Wednesday, February 20, 2008

Application Software:

Types of application software:

1. Word processing – Microsoft Word
2. Spreadsheet – Microsoft Excel
3. Presentation – Microsoft Powerpoint
4. Database – Microsoft Access
5. Programming – Visual Basic, C++

The usage of Microsoft Powerpoint

The usage of Microsoft Powerpoint

1. For teaching
2. To make a presentation
3. To show a picture
4. To make a courseware
5. To show as a background
6. For handouts

What is Multimedia ?

What is Multimedia ?:
a) is the combining of text, images, and sound
b)In general, multimedia includes a combination of text, audio, still images, animation, video, and interactivity content forms.


Steps in Multimedia Development
1. Analysis
2. Design (storyboard)
3. Implementation
4. Testing
5. Evaluation
6. Publishing

Friday, February 15, 2008

Announcement

This web site is for my ICTL students. They can use this notes for test/exam preparation. Thank you. Good luck. Any comment, please post your comment.

Unethical Use of Computer

Computers in Society
Ethics and Information Technology

UNETHICAL COMPUTER USE
Rather than hackers, who is usually responsible for unethical computer use?

Individual practice:
1. Change passwords, don't share them, back up data, lock computers,
2. Don't leave confidential OR POTENTIALLY OFFENSIVE information on screen in a public place.
Development processes:
3. Responsibility to test thoroughly (fallen bridge, Therac radiation therapy machine)
4. No piracy. What is the most common excuse for piracy?
Management employee relations:
Revenge
5. Ethical disagreements.
Processing issues.
1. Unreliability
AT&T switch failure.
Air traffic control failure
2. Untimely output.
What happens when computers make work late?
3. Unintended Data use.
Think of all the junk mail you get.
Is it ethical for someone to sell your consumer profile without your permission?
Workplace issues:
1. Ergonomics.
Chairs, monitors, electromagnetic radiation, repetitive stress, breaks
2 Monitoring:

Issues of Data Collection, Storage, and Access:

Email:
Is your privacy protected?
Does your employer have a right to see your mail if you use the employer's system for your mail?
Do employees know their mail is being read?
Should you send unwanted advertisements, or rude messages?
Resource Exploitation Issues:
Wasting resources, interrupting services, cracking into systems.
Planting viruses, bad hacking.
Logic bombs, using a company computer for your own gain.

Computer crime:
Using computers to perform illegal acts.
Altering documents with DTP technology.

Copyright Law

Seksyen 41 (1)(i) Akta Hakcipta 1987 (Pindaan Akta A994) yang membawa hukuman denda minimum RM2,000 dan maksimum RM20,000 bagi setiap salinan langgaran atau penjara sehingga lima tahun atau kedua-duanya sekali.

What is copright ?

A copyright gives the owner the exclusive right to reproduce, distribute, perform, display, or license his work.