computer programming chapter 1 – lesson 2. privacy we currently live in the information age a...

35
COMPUTER PROGRAMMING Chapter 1 – lesson 2

Upload: laurence-holmes

Post on 18-Dec-2015

214 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

COMPUTER PROGRAMMING

Chapter 1 – lesson 2

Page 2: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

PRIVACY

We currently live in the Information Age A lot of data can be stored and

processed quickly thanks to computers The people of the Information Age have

a social and ethical responsibility Due to the large amounts of personal

information stored on computers, invasion of privacy has become a very serious problem

Page 3: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

PRIVACY - continued

A lot of information is accessed when a company looks up your credit rating

Your credit rating determines whether or not you qualify for loans

Sometimes, information may not be accurate, due to a company making a mistake or if someone has a name similar to yours

For this reason, several laws have been passed to protect you: (laws on next slide)

Page 4: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

Laws to Protect You

The Fair Credit Reporting Act of 1979 is one of the laws that guards against inaccurate credit ratings. A person has a right to see information obtained by credit, insurance, and employment agencies. If an individual is turned down for credit they must be allowed to view the files used to make the decision. Only those with a court order or written permission of the person whose information is involved are allowed to view the information.

Page 5: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

The Privacy Act of 1974

This act places limits on use of personal data by federal agencies.

Individuals are allowed to view information stored about themselves and are allowed to make changes to incorrect information.

Confidentiality and security must be maintained for any sensitive information

Page 6: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

The Financial Privacy Act of 1978 This act states that government

authorities can only access personal financial records with a subpoena, summons, or search warrant.

If records are released to such authorities, the financial institution must inform the person who has access to their records

Page 7: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

Intranet, Extranet, Internet

Intranet is a network that is used by a single organization, such as a corporation or school, and is only accessibly by authorized users

The purpose of an intranet is to share information

A firewall is also used to lock out unauthorized users

A firewall is a network security system that prevents unauthorized network access

Page 8: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

Extranet

Extends an intranet by providing various levels of accessibility to authorized members of the public

Example: a corporation may extend their intranet to provide access to specific information, such as their ordering system, to registered customers

Page 9: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

Internet

The largest and most widely accessed network A world-wide network of computers that is not controlled

by any one organization Has an undeniable impact on modern society because it

allows users worldwide to communicate in a matter of seconds

The Internet is actually numerous networks all linked together through routers

A router is a device that connects different network technologies

Networks connected to routers use TCP/IP(Transmission Control Protocol/Internet Protocol) software to communicate

Page 10: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

Servers or Clients

Computers on the Internet are either: Servers Clients

The client is sent information from a server The client/server structure of the Internet is called

interactive because the information accessed is a result of selections made by the user – Example: a computer with just minimal software for accessing the Internet is a client. The client user selecting options from the Internet is receiving the information from a server, a computer with additional software and files that is also connected to the Internet

Page 11: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

Telecommunications

The transmitting and receiving of data Data can be in various forms including

voice and video Requires a modem or adapter and a line

or cable The speed of data transmission (sending)

and receipt(receiving) is measured in Kbps (thousnads of bits per second) or Mbps (millions of bits per second)

Page 12: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

Telecommunications - continued Numerous telecommunications options are

available, which vary in speed and cost: Conventional modem uses standard telephone

lines to convert analog signals to digital data Conventional modem is a 56 Kbps modem,

which transmits data at 28.8 Kbps and 36.6 Kbps, and receives data at 56 Kbps

Today, most home and business users select options other than conventional modems if they are available in their area, due to the slow access time associated with conventional modems

Page 13: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

Telecommunications - continued DSL (Digital Subscriber Line) modem

uses standard telephone lines with data transmission up to 640 Kbps

Data receipt is from 1.5 Mbps to 9 Mbps A DSL (Asymmetric DSL) is the most

common form used Cable Modem transmits data through a

coaxial cable television network Data transmission is from 2 Mbps to 10 Mbps

and data receipt is from 10 Mbps to 36 Mbps

Page 14: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

The Electronic Communications Privacy Act of 1986

This act makes it a crime to access electronic data without authorization.

It also prohibits unauthorized release of such data

Page 15: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

The Electronic Freedom of Information Act of 1996 (E-FOIA)

This act requires federal government agencies to make certain agency information available for public inspection and is designed to improve public access to agency records by making more information available online

Page 16: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

The Children’s Online Privacy Protection Act of 1998

This act requires commercial websites that collect personal information from children under the age of 13 to obtain parental consent

Page 17: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

The Safety and Freedom through Encryption Act of 1999 (SAFE)

This act gives Americans the freedom to use any type of encryption to protect their confidential information

Page 18: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

Telecommunications - continued ISDN (Integrated Services Digital

Network) is a digital telephone network provided by a local phone company

ISDN is capable of transmitting and receiving data at up to 64 Kbps

ISDN requires the use of an ISDN terminal and adapter instead of a modem

Page 19: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

Telecommunications - continued Leased/Dedicated lines are used by

many businesses and schools for Internet access

They allow for a permanent connection to the Internet that is always active

The cost of a leased line is usually a fixed monthly fee

A T-1 carrier is a type of leased line that transmits data at 1.544 Mbps

Page 20: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

Internet Services

Internet Services include the World Wide Web, e-mail, and mailing lists

The WWW also called the Web is the most widely used Internet service

The Web can be used to search and access information available on the Internet

A web browser application, such as Microsoft Internet Explorer, provides a graphical interface to present information in the form of a website

Page 21: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

Another widely used Internet service is e-mail or electronic mail, which is the sending and receiving of messages and computer files over a communications network, such as a LAN (Local Area network) or the Internet

E-mail can be received in a matter of seconds, even if the recipient is located half way around the world

Page 22: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

© 2010 Lawrenceville Press

Slide 22

Chapter 1

E-mail Address

An e-mail address is required in order to send and receive e-mail messagesE-mail addresses are provided when you sign up with an ISP or an online service. A typical e-mail address is similar to:

Page 23: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

Mailing List server

A server that manages mailing lists for groups of users

Two mailing list servers are Listserv and Majordomo

Often used for discussion purposes When a subscriber posts a message to a

mailing list server, every subscriber receives a copy of the message

Subscribers are identified by a single name or e-mail address

Page 24: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

Finding Information on the Web and downloading Files

A search engine like Yahoo, Google, or MSN is a program that searches a database of web pages for keywords and then lists hyperlinks to pages that contain those keywords

A search engine usually works by sending out an agent, such as a spider

a spider is an application that gathers a list of available web page documents and stores this list in a database that users can search by keyword

Page 25: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

Most searches yield far too many matches to be useful Limiting the number of matches to a reasonable number

can usually be accomplished by using Boolean login in the search criteria:

Boolean logic uses three logical operators: AND locates pages that include both words OR locates pages that include one word or the other or

both NOT locates pages that include the first word, but not the

second word A Boolean expression always evaluates to TRUE or FALSE

with pages that match the search condition evaluating to TRUE

Page 26: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

© 2010 Lawrenceville Press

Slide 26

Chapter 1

MLA Citations

General citation for material located at a website:

Author’s Last Name, First Name MI. Site Title. Access date. Organization name. <URL>.

Example citation of a personal website:Rawlings, Julie. Home page. 23 Dec. 2009.

<http: //www.lpdatafiles.com/jrawlings/index.htm>.

continued next slide

Page 27: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

© 2010 Lawrenceville Press

Slide 27

Chapter 1

MLA Citations, continuedExample citation of an article in an online magazine:

Schiffman, Paula. "Making Vinegar at Home." Vinegar Monthly. 4 May 2009. <http://www. lpdatafiles.com/ vinegarassoc/journal.asp>.

Example citation of a posting to a discussion list:

Cruz, Anthony. "Are Orchestras Going Downhill?" online posting. 10 Oct. 2009. Tuscon Annual Ballet Conf. <http://www.lpdatafiles.com/ tuscontoes/downhill.txt>.

Page 28: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

Computer Ethics

With so much information that is electronically available people often steal works without thinking about it

This is copyright infringement which is illegally using or copying any type of data or work

Copyright protects media such as text, pictures, music, video, etc

Page 29: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

Piracy

Software is copied so easily that it presents a special problem

If software is copied without paying for it, the author of that software is losing money

When people illegally copy software, it is called PIRACY

Page 30: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

Protecting Computer Software and Data

Programs written to cause harm are another issue we must consider in software ethics

Virus – harmful software which can copy itself without the user knowing

TYPES OF VIRUSES: Trojan horse: looks like a useful program

that actually damages files on your computer as it runs

Worm: can copy itself over a network. A worm spreads quickly and can cause an entire network to shutdown

Page 31: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

Other protection concerns

Crackers/hackers: Someone who gains access to large computer systems with the sole purpose of performing acts of vandalism

This act is illegal and can cause expensive damage

The Electronic Communications Privacy Act of 1986 specifically makes it a federal offense to access electronic data without authorization

Networks usually 9include a firewall, which is a combination of hardware and software that helps prevent unauthorized access

Page 32: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

Other protection concerns

Phishing The act of sending an e-mail to a user

falsely claiming to be a legitimate business in an attempt to trick the user into revealing personal information that could be used for crimes such as identity theft

Page 33: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

The Ethical Responsibilities of an IT Professional

IT (information technology) professionals have responsibilities that relate to system reliability Ensure all networks and systems are reliable,

which means: Updating antivirus software Writing programs which are reliable Keeping hardware up to date Maintaining databases Consider the impact on users

We must keep in mind that computers will only do what they have been programmed to do

Page 34: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks

How To Protect Our Computers Antivirus software: software that

removes the malicious code before it causes harm

Antivirus software should be updated regularly

Do not open e-mail attachments without scanning for malicious coed

One estimate states that 80% of virus infection is through e-mail

Page 35: COMPUTER PROGRAMMING Chapter 1 – lesson 2. PRIVACY  We currently live in the Information Age  A lot of data can be stored and processed quickly thanks