ICT Review For The Final Exam

Download as pdf or txt
Download as pdf or txt
You are on page 1of 27

‫‪ICT Review for the final‬‬

‫)‪exam (AASU‬‬
‫عمل الطالب ‪ :‬عبدالرحمن محمد‬
‫بمساعدة من مشرفين قروب طلبة عبدهللا السالم‬

‫‪1‬‬
WEEK 1
What is information technology?
Information technology: The set of techniques used in processing and
retrieving Information
Examples:
o Social media tools

o Crisis mapping tools.

o Health care tools

Social Media Tools: Websites or apps that allow users to


create and share content and/or participate in social networking with others.
Crisis-Mapping Tools: A tool that collects information from e-mails, text messages, and
tweets and then maps them, instantly making the information publicly available.
Health Care: Scientific visualization tools help scientists develop tests for antibodies for
specific viruses.
Why is it important to learn about IT?
- Computers are everywhere.
- Understanding the key concepts in technology can help people to easily and quickly
react to the next round of new technologies.
Historical evolution of IT:
Phase 1: Giant Computers (1940-1960):
Giant computers: A large computer made up of individual parts to perform different
functions.
Features:
- Size: Large
- Located in special facilities.
- Needed highly skilled technicians to run them.
Phase 2: Personal Computers (1970):
PC: A computer that can run programs by itself.
Phase 3: Networked Computers (Mid 1990s):
Networked Computers: Network is a group of two or more computers that are configured to
share information and resources.
Phase 4: Cloud Computing (2000):
Cloud computing: Delivery of computing services over the internet
Features:
- Storing and retrieving data from internet-based spaces

- Backing up and sharing data

- Running programs that are not installed locally.

2
Computer Literacy:
Computer Literacy: Understanding computer terminology and staying updated with
technological advancement.
Computer Functions:
Computer Functions: A Computer is a data processing device that converts data into
information.
Basic functions of computers:
1. Processing: Manipulates, calculates, or organizes that data into information
2. Input: Gathers data or allows users to enter data
3. Output: Displays data and information in a form suitable for the user
4. Storage: Saves data and information

Data Processing
Data: Raw unorganized collection of facts
Information: Data that has been organized or presented in a meaningful fashion
Computer Language
Binary language: The language computers use to process data into information.
- Consists of two digits
- Byte: 8 bits
Integrated circuits
Integrated circuits (or chips): are tiny regions of semiconductor material that support a
huge number of transistors.
Processing of bits and bytes
Hardware: is any part of the computer you can physically touch
Software: is the set of computer programs that enables the hardware to perform different
tasks
Operating system (OS): The program that controls how your computer functions (common
type of software)
Processing Devices
Central Processing Unit (CPU): Brain of the computer which contains billions of circuits

Memory:
1- RAM (Volatile): Stores programs and data that the computer is currently using
2- ROM (Non-volatile): Holds all the instructions needed to start up the device when
powered on
Motherboard: Connects all the hardware in the computer
Input Devices
input Devices :A device used to enter data and instructions.
Output Devices
Output Devices :device that sends processed data and information out of a computer in the
form of text, pictures (graphics), sounds (audio), or video.
Storage Devices

3
local Storage Devices:-
Hard drive (HDD): Non-volatile Permanent storage of software and data
Internal hard drive: Resides within the desktop or laptop system unit.
External hard drives: reside outside the system unit and connect to the computer via a port.
Solid-state drive (SSD): runs with no noise, emits little heat, and requires little power.
Portable Storage Options:
Flash drive: Up to 4TB storage capacity
Flash memory card: Transfer data between computers and digital cameras, smartphones,
tablets, video cameras, and printers
Smartphone Storage Devices:-
1. Memory chips

2. Micro SD flash cards (external) (not in all phone models): Allow adding additional
memory to the phone.
3. Cloud Storage: keeps your files on the cloud rather than on your device, Requires
installation of software or an app on your device.
Examples: Google Drive, Microsoft OneDrive, and Dropbox
Types of Computers
Portable Computers : -
1. Cell Phone 2. Tablets
3. Laptops
Laptops variants:
2-in-1 PCs: laptop computer that can convert into a tablet-like device
Ultrabooks: Full-featured computers that focus on offering a very thin, lightweight
computing solution
Chromebook: Uses the Google Chrome OS and is designed to be connected to the Internet
always

Stationary Computers
1- Desktop Computers: Intended for use at a single location, Consist of a system unit
2- All-in-one Computers: Computers house the computer’s processor and memory in
the monitor

Super Computers: Fastest computers, Analyse significant amount of data and numbers
Mainframes: Process and store business transaction
Servers: Computer chip that resides in another device, such as your car, a drone in your
home.

4
WEEK 2
Ethics
Ethics: The study of the general nature of morals and of the specific moral choices
individuals make.
True or false
- Ethics can be defined as the rules of conduct presented in a religion (FALSE)
- Ethics are defined as accepted ideas of right and wrong (FALSE)

Ethical Challenges in IT
1. Intellectual Property: Work that is the result of someone’s creativity and knowledge
that is protected by copyright law and documented by copyrights, patents, and
trademarks
Why Intellectual Property is important ? With increased use of electronic media,
challenges to enforcing copyright laws have increased
2. Privacy
Intelligent personal agents are constantly listening to their users and combing through
your data to help determine your needs
Social media sites: User’s privacy settings will allow these sites to have information they are
not legally allowed to have
3. Social Justice
(Example 1) Predictive policing : Gathering data from different sources, analysing it, and
then using the results to prevent future crime
(Example 2) Military and government secrets: WikiLeaks (wikileaks.org) makes private
and secret documents available for viewing on its site
4. Liability :Traditional manufacturing makes it relatively easy to enforce safety laws
(Example ) A person uses 3D scanner to scan an existing object. Then, the person uses
design software to create their own plan for how to print the object. If the object is patented,
this would be a violation of the law

-Products are subjected to safety testing prior to being sold to the public and must conform to
legal safety guidelines.

Liability Challenge Scenario: ( just understand don’t memorize)


Consider the ethics of printing a helmet from a file you downloaded from a public website.
You give it to a friend as a gift.
While riding his/her bicycle, your friend is injured because the design of the helmet was
flawed and the materials you used to make it were substandard.

Who is responsible for the injuries? You? The manufacturer of the printer? The owner of the
printer? The manufacturer of the raw materials used to make the helmet? The creator of the
flawed design plans? The person who decided to use an untested product ) your friend)?

5. Censorship
India: Ranked as first country whose government most often cuts off access to the Internet
for its citizens
China: has imposed censorship on Google search engines to prevent any Chinese person
from accessing websites and accounts against the Chinese government

5
6. Social Activism
Hacktivism : Using computers and computer networks in a subversive (troublemaking) way
to promote an agenda.
Nowadays, attacks are usually carried out by groups of hackers or computer scientists
Forms of Hacktivism:
1. Denial-of-service attack : Websites are bombarded with requests for information
until they are overwhelmed, and legitimate users can’t access the site
2. Cyberterrorism : embarrass or harass a company by penetrating its computer
networks and stealing (and often publishing) sensitive information.

7. Automated Robotic Machinery: Automobiles now contain sophisticated AI systems to


exercise control over the vehicle and respond faster than humans can
(Example) self-driving cars by Google
Societal Impact of Information Technology
1. Technology connects us with others
Web 2.0: Allows users to contribute content and connect with one another easily
Cognitive surplus: Combination of leisure time and the tools to be creative
Crowdfunding: Asking for small donation from a large number of people, often using the
internet
2. Technology impacts how we consume
Influencers: Social media personalities with huge followings and high levels of interaction
with their followers
Crowdsourcing: Obtaining information for a project from the opinion of many different
people
Sharing Economy: Items like cars and bikes can now be subscriptions instead of purchases
Collaborative consumption: Implies that we are joining together as a group to use a
specific product more efficiently

6
Week 3
Software : A set of instructions that tells the computer what to do
How is software created?
1. Proprietary (or commercial) software: Created by companies for profit and then sold to
you
2. Open-source software: Available free of charge and with few licensing and copyright
restriction
Types of software:
- Application software - System software

Application software :The software you use to do tasks at home, school, and work

Software distribution :

1. Local installation:- Paying a one-time fee for either an electronic download or a disc
of the software, Software can be run anytime ( no internet connection required)

2. Software as a service (SaaS): The software is accessed over the Internet(no


installation required on HDD), The program can only be used when connected to the
Internet, Often free of charge

Examples: Google Docs and Microsoft Office Online

Subscription: Requires monthly or annual fee to use the software

-After the fees are paid, the software will become available for download on the
computer
Examples: Adobe Creative Cloud, Microsoft Office 365

Beta version: An application that is still under development


‫ر‬Why do Beta version exist ? To help developers find errors, or bugs reported by their
program users
Software Licenses: An agreement between the user, and the software company which
outlines the acceptable uses of the program
- Software don’t belong to users
- Users purchase a license
Can you use a Software on your device when you don’t own the license? No, it is
considered a participation in software piracy
Database : A collection of related data that can be stored, sorted, organized, and queried
How do databases make information sharing possible? by Data Centralization : A
centralized source ensures that everyone can access the same data

How do databases ensure that data is accurate? Data integrity ( accurate and reliable)
Database administrator: An IT professional who is responsible for designing, constructing,
and maintaining databases

7
Types of databases

1. Flat Databases: Represented as a list or simple table.

Disadvantages of flat databases:

- Duplication, Inconsistency, Inappropriate data ,Incomplete data

2. Relational Databases: Operates by organizing data into various tables based on logical
groupings
Relationship: A link between tables that defines how the data is related
Relationships types:
- One to many relationship: A record appearing only once in one table while having
the capability of appearing many times in a related table

- One to one relationship: For each record in a table, there is only one corresponding
record in a related table

- Many to many relationship: Multiple records in one table being related to multiple
records in a second table and vice versa.

3. Object-oriented database : It handles unstructured data, such as audio clips, video clips,
pictures, and extremely large documents better
Database management system (DBMS): A software that allows a computer to perform
database functions
DBMS Operations:
1. Storing and defining data
2. Viewing, adding, deleting, and modifying data
3. Querying (extracting) data
4. Outputting data
Defining data
How are data organized in a relational database?
1. Fields : Displayed in columns
- Each field is identified by a field name
2. Records: A group of related fields (rows)
3. Tables: A group of related records

Storing data
Input forms: Used to control how new data is entered into a database
Structured Query Language (SQL)

8
To extract records from a database, you use a query language
examples of popular databases that use SQL:-
- Oracle, Microsoft SQL Server and MySQL

Software Engineering: An engineering discipline that is concerned with all aspects of


software production
Software process: A sequence of activities that leads to the production of a software product
software process models: A simplified representation of a software process
Waterfall model: A plan driven process that includes cascaded phases
Programming: The process of translating a task into a series of commands that a computer
will use to perform that task
Program development life cycle (PDLC):
1. Describing the problem

2. Making a plan

3. Coding

4. Debugging

5. Testing and documentation

What kind of problems can computer programs solve?


1. Tasks that work with electronic information
2. Repetitive tasks
What kinds of problems can computers not solve?
- Problems requiring intuition or spontaneous creativity
How do programmers handle bad inputs?
1) Error handling: Describing what the program should do if the input data is invalid
2) Testing plan: lists specific input numbers that the programmers would typically
expect the user to enter
All programming languages have four common elements
- Rules of syntax
- Keywords set
- A set of allowed operators
Syntax: an agreed-upon set of rules defining how a language must be structured
Statement: Sentence in a code
Syntax error: Violations of the strict, precise set of rules that define the programming
language

9
Week 4
System software : Software that helps run the computer and coordinate instructions between
application software and the computer’s hardware devices
Types of system software:
- Operating system (Windows and macOS)

- Utility programs: Programs in the operating system that help manage system resources

Operating system: A group of programs that controls how computers function


Functions: Managing hardware, Managing software, Managing tasks
UserInterface: The point of interaction between a user and a computer program or device
Single-user/single-task operating systems: Early operating systems which were designed
for one person performing one task at a time
Modern OS: Multi-task, networking capabilities (multiuser, multitasking OS)
Real-time operating system (RTOS):
1) Used in machines with built-in computers (embedded system)
2) Requires minimal user interaction
3) A program with a specific purpose
Multi-user operating system (network operating system): Allows more than one user
access to the computer system at a time
Server: The computer that manages network resources such as printing and communications
Operating system Functionalities
1. Provides a user interface
- Helps users interact with their devices
2. Hardware Coordination
A. Processor Management :Although the CPU is powerful, it needs the OS to arrange
the execution of all these activities.
B. Memory and Storage Management: OS uses RAM as a temporary storage area for
instructions and data that the processor needs
C. Hardware and Peripheral Management
Device driver: A software that facilitates communication between a device and the OS

3. Software Application Coordination: Every computer program needs to interact with the
CPU by using computer code
Network :Two or more computers that are connected by software and hardware to
communicate with each other
Advantages of networks
1) Sharing an Internet connection
2) Sharing printers and other peripherals
4) Sharing files
5) Online gaming and home entertainment
6) Common communications
Types of networks
- A personal area network (PAN) , Local area network (LAN) , Home area network (HAN),
Metropolitan area network (MAN ) , Wide area network (WAN)

10
Network Components

Transmission media: A radio waves or physical system (cable) allow the nodes to
communicate with each other
Wired transmission media:
- Unshielded twisted-pair (UTP) cable

- Coaxial cable

- Fiber-optic cable
Wireless (or Wi-Fi) networks: do not require physical cables and uses radio waves to
connect computing devices to other devices and to the Internet
Network navigation device: A device that moves data signals around the network
A router : transfers packets of data between two or more networks

A switch : transmits data between devices on the same network

Cybersecurity : The act of securing computers,, mobile devices, electronic systems,


networks, servers and data against malicious attacks
Cybercrime: Any criminal action perpetrated through the use of a computer
Cybercriminals: Individuals who use computers, networks, and the Internet to perpetrate
crime
Identity theft: When a thief steals personal information and poses as you in financial or legal
transactions
Hacker: Anyone who unlawfully breaks into a computer system either an individual
computer or a network
Kinds of hackers:
- White-hat hackers, Black-hat hackers, Gray-hat hackers

Artificial Intelligence (AI): A computer science branch that focuses on creating computer
systems able to perform tasks that are usually associated with human intelligence
Intelligence: The ability to acquire and apply knowledge and skills
Natural language processing (NLP): An AI field that uses software to analyse, understand,
and generate human languages naturally
Perception: AI systems have senses just as humans do
Knowledge representation: AI systems need to build knowledge bases to solve problems

Planning: AI systems need to set goals and then achieve them.

Learning: AI algorithms adapt and learn through experience

Supervised learning: Trained with significant number of examples

Unsupervised learning: A system that builds rules based on what it is seeing

11
Week 5
What is Digital Literacy?
Digital Literacy : the ability to utilize information technology tools effectively to find,
evaluate, and communicate information
Internet and Computing Core Certification (IC3) : Digital Literacy program is simply the
best way to ensure that students and employees are prepared to succeed in a technology-based
world
Finding information: is one of the most important skills you need as student, researcher, or
employee
Web search engines and e-libraries : are tools for locating information on the Internet and
the World Wide Web
1) The Internet was developed by US Department of Defense (in the late 1950s)
2) The web was established by Tim Berners-Lee (in1991)
Accuracy: One of the ways to check the correctness is by comparing multiple resources

Authority: You can check the authority by asking questions such as, is the website official?
Is the author expert? Who can edit the content?

Currency: How often the website is updated?

12
Week 7-9
Online content generation : Any information that is produced , saved , and
shared digitally is referred to as digital content
Blogging: It is a periodical journal or personal log that any user can create on the world
wide web.
- There are millions of blogs available within reach that are usually written by a single
author.
- The most recent entry in the blog is almost always shown at the very top of the page.
Benefits of Blogging:
- Accessible from anywhere with a browser.
- Can be integrated into mobile applications.
- No character limit restrictions
- Collaborative-friendly and can have multiple authors for each entry
- Posts or entries can be monetized to generate income

Drawbacks of blogging:
1. spam-blogs , a journal with stolen content or fake articles with the aim of increasing
viewers and search engine rankings.
2. It is harder to reach compared to regular social media platforms therefore, it’s hard to
Make profits
Types of blogs
1- Regular blogs / Weblogs : They are mainly textbased and include images, audio or
videos.
2- Vlogs/ Video logs: They mainly use videos as its primary content; however it can also
include images and text.
3- Microblogs : Blogging can take a smaller form, There are text restrictions and
character count limitations.
Audience restrictions (Public or Private)
4- Podcast : it contains visual information and prerecorded series of audio or video files
that are made available to users over the internet.
A user can be subscribed to any podcast for free or for a specific fee.
Question !
Podcasts are downloaded to a device using an
“Aggregator” that utilizes the Really Simple Syndication (RSS) format.
5- Webcast : Is usually a live broadcast of audio or video content over the internet.
Webcast features :-
- Online audiences can interact with each other
- Online audiences can interact with the host and their guest during the live broadcast.
- It can be archived so users can view it later.
Multimedia:-
- Multimedia is the use of various mediums of expression or communication at once.
- Media can be transformed from one form to the other
Multimedia features:-
- Allowing precise production
- easier production
- greater capabilities.

13
Digital Videos
A series of moving visual images, with or without audio, stored as digital data
containing a series of numbers representing both the color and brightness of millions of
points.
Internet (youtube) and television
Recording Digital Videos
- We can record digital videos by use of both computer applications and the necessary
hardware
Webcams (integrated into laptops) also work as inexpensive devices for creating digital
video.

webcam

Editing Digital Video


- Digitized videos that are stored on a computer can be edited using proper hardware and
software.
Video-editing software such as Adobe Premiere presents a storyboard or timeline you can
use to manipulate your video file.
Typical file formats for Digital Videos
QuickTime: You can download the QuickTime player
( without charge from
qt & mov
Moving Picture Experts Group : video standard was adopted internationally in 2000 , it’s
recognized by most video player software.
Quality and Resolution of Digital Videos

16:9 An image that is 16” wide and 9” high.

1080p 1920 vertical lines


1080 horizntal lines

UHDTV Also known as 4Kor 2160p


Ultra High 3840 vertical lines
Definition 2160 horizontal lines
TV
8K Format 7680 vertical lines
4320 horizontal lines

Connectivity to Display Digital Videos on Display Devices


- There are many ways to display digital videos on display devices, however all
connectivity falls into two categories,
Wired and Wireless
Wired: HDMI
Wireless: External devices such as Apple TV
HDMI: connectors on display devices allow for a single cable to carry both audio and video
information.

14
External devices: view content from your device or stream content from the Internet
wirelessly.
Protecting your work
Advantages and drawbacks of licenses
Advantages :
- People wont constantly send you permission requests to use your work saving you time
- The license explains how your work can be used and the instructions are easy to follow
Disadvantages

1. Opponents complain that the licenses have affected their livelihoods. professional
photographers might have a tougher time selling their work because of the photos
with licenses that permit free commercial use
2. Making a mistake and selecting the wrong license for your work.If you later find out
that the work is valuable, and your previously selected license allows commercial use,
then you’re out of luck.

Creative Commons Licenses –What are they


- These are very popular licenses in use today to help control the rights to works. Creators
choose a set of conditions they wish to apply to their work :

Attribution (by) Require that others who use your work in any way must
give you credit the way you request, but not in a way that suggests you
endorse them or their use.

ShareAlike (sa) You let others copy, distribute, display, perform, and
modify your work, as long as they distribute any modified work on the
same terms.

Noncommercial (nc) -You let others copy, distribute, display, perform, and
modify and use your work for any purpose other than commercially unless
they get your permission first.

NoDerivatives (nd) : You let others copy, distribute, display and perform
only original copies of your work. If they want

Web Development
- A document that will be presented on the web must be written using special symbols
called tags.

Tags control how a web browser will display the text, images, and other content tagged in
Hypertext Markup Language (HTML).
Adobe Dreamweaver presents web page designers with an interface that’s similar to a
word processing program.
Adobe Dreamweaver features
- Web designers can quickly insert text, images, and hyperlinks.

15
- the program automatically inserts the corresponding HTML tags.
No-Code Web development
Advantages and drawbacks of zero-code websites

Advantages Disadvantages

1- No prior coding experience is 1- Less flexibility and specific features


needed might
not be available.
2- Does not require installation of
software.

3- Cost-Effective requiring less people 2- Security is limited to the service


provider and cannot be enhanced or
to
modified.
build.

16
Week 10
Artificial Intelligence (AI)
AI in Retail:
Recommendation engines are AI systems that process enormous amounts of data in order to
assist people in finding things they may enjoy but are unlikely to find on their own.
- The recommendation lists is used by customers for about 35% of Amazon's sales.
Data Mining helps retail businesses gather data from register terminals to determine which
products are selling on a given day and location.
This helps managers figure out when to replace stock or to adjust prices for products to sell
well.
AI in Banking
-Banks and credit card processors employ AI systems to examine vast amounts of transaction
data to detect fraud.
-Banks employ software to analyze consumer purchasing habits, credit scores, and
debt repayment to determine the risk of granting loans to them
-Using AI assessed credit risk might help an institution cut loan losses by 25%,
according to MIT researchers.
AI in Transportation
Just 5% of a car's life is spent in motion
Self-driving automobiles and truck would improve vehicle utilization and boost safety
AI in Robotics
In industrial environments, several robots are used for risky or repetitive work.
Designs that imitate how people move and hold objects have been created, resulting in robots
known as embodied agents that behave and appear like people
AI in Education
Intelligent personal assistants promotes learning in education, online language teachers
converse with pupils, correcting their grammar and suggesting alternative words to broaden
their vocabulary.(Plagiarism detection tools like Turnitin to detect matches in texts)
AI in Medicine: AI software is now being used to search through data on millions of patient
visits and treatments provided by thousands of physicians for doctors to quickly diagnose
patients
prosthetic devices :To aid in the fitting of prosthetics, sensors and AI are being utilized to
determine how soft or stiff the patient's residual tissue is
AI in Law Enforcement: proprietary police enforcement databases can be examined for
commonalities between crimes using Al-powered software. In order to combat contemporary
crime
AI in Psychology: AI systems helps sufferers of mental disorders such as autism how?
improve their interpersonal skills such as eye contact and social cue recognition.
The MACH (My Automated Conversion coach) is a computer program that creates a
virtual person for use in situations such as job interviews, it reacts to the user's movement and
speech
Affective computing is the process of creating computers that can mimic and recognize
human emotions.
Productivity Tools
Word processing
Microsoft Word is the most popular word processing program.
Microsoft word features :
Spelling and grammar checking
Thesaurus

17
language translator

Spreadsheets
Each cell can contain :
-Text
-Values and dates
-Formulas
-Functions
Presentation
Microsoft Powerpoint It's a software that can help speakers create high-quality
presentational slideshows
Presentation software can allow :
-Adding embedded videos
-Applying visual effects
-Setting up Transitions
-Adding Voice and Video
Database Software
Fields: The smallest unit storing a single piece of
Information
Records: An instance of related fields
Tables: A group of related records
Forms: A user interface that can store or display data
Reports: A document summarizing data stored within a database
Note-Taking SoftwareThis is a software that is primarily used for taking notes and
organizational purposes.
You can use this software to do a range of tasks that include:
-Research
Brainstorming
Collaboration
Organizing information
One-Note by Microsoft is a popular example
Personal Information Manager Software
Personal Information Managers (PIM) help manage e-mail, contacts, calendars, and tasks
in one place
Outlook by Microsoft is one of the most popular PIM programs used today
Productivity Software Features
Most productivity software contain tools allowing its users to use it more efficiently such as :
Wizards: Walks the user through steps necessary to complete a task. Within every step a user
is asked questions, and based on their answers a portion of the task is completed.
templates: it is a predesigned form that provides the basic structure for a particular kind of
document
Macros: a small program that groups a series of commands so that they will run in one go.
They are used to automate a routine task to save time and increase efficiency.
Personal Financial Software
Financial Planning Software (FPS) helps you manage your daily finances at home or within
your business. It helps push down the costs
Tax Preparation Software
Tax preparation software (TPS) helps you prepare your taxes on your own which drives down
the costs associated with hiring a taxation accountant

18
Enhancing Productivity in Businesses
Accounting software: helps small business owners manage their finances more efficiently
Desktop publishing software (DTP): Helps professionals design books and other
publications that require complex layouts.
Web authoring software: Allows even novices to design interactive webpage without direct
programing knowledge.
Project management : creates scheduling charts to plan and track specific tasks and to
coordinate resourses
Customer relationship management : stores sales and client contact information in one
central database
Enterprise resource planning : controls many operations and processing functions such as
biling , production, inventory management
E-commerce : facilitates website creation , shopping cart setup, and credit card processing
services
Computer - Aided Design : creates automated designs, technical drawings and 3D model
visualizations
vertical market : Addresses the needs of businesses in a specific industry or market such as
the real estate, banking and automotive industries

19
Week 11
What is social media? Websites or apps that allow users to create and share content to
participate in social networking with others.
Social Networking –More to it : LinkedIn
Why linkedIn? Finding business opportunities , Finding jobs, Extending one’s professional
network
Why linkedIn for business owner ?
- Seeking Clients for your business.
- Finding emplyees for your business
- Businesses use them for marketing and communicating directly with their customers.

Some Dos and Don’ts of Social Networking


1. Keep your personal information personal.
(Birthday, physical address, life routine, …)
2. Know who your friends are and know who can
see the information you post.
3. Review your privacy settings periodically.
4. Do not post information you might use to set up
security questions.
Online Reputation (What?)
- It consists of the information available about you in cyberspace that can influence
people’s opinions of you in the real world

Online vs. Real-life Reputation


- Online reputation is an extension of real-life reputation. After some time, people
forget about real-life incidents.
- Onlinepictures, videos, and narratives about you might never disappear due to the
persistence of information on the Internet.
Even if you delete something, it probably still exists

Online Reputation –In the Workspace


- According to CareerBuilder, 18% of employers surveyed have fired employees due to
social media posts
- Employers usually prevent you from saying disparaging things about your employer,
work environment, customers, and coworkers on social media sites.
Steps to Protect Your Online Reputation
1- Improve and update your personal profiles
2- Make sure your name is associated with things people feel good about reading.
3- Post frequently : Newer information tends to come up first in search engine results
4- Be vigilant : Contact people who’ve posted negative things about you and see if you
can get them to modify or delete them.
Global Village
The global village definition implies that even when people are not physically close, they
can still connect, share experiences, and access the same information through technologies,
such as social media.

20
- A communication theorist called Marshall McLuhan, in 1962, coined the term “global
village”
Online Interaction
Examples:-
Social Networking web 2.0 technology
- lets you build an online networks of friends
- lets you share media content
Project collaboration and file sharing
- Web-based document products such as Google Docs
- Screen sharing
- Project management
Blogs:
-Written by a single author
-May include images, audio, and video
Podcast :Audio/video files delivered via RSS
-Can download and view content on portable media player
-Platforms to host and share images, videos, and music
: ‫ االيميل‬E-mail
-Most common form of online communication
-Asynchronous (not having to be done at the same time)
-Real-time communication
-Requires Internet connection
-Used with individuals or groups
Texting:
-Needs cellular network
-Uses Short Messaging
-Service (SMS) for text messages
Netiquette or Internet etiquette : is a set of guidelines for appropriate behaviour on
the Internet, including e-mail.
-Written communication is expected to be correct in terms of spelling, punctuation, and
grammar.
-Using all caps is considered rude. It is like shouting at the recipient. Use Standard
Capitalization.

WHERE ARE YOU I DID NOT SEE YOU

Where are you I did not see you Emoticons/Emojis help to convey the fellings

E-mail Etiquette
1. Use CC and BCC sparingly
2. Include a useful subject line
3. Use spell checker

21
4. Avoid abbreviations like LOL and btw
Threats: Social Engineering
What? It is any technique that uses social skills to generate human interaction that entices
individuals
to reveal sensitive information
Social Engineering: How does it work?
Pretexting : Involves creating a scenario that sounds legitimate enough that someone will
trust you.
Phishing: lures Internet users to reveal personal information such as credit card numbers, or
passwords that could lead to identity theft.
Pharming occurs when malicious code is planted on your computer, either by viruses or by
you visiting malicious websites
Avoid Phishing and Pharming Scams
- Never reply to any e-mail asking you for personal information.
- Don’t click on a link in an e-mail to go to a website. Instead, type the website address
in the
browser.
- Never give personal information over the Internet unless you know the site is secure
Use, and constantly update, an Internet security
software.

22
Week 12
Automation : What‫ ؟‬It is the application of machines to tasks once performed manually
by human.
Main Purposes (with Examples):
1- Processing
Applying equations on input data of a spreadsheet
Welding by robotic arms in factories
2- transfer and processing
Transferring content to an output device, such as a printer
Automation Impacts :
Generally: Replacement of human workers
In manufacturing
- limiting the occupational hazards
- Allows for fast, accurate, measurable, and highly controllable operations
In Paper-Replacement
- Transparency
- save the employees time for value tasks
In resources consumption mechanisms
-
Promotes energy conservation and utilizes resources effectively
Automation History
Stone tools: Magnify human strength (Human Intervention required)

Mechanization + Human Intervention


-Mechanical Mechanisms requiring human intervention
Mechanization + min. Human Intervention
-Mechanical Mechanism not requiring human intervention , not self-governing system
Mechanization + Self-governing Systems
Still mechanical, but it has a feedback-control
mechanism
For example : Steam engines could control its speed to remain in a pre-defined range.
Electronic Computers and Integrated Circuits :Electronic operations and control, speed,
accuracy
Sensors Technology Improvement : More input and feedback control options, without
human intervention.
AI: System improves itself, learns from historical data

Automation Requirements
1- Power source
- Electricity (usually)

23
2- Feedback control:
-The system has a pre-defined goal and can measure its current progress to either
stabilize or modify state to reach
-Example: Car Cruise system
3- Machine Programming
- Commands stored on the ROM of the controller, executed by system
Automation Examples
- Kuwait ID app & Sahel
- robotic arm
- Government transactions made easy

Industrial Automation : It is at the heart of the automation field


Applicant Tracking System (ATS) : Filters, stores & evaluates (if AI included) the Job
applications
E-commerce: what? It’s the process of conducting business online for fundraising to advertising to
selling products

E-commerce types:
1- Business-to-Consumer )B2C )
The business can be completely online. (e.g. Tatayab) or have stores both physical and online
(e.g. X-cite Alghanim).
2- Business-to-Business (B2B)
Both sides of the transaction are business entities or companies (MABROOK co Hotels
Supplies)
3- Consumer-to-Consumer(C2C)
Consumers sell to each other through sites ( OpenSooq)
E-commerce Business Models & Trends
Social commerce: uses social networks to assist with ratings and reviews in marketing and
purchasing (e.g yelp)

2- Group Buying
- Services providing deal-of-the-day, discounted
deals (Sheeel)
- instead of direct profit Businesses gain marketing
3- Individual Customization
Consumers buy items like t-shirts with customized graphics (Zazzle)
M-commerce (Mobile Commerce)
(What?) Conducting commercial transactions through a smartphone, tablet, or other mobile
device.
Digital Payment systems like MyFatoorah, Apple Pay
Place food orders for in-store pick-up or delivery like KFC Kuwait
- Bank and Investment applications
Online Shopping Safeguards
-Don't shop on public Wi-Fi networks, as they may contain spyware.

24
-Use a credit card, not a debit card, to protect transactions, or use a third-party payer such as
PayPal or Apple Pay.
-Create a strong password for all online accounts
Educational Online Platforms
Learning Destination Sites (LDS): Access a variety of courses and learning materials online
in an organized fashion.
Learning Management Systems (Course Management Systems): Portals for educators to
manage the material, communication, and resources for their students
Learning Management Ecosystems: Combining LDS and LMS to offer a customized
solution for exclusively members of an enterprise or a major institution.
Examples of Educational Software
test preparation: Designed to improve your performance on standardized test
simulation: Allows you to experience a real situation through a virtual environment.
Instructional: Designed to teach you almost anything from playing a musical instrument to
leaming a language or cooking
Health and fitness: Helps monitor physical activity, diet, and general health status.
Home design/improvement: Provides 2D or 3D templates and images to let you better
visualize indoor and outdoor remodelling projects and landscaping ideas.
Brain training: Features games and activities to exercise your brain to improve your
memory, processing speed, attention, and multitasking capabilities.
Course management: Web-based software system that creates a virtual learning experience,
including course materials, tests.
genalogy: Helps chart the relationships between family members through multiple
generations
Tools For Distance-based Education
Videos: Whether via the learning management system or any video streaming or video-
sharing platform
One-to-one learning: online platforms for instructors to offer one-on-one sessions or series
of classes to learners.
Group learning: virtual classrooms, possibly aided with pre-recorded videos and reading
materials.

25
Week 13
Some key areas of IT innovation:

- Artificial Intelligence (AI): AI involves creating algorithms and systems that can
perform tasks that typically require human intelligence
- Internet of Things (IoT): IoT connects devices to the internet, allowing them to collect
and exchange data.
examples of IoT innovations: Smart homes, industrial automation, and wearable devices
5G Technology: The fifth generation of mobile networks offers faster data speeds and
reduced latency.
Cybersecurity Innovations: Develop technologies to protect digital systems from cyber
threats and include advanced threat detection, secure authentication methods, and encryption
technologies.
IT-based business ideas:
1- Web Development
- Offer custom website development services for individuals and businesses.
- Specialize in e-commerce website development.
- Create and sell website templates.
2- Mobile App Development
- Develop mobile apps for iOS and Android platforms.
- Offer app maintenance and support services.

3- E-learning Platform
- Develop an online learning platform.
- Offer a platform for others to sell their courses.
4- Artificial Intelligence (AI) Solutions
- Develop AI-powered applications for businesses
- Provide solutions for automating processes and improving efficiency.

5- Data Analysis and Business Intelligence:


- Offer data analysis services to help businesses make informed decisions.
- Provide data visualization services.

6- Game Development
- Create and sell mobile or computer games.
- Provide game development services to other companies
IT-based entrepreneurship
General areas of IT-based entrepreneurship:
o Software Development Services.
o Digital Marketing Agency
o Cybersecurity Consulting Firm

26
What is digitization?
Digitization: the diffusion of information and communication technologies that can bring
about both positive and negative effects.
Smart Homes: devices and appliances are automated or controlled by apps installed on your
smartphone or tablet thanks to the power and availability of strong wireless.
networks and Bluetooth.
Smart cities: It is an innovative city that uses information and communication technologies
and other means to improve quality of life concerning economic, social, and environmental
aspects.
Solutions that make a city "smart”.
Internet of Things (IoT): It involves analyzing and sharing data using dedicated sensors,
gateways, and cloud technologies.
such as:
- Smart Traffic Management: IoT sensors in traffic lights and on roads to optimize
traffic flow
- Smart Waste Management: Bins equipped with sensors to optimize waste collection
schedules
- Environmental Monitoring: Sensors to measure air and water quality in real-time
- Renewable Energy: Developing green energy allows cities to use less resources and
reduce their carbon footprint
- Smart Transportations: Vehicles are connected to traffic monitoring systems in smart
cities to build optimal routes.
- Enhanced Connectivity: A smart city's elements generate vast data that must be stored,
processed, and analysed in real-time
How Can Society Benefit from Smart Cities?
o Improve air quality, Ease traffic and congestion
o Improve civil services efficiency
o Improve healthcare
o Provide more economic opportunities

‫ ال تنسوني من صالح دعائكم‬.. ‫بالتوفيق لي ولكم‬

27

You might also like