ITGS Syllabus

Friday, September 05, 2008

Linux vs. Mac vs. Windows

They worked on Vista for years and it ended up looking like Mac
Mac works on UNIX
Linux works with UNIX
Linux vs. Mac vs. Windows
Mac took Linux users away because Mac had UNIX and was user friendly
Linux became server only/computers with little user friendly software
Mac moved to Intel over IBM

Mac took Linux out of the picture and wants to replace Microsoft out next

The first computers ran on thousands of vacuum tubes
Many would break therefore someone would run around replacing them
Early computers would have been used for military purposes etc

Banks used to close at 3 pm to have time to record all the days transactions and update all the accounts before the start of the next day.

Next they started converting them onto computer cards IBM Cards Holerith cards
They needed a way to convert stuff humans can read and write into 1s and 0s for a computer to understand Binary.
So they had to make a code (eg ‘A” would be 00, ‘B’ would be like 01 etc)
It was like light bulbs doing binary
(4 light bulbs only got you to 15, 5 got you to 31)
7 got you the amount you need but 7 wasn’t binary friendly, so they got to 8, containing 255 bits
Binary means a bunch of 0s and 1s (on and off)
1 2 4 8 16 32 64 128

The smallest unit of binary used was 8 (1, 2, 4 were too smaller)\
Bits was 1’s and 0’s, 8 bits were a byte
At first they only used capitals because lowercase letters need more memory
Old cards with a bunch holes in them to mark the binary for each letter
Modern variation of this is with the SATS where you mark down on cards with pencils

Evolution of Computers

Computers have a circuit in which you can have two inputs.
Computers have to make decisions, namely yes or no; 0 is false and 1 is true.

For example:

1 ---
and ---- 0
0 ---


1 ---
or ---- 1
0 ---

Computers have transistors (originally bulbs), which direct the flow of information in a computer. Then, micro-transistors were created that had many thousand or millions of transistors fit on one chip allowing for multiple decisions by that chip. One single chip emerged, the microprocessor or the CPU, which became the most important chip in a computer.

Now, major chip producing companies, such as Intel, are fitting multiple microprocessors in one CPU. For example, the “Core 2 Duo” has two and the “Quad-core” has four. for putting several processors together.

The RAM (random access memory) remembers certain information for making decisions later.

Thursday, August 28, 2008

LAST THING WE WEERE TALKING ABOUT was bill gates and dos


Software topic
When computers were first invented, they had large chips
Many chips are integrated now, in the 50’s, each function had its own chip Each design was so unique, the software had to be unique (software for one computer won’t run on the other.)

In the 60’s IBM was king
Unysis built a computer like IBM but cheaper. It took IBM software and use it on the Unysis No software had ever been sold or used on another machine.

Define software as a product by separating hardware and software
Now IBM started to make and sell software. Problems with modern day selling software. (Can I give it to my family use it in my family?) Companies use licenses to allow users (family etc) Software rights as a concept is only 40 years old.
Software rights
Software Companies compare software rights to things like stealing cars etc, but software is like nothing else. Software isn’t made of any real thing, like a car is. Its just an idea (compare software to a story in a book where the book is the hardware and the story is the software). Having a book read to you. Then reciting it to others, is that stealing. You can read the stories to others but don’t do like a music concert with the book.

Everything became mixed up. Radio was free to anyone who had a receiver
Should playing a song on the radio at 2 in the morning costs less than during the day say 1 million people listen or 0.

Software should let the market forces should determine price and distribution.
Music on radio gets 5 cents to the artists (popular song is 5 cents, unknown songs is 5 cents) determined by US government (not free market)
Record companies lost sales when people recorded the radio with tapes
So government ‘taxed’ tapes (no matter what kind of tape) and gave that to the recording artists.

They didn’t tax DVDs/CDSs didn’t because there was too much resistance and too many other uses for discs.

NBC broadcast making free stuff, but cable companies sold it as a service. NBC complained that they were making money for content that they were giving for free. The government stepped in and made cable companies pay a fee for the content.

Software is just an idea (like stories in books are just ideas)
But software runs machines (even appliances) A lot of the times software runs hardware but its still an idea.

Since software is ideas it should it be patented But old software should have their patents expire. Japan (25 years) for music patents to run out
Billy Joel was popular for more than 25 years so his songs are common place on TV commercials.

Rights on Mickey Mouse since its so popular after a many years Disney lobbied to have their patent increased. From 25 to 50 to 75 years.

Fair length of time for a patent? Forever?

How about until the creator died?

How about a long time since the guy who made it has to support their kids?

Rights of the book should pass onto their kids
(because if he dies when his child is only two that would be unfair to his kid)

Wednesday, January 02, 2008

Table of Contents

2.1.1 System Fundementals

Topic 01: by Kent Harvath (1)
Topic 02: by Joseph Toyoshima (1)
Topic 03: by Roger Maue (1)
Topic 04: by Ken Moyer (1)
Topic 05: by Akira Jackson (1)
Topic 06: by HeeJun Son (1)
Topic 07: by Takafumi (1)
Topic 08: by Sung Hwan Chun (1)
Topic 09: by Andrew Leung (1)
Topic 10: by Sam Simaskul (1)
Topic 11: by Matthew Wilder (1)
Topic 12: by Tommy Chang (1) and Xiao Xiao (1)
Topic 13: by Tomer Lapidot (1)

Topic 14: by Xiao Xiao (2)

Topic 15: by Raymon Ohmori (1)
Topic 16: by Romeo Wu (1)

2.1.2 Networks

Topic 17: by Isaku (1)
Topic 18: by Raymon (2)
Topic 19: by Haider (1)
Topic 20: by Chaan Tutlam (1)
Topic 21: by Simon Ruiz (1)
Topic 22: by Tanay Khandelwal (1)
Topic 23: by Vaibhav Bhandari (1)
Topic 24: by Su Chen (1)
Topic 25: by Dhruv (1)
Topic 26: by Taro Kondo (1)
Topic 27: by Alex Young (1)
Topic 28: by Ronald (1)
Topic 29: by Aditya Kumar (1)
Topic 30: by Dwarkesh Iyengar (1)
Topic 31: by Marek Strzepek (1)
Topic 32: by Chirag Garg (1)
Topic 33: by Wilanth James (1)
Topic 34: by Oliver Chan (1)
Topic 35: by Nitish Gautam (1)
Topic 36: by Harsh Sharma (1)

2.2.1 Software Fundamentals

Topic 37: by Tommy Chuang (2)
Topic 38: by Ken Moyer (2)
Topic 39: by Dwarkesh (2)
Topic 40: by Raymon (3)
Topic 41: by Andrew (2)
Topic 42: by Roger (2)
Topic 43: by Ronald (2) & Wilanth (2)
Topic 44: by Oliver (2)

2.2.2 Databases and Spreadsheets

Topic 45: by Matthew Wilder (2)
Topic 46: by Taro Kondo (2)
Topic 47: by Simon Ruiz (2)
Topic 48: by HeeJun (2)
Topic 49: by Aditya (2)
Topic 50: by Akira (2)
Topic 51: by Haider (2)
Topic 52: by Joseph (2)
Topic 53: by Kent (2)
Topic 54: by Chirag Garg (2) or Isaku (2)
Topic 55: by Sam (2)
Topic 56: by Tomer (2)
Topic 57: by Chaan (2)
Topic 58: by Su Chen (2)
Topic 59: by Nitish Gautam (2)
Topic 60: by Raymon (4)
Topic 61: by Xiao Xiao Li (3)
Topic 62:
by Raymon (5)
Topic 63: by Vaibhav Bhandari (2)
Topic 64: by Tanay (2)
Topic 65: by Marek (2)
Topic 66: by Isaku (3)
Topic 67: by Alex Young (2)
Topic 68:
by Harsh (2)
Topic 69: by Harsh (3)
Topic 70: by Dhruv (2)

2.2.3 Word processing and desktop publishing

Topic 71: by HeeJun (3)
Topic 72: by Vaibhav (3) or Isaku (4)
Topic 73: by Dwarkesh (3)
Topic 74:
by Isaku (5) and Takafumi (2)
Topic 75:
by Marek (3)
Topic 76: by Tomer (3)
Topic 77: by Andrew (3)
Topic 78: by Nitish Gautam (3)
Topic 79: by Sujit George (1)

Topic 80: by Joseph Toyoshima (3)
Topic 81: by Sung-Hwan Chun (2)

2.2.4 Images, Sound and Presentations


Topic 82: by Ken Moyer (3)
Topic 83: by Ronald (3)
Topic 84: by Romeo Wu (2)
Topic 85: by Akira (3)
Topic 86: by Simon Ruiz (3)
Topic 87: by Chirag (3)
Topic 88: by Wilanth (3)
Topic 89: by Tommy (3)
Topic 90: by Taro (3)
Topic 91:
by Sung-Hwan Chun (3) or Tommy()
Topic 92: by Harsh (4)
Topic 93: by Matthew (3)
Topic 94: by Ken Moyer (4)
Topic 95: by Dhruv (3)
Topic 96: by Sam (3)
Topic 97: by Harsh (5)
Topic 98: by Xiao Xiao (4)
Topic 99:
by Chirag Garg (4) and Takafumi (3)
Topic 100: by Chaan (3)


2.2.5 Modelling and Simulations


Topic 101: by Roger (3)
Topic 102: by Haider (3)
Topic 103: by Su Chen (3)
Topic 104: by Haider (4)
Topic 105: by Sujit (2)
Topic 106:
by Chaan (4)
Topic 107: by Xiao Xiao (5)

Topic 108:
by Romeo Wu (3)
Topic 109: by Xiao Xiao (6)
Topic 110:
by no one yet (1)
Topic 111:
by Raymon (6)
Topic 112:
by Sam (4)
Topic 113: by Tomer (4)

2.2.6 Tutorials, training and wizards (assistants)

Topic 114: by Nitish (4)
Topic 115: by no one yet (2)
Topic 116: by Dhruv (4)
Topic 117: by Vaibhav (4)
Topic 118:
by Aditya (3)

2.3.1 The Internet

Topic 119: by Matthew (4) or Sujit (3)
Topic 120:
by Oliver (4)
Topic 121: by Simon (4)
Topic 122: by Roger (4) or Sujit (4)
Topic 123: by Akira (4)
Topic 124:
by Tanay (3) or Sujit (5)
Topic 125: by Alex (3)
Topic 126: by Aditya (4)
Topic 127: by HeeJun (4)
Topic 128: by Kent (3)
Topic 129:
by Sung-Hwan Chun (4)
Topic 130: by Oliver (3)
Topic 131: by Ronald (4)
Topic 132: by Wilanth (4)
Topic 133: by Su Chen (4)
Topic 134:
by Wilanth (5) or Nitish Gautam (5)
Topic 135: by Alex (4)
Topic 136:
by Romeo Wu (4) or Chirag (5)
Topic 137:
by Tommy (4)
Topic 138: by Joseph (4)
Topic 139:
by Isaku (6)
Topic 140:
by Taro Kondo (4)
Topic 141:
by Ken Moyer (5)
Topic 142: by Kent (4)
Topic 143:
by Dwarkesh (4) and Aditya Kumar (5)

2.3.2 Personal and Public Communications

Topic 144: by Romeo Wu (5)
Topic 145: by Harsh (6)
Topic 146: by Hee Jun Sun
(5)
Topic 147: by Kent Herath (5)

Topic 148: by
Xiao Xiao (7)
Topic 149: by Simon Ruiz
(5) or
Dwarkesh (5)
Topic 150: by Romeo Wu (6)
Topic 151: by Su Chen (5)
Topic 152: by Chaan (5) or Chirag (6)
Topic 153: Key Terms by Ken Moyer
(6)
Topic 154: by Sam (5)
Topic 155: by Sung-Hwan Chun
(5)
Topic 156: by Roger
(5)
Topic 157: by Vaibhav (5)
Topic 158: by Tanay (4) and Taro (5)
Topic 159:
by Harsh (7)
Topic 160:
by Xiao Xiao (8)
Topic 161: by Vaibhav (6)
Topic 162: by Alex (5) with additions by Nitish
Topic 163: by Roger (6)

2.4.1 Robotics


Topic 164: by Aditya (6) or Akira (5)

Topic 165: by Dwarkesh (6)

Topic 166: by Nitish (6) and Sung-Hwan (6)
Topic 167: by Takafumi
(4)
Topic 168: by Akira (6) or Sung-Hwan (7)

Topic 169: Key Terms by Matthew Wilder (5)
Topic 170: by Andrew Leung
(4)
Topic 171: by Kent (6)
Topic 172: by Raymon
(7)
Topic 173: by Andrew (5) or Taro (6) or Aditya (7)
Topic 174: by Andrew (6)

2.4.2 Artificial Intelligence and Expert Systems

Topic 175: by Nitish (7)
Topic 176: by Isaku
(7) or Chirag (7)
Topic 177: by Isaku (8) or Marek (4)
Topic 178: by Takafumi (5) or Chirag (8)
Topic 179: by HeeJun (6)
Topic 180: by Dwarkesh (7)
Topic 181: by Vaibhav (7)
Topic 182: Key Terms by Tommy
(5) or Tanay (5) or Matthew (6)
Topic 183: by Joseph (5)
Topic 184: by Isaku (9)
Topic 185: by Tanay (6) or Ronald Chu (5)
Topic 186: by Raymon (8)
Topic 187: by Chirag (9)

3.1 Business and Employment

Topic 188:
by Ken Moyer (7)
Topic 189: by Roger (7)
Topic 190: by Su Chen (6)
Topic 191:
by Su Chen (7)
Topic 192: by Matthew (7)
Topic 193: by
Ken Moyer (8)

3.2 Education

Topic 194:
by Kent (7)
Topic 195: by Chirag (10) or Marek (5) or Kent (8)
Topic 196:
by Akira (7)
Topic 197: by Joseph Toyoshima (6)
Topic 198:
by HeeJun Son (7) or Harsh (8)
Topic 199:
by Sung-Hwan (8)
Topic 200:
by Tommy (6)

3.3 Health

Topic 201: by Tanay (7) or Taro (7)
Topic 202:
by Simon (6) or Marek (6)
Topic 203:
by Vaibhav (8) or Matthew (8) or Taro (8)
Topic 204:
by Marek (7)
Topic 205:
by Romeo Wu (7)
Topic 206:
by Marek (8)

3.4 Arts, Entertainment and Leisure

Topic 207:
by Ronald Chu (6)
Topic 208:
by Aditya (8) or Chaan (6)
Topic 209:
by Su Chen (8)
Topic 210: by Ronald Chu (7)
Topic 211:
by HeeJun Son (8)
Topic 212:
by Joseph (7) or Tommy (7)

3.5 Science and the Environment

Topic 213: by Nitish (8)

Topic 214:
by Simon (7)
Topic 215:
by Joseph (8) or Chaan (7)
Topic 216: by Ronald Chu (8)
or Romeo (8)
Topic 217:
by Dwarkesh (8) or Romeo (9)

3.6 Politics and Government

Topic 218: by Marek (9)
Topic 219: by Akira (8)
Topic 220:
by Romeo Wu (10) or Ronald (9)
Topic 221: by Tommy Chuang (8)
Topic 222: by Roger (8)
Topic 223:
by Alex (6)

Tuesday, January 01, 2008

Section 1

Social and Ethical Issues

The widespread use of IT raises questions about social and ethical issues that shape the world today. Students should become familiar with all the social and ethical issues described in this section. Teachers should introduce the social and ethical issues as appropriate using the integrated approach illustrated in the diagram at the beginning of the syllabus details. In this way students can examine social and ethical issues that are raised when IT systems are used in a range of areas. The use of IT is likely to bring both advantages and disadvantages, both costs and benefits, and students should study the impact of IT in a critical way. It is important that examples are drawn from the local, national and global level.

1.1 Reliability

Reliability refers to the operation of hardware, the design of software, the accuracy of data or the correspondence of data with the real world. Data may be unreliable if it is entered incorrectly or if it becomes outdated. For example, a medical record that becomes dissociated from the patient it refers to becomes unreliable. The reliability of machines, software and data determines our confidence in their value.

1.2 Integrity

Integrity refers to correspondence of data with itself, at its creation. Data lacks integrity when it has been changed accidentally or tampered with. For example, a hacker might change driver licence data resulting in arrests of innocent people.

1.3 Security

Security refers to the protection of hardware, software, machines and networks from unauthorized access, alteration or destruction. Security measures include restricted access to machines and networks and encryption of information. The degree of security of information systems determines society’s confidence in the information contained in the systems.

1.4 Privacy and anonymity

Privacy is the ability of individuals and groups to determine for themselves when, how and to what extent information about themselves is shared with others. At its extreme, privacy becomes anonymity, which might be called for in some contexts but is dangerous in others. For example, discussion of a delicate subject might require anonymity, or at least privacy. On the other hand, anonymity could also conceal the perpetrators of criminal, terrorist or computer hacking acts.

1.5 Authenticity

Authenticity means establishing the user’s identity beyond reasonable doubt. Authenticating the user is crucial in many situations, particularly in business and legal matters. A simple example of authentication is user login onto a network. A more advanced example would be the use of encrypted digital signatures in a business transaction.

1.6 Intellectual property

Intellectual property includes ideas, discoveries, writings, works of art, software, collections and presentations of data. Copyrights, trademarks and patents legally protect intellectual property, but easy and accurate duplication methods made available by IT can undermine such protections. On the other hand, the same methods create opportunity for inexpensive dissemination of information.

Monday, December 31, 2007

2.1.1 System Fundementals

Social and ethical issues

Students must study and evaluate the social and ethical issues involved in the use of IT systems. These may include:

Topic 1: The economic value of information by Kent Harvath

Topic 2: Environmental issues related to the production of computer components and supplies by Joseph Toyoshima

Topic 3: Environmental issues related to the disposal of obsolete hardware and computer supplies by Roger Maue

Topic 4: Health and Ergonomic Issues Created by Computers by Ken Moyer

Topic 5: Password protection, Security, Biometrics and Authorized access by Akira Jackson

Topic 6: Issues related to viruses on both stand-alone and network systems by HeeJun Son

Topic 7: Greater dependence of organizations on IT by Takafumi Kurihara

Topic 8: Increase in teleworking and the virtual office by Sung Hwan Chun

Topic 9: The need for ongoing training and retraining by Andrew Leung

Topic 10: The economic and psychological implications of planned IT obsolescence in hardware, software and services, which has been forced on consumers by the IT industry by Sam Simaskul

Topic 11: Organizational policies and standards, for example, e-mail, surveillance and monitoring policies by Matthew Wilder

Knowledge of technology

In order to study and evaluate the social and ethical issues involved in the use of IT systems, the student must have an understanding of related technological concepts. These may include:

Topic 12: Key Terms by Tommy Chang
Data, information, hardware components, for example, input devices, output devices, processing, storage, memory (RAM, ROM), MHz, dpi, bit, KB, MB, GB, TB, ASCII, compatibility

Topic 13: Use, advantages and disadvantages of analogue and digital data by Tomer Lapidot

Topic 14: Operating systems (multitasking, boot) and utilities, for example, defragment, disk format, virus scan programs by no one yet.

Topic 15: Responsible computer use (for example, regular back-ups, virus checking, security, storage, housekeeping) by Raymon Ohmori

Topic 16: A responsible and systematic approach to implementing or upgrading IT systems, for example, analysis, design, implementation, testing, evaluation, training, policies and standards. by Romeo Wu

Sunday, December 30, 2007

2.1.2 Networks

Social and ethical issues

Students must study and evaluate the social and ethical issues involved in the use of networks. These may include:

Topic 17: Vulnerability of networks to intrusion by Isaku Oba

Topic 18: Ability to implement different levels of access by Raymen Ohmori

Topic 19: Implications of network failure, for example, banks, transportation, hospitals, schools by Haider

Topic 20: Implications of Collaboration, Groupware and Data sharing by Chaan Tutlam

Topic 21: Threat of compromising data integrity in shared databases by Simon Ruiz

Topic 22: Additional threats to privacy on a network compared with stand-alone computers by Tanay Khandelwal

Topic 23: The need to authenticate information by Vaibhav Bhandari

Topic 24: Intellectual property protection on networks, for example, site licences, file access by Su Chen

Topic 25: Equality of access for different groups and individuals by Dhruv

Topic 26: Ability to monitor users (surveillance); concerns of people regarding monitoring by Taro Kondo

Topic 27: Ability to filter incoming data by Alex Young

Topic 28: Ability to control personal, business, military, government operations over a wide geographical area by Ronald Chu

Topic 29: Increased globalization, for example, EFT, EDI, e-commerce by Aditya Kumar

Topic 30: Need for interface standards by Dwarkesh Iyengar

Topic 31: Need for network use policy by Marek Strzepek

Knowledge of technology

In order to study and evaluate the social and ethical issues involved in the use of networks the student must have an understanding of related technological concepts. These may include:

Topic 32: Key Terms by Chirag Garg
LAN, WAN, client, server, Ethernet, access, access permissions, login, password, firewall, sysadmin, UPS, EDI

Topic 33: Security Measures by Wilanth James

Topic 34: Network types, for example, Intranet, Internet, VPN by Oliver Chan

Topic 35: Encryption and SSL by Nitish Gautam

Topic 36: E-commerce by Harsh Sharma

Saturday, December 29, 2007

2.2.1 Software Fundamentals

Social and ethical issues

Students must study and evaluate the social and ethical issues involved in the use of networks. These may include:

Topic 37: Bug-free software by Tommy Chuang

Topic 38: Software piracy by Ken Moyer

Topic 39: Interfaces adapted for the disabled by Dwarkesh

Topic 40: Language independence of GUIs, making computers accessible to a very wide range of users, including those with special needs, and very small children by Raymon

Topic 41: Use of password protection to prevent unauthorized access by Andrew

Topic 42: Globalization of software by Roger

Knowledge of technology

In order to study and evaluate the social and ethical issues involved in the use of software, the student must have an understanding of related technological concepts. These may include:

Topic 43: Key terms by Ronald/Wilanth
software (application), shareware, public domain, freeware, commercial software, integrated software, user manual, registration card, serial number, warranty, copyright, licence (multi-user, single user, site licence), compression/decompression, back-up, back door (trapdoor), upload/download, wizard, template.

Topic 44: GUI, command-line interface, voice recognition by Oliver

Friday, December 28, 2007

2.2.2 Databases and Spreadsheets

Social and ethical issues

Students must study and evaluate the social and ethical issues involved in the use of databases and spreadsheets. These may include:

Topic 45: privacy of information in different cultures by Matthew Wilder

Topic 46: rights of individuals with respect to the storage of personal data by Taro Kondo

Topic 47: social consequences of outdated or incorrect data stored in databases by Simon Ruiz

Topic 48: social consequences of the release of sensitive data stored in databases by HeeJun

Topic 49: legislation on access and use of database information in different countries by Aditya

Topic 50: responsibility for the security of data stored in databases from different perspectives, for example, the developer, the user and the management of an organization by Akira

Topic 51: accountability for the negative social effects caused by insecure databases by Haider

Topic 52: ethical issues related to the collection and use of personal data by Joseph

Topic 53: ethical issues related to the selling of data stored in databases by Kent

Databases: Knowledge of technology

In order to study and evaluate the social and ethical issues involved in the use of databases, the student must have an understanding of related technological concepts. These may include the following:

Databases: Design and creation concepts

Topic 54: Key Terms by Chirag Garg
field, key field, record, search, query, sort, database management system, mail merge

Topic 55: Flat-file database versus relational database by Sam

Topic 56: Paper files versus electronic files by Tomer

Topic 57: Data redundancy and data integrity by Chaan

Topic 58: Updating data by Su

Databases: Storage and access concepts

Topic 59: Data transfer between a database and a spreadsheet by Nitish Gautam

Topic 60: Search and the use of the Boolean operators (AND, OR and NOT) by Raymon

Topic 61: Data mining/data matching by Xiao Xiao Li

Databases: Presentation concepts

Topic 62: Report generation by Taro Kondo

Topic 63: Special-purpose databases, for example, personal information managers, encyclopedias, library systems by Vaibhav Bhandari

Spreadsheets: Knowledge of technology

In order to study and evaluate the social and ethical issues involved in the use of spreadsheets, the student must have an understanding of related technological concepts. These may include the following.

Spreadsheets: Design and creation concepts

Topic 64: Key terms by Tanay
cell, cell format (number, text, value, function, calculation, date, currency), row, column, label, macro, replicate, template, worksheet, “what if” questions, range, absolute and relative reference

Topic 65: Paper files versus electronic files by Marek

Topic 66: Reliability and integrity of data by Isaku

Spreadsheets: Storage and access concepts

Topic 67: Data transfer between a database and a spreadsheet by Alex Young

Topic 68: Select, print and display area of a worksheet by no one yet

Topic 69: Use of the appropriate graph or chart for the meaningful representation of information by Harsh

Topic 70: Special-purpose spreadsheets, for example, inventory, budget by Dhruv

Thursday, December 27, 2007

2.2.3 Word processing and desktop publishing

Social and ethical issues

Students must study and evaluate the social and ethical issues involved in the use of word processing and desktop publishing (DTP). These may include:

Topic 71: effects of DTP on the right to publish, for example, freedom of the press, free exchange of ideas by HeeJun

Topic 72: economic effects of DTP on business by Vaibhav Bhandari

Topic 73: intellectual property issues associated with reproduction and/or transformation of digitized text by Dwarkesh

Topic 74: effects of word processing and DTP on the workplace, for example, job loss, deskilling, surveillance by no one yet

Topic 75: ergonomics/health impacts of word processing and DTP in the workplace by no one yet

Topic 76: social impact of speech-enabled input/output by Tomer

Knowledge of technology

In order to study and evaluate the social and ethical issues involved in the use of word processing and desktop publishing, the student must have an understanding of related technological concepts. These may include:

Topic 77: Key terms by Andrew
formatting, template, spell check, grammar check, ASCII/unicode, PDF, RTF, text

Topic 78: word processing versus page layout by Nitish Gautam

Topic 79: appropriate use of templates by no one yet

Topic 80: effective use of word processing functions to streamline production of documents by Joseph

Topic 81: use of appropriate fonts, white space and line spacing to create output that communicates effectively by Sung-Hwan Chun

Wednesday, December 26, 2007

2.2.4 Images, Sound and Presentations

Social and ethical issues

Students must study and evaluate the social and ethical issues involved in the use of images, sound and presentations, for example, multimedia, slideshows, virtual reality, games. These may include:

Topic 82: intellectual property relating to the copying and modifying of text, images, sound and video (fair use policies) by Ken Moyer

Topic 83: copyright issues by Ronald

Topic 84: printed versus electronically published information by Romeo Wu

Topic 85: health issues related to virtual reality by Akira

Topic 86: multimedia solutions for disabled persons by Simon Ruiz

Topic 87: multilingual selection possibilities of CD-ROMs and DVD by Chirag

Topic 88: surveillance and privacy by Wilanth

Topic 89: global access to information available on CD-ROMs versus Internet by Tommy

Topic 90: use of virtual actors in films by Taro

Topic 91: biased information by Tanay

Topic 92: reliability of data by Harsh

Topic 93: social and ethical issues related to games by Matthew

Knowledge of technology

In order to study and evaluate the social and ethical issues involved in the use of images, sound and presentations, the student must have an understanding of related technological concepts. These may include the following.

Design and creation concepts

Topic 94: Key terms—animation, bit-map versus vector graphics, object-oriented, clip art, CAD, hypermedia, hypertext, pixel, resolution, MP3, MIDI, morph by Ken Moyer
Topic 95: Data integrity by Dhruv

Topic 96: Consistency in design elements by Sam

Topic 97: Use of appropriate fonts, sound, images, video to convey a specific message by Harsh

Storage, processing and access concepts

Topic 98: File formats, for example, storage requirements, loading time, portability by Xiao Xiao

Topic 99: Sound, image and video capture and editing by no one yet

Topic 100: Updating and combining sounds or images at a later point in time to create a new work of art by Chirag and Takafumi

Tuesday, December 25, 2007

2.2.5 Modelling and Simulations

Social and ethical issues

Students must study and evaluate the social and ethical issues involved in the use of modelling and simulations. These may include:

Topic 101: reliability of predictions based on computer models, for example, weather, global warming by Roger

Topic 102: economic effects of the use of models to design and test new products by Haider

Topic 103: security issues involved in military simulations by Su Chen

Topic 104: social impact of reliance on simulations to examine issues of public policy by Haider

Topic 105: responsibility of the designer for accuracy of assumptions underlying the model by Raymon

Topic 106: ethical considerations involved in deciding when to use models or simulations to ensure human safety by Chaan

Knowledge of technology

In order to study and evaluate the social and ethical issues involved in the use of modelling and simulations, the student must have an understanding of related technological concepts. These may include:

Topic 107: Key terms by Marek—model, simulation, feedback loop

Topic 108: faulty or hidden assumptions by Chaan

Topic 109: extent and effect of the simplification of reality by Xiao Xiao

Topic 110: extent to which the phenomenon being modelled is understood by no one yet

Topic 111: processing power needed to create complex models by Raymon

Topic 112: visualization of information by Sam

Topic 113: correspondence of the model with reality. by Tomer

Monday, December 24, 2007

2.2.6 Tutorials, training and wizards (assistants)

Social and ethical issues

Students must study and evaluate the social and ethical issues involved in the use of tutorials, training and wizards. These may include:

Topic 114: the balance in responsibility between an individual and an organization for training by Nitish

Topic 115: the need for IT companies to consider global and cultural diversity when preparing training and tutorial software by Chirag

Topic 116: the requirement of organizations to provide training when implementing change by Dhruv

Knowledge of technology

In order to study and evaluate the social and ethical issues involved in the use of tutorials, training and wizards, the student must have an understanding of related technological concepts. These may include:

Topic 117: Key terms by Vaibhav
tutorial software, training software, wizards and assistants, help menu and help features, “Read Me” files

Topic 118: using wizards, assistants and online assistants in the design and creation of a product, for example, desktop-published documents, slideshows, web sites by Tanay

Sunday, December 23, 2007

2.3.1 The Internet

Social and ethical issues

Students must study and evaluate the social and ethical issues involved in the use of the Internet. These may include:

Topic 119: reliability and authenticity of information by Matthew

Topic 120: social consequences of addiction to the Internet by Andrew

Topic 121: social impact of global viruses by Simon

Topic 122: social impact of dependence on the Internet by Roger

Topic 123: etiquette rules for appropriate behaviour when using the Internet by Akira

Topic 124: social impact of the domination of English as the main web language by Taro Kondo

Topic 125: social impact of theft of identity through the Internet by Alex

Topic 126: social impact of open access to unsuitable material on the Internet by no one yet

Topic 127: ethical issues related to misuse of the Internet, for example, spamming by HeeJun

Topic 128: ethical considerations of IT-rich versus IT-poor nations as a result of differing access by Kent

Topic 129: ethical considerations relating to the use of encryption by Sung-Hwan Chun

Topic 130: ethical considerations relating to workplace monitoring. by Oliver

Knowledge of technology

In order to study and evaluate the social and ethical issues involved in the use of the Internet, the student must have an understanding of related technological concepts. These may include:

Topic 131 & 132: Key terms by Ronald & Wilanth
Internet protocols, for example, HTTP, FTP, TCP/IP, cookies, listserv, web cam, Internet languages, netiquette, Intranet, URL, hyperlink, bandwidth, WWW, browser, search engine, e-mail

Topic 133: means for blocking access to information by Su

Topic 134: features of a web browser by no one yet

Topic 135: comparison of Internet and Intranet by Alex

Topic 136: encryption methods by no one yet

Topic 137: the limiting effect of bandwidth by no one yet

Topic 138: e-mail by Joseph

Topic 139: viruses by Dwarkesh

Topic 140: features of a web page by Taro Kondo

Topic 141: global databases by no one yet

Topic 142: online services, e-commerce, banking, health, libraries by Kent

Topic 143: use of appropriate search engines. by no one yet

Saturday, December 22, 2007

2.3.2 Personal and Public Communications

Social and ethical issues

Students must study and evaluate the social and ethical issues involved in the use of personal and public communications. These may include:

Topic 144: the psychological consequences of people being in permanent contact by Romeo

Topic 145: ethical considerations of control as the result of using communications technologies by Harsh

Topic 146: social impact on health of the use of mobile devices by HeeJun

Topic 147: effect on personal productivity of personal communications devices by Kent

Topic 148: effect on the environment of personal communications devices by XiaoXiao

Topic 149: social effects of telecommuting by Simon

Topic 150: social effects of the widespread use of teleconferencing and videoconferencing by no one yet

Topic 151: social and environmental impact and ethical considerations of telecommuting by Su Chen

Topic 152: social impact and ethical considerations of: distance learning, digital entertainment, global media and public information systems. by no one yet

Knowledge of technology

In order to study and evaluate the social and ethical issues involved in the use of personal and public communications, the student must have an understanding of related technological concepts. These may include:

Topic 153: key terms—convergence, teleconferencing, videoconferencing, telecommuting, digital television, push–pull technologies
by Ken
Topic 154: mobile phone and associated services and uses by Sam

Topic 155: digital entertainment versus live entertainment by Sung-Hwan

Topic 156: contents of digital entertainment, for example, violence, pornography and realism by Roger

Topic 157: features of telecommuting, for example, environmental aspects, flexibility, productivity, business and social relationships by Vaibhav

Topic 158: face-to-face communications versus communications via technology by Tanay

Topic 159: minimum requirements to enable realistic teleconferencing and videoconferencing by Harsh

Topic 160: undetected intrusions into IT systems, for example, phone tapping by XiaoXiao

Topic 161: personal mobile devices, for example, PDA, laptop by Vaibhav

Topic 162: emerging technologies as the result of convergence of computers and communications technology by Alex

Topic 163: public information systems, for example, traffic control, security camera systems, public transfer information systems. by no one yet

Friday, December 21, 2007

2.4.1 Robotics

Social and ethical issues

Students must study and evaluate the social and ethical issues involved in the use of robotics. These may include:

Topic 164: social and economic effects of replacing people with robots in the workplace by Aditiya

Topic 165: ethical decisions regarding the use of robots in situations that might endanger human beings by no one

Topic 166: social impact of human interaction with robots, for example, artificial pets, robots for the disabled and elderly by Nitish and Sung-Hwan

Topic 167: social impact and ethical considerations regarding the use of robotics in medicine, for example, robotic surgery, computer-controlled prostheses by Takafumi

Topic 168: reliability of robotic devices, particularly in life-threatening situations. by no one

Knowledge of technology

In order to study and evaluate the social and ethical issues involved in the use of robotics, the student must have an understanding of related technological concepts. These may include:

Topic 169: key terms—robot, android, cyborg, sensors by Matthew

Topic 170: determining situations in which it is more appropriate to use a robot than a human being by Andrew

Topic 171: types of input/output peripherals used in various situations, for example, arms, fingers, voice, wheels by no one

Topic 172: reasons why robots are/are not designed as androids with human-like form by Raymon

Topic 173: the capabilities and limitations of robots with respect to vision, touch, sound and movement by no one

Topic 174: processing power in relation to the capabilities and limitations of robots. by no one

Thursday, December 20, 2007

2.4.2 Artificial Intelligence and Expert Systems

Social and ethical issues

Students must study and evaluate the social and ethical issues involved in the use of artificial intelligence (AI) and expert systems. These may include:

Topic 175: responsibility for the performance of an expert system—knowledge engineer, informant, programmer, company that sold it, the buyer/consumer by no one yet

Topic 176: value of the development of AI as a field, for example, whether it is an appropriate place to put economic resources by Isaku

Topic 177: ethical issues of various applications of AI, for example, replacement of human workers, handing decision-making tasks to a computer by Isaku or Marek

Topic 178: social impact of the use of “smart” machines on everyday life by Takafumi

Topic 179: ethical issues related to military applications of AI, for example, smart weapons, reconnaissance, decision making by HeeJun

Topic 180: implications of creative production by computers using AI, for example, Aaron, an expert system, creates visual art by no one yet

Topic 181: access to the knowledge base underlying an inference engine in an expert system, for example, whether people affected by decisions made using an expert system should have access to the rules by which the decision was made. by Vaibhav

Knowledge of technology

In order to study and evaluate the social and ethical issues involved in the use of AI and expert systems, the student must have an understanding of related technological concepts. These may include:

Topic 182: key terms—AI, Turing test, parallel processing, machine learning, natural language, common-sense knowledge, agent, pattern recognition, expert system, knowledge base, inference engine, heuristics, fuzzy logic, knowledge engineer, domain by Tommy

Topic 183: storage requirements for common-sense knowledge by no one yet

Topic 184: processing requirements for AI by no one yet

Topic 185: collection/creation of a knowledge base by no one yet

Topic 186: creation of an inference engine (for example, if/then rules, fuzzy logic) by no one yet

Topic 187: identifying domains that are suitable for expert systems. by no one yet

Wednesday, December 19, 2007

3.1 Business and Employment

The study of this area of impact is compulsory for all students.

Topic 188: Transportation: reservation systems, luggage processing, navigation, scheduling and distribution, traffic simulation, smart roads and cars, fuel efficiency and traffic safety systems by no one yet

Topic 189: Employment: electronic employee monitoring, telecommuting, ergonomics and health, job obsolescence and retraining, online job search, employee surveillance by Roger

Topic 190: Banking and finance: EFT, ATMs, Internet banking and brokerage, electronic cash, insurance by Su Chen

Topic 191: International commerce: management of transnational corporations, business concentration by no one yet

Topic 192: E-commerce: teleshopping, online marketing, data mining, spyware by Matthew

Topic 193: Retailing, advertising, media by Ken