are used to measure the continuous values. The
thermometer is an example of analog device because it measures continuously the length of a mercury column.
B. Digital Computers
The word "Digital" means discrete. It refers to binary system, which consists of only two digits, i.e. 0 and 1. Digital data consists of binary data represented by OFF (low)
and ON (high) electrical pulses. These pulses are increased and decreased in discontinuous form rather than in continuous form. The digital computer is designed using
digital circuits in which there are two levels for an input or output signal. These two levels are known as logic 0 and logic 1. Digital Computers can give more accurate
and faster results. Digital computer is well suited for solving complex problems in engineering and technology. Hence digital computers have an increasing use in the field
of design, research and data processing. Digital computers can be further classified as, (1) General Purpose Computers, and (2) Special Purpose Computers. Special
purpose computer is one that is built for a specific application. General purpose computers are used for any type of applications. They can store different programs and do
the jobs as per the instructions specified on those programs. Most of the computers that we see today, are general purpose computers.
C. Hybrid Computers
A hybrid computer combines the desirable features of analog and digital computers. It is mostly used for automatic operations of complicated physical processes and
machines. Now-a-days analog-to-digital and digital-to-analog converters are used for transforming the data into suitable form for either type of computation. For example,
in hospital’s ICU, analog devices might measure the patient’s temperature, blood pressure and other vital signs. These measurements which are in analog might then be
converted into numbers and supplied to digital components in the system. These components are used to monitor the patient’s vital sign and send signals if any abnormal
readings are detected. Hybrid computers are mainly used for specialized tasks.
ACTIVITY
Answer the following questions below:
1. Make a table of comparison for the varieties of computers. (10 points)
2. What is an analog computer and how is it different from a digital computer? (5 points)
Activities, Resources, and Assessment
Online (Hybrid Model) Blended (Asynchronous Model) Offline (Flex Model)
Resources: Resources: Resources:
Schoology App/Messenger Schoology App/Messenger Schoology App/Messenger
E-book: Fundamentals of Computers E-book: Fundamentals of Computers E-book: Fundamentals of Computers
Activities: Activities: Activities:
Topic discussion will be through GoogleMeet App., during Topic discussion will be through GoogleMeet App., during Topic discussion will be during classroom meetups, and
which the activities will be supplied with answers. which the activities will be supplied with answers. Such during which the exercises will be supplied with answers.
teleconferencing will be recorded, the video of which will
be made available to you via Messenger Group Chat or
Gmail address.
REFERENCES:
Lesson Objectives:
As a result of completing this learning module, students will be able to
• determine the necessary components of a computer system;
• distinguish the functions of input and output devices; and
• determine the essential functions of an operating system.
Topics:
Components of Computer System: Hardware and Software
Input and Output Devices
Functions of Operating System
Module Guide:
2. Answer the exercises presented after the topic content below. (ACTIVITY)
TOPIC CONTENTS:
A. Input Devices
Now-a-days, the commonly used input devices are:
• Keyboard. The keyboard is still the commonest way of entering information into a Computer.
• Mouse. A pointing device is any human interface device that allows a user to input spatial data to a computer.
• Scanner. A scanner allows you to scan printed material and convert it into a file format that may be used within the PC.
• Microphone. Microphone is an input device used to enter the sound signals of user into the computer. It is used to record the
voice of the user in a computer. It is also used to talk to others on the Internet. The user talks to another user on the Internet by sending his message through the microphone
and receives the response on the speaker attached to the computer. For this purpose, you must have the microphone and a sound card with your computer
• Digital Camera. Digital Camera is an input device used to take pictures and to store directly in computer in digital form. It operates on the same basic principle as a
traditional or conventional camera but digital camera sends images directly inside the PC in digital form instead of storing it on a conventional film. When a picture is
taken with digital camera, the electric image of the picture is stored in digital form on the floppy disk or CD-R attached with the camera. The stored picture can be loaded
into the computer from the disk for editing.
• Optical Bar Code Reader. Data coded in the form of small vertical lines forms the basis of bar coding. Alphanumeric data is represented using adjacent vertical
lines called Bar Codes. These are of varying widths and spacing between them used to uniquely identify books, merchandise in stores, postal packages etc.
• Optical mark recognition (OMR). The OMR devices can sense marks on computer readable paper. This kind of device is typically used by academic institutions to
grade aptitude tests whether candidates need to mark the correct option from a number of alternatives, on a special sheet of paper. These answer sheets can then be directly
read by the optical mark recognition devices and can be used for further processing by the computer.
• Touch Screen. The touch screen can detect exactly where on its surface it has been touched. Touch screen are used in lot of fast food and restaurants because they
are easy to keep clean reprogram if changes need to be made to menu.
• Joystick. The main function of joystick is to play computer games by controlling the way that something moves on the screen. Joysticks can be used to control
movement from side by side, up and down and diagonally.
• Magnetic Ink Character Recognition (MICR). The MICR is similar to optical mark recognition and is used exclusively by the bank industry. MICR devices are
used by the banking Industry to read the account numbers on cheques directly and subsequently do the necessary processing. It must be noted that floppy drives, hard
disks and CD drives are used for both input and output devices.
B. Output Devices
Now-a-days, the commonly used output devices are:
• Monitor. The monitor is a popular and most commonly used output device. The monitor consists of a screen and the electronic components that produce the output
on the screen for a temporary period. The output received on the screen is called softcopy. Most monitors used in personal computers display text, graphics and video
information.
• Plotter. A plotter is a special output device used to produce hardcopies of graphs and designs on the paper. A plotter is typically used to print large-format graphs or
maps such as construction maps or engineering drawings.
• Speaker. A speaker gives you sound output from your computer. Some speakers are built into the computer and some are separate.
• Printer. These are most commonly used output devices used to get prints of documents on the paper. The output printed on the paper is called hard copy. The hard
copy is also called as print out. Two (2) types of printers: (1) Impact printer prints characters and graphics on the paper with the strikes of hammer on a ribbon. A simple
example of an impact printer is typewriter, which uses small hammers to strike the ribbon. Each hammer is embossed with the shape of alphanumeric character that shape
is printed on the paper through inked ribbon. There are many types of impact printers but the most popular and commonly used is the dot matrix printer (are called Impact
printers because they print by hammering the pins on the inked ribbon to leave ink impressions on a paper. Hence, they can be used to produce multiple copies by using
carbon paper or its equivalent. A dot matrix printer makes a hard copy by printing one character at a time.), and (2) Non-impact printer produces the output on a paper
without striking the paper are known as non-impact printers. The main features of non-impact printers are: (a) faster than impact printer, (b) print high quality output, and
(c) produce no noise during printing. Examples of non-impact printers are Laser printer (is the fastest and high-quality non-impact printer. Laser printers are most
expensive than Inkjet printers and their print quality is also higher. The print quality and printing speed of Laser printers make them ideal for offices and business. The
price of Laser printer depends on the quality and printing speed. The color printers are most costly than black and white Laser printers. The higher the resolution and speed
the more expensive the printer.), Inkjet printer (are called Non-Impact printers because they print by spraying ink on the paper. Being of non-impact type, they cannot be
used to produce multiple copies of a document in a single printing.) and etc.
ACTIVITY
Answer the following questions below:
1. What is a computer system? Explain its components. (10 points)
2. Name at least 2 latest computer input devices and at least 2 latest computer output devices. (5 points)
3. What are the functions of an operating system? (5 points)
Activities, Resources, and Assessment
Online (Hybrid Model) Blended (Asynchronous Model) Offline (Flex Model)
Resources: Resources: Resources:
Schoology App/Messenger Schoology App/Messenger Schoology App/Messenger
E-book: Fundamentals of Computers E-book: Fundamentals of Computers E-book: Fundamentals of Computers
REFERENCES:
Lesson Objectives:
As a result of completing this learning module, students will be able to
• determine various cyber-attacks and malwares; and
• distinguish different cyber intruders: trolls, spies, hackers, and thieves.
Topics:
Cyber-Attacks and Malwares
Cyber Intruders: Trolls, Spies, Hackers, and Thieves
Module Guide:
2. Answer the exercises presented after the topic content below. (ACTIVITY)
TOPIC CONTENTS:
A.1. Malware
If you've ever seen an antivirus alert pop up on your screen, or if you've mistakenly clicked a malicious email attachment, then you've had a close call with malware.
Attackers love to use malware to gain a foothold in users' computers—and, consequently, the offices they work in—because it can be so effective. “Malware” refers to
various forms of harmful software, such as viruses and ransomware. Once malware is in your computer, it can wreak all sorts of havoc, from taking control of your
machine, to monitoring your actions and keystrokes, to silently sending all sorts of confidential data from your computer or network to the attacker's home base. Attackers
will use a variety of methods to get malware into your computer, but at some stage it often requires the user to take an action to install the malware. This can include
clicking a link to download a file, or opening an attachment that may look harmless (like a Word document or PDF attachment), but actually has a malware installer hidden
within.
A.1.a. Malware Definition
Malware, short for malicious software, is a blanket term for viruses, worms, trojans and other harmful computer programs hackers use to wreak destruction and gain
access to sensitive information. As Microsoft puts it, "[malware] is a catch-all term to refer to any software designed to cause damage to a single computer, server, or
computer network." In other words, software is identified as malware based on its intended use, rather than a particular technique or technology used to build it. This
means that the question of, say, what the difference is between malware and a virus misses the point a bit: a virus is a type of malware, so all viruses are malware (but
not every piece of malware is a virus).
A.1.b. Types of Malware
There are a number of different ways of categorizing malware; the first is by how the malicious software spreads. You've probably heard the words virus, trojan, and
worm used interchangeably, but as Symantec explains, they describe three subtly different ways malware can infect target computers:
A.1.b.1. Worm: is a standalone piece of malicious software that reproduces itself and spreads from computer to computer.
A.1.b.2. Virus: is a piece of computer code that inserts itself within the code of another standalone program, then forces that program to take malicious action
and spread itself.
A.1.b.3. Trojan: is a program that cannot reproduce itself but masquerades as something the user wants and tricks them into activating it so it can do its damage
and spread.
Malware can also be installed on a computer "manually" by the attackers themselves, either by gaining physical access to the computer or using privilege
escalation to gain remote administrator access.
Another way to categorize malware is by what it does once it has successfully infected its victim's computers. There are a wide range of potential attack techniques
used by malware:
A.1.b.4. Spyware: is defined by Webroot Cybersecurity as "malware used for the purpose of secretly gathering data on an unsuspecting user." In essence, it
spies on your behavior as you use your computer, and on the data you send and receive, usually with the purpose of sending that information to a third party. A
keylogger is a specific kind of spyware that records all the keystrokes a user makes—great for stealing passwords.
A.1.b.5. Rootkit: is, as described by TechTarget, "a program or, more often, a collection of software tools that gives a threat actor remote access to and control
over a computer or other system." It gets its name because it's a kit of tools that (generally illicitly) gain root access (administrator-level control, in Unix terms)
over the target system, and use that power to hide their presence.
A.1.b.6. Adware: is malware that forces your browser to redirect to web advertisements, which often themselves seek to download further, even more malicious
software. As The New York Times notes, adware often piggybacks onto tempting "free" programs like games or browser extensions.
A.1.b.7. Ransomware: is a flavor of malware that encrypts your hard drive's files and demands a payment, usually in Bitcoin, in exchange for the decryption
key. Several high-profile malware outbreaks of the last few years, such as Petya, are ransomware. Without the decryption key, it's mathematically impossible
for victims to regain access to their files. So-called scareware is a sort of shadow version of ransomware; it claims to have taken control of your computer and
demands a ransom, but actually is just using tricks like browser redirect loops to make it seem as if it's done more damage than it really has, and unlike ransomware
can be relatively easily disabled.
A.1.b.8. Cryptojacking: is another way attackers can force you to supply them with Bitcoin—only it works without you necessarily knowing. The crypto mining
malware infects your computer and uses your CPU cycles to mine Bitcoin for your attacker's profit. The mining software may run in the background on your
operating system or even as JavaScript in a browser window.
A.1.b.9. Malvertising: is the use of legitimate ads or ad networks to covertly deliver malware to unsuspecting users’ computers. For example, a cybercriminal
might pay to place an ad on a legitimate website. When a user clicks on the ad, code in the ad either redirects them to a malicious website or installs malware on
their computer. In some cases, the malware embedded in an ad might execute automatically without any action from the user, a technique referred to as a “drive-
by download.”
Any specific piece of malware has both a means of infection and a behavioral category. So, for instance, WannaCry is a ransomware worm. And a particular
piece of malware might have different forms with different attack vectors: for instance, the Emotet banking malware has been spotted in the wild as both a trojan
and a worm.
A look at the Center for Internet Security's top 10 malware offenders for June of 2018 gives you a good sense of the types of malware out there. By far the most
common infection vector is via spam email, which tricks users into activating the malware, Trojan-style. WannaCry and Emotet are the most prevalent malware
on the list, but many others, including NanoCore and Gh0st, are what's called Remote Access Trojans or RATs—essentially, rootkits that propagate like Trojans.
Cryptocurrency malware like CoinMiner rounds out the list.
A.2. Phishing
The physical parts of a computer are known as computer hardware. You can touch, see and feel the hardware. The hardware consists of electronic circuits and mechanical
equipment etc. used to perform various functions in the computer. The hardware components are: (1) input devices, (2) output devices, (3) Central Processing Unit (CPU),
(4) Memory Unit, and (5) Other peripheral devices. Of course, chances are you wouldn't just open a random attachment or click on a link in any email that comes your
way—there has to be a compelling reason for you to take action. Attackers know this, too. When an attacker wants you to install malware or divulge sensitive information,
they often turn to phishing tactics, or pretending to be someone or something else to get you to take an action you normally wouldn’t. Since they rely on human curiosity
and impulses, phishing attacks can be difficult to stop. In a phishing attack, an attacker may send you an email that appears to be from someone you trust, like your boss
or a company you do business with. The email will seem legitimate, and it will have some urgency to it (e.g. fraudulent activity has been detected on your account). In the
email, there will be an attachment to open or a link to click. Upon opening the malicious attachment, you’ll thereby install malware in your computer. If you click the link,
it may send you to a legitimate-looking website that asks for you to log in to access an important file—except the website is actually a trap used to capture your credentials
when you try to log in. In order to combat phishing attempts, understanding the importance of verifying email senders and attachments/links is essential.
B. Spies
Many companies have extensive data-collection efforts that constantly track (spy on) our personal activities.
C. Hackers
Hacker is an individual who uses computers, networking or other skills to gain unauthorized access to data.
C.1. Malicious Hackers: break into computers for malicious purposes.
C.2. Script Kiddies: are technically unsophisticated teenagers who use downloadable software for perform break-ins.
C.3. Hacktivists: are hacker activists who break into systems for a political or a socially motivated purpose.
C.4. Black-hat Hackers: break into computers to steal or destroy information or to use it for illegal profit.
C.5. Cyberterrorists: attack computer systems so as to bring physical, political or financial harm to groups, companies, or nations.
C.6. Benign Hackers: (thrill-seeker hackers) illegally access computer systems simply for the challenge of it, not to damage or steal anything; their reward is the
achievement of breaking in.
C.7. Benevolent Hackers: (ethical hackers or white-hat hackers) are usually computer professionals who break into computer systems and networks with the knowledge
of their owners to expose security flaws that can then be fixed.
D. Thieves
May be a company’s employees or suppliers or professionals.
D.1. Employees
D..2. Outside Partners & Suppliers
D.3. Hardware Thieves
D.4. Con-artists, Scammers, & Counterfeiters
ACTIVITY
Answer the following questions below:
1. Provide one (1) example for each cyber-attacks. (10 points)
2. How can malware damage a computer system? (5 points)
3. Among the types of cyber-intruders, which do you think is dangerous? (5 points)
Activities, Resources, and Assessment
Online (Hybrid Model) Blended (Asynchronous Model) Offline (Flex Model)
Resources: Resources: Resources:
Schoology App/Messenger Schoology App/Messenger Schoology App/Messenger
E-book: Fundamentals of Computers E-book: Fundamentals of Computers E-book: Fundamentals of Computers
Activities: Activities:
Topic discussion will be through GoogleMeet App., during Topic discussion will be through GoogleMeet App., Activities:
which the activities will be supplied with answers. during which the activities will be supplied with Topic discussion will be during classroom meetups, and
answers. Such teleconferencing will be recorded, the during which the exercises will be supplied with answers.
video of which will be made availa
d. Real-time
e. Distributed
ble to you via Messenger Group Chat or Gmail address.
REFERENCES: