Information Technology
Information Technology
Lesson Plan
Venue : Classrooms
https://www.google.com.ph/#q=comp
uter
https://www.google.com.ph/#q=Fund
amentals+of+Information+Technolog
y
PSSLC Page 1 of 15
coursedesign.colostate.edu/obj/corer
ulesnet.html
http;//www/peacedirect.org/landing-
page/world-
peace/?gclid=CKTom66qxdECFYKV
vAod
Lesson Objectives:
PSSLC Page 2 of 15
Presentation Outline:
PSSLC Page 3 of 15
Lesson Plan
Lesson Topic – Information Technology: A Managerial Overview
• Opening Prayer
• Introduction of Instructor
• Checking of attendance
• Administrative announcements
• Clarification of Personal Learning/Leveling of Expectations
Leveling of expectation using KWL Approach (Know-Want-
Information Concepts
• Data, information, and knowledge
- Data: Raw facts
- Information: Collection of facts organized in such a way that they have
additional value beyond the value of the facts themselves
- Process: Set of logically related tasks performed to achieve a defined
outcome
-Knowledge: Awareness and understanding of a set of information
PSSLC Page 4 of 15
The Value of Information
• Valuable information
-Can help people and their organizations perform tasks more efficiently and
effectively
- Can help managers decide whether to invest in additional information
systems and technology
PSSLC Page 5 of 15
-Telecommunications: Electronic transmission of signals for
communications
-Networks: Connect computers and equipment in a building, around the
country and around the world
• CBIS components
- Internet: World's largest computer network
- People: Manage, run, program, and maintain the system
- Procedures: Strategies, policies, methods, and rules for using a CBIS
-Transaction processing
-Management information
- Decision support
Computer Hardware
It is the collection of physical components that constitute a computer
system. Computer hardware is the physical parts or components of a
computer, such as monitor, keyboard, computer data storage, hard disk drive
(HDD), graphic card, sound card, memory (RAM), motherboard, and so on, all
of which are tangible physical objects. By contrast, software is instructions
that can be stored and run by hardware.
• Motherboard
• Central Processing Unit (CPU)
• Random Access Memory (RAM)
• Power Supply
• Video Card
• Hard Drive (HDD)
• Solid-State Drive (SSD)
• Optical Drive (e.g. BD/DVD/CD drive)
• Card Reader (SD/SDHC, CF, etc.)
PSSLC Page 6 of 15
Here is some common hardware that you might find connected to the
outside or a computer, although many tablets, laptops, and netbooks integrate
some of these items into their housings:
• Monitor
• Keyboard
• Mouse
• Battery Backup (UPS)
• Flash Drive
• Printer
• Speakers
• External Hard Drive
• Pen Tablet
Computer Software
It is important to choose the right software program for the type of task
you want to do:
PSSLC Page 7 of 15
V. Electronic concerns related to internet
TP 3: Internet and Electronic Concerns
New technologies are radically advancing our freedoms but they are also
enabling unparalleled invasions of privacy.
Your cell phone helps you keep in touch with friends and family, but it also
makes it easier for security agencies to track your location.
Your Web searches about sensitive medical information might seem a secret
between you and your search engine, but companies like Google are creating
a treasure trove of personal information by logging your online activities, and
making it potentially available to any party wielding enough cash or a
subpoena.
And the next time you try to board a plane, watch out-you might be turned
away after being mistakenly placed on a government watch list, or be forced
to open your email in the security line.
National and international laws have yet to catch up with the evolving need for
privacy that comes with new technology. Several governments have also
chosen to use malware to engage in extra-legal spying or system sabotage
for dissidents or non-citizens, all in the name of "national security."
Respect for individuals’ autonomy, anonymous speech, and the right to free
association must be balanced against legitimate concerns like law
enforcement. National governments must put legal checks in place to prevent
abuse of state powers, and international bodies need to consider how a
changing technological environment shapes security agencies' best practice.
Internet
This is the world-wide network of computers accessible to anyone who knows
their Internet Protocol (IP) address - the IP address is a unique set of
numbers (such as 208.33.27.100) that defines the computer's location. Most
will have accessed a computer using a name such as http://www.hcidata.com.
Before this named computer can be accessed, the name needs to be
resolved (translated) into an IP address. To do this your browser (for example
Netscape or Internet Explorer) will access a Domain Name Server (DNS)
computer to lookup the name and return an IP address-or issue an error
message to indicate that the name was not found. Once your browser has the
IP address it can access the remote computer. The actual server (the
computer that serves up the web pages) does not reside behind a firewall -if it
did, it would be an Extranet. It may implement security at a directory level so
that accessible is via a username and password, but otherwise all the
information is accessible. To see typical security, have a look at a sample
PSSLC Page 8 of 15
secure directory- the username is Dr and the password is Who (both
username and password are case sensitive)
Intranet
This is a network that is not available to the world outside of the Intranet. If the
Intranet network is connected to the Internet, the Intranet will reside behind a
firewall and, if it allows access from the Internet, will be an Extranet. The
firewall helps to control access between the Intranet and Internet to permit
access to the intranet only to people who are members of the same company
or organization,
For example, consider an office with a few PCs and a few printers all
networked together. The network would not be connected to the outside
world. On one of the drives of one of the PCs there would be a directory of
web pages that comprise the Intranet. Other PCs on the network could access
this Intranet by pointing their browser (Netscape or Internet Explorer) to this
directory for example U:linetlindex. htm.
From then onwards they would navigate around the Intranet in the same way
as they would get around the Internet.
Extranet
An Extranet is actually an Intranet that is partially accessible to authorized
outsiders. The actual server (the computer that serves up the web pages) will
reside behind a firewall. The firewall helps to control access between the
Intranet and Internet permitting access to the Intranet only to people who are
suitably authorized. The level of access can be set to different levels for
individuals or groups of outside users. The access can be based on a
username and password or an IP address (a unique set of numbers such as
209.33.27.100 that defines the computer that the user is on).
GENERAL INFORMATION
The National Bureau of Standards issued Federal Information Processing
Standards Publication 46 (FIPS PUB 46) in 1977. That standard specifies a
cryptographic algorithm, commonly called the Data Encryption Standard
(DES) algorithm, to be used within the Federal Government for the
cryptographic protection of sensitive, but unclassified, computer data. The
DES algorithm was developed by the International Business Machines
Corporation (IBM) and submitted to the National Bureau of Standards during
an NBS public solicitation for cryptographic algorithms to be used in a Federal
Information Processing Standard. Several methods for incorporating this
PSSLC Page 9 of 15
algorithm into a cryptographic system are possible. These methods, external
to the DES algorithm, have come to be called the "modes of operation. Four
modes, called, the Electronic Codebook (ECB) mode, the Cipher Block
Chaining (CBC) mode, the Cipher Feedback (CFB) mode, and the Output
Feedback (OFB) mode, are specified in this standard. ECB is a direct
application of the DES algorithm to encrypt and decrypt data; CBC is an
enhanced mode of ECB which chains together blocks of Cipher text; CFB
uses previously generated cipher text as input to the DES to generate
pseudo-random outputs which are combined with the plain text to produce
Cipher text, thereby chaining together the resulting cipher text; OFB Is
identical to CFB except that the previous output of the DES is used as input in
OFB while the previous cipher text is used as input in CFB. OFB does not
chain the cipher text. The proposed FIPS specifies these four modes because
they are capable of providing acceptable levels of protection for all anticipated
unclassified Federal ADP encryption applications.
PSSLC Page 10 of 15
dependence on information technology. When an organization's information is
exposed to risk, the use of information security technology, however, deals
with only a small fraction of the problem of information risk. In fact, the
evidence increasingly suggests that information security technology does not
reduce information risk very effectively.
Ethics refers to the principles of right and wrong that individual, acting as free
moral agents, use to make choices to guide their behaviors. Information
systems raise new ethical questions for both individuals and societies
because they create opportunities for intense social change, and thus
threaten existing distributions of power, money rights, and obligations.
• Maintaining and assuring the accuracy and consistency of data over its
entire life-cycle.
PSSLC Page 11 of 15
• Ensuring the integrity of a transaction by validating that both parties
involved are genuine, by incorporating authentication features such as
"digital signatures".
• Ensuring that once a transaction takes place, none of the parties can
deny it, either having received a transaction, or having sent a
transaction. This is called 'non-repudiation'.
Rule 2: Adhere to the same standards of behavior online that you follow
in real life
PSSLC Page 12 of 15
While it can be argued that standards of behavior may be different in the
virtual world, they certainly should not be lower. You should do your best to
act within the laws and ethical manners of society whenever you inhabit
"cyberspace." Would you behave rudely to someone face-to-face? On most
occasions, no. Neither should you behave this way in the virtual world.
PSSLC Page 13 of 15
might read on a sports blog. While "flaming" is not necessarily forbidden in
virtual communication, "flame wars," when two or three people exchange
angry posts between one another, must be controlled or the camaraderie of
the group could be compromised. Don't feed the flames; extinguish them by
guiding the discussion back to a more productive direction.
Adapted from The Core Rules of Netiquette Shea, V. (1994). Core rules of netiquette.
Netiquette (Online ed., pp. 32-45). San Francisco: Albion Books.
PSSLC Page 14 of 15
Application
Require the students to use software applications using the computer
individually.
XII. TEST
A. Formulate twenty (20) test items that are aligned with the
learning objectives.
PSSLC Page 15 of 15