0% found this document useful (0 votes)
8 views15 pages

Information Technology

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views15 pages

Information Technology

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

COURSE: Public Safety Senior Leadership Course (PSSLC)

Module 1. General Subjects

Lesson Plan

Topic : Information Technology:


A Managerial Overview

Lesson Plan Number :

Target Audience : SLC Students

Venue : Classrooms

Training Day Number :

Time Allotted : 8 Hours

Instructional Method :  Lecture  PE  Critique

Training Aids : Laptop, LCD projector, Laser Pointer


Portable PA System

Trainee Requirements : Notebook and Ballpen

Issue Items : Handouts

Required Instructor Qualification :  General Instructor


 Specialized Instructor
 Master Instructor

Coordination : Not Necessary

Training Reference Used : https://www.google.com.ph/#q=Infor


mation+Technology

https://www.google.com.ph/#q=comp
uter

https://www.google.com.ph/#q=Fund
amentals+of+Information+Technolog
y

The Core Rules of Netiquette Shea,


V. (1994). Core Rules of Netiquette.
Netiquette (Online ed., pp. 32-45).
San Francisco: Albion Books. Core
Rules of Netiquette

PSSLC Page 1 of 15
coursedesign.colostate.edu/obj/corer
ulesnet.html

http;//www/peacedirect.org/landing-
page/world-
peace/?gclid=CKTom66qxdECFYKV
vAod

Lesson Goal: This lesson is intended to inculcate


to the PNP SLC students the Conflict
Sensitive and Peace Promoting
Paradigm

Lesson Objectives:

After this lesson, the trainees will be able to:

LO 1: Explain the value of information as a direct linked in helping decision


makers in achieving organizational goals with ninety percent (90%)
clarity;
LO 2: Give the fundamentals of information systems with ninety percent (90%)
L0 3: Distinguish computer hardware from computer software with ninety
percent (90%);
LO 4: Enumerate electronic concerns related to internet; with ninety percent
(90%) correctness;
LO 5: Differentiate internet, intranet, and extranet with ninety percent (90%)
correctness;
LO 6: Enumerate and discuss the modes od operations with ninety percent
(90%) correctness;
LO 7: State the key aspects in guaranteeing effective information security with
ninety (90 %) correctness; and
LO 8: Define the core rules of netiquette with ninety percent (90%)
correctness.

PSSLC Page 2 of 15
Presentation Outline:

Topics Time Methodology


I. Introduction 30 mins Brainstorming
II. Developmental
30 mins Brainstorming
Activity/Motivation
Presentation (Lesson Proper)
III. Fundamentals of Information Lecture/ Group
30 mins
systems Discussion
TP 1: Information Concepts
IV. Computer hardware from Lecture/ Group
computer software Discussion
30 mins
TP 2: Hardware Components &
Types of Software
V. Electronic concerns related to Lecture/ Group
internet 15 mins Discussion
TP 3: Disadvantages of Internet
VI. Definition of Terms Lecture/ Group
TP 4: Internet, intranet and 15 mins Discussion
extranet
VII. General Information Lecture/ Group
30 mins
TP 5: Modes of Operations Discussion
VIII. Managing Security and Ethical Lecture/ Group
Issues in effective Information Discussion
Security 30 mins
TP 6: Security of an Information
System
IX. Break 10 mins
X. Core Rules of Netiquette Lecture/ Group
TP 7: Ten (10) Proper Ways to Discussion
40 mins
Communicate in an online
Environment
XI. Application 3 hrs Hands-on Activity
XII. Test
1 hr Test
Closing Prayer
Total 8 hrs

PSSLC Page 3 of 15
Lesson Plan
Lesson Topic – Information Technology: A Managerial Overview

I. INTRODUCTION (30 mins)


Preparatory Activities

• Opening Prayer
• Introduction of Instructor
• Checking of attendance
• Administrative announcements
• Clarification of Personal Learning/Leveling of Expectations
Leveling of expectation using KWL Approach (Know-Want-

II. DEVELOPMENTAL ACTIVITIES (30 mins)

• Require the students to give the uses and importance of


computer in daily life and make it to the point of discussion

PRESENTATION (Lesson Proper)


III. Fundamentals of Information Systems
TP 1: Information Concepts

The value of information is directly linked to how it helps decision makers


achieve the organization's goals. Knowing the potential impact of information
systems and having the ability to put this knowledge to work can result in a
successful personal career and organizations that reach their goals. The use
of information systems to add value to the organization can also give an
organization a competitive advantage.
Cooperation between business managers and IS personnel is the key to
unlocking the potential of any new or modified system.

Information Concepts
• Data, information, and knowledge
- Data: Raw facts
- Information: Collection of facts organized in such a way that they have
additional value beyond the value of the facts themselves
- Process: Set of logically related tasks performed to achieve a defined
outcome
-Knowledge: Awareness and understanding of a set of information

The Characteristics of Valuable Information


• lf information is not accurate or complete
- People can make poor decisions, costing thousands, or even millions, of
dollars
• Information can be of little value to the organization
- If information is not relevant, not delivered to decision makers in a timely
fashion, or too complex to understand

PSSLC Page 4 of 15
The Value of Information
• Valuable information
-Can help people and their organizations perform tasks more efficiently and
effectively
- Can help managers decide whether to invest in additional information
systems and technology

What Is an Information System?


• Feedback mechanism
- The component that helps organizations achieve their goals, such as
increasing profits or improving customer service

Input, Processing, Output, Feedback


• Input
- Gathering and capturing raw data
• Processing
- Converting or transforming data into useful outputs
• Output
-Production of useful information, usually in the form of documents and
reports
• Feedback
-Output that is used to make changes to input or processing activities

Manual and Computerized Information Systems


• An information system can be:
- Manual
• Example: Developing patterns and trends on graph paper for stock analysis
-Computerized
• Example: Using program trading to track the market and trade large blocks
of stocks when discrepancies occur

Computer-Based Information Systems


• Single set of hardware, software, databases, telecommunications, people,
and procedures configured to collect, manipulate, store, and process data
into information
• Information technology (IT)
-Hardware, software, databases, and telecommunications

Computer-Based Information Systems


• CBIS components
- Hardware: Computer equipment used to perform input, processing, and
output activities
-Software: Computer programs that govern the operation of the computer
-Database: Organized collection of facts and information

PSSLC Page 5 of 15
-Telecommunications: Electronic transmission of signals for
communications
-Networks: Connect computers and equipment in a building, around the
country and around the world
• CBIS components
- Internet: World's largest computer network
- People: Manage, run, program, and maintain the system
- Procedures: Strategies, policies, methods, and rules for using a CBIS

Business Information Systems


• Most common types of information systems used are those designed for:
- Electronic and mobile commerce

-Transaction processing
-Management information
- Decision support

IV. Computer hardware from computer software


TP 2: Hardware Components & Types of Software

Computer Hardware
It is the collection of physical components that constitute a computer
system. Computer hardware is the physical parts or components of a
computer, such as monitor, keyboard, computer data storage, hard disk drive
(HDD), graphic card, sound card, memory (RAM), motherboard, and so on, all
of which are tangible physical objects. By contrast, software is instructions
that can be stored and run by hardware.

Hardware is directed by the software to execute any command or


instruction. A combination of hardware and software forms a usable
computing system

List of Computer Hardware


Here are some common individual computer hardware components that you'll
often find inside a modern computer. These parts are almost always found
inside the computer's housing:

• Motherboard
• Central Processing Unit (CPU)
• Random Access Memory (RAM)
• Power Supply
• Video Card
• Hard Drive (HDD)
• Solid-State Drive (SSD)
• Optical Drive (e.g. BD/DVD/CD drive)
• Card Reader (SD/SDHC, CF, etc.)

PSSLC Page 6 of 15
Here is some common hardware that you might find connected to the
outside or a computer, although many tablets, laptops, and netbooks integrate
some of these items into their housings:

• Monitor
• Keyboard
• Mouse
• Battery Backup (UPS)
• Flash Drive
• Printer
• Speakers
• External Hard Drive
• Pen Tablet

Computer Software

It is a collection of instructions that enable the user to interact with a


computer, its hardware, or perform tasks. Without software, computers would
be useless. For example, without your Internet browser, you could not surf the
Internet or read this page and without an operating system, the browser could
not run on your computer. The picture to the right shows a Microsoft Excel
box, an example of a spreadsheet software program. Different types of
software have different functions:

• Operating system (OS) software - makes your computer work


• Application software - lets you do different tasks on your computer
• Utility software - helps you maintain your computer and keep it in good
running condition

How Do I Use Software?

It is important to choose the right software program for the type of task
you want to do:

PSSLC Page 7 of 15
V. Electronic concerns related to internet
TP 3: Internet and Electronic Concerns

New technologies are radically advancing our freedoms but they are also
enabling unparalleled invasions of privacy.

Your cell phone helps you keep in touch with friends and family, but it also
makes it easier for security agencies to track your location.

Your Web searches about sensitive medical information might seem a secret

between you and your search engine, but companies like Google are creating
a treasure trove of personal information by logging your online activities, and
making it potentially available to any party wielding enough cash or a
subpoena.

And the next time you try to board a plane, watch out-you might be turned
away after being mistakenly placed on a government watch list, or be forced
to open your email in the security line.

National and international laws have yet to catch up with the evolving need for
privacy that comes with new technology. Several governments have also
chosen to use malware to engage in extra-legal spying or system sabotage
for dissidents or non-citizens, all in the name of "national security."

Respect for individuals’ autonomy, anonymous speech, and the right to free
association must be balanced against legitimate concerns like law
enforcement. National governments must put legal checks in place to prevent
abuse of state powers, and international bodies need to consider how a
changing technological environment shapes security agencies' best practice.

VI. Definition of Terms


TP 4: Internet, intranet and extranet

Internet
This is the world-wide network of computers accessible to anyone who knows
their Internet Protocol (IP) address - the IP address is a unique set of
numbers (such as 208.33.27.100) that defines the computer's location. Most
will have accessed a computer using a name such as http://www.hcidata.com.
Before this named computer can be accessed, the name needs to be
resolved (translated) into an IP address. To do this your browser (for example
Netscape or Internet Explorer) will access a Domain Name Server (DNS)
computer to lookup the name and return an IP address-or issue an error
message to indicate that the name was not found. Once your browser has the
IP address it can access the remote computer. The actual server (the
computer that serves up the web pages) does not reside behind a firewall -if it
did, it would be an Extranet. It may implement security at a directory level so
that accessible is via a username and password, but otherwise all the
information is accessible. To see typical security, have a look at a sample

PSSLC Page 8 of 15
secure directory- the username is Dr and the password is Who (both
username and password are case sensitive)

Intranet
This is a network that is not available to the world outside of the Intranet. If the
Intranet network is connected to the Internet, the Intranet will reside behind a
firewall and, if it allows access from the Internet, will be an Extranet. The
firewall helps to control access between the Intranet and Internet to permit
access to the intranet only to people who are members of the same company
or organization,

In its simplest form, an Intranet can be set up on a networked PC without any


PC on the network having access via the Intranet network to the Internet.

For example, consider an office with a few PCs and a few printers all
networked together. The network would not be connected to the outside
world. On one of the drives of one of the PCs there would be a directory of
web pages that comprise the Intranet. Other PCs on the network could access
this Intranet by pointing their browser (Netscape or Internet Explorer) to this
directory for example U:linetlindex. htm.

From then onwards they would navigate around the Intranet in the same way
as they would get around the Internet.

Extranet
An Extranet is actually an Intranet that is partially accessible to authorized
outsiders. The actual server (the computer that serves up the web pages) will
reside behind a firewall. The firewall helps to control access between the
Intranet and Internet permitting access to the Intranet only to people who are
suitably authorized. The level of access can be set to different levels for
individuals or groups of outside users. The access can be based on a
username and password or an IP address (a unique set of numbers such as
209.33.27.100 that defines the computer that the user is on).

VII. General Information


TP 5: Modes of Operations

GENERAL INFORMATION
The National Bureau of Standards issued Federal Information Processing
Standards Publication 46 (FIPS PUB 46) in 1977. That standard specifies a
cryptographic algorithm, commonly called the Data Encryption Standard
(DES) algorithm, to be used within the Federal Government for the
cryptographic protection of sensitive, but unclassified, computer data. The
DES algorithm was developed by the International Business Machines
Corporation (IBM) and submitted to the National Bureau of Standards during
an NBS public solicitation for cryptographic algorithms to be used in a Federal
Information Processing Standard. Several methods for incorporating this

PSSLC Page 9 of 15
algorithm into a cryptographic system are possible. These methods, external
to the DES algorithm, have come to be called the "modes of operation. Four
modes, called, the Electronic Codebook (ECB) mode, the Cipher Block
Chaining (CBC) mode, the Cipher Feedback (CFB) mode, and the Output
Feedback (OFB) mode, are specified in this standard. ECB is a direct
application of the DES algorithm to encrypt and decrypt data; CBC is an
enhanced mode of ECB which chains together blocks of Cipher text; CFB
uses previously generated cipher text as input to the DES to generate
pseudo-random outputs which are combined with the plain text to produce
Cipher text, thereby chaining together the resulting cipher text; OFB Is
identical to CFB except that the previous output of the DES is used as input in
OFB while the previous cipher text is used as input in CFB. OFB does not
chain the cipher text. The proposed FIPS specifies these four modes because
they are capable of providing acceptable levels of protection for all anticipated
unclassified Federal ADP encryption applications.

VIII. Managing Security and Ethical Issues in effective Information


Security
TP 6: Security of an Information System
Security is a broad topic and covers a multitude of sins. In its
simplest from, it is concerned with making sure that nosy people cannot
read, or worse yet, modify messages intended for other recipients. It is
concerned with people trying to access remote services that they are not
authorized to use. Most security problems are intentionally caused by
malicious people trying to gain some benefit or harm someone. Student
have fun snooping on people's email, hacker hacks to test out someone's
security system or steal information, businessman causes breach in
security to discover a competitor's strategic marketing plan, an ex -
employee leaks information to get revenge for being fired, a terrorist to
steal germ warfare secrets. These all-unauthorized access to information
system causes serious security problems.

Data security is a broad category of activities that covers all aspects of


protecting the integrity of a computer or computer network. Under its most
liberal interpretation, data security involves protecting a computer from
external threats (from individuals outside the organization), internal threats
(from individuals within the organization) and from threats to hardware as well
as to software. In this interpretation, disaster recovery can be considered a
part of data security as information managers seek to protect data from
natural disasters and manmade attacks

Organizations can improve their security by simply observing fundamental


strategies such as using only licensed copies of software which are unlikely to
have viruses installed on them and by limiting access to computers and files
on those computers. Just as physical files have limited access points, so data
files should also be limited to those individuals who have a business reason
for viewing the files. Passwords and access codes provide rudimentary
security at this level, and will prevent access by the merely curious.
Information security is important in proportion to an organization's

PSSLC Page 10 of 15
dependence on information technology. When an organization's information is
exposed to risk, the use of information security technology, however, deals
with only a small fraction of the problem of information risk. In fact, the
evidence increasingly suggests that information security technology does not
reduce information risk very effectively.

Ethics refers to the principles of right and wrong that individual, acting as free
moral agents, use to make choices to guide their behaviors. Information
systems raise new ethical questions for both individuals and societies
because they create opportunities for intense social change, and thus
threaten existing distributions of power, money rights, and obligations.

Security of an Information System


Information system security refers to the way the system is defended against
unauthorized access, use, disclosure, disruption, modification, perusal,
inspection, recording or destruction.

There are two major aspects of information system security:

• Security of the information technology used - securing the system from


malicious cyber-attacks that tend to break into the system and to
access critical private information or gain control of the internal
systems.

• Security of data - ensuring the integrity of data when critical issues,


arise such as natural disasters, computer/server malfunction, physical
theft etc. Generally, an off- site backup of data is kept for such
problems.

Guaranteeing effective information security has the following key


aspects:

• Preventing the unauthorized individuals or systems from accessing the


information.

• Maintaining and assuring the accuracy and consistency of data over its
entire life-cycle.

• Ensuring that the computing systems, the security controls used to


protect it and the communication channels used to access it,
functioning correctly all the time, thus making information available in
all situations.

• Ensuring that the data, transactions, communications or documents are


genuine.

PSSLC Page 11 of 15
• Ensuring the integrity of a transaction by validating that both parties
involved are genuine, by incorporating authentication features such as
"digital signatures".

• Ensuring that once a transaction takes place, none of the parties can
deny it, either having received a transaction, or having sent a
transaction. This is called 'non-repudiation'.

• Safeguarding data and communications stored and shared in network


systems.

Information Systems and Ethics


Information systems bring about immense social changes, threatening the
existing distributions of power, money, rights, and obligations. It also raises
new kinds of crimes, like cyber-crimes.
Following organizations promote ethical issues:

• The Association of Information Technology Professionals (AlTP)

• The Association of Computing Machinery (ACM)

• The Institute of Electrical and Electronics Engineers (EEE)

• Computer Professionals for Social Responsibility (CPSR)

IX. Break (10 mins)

X. Core Rules of Netiquette


TP 7: Ten (10) Proper Ways to Communicate in an online
Environment

Core Rules of Netiquette


Netiquette, or network etiquette, is concerned with the "proper" way to
communicate in an online environment. Consider the following "rules,"
adapted from Virginia Shea's The Core Rules of Netiquette, whenever you
communicate in the Virtual world.

Rule 1: Remember the Human


When communicating electronically, whether through email, instant message,
discussion post, text, or some other method, practice the Golden Rule: Do
unto others as you would have others do unto you. Remember, your written
words are read by real people, all deserving of respectful communication.
Before you press "send" or "submit," ask yourself, "Would T be okay with this
if someone else had written it?"

Rule 2: Adhere to the same standards of behavior online that you follow
in real life

PSSLC Page 12 of 15
While it can be argued that standards of behavior may be different in the
virtual world, they certainly should not be lower. You should do your best to
act within the laws and ethical manners of society whenever you inhabit
"cyberspace." Would you behave rudely to someone face-to-face? On most
occasions, no. Neither should you behave this way in the virtual world.

Rule 3: Know where you are in cyberspace


"Netiquette varies from domain to domain." (Shea, 1994) Depending on where
you are in the virtual world, the same written communication can be
acceptable in one area, where it might be considered inappropriate in another.
What you text to a friend may not be appropriate in an email to a classmate or
colleague. Can you think of another example?

Rule 4: Respect other people's time and bandwidth


Electronic communication takes time: time to read and time in which to
respond. Most people today lead busy lives, just like you do, and dont have
time to read or respond to frivolous emails or discussion posts. As a virtual
world communicator, it is your responsibility to make sure that the time spent
reading your words isn't wasted. Make your written communication meaningful
and to the point, without extraneous text or superfluous graphics or
attachments that may take forever to download.

Rule 5: Make yourself look good online


One or the best things about the virtual world is the lack of judgment
associated with your physical appearance, sound of your voice, or the clothes
you wear (unless you post a video of yourself singing Karaoke in a clown
outfit.) You will, however, be judged by the quality of your writing, so keep the
following tips in mind:

• Always check for spelling and grammar errors

• Know what you're talking about and state it clearly

• Be pleasant and polite

Rule 6: Share expert knowledge


The Internet offers its users many benefits; one is the ease in which
information can be shared or accessed and in fact, this "information sharing"
capability is one of the reasons the Internet was founded. So, in the spirit of
the Internet's "founding fathers, share what you know! When you post a
question and receive intelligent answers, share the results with others. Are
you an expert at something? Post resources and references about your
subject matter. Recently expanded your knowledge about a subject that might
be of interest to others? Share that as well.

Rule 7: Help keep flame wars under control


What is meant by flaming" and "flame wars?" "Flaming is what people do
when they express a strongly held opinion without holding back any emotion."
(Shea, 1994). As an example, think of the kinds of passionate comments you

PSSLC Page 13 of 15
might read on a sports blog. While "flaming" is not necessarily forbidden in
virtual communication, "flame wars," when two or three people exchange
angry posts between one another, must be controlled or the camaraderie of
the group could be compromised. Don't feed the flames; extinguish them by
guiding the discussion back to a more productive direction.

Rule 8: Respect other people's privacy


Depending on what you are reading in the virtual world, be it an online class
discussion forum, Facebook page, or an email, you may be exposed to some
private or personal information that needs to be handled with care. Perhaps
someone is sharing some medical news about a loved one or discussing a
situation at work.
What do you think would happen if this information "got into the wrong hands?
Embarrassment? Hurt feelings? Loss of a job? Just as you expect others to
respect your privacy, so should you respect the privacy of others. Be sure to
err on the side or caution when deciding to discuss or not to discuss virtual
communication.

Rule 9: Don't abuse your power


Just like in face-to-face situations, there are people in cyberspace who have
more power than others. They have more expertise in technology or they
have years of experience in a particular skill or subject matter. Maybe it's you
who possesses all of this knowledge and power! Just remember: knowing
more than others do or having more power than others may have does not
give you the right to take advantage of anyone. Think of Rule 1: Remember
the human.

Rule 10: Be forgiving of other people's mistakes


Not everyone has the same amount of experience working in the virtual world.
And not everyone knows the rules of netiquette. At some point, you will see a
stupid question, read an unnecessarily long response, or encounter
misspelled words, when this happens, practice kindness and forgiveness as
you would hope someone would do if you had committed the same offense. If
it's a minor "offense, you might want to let it slide. If you feel compelled to
respond to a mistake, do so in a private email rather than a public forum.

Adapted from The Core Rules of Netiquette Shea, V. (1994). Core rules of netiquette.
Netiquette (Online ed., pp. 32-45). San Francisco: Albion Books.

XI. SUMMARY & APPLICATION

Summarize the Lesson/Important Points Discussed


Knowing the potential impact of information systems and having the
ability to put this knowledge to work can result in a successful personal career
and organizations that reach their goals. The use of information systems to
add value to the organization can also give an organization a competitive
advantage. Cooperation between business managers and IS personnel is the
key to unlocking the potential of any new or modified system.

PSSLC Page 14 of 15
Application
Require the students to use software applications using the computer
individually.

XII. TEST
A. Formulate twenty (20) test items that are aligned with the
learning objectives.

PSSLC Page 15 of 15

You might also like