Thursday, March 16, 2017

TOPIC 1 - INTRODUCTION TO INFORMATION TECHNOLOGY





 The Education field has not been spared from the recent Information Technology or IT explosion. The development of IT has great influence in the world of adult education. IT has caught the attention of the Education Department and other authorities in the education field, namely as regards to education management and as a teaching aid.

As an educator, you  as an  agent of change, has to be in line with the recent developments in this field.

There are five generations in the information era. 

Early Contributions before 1940 Have you ever heard of the abacus? As a teacher, you must have been exposed to the intentions of the Education Ministry to implement this method of calculations in schools. The history of the first computer started with the use of the Abacus, as a calculator some 3000 BC ago.

First Generation(1940-1958)  With the creation of the vacuum tube, problems of mechanical reactions could be solved. This was one of the main problems faced by computer designers that is the slow and jerky computer reactions.

Second Generation (1959-1963)  In the second generation computer, the vacumm tube has been changed to a transistor. As a result of the use of the transistor, the computer has physically become smaller, increased its speed and  reduced its energy efficiency while still  having great potential.

 This change has reduced the cost of computers. More than 17000 IBM computers have been marketed between the years 1959 to 1963. Among the famous computers are  IBM 1620 and IBM 1401. In this generation, computers  have started using magnetic tapes for storage. The programming languages used are FORTRAN and COBOL.


Third Generation (1964-1980)  In the third generation of computers, transistors were replaced with Integrated Circuits or chips. On the other hand, the magnetic coil had fully replaced the perforated card as an external hard disk. As a result of the use of the Integrated Circuits, the following computers were invented:  In  1971, Dr Ted Hoff invented the Intel microprocessesor 4004.   In 1975, the first local area network yang pertama telah was introduced by Robert Metcalfe.    The first Appel computer  was invented in 1976 by Steve Woziniak and Seve Job.    In 1977, Apple II was introduced.   Intel invented the computer 8086 in 1978, then it was replaced by 8088 in 1979.


Fourth Generation (1980-Today)   The fourth generation computer has used the integrated circuits. Intel has introduced the microprocessessor 286 in 1982 and todate,  Intel has used Pentium Centrino. In 1984, Macintosh was introduced. In May 1991 Microsoft Incorporated has introduced  operating systems known as Windows 3.0, subsequently in early 1992, Microsoft introduce  the new version of Windows 3.1. Windows 3.0 and 3.1 graphics and  DOS.

The Application of Information Technology  in Life  

- Management Tool  : There are a lot of data that have to be managed in an educational organisation. Among them student data, finance data, human resources data, stock data and others. IT with the application of the database system and Local Area Network can manage data systematically and efficiently. For instance, with the help of this system, an administrator will be able to know the studentÊs disciplinary status quickly.


- Teaching Aid 

The use of IT as a teaching aid can be divided into four that is:
• IT using tutorial mode
 • IT using investigative mode
 • IT using application mode
• IT using  communication mode

 - Internet in Education  :The use of computers helps users to communicate effectively, fast and cheaply.  Information sharing, meetings and discussions can be carried out through teleconferencing. The internet is also used for research and education. The Internet can be used with a variety of media in its application. With this open and wide characteristic,  it is not confined to any specific area, but is worldwide.

-  Industrialisation  In industries,
 IT is used to create products and increase productivity. There are two categories of industries namely:
 (i) Industries that produces products with IT. Among them are the software industry, biotechnology, computer parts to name a few.
(ii) Industries that use the application of IT. The banking industry, insurance industry are among the industries that are not based on IT.


- Multimedia Super Corridor :
- Communication between government agencies   Communication between government agencies are carried out electronically and with multimedia. Through this network communication, the ministry and the departments can communicate with each other. This will speed up matters that require decision making by both side. Documents, information and database can be shared by both the ministry and the relevant departments. Videoconferencing is used to facilitate meeting from being held at various locations.

 (ii) Communication between the citizens and the government  This aims at providing an efficient administration besides improving the quality of service in the public sector. The objective of the electronic government is stated below:

• Provides an efficient and quality service in the public sector
, • Form a fast and efficient communication newtwork between departments,
 • Save cost with paperless management
• Improve data safety

- Smart Schools       Smart Schools are institutions of education which are systematically organised in practising teaching and learning, that use IT and its application in its administration.

-Telemedicine    Telemedicine is an information network application that is used in the management and treatment work in hospitals.

- Research Centre  Having a research and development centre is an important aspect in a developing nation.

- Smart Card    Information can be loaded onto the microchip of the smart card. Basic information of the holder such as picture, place of birth, date of birth, fingerprint and identity card number of the holder can be stored in the chip. It also contains immigration information such as passport number and its expiry date. Information such as driverÊs license and expiry date is also stored in the chip. Besides that, the holderÊs medical record can be stored. Information on E-cash and E-trade is also stored. A mini card or portable card can trace all the information in the chip.

- A Borderless World Marketing Centre  The Multimedia Super Corridor (MSC) is able to provide the best infrastructure and services for traders. Multimedia Super Corridor can link with the world through the latest and most sophisticated telecommunication systems. The Multimedia Super Corridor has become a borderless world-class marketing centre through flexible laws and policies, good infrastructure and citizens skilled in technology and various languages.

- World Manufacturing Network         Raw materials are sent to factories fast through the use of telecommunication of international standing and support of a good and systematic transport system.


- Basic Parts of the computer system :
- three basic parts include input/ process/ output
 Devices under input: Keyboard, scanner, touch screen, joysticks, mic, camera
                         Output: printers, monitors, speakers.
                         Storage: RAM/ ROM
                         Secondary Storage: hard disk

Safety: 

 Regulations and Maintenance of the Computer
The computer laboratory just like any other laboratory has regulations.
Among the regulations in the laboratory are:

• Students are not allowed to enter or be in the laboratory without the presence of  teachers;
   • Food and drinks are not allowed in the laboratory;
 • Laboratory apparatus cannot be taken out of the laboratory without the teachersÊ permission;
  • Bags are not allowed in the laboratory;
 • Computers cannot be adjusted in any way (computer arrangement, hardware or software);
• The laboratory has to be kept clean and rubbish be thrown into the dustbins;
 • Walk carefuly and avoid running in the laboratory;
• In the event the user needs assistance he or she needs to get assistance from  authorised personnel only;
 • Be seated properly and avoid walking around from computer to computer;
  • The users need to well-behaved and not make noise in the laboratory;
  • Use the computer according to the regulations provided
  • Use the Internet only with the teachersÊ approval.

Hardware care:  
Computers are sensitive and expensive equipment. The computer user should take the following steps to prevent the computer from damage:
 • Store the computer away from areas that are damp or near places with a high moisture (for example below an air condition, stove and other places);
  • Store the computer away from dusty and humid places;
• Store the computer away form places with electrical appliances and magnetic fields;
  • Place the computer about 7cm from the wall or other objects to allow air circulation;
• Do not clean the screen with liquids containing alcohol or acetone, but clean the screen with a liquid detergent which is non-corrosive;
   • Use an appropriate table size to place the computer, place the table and the computer on a stable level and one that is free of vibrations, moving it only when necessary;
    • Rest the computer after long or continuous usage;
   • Switch off the power supply and remove the plug from the socket after using the computer;
   • Use an anti-static material around the computer to get rid of static charge;
 • To prevent windows errors, allows exit windows in the proper method

 - Safeguarding Data:  There are times data is even more valuable than the computer. For example data for a thesis is very precious compared to the any other programme files. These data has to be saved carefully. Carelessness in saving the data will cause the valuable data to be lost or  misused.

(a)  Types of  Misuse  of Data  There are many kinds of data misuse:

(i)    Data  Theft     • There are many reasons why criminals steal data. Data can be valuable for example data on customers may be valuable to a trader. Criminals need this data to steal customers from other traders. Criminals also target data on bank accounts, resulting in transfer of money from accounts to gain profits.
 (ii) Manipulating Data

• Cyber thieves usually manipulate data for a specific reason. For instance, some of these criminals use their computer expertise to alter personal data to confuse the relevant authorities. There are some who alter marks in examinations from fail to pass.
 (iii) Spying 

• Competitors in business always need data of their competitors to know their strategies and subsequently device new and better strategies. The same with safety data of a country that is always targeted by the enemies. Lack of security allows the enemies to spy on important data.

No comments:

Post a Comment