web viewcheck with the teacher, ... (american standard code for information interchange) and...

38
ITGS Current Event Project revised 8/8/11 1. Sign up for a quarter topic in class. 2. Find an appropriate* current event article to analyze from our quarter theme. 3. Paste the article at the bottom of this worksheet. 4. Highlight the individual words in the article that match each “strand”: YELLOW = Theme/Topic; GREEN = IT System; BLUE = Social/Ethical Issues; PINK = Stakeholders 5. List the new ITGS vocabulary words from the article and use google to define them. 6. Save often. Keep a copy in the cloud, on the AW server, or on a flash that goes to school. 7. Type your answers on this worksheet in black, size 12, and only submit your own original work. Do not leave any spaces blank. 8. Save the completed project as a PDF file. 9. Drop it into the ITGS Current Event AngelWeb Drop Box as soon as you are finished. 10. Complete the “blabberize.com” summary assignment online and embed your summary on our class wiki: https://itgsfrau.wikispaces.com/Blabbers IDENTIFICATION Your Name Class Period Today’s Date Date of Article (*must be within a year from today) Article Title Article Author Word Count (*must be over 500) ITGS Scenario/Theme (must be the assigned quarter scenario) ITGS Topic (sign up in class-no repeat topics) SUMMARY (*include all 4 ITGS components: Scenario/Stakeholders/IT System/ Primary Social & Ethical Issue ) COMPLETE URL (make sure this link works correctly) FINDING AN ARTICLE

Upload: hakhanh

Post on 01-Feb-2018

215 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Web viewCheck with the teacher, ... (american standard code for information interchange) and unicode. analog and digital ... applications such as word processing, desktop

ITGS Current Event Project revised 8/8/11

1. Sign up for a quarter topic in class.2. Find an appropriate* current event article to analyze from our quarter theme. 3. Paste the article at the bottom of this worksheet.4. Highlight the individual words in the article that match each “strand”:

YELLOW = Theme/Topic; GREEN = IT System; BLUE = Social/Ethical Issues; PINK = Stakeholders5. List the new ITGS vocabulary words from the article and use google to define them.6. Save often. Keep a copy in the cloud, on the AW server, or on a flash that goes to school.7. Type your answers on this worksheet in black, size 12, and only submit your own

original work. Do not leave any spaces blank. 8. Save the completed project as a PDF file.9. Drop it into the ITGS Current Event AngelWeb Drop Box as soon as you are finished.10. Complete the “blabberize.com” summary assignment online and embed your summary

on our class wiki: https://itgsfrau.wikispaces.com/Blabbers

IDENTIFICATIONYour NameClass PeriodToday’s DateDate of Article (*must be within a year from today)Article TitleArticle AuthorWord Count (*must be over 500)ITGS Scenario/Theme (must be the assigned quarter scenario)ITGS Topic (sign up in class-no repeat topics)SUMMARY (*include all 4 ITGS components: Scenario/Stakeholders/IT System/

Primary Social & Ethical Issue )COMPLETE URL (make sure this link works correctly)

FINDING AN ARTICLE Use the 3 tables below to help yourself find a qualified current event

story online. The article must have at least 500 words, be dated within a year from

today and include all 4 required ITGS components. Save those that do not match the assigned quarter theme, but can be

used for a different ITGS theme at a later date. You must claim your topic/story by recording it on the sign-up sheet in

class. First come, first serve, no repeat topics. You may use your textbooks, and the internet to complete this

INDIVIDUAL project.

PART 1: REFLECT ON THE “STRANDS”

You will have 5 minutes at the beginning of the IB ITGS Paper 2 exam to read an IT article. You are advised to take the next 15 minutes to reflect on the following 4 “strands” before formulating your 4 responses. Assignment 1 will teach you how to reflect at this deep level.

Page 2: Web viewCheck with the teacher, ... (american standard code for information interchange) and unicode. analog and digital ... applications such as word processing, desktop

Scan the tables to help you highlight your article and decide if it can be used for this project. Using an article which does not involve a computer chip, will earn a zero. Your IT article must also mention all 4 strands. Highlight only the words that match a strand, not entire sentences or paragraphs. Check with the teacher, if you are not sure you have an appropriate article. Copy and paste your highlighted news story to the end of this document.

THESE TABLES SHOW WHICH TOPICS YOU MAY SEE ON YOUR IB ITGS EXAMS.

AS YOU READ THROUGH THEM, GOOGLE & STUDY ANY TERMS THAT ARE NEW TO YOU. YOU ARE STUDYING FOR YOUR EXAMS EACH TIME YOU DO THIS.

1. SCENARIO

Quarter 1 Juniors

Scenario Theme TopicPolitics and Government

Political Processes online campaigning

votinglobbyingfund-raising and advertising

Government Information Sites

For example: travel warnings, tourist information, environmental information and warnings, government policies, city government websites

Access to and updating of Personal Information held on Government Databases

collection, storage and updating of personal data- for example: driving license, TV license, tax returns, passport applications and renewals, medical records, military service records, social security information, online police records

Government Control and Use of Information

censorship

data matching across agenciesarchivingbiometric datanational identity cards

Law and Order police surveillanceterrorist monitoringDNA data

Military cyber warfaresmart weapons

Page 3: Web viewCheck with the teacher, ... (american standard code for information interchange) and unicode. analog and digital ... applications such as word processing, desktop

espionagebattlefield technology

Quarter 2 Juniors

Scenario Theme TopicThe Environment Modeling and Simulations Climate change

Forecasting natural events or demographic changes

Data Logging SensorsProbesReal-time data collection

Satellite Communication Remote sensing devices

Satellite imageryTagging

Mapping, Virtual Globes Geographic information systems (GIS)

Global positioning systems (GPS)

Cell/mobile phone tracking

Online journey planning

Online mapsE-waste Disposal and recycling of IT

equipment

Monitoring organizations (such as the Basel Action Network).

Resource Depletion Use of nonrenewable resources for manufacturing components

Electrical consumption of IT systems

Quarter 3 Juniors

Scenario Theme TopicHome and Leisure

Homes and Home Networks

IT management of home systems: for example: lighting, security and

Page 4: Web viewCheck with the teacher, ... (american standard code for information interchange) and unicode. analog and digital ... applications such as word processing, desktop

entertainment centers.Digital Entertainment films

photographsmusicartsonline and digital gamesgamblingvirtual worlds

Social Networkingchat roomsmessagingbloggingfile sharingwikis

Published and Broadcast Information

booksnewspapersdigital radio and TVe-bookspodcasts/vodcasts

Digital Policing monitoring organizations such as the Recording Industry Association of America (RIAA) and the Motion Picture Association of America (MPAA).

Hardware, Software and Networks

portable digital devices and their ability to remotely control other devicesIT-enabled appliances

Quarter 4 Juniors

Scenario Theme TopicBusiness & Employment

Traditional Businesses Banks

ATMSEFT (electronic funds transfers)HotelsSupermarketsTravel Agencies

Online Businesses(e-commerce)

Teleworking

Web StoresTransportation Airline Reservations

Luggage TrackingPackage TrackingNavigationTraffic Control Systems

Page 5: Web viewCheck with the teacher, ... (american standard code for information interchange) and unicode. analog and digital ... applications such as word processing, desktop

IT Systems in Cars

Quarter 1 Seniors

Scenario Theme TopicHealth Diagnostic and Therapeutic

ToolsSurgery

Prosthetic devices

Diagnostic technology

Rehabilitation

Patient monitoring

Individualized IT solutions for disabled peopleAccessibility

Medical Information, Medical Marketing and Medical Sales

Medical advice

E-prescriptionsTelemedicineElectronic health records

International health cards

Medical Research Global collaboration

Database for the Human Genome ProjectImproving patient rehabilitation

Psychological and Physical Considerations

Internet addiction

Repetitive strain injury (RSI)Ergonomics

Page 6: Web viewCheck with the teacher, ... (american standard code for information interchange) and unicode. analog and digital ... applications such as word processing, desktop

Quarter 2 Seniors

Scenario Theme TopicEducation and Training

Distance learning over large areas

Hospitals

Prisons

Schools

Use of IT in Teaching and Learning

Educational software

Online research and forums

Virtual learning environments (VLE)e-Books

Web 2.0/ Web 3.0

Educational networks

Use of mobile devices

Game-based learning

Fully immersive environments

Filtering and monitoring of students’ internet use1-to-1

m-learning

Hardware and Network Technologies in the Classroom

Laptop computers

Handheld devicesInteractive whiteboards

Provision for Special Needs Inclusive softwareBraille keyboardsAccessibility

School Administration Record-keeping of staff and finances

Libraries

Student RecordsEDI (electronic data interchange)

Page 7: Web viewCheck with the teacher, ... (american standard code for information interchange) and unicode. analog and digital ... applications such as word processing, desktop

Quarter 3 & Quarter 4 Seniors

NO CURRENT EVENT PROJECT (WORK ON CASE STUDY & REVIEW FOR EXAMS)

2. IT SYSTEMIdentify the IT system(s) in your current event article. The story MUST involve at least one system that uses a computer chip. If you can’t find any- pick a new article!

Identify the IT System(s) in your

Article.Highlight all those that

match in green.

Type of Technology?

Highlight all those found in your article in green.

Which Social/Ethical Concerns are there for this IT

System?Highlight all those that match

your article in green.HardwareLook for articles dealing with a computer system consisting of input devices, output devices, a central processing unit and storage. The increasing tendency to develop hardware in modular units raises a range of social impacts and ethical issues such as the use of non-renewable natural resources, the global transportation of manufactured components and their eventual disposal by individuals, organizations and governments. Possible solutions and their effectiveness are also appropriate topics.

o PDAso laptopso desktopso netbookso tabletso MAC addresso motherboardso CPUs, microprocessorso portso keyboards, mice, touch padso microphoneso webcams, digital cameras, digital

video cameraso sensors, probes, real-time data

collectiono composite devices, such as game

controllerso touch sensitive deviceso printers,o monitors,o speakers,o projectorso CD-ROM, DVD readers and burnerso optical mark recognition (OMR),

optical character recognition (OCR), magnetic ink character recognition (MICR)

o radio frequency identification (RFID), radio tags, bar code scanners, magnetic stripe readers

o smartcard readerso clock speeds: megahertz(MHz),

gigahertz (GHz), terahertz (THz)o primary storage: read-only

memory (ROM), random-access memory (RAM)

o secondary storage: optical, and magnetic; flash memory: USB (universal serial bus) flash drive

o Bit, byte, kilobyte (KB), megabyte (MB), gigabyte (GB), terabyte (B), petabyte (PB), exabyte (EB), zettabyte (ZB), yottabyte (YB)

o character encoding: ASCII (american standard code for information interchange) and unicode

o health issueso ergonomics (physical comfort)

related to the use of hardwareo increase in teleworking and

the virtual officeo password protection, security,

biometrics and authorized access

o the economic value of information

o proper disposal of old hardware

o greater dependence of organizations on IT

o other:

Page 8: Web viewCheck with the teacher, ... (american standard code for information interchange) and unicode. analog and digital ... applications such as word processing, desktop

o analog and digital datao data, information, and hardware.o operating systemso responsible computer useo a responsible and systematic

approach to implementing or upgrading IT systems

SoftwareLook for articles about software associated with a particular computer system. The development of software can have social impacts such as increased access for disabled people, and ethical issues, such as only producing packaging in a limited number of languages, effectively making English the global language. Articles that examine the effects of these developments on stakeholders are also appropriate.

o applications such as word processing, desktop publishing, presentations, photo and video editing, music and sound development, website development

o system software, such as operating systems and utilities

o interfaces, such as graphical user interfaces (GUI), command line interface (CLI), menu-driven interface (MDI), and voice

o licensing: shareware, public domain, freeware, proprietary and open source software

o licensing authorities: Business Software Alliance (BSA)

o commercial and custom-built (bespoke) software

o registration, serial number, warranty, copyright agreement

o web-based softwareo user support: manuals, assistants,

tutorials, help systems, “Read Me” files

o Macros, templates, wizardso File formats, for example, RTF

(rich text format), TXT (text), PDF (portable document format), XLS (Excel spreadsheet), SWF (small web format), ZIP (zipped file), JPG/JPEG (Joint Photographic Experts Group bitmap), PNG (portable network graphics bitmap), CSV (comma-separated values), HTM/HTML (hypertext markup language)

o Data transfer: ASCII (American Standard Code for Information Interchange), tab-delimited text file, zipped file

o software and sharewareo GUI, command-line interface, and

voice recognition.o defragmentation/optimization

and disk utility softwareo backup, file management, account

and accessibility managemento monitor and keyboard settings,

for example, international settings, disability settings

o virus scan, malware detectors and removers

o compression/decompression (lossless, lossy)

o interfaces adapted for the disabled

o bug-free softwareo software piracyo globalization of softwareo use of password protection to

prevent unauthorized accesso selecting a suitable operating

systemo verifying that software is

legally installed, registered and has available tech support

o selecting protection from viruses and malicious software

o selecting a source to obtain software

o balance in responsibility between an individual and an organization for training

o the need for IT companies to consider global and cultural diversity when preparing training and tutorial software

o the requirement of organizations to provide training when implementing change

o other:

Page 9: Web viewCheck with the teacher, ... (american standard code for information interchange) and unicode. analog and digital ... applications such as word processing, desktop

o color synchronizationo tutorial software, training software,

wizards and assistantso using wizards, assistants and online

assistants and web sites

NetworksLook for articles focused on a type of network, the development of acceptable-use policies, compatibility protocols, effectiveness of networks, the impact of ineffective management and network failure. Almost all businesses, institutions and organizations, and an increasing number of households, are linked by networks. The increasing use of networks raises a range of social impacts and ethical issues such as unauthorizedaccess, intrusive software (viruses, worms and Trojan horses), spam, phishing, pharming, spoofing andidentity theft. Students are expected to discuss possible solutions and evaluate their effectiveness.

o e-commerceo security measureso types of intrusion like viruses and

hackingo encryption and SSLo LAN and WANo client, host and servero main frame, supercomputerso grid computing, distributed

processingo ethernet, peer-to-peer (P2P)o local area network (LAN), wide

area network (WAN), virtual LAN (VLAN), wireless WAN (WLAN), and home networks

o internet, intranet, extranet, virtual private network (VPN)

o routers, switches, hubso connection types:

optical fiber, cable, wireless technologies such as wireless fidelity (WiFi), worldwide interoperability for microwave access (WiMax), Bluetooth, microwave

o network operating systems and utility software

o cloud computingo storage technologies: such as SAN

(storage area network), RAID (redundant array of inexpensive disks)

o protocols for network functionalityo synchronous and asynchronous

functionalityo remote accesso bandwidth, broadbando bit rateso electronic security issues:

authorized access, levels of access, biometrics, login, password, firewalls, proxy server, encryption, secure socket layer (SSL), audit trails

o licenses: single-user, multi-user, concurrent, network, site license

o physical security, such as lockso monitoring, such as keystroke

monitoring, system performance, surveillance

o network policies, such as: backup, archiving, disaster recovery, usage, redundancy, fallover

o codes of ethics and professional conduct: ACM (Association for Computer Machinery)

o vulnerability of networks to intrusion

o ability to filter incoming data,o need for interface standardso implications of network

failureso need for network use policyo other:

Page 10: Web viewCheck with the teacher, ... (american standard code for information interchange) and unicode. analog and digital ... applications such as word processing, desktop

o data centerso energy usage, uninterruptable

power supply (UPS)

InternetLook for articles about the technology that enables access to the internet, as well as the tools and applications that contribute to the creation of web-based resources. The use of the internet for activities such as e-commerce, academic research and social networking canraise ethical issues and have positive or negative social impacts. These may include exposure to undesirablematerials, cyber-bullying, e-fraud, improved communication between individuals and groups, intellectual property theft, plagiarism, spamming and the global dissemination of ideas. Possible solutions to a specified problem and an evaluation of their effectiveness are also appropriate.

o e-mailo viruseso global databaseso encryption methodso features of a web pageo the limiting effect of bandwidtho means for blocking access to

informationo WWW (World Wide Web), URL

(uniform resource locator), internet, intranet, extranet

o internet protocols: for example, HTTP (hypertext transfer protocol), HTTPS (hypertext transfer protocol secure), FTP (file transfer protocol), TCP/IP (transmission control protocol/internet protocol)

o IP addresso modem, browser, internet service

provider (ISP), bandwidth, download, upload, streaming audio/video, compression, decompression, cache

o domain names, domain name system (DNS)

o features of a website: for example, hyperlinks, navigation, metatags, tags, forms

o features of a browser: for example, bookmarks, visited links, tabs

o Web-based languages: for example, hypertext markup language (HTML), JavaScript

o adding functionality to a browser (for example, plug-ins)

o data-driven websites: for example, active server page extended (ASPX), personal home page (PHP)

o site management: for example, web hosting, uploading

o other site use: for example, bounce rate, click-through rate (CTR), avatar, profile

o search engines, web crawler/spider, search directories, search techniques, filtering, keyword density,

o keyword prominence, ranking of sites

o social networking: for example, newsgroups, message boards, chat rooms, forums, instant messaging

o email, email server, list servero Web 2.0, Web 3.0 and beyond,

collaborative online tools: for example, wikis, blogs, micro-blogs, RDF (resource description framework) site summary feeds, RSS (really simple syndication) feeds, mashups, forums, social

o ethical considerations relating to the use of encryption and, to workplace monitoring

o social impact of global viruses and dependence on the Internet

o reliability of the informationo etiquette rules for appropriate

behavior when using the Internet

o ethical considerations relating to workplace monitoring

o internet security: for example, firewall, proxy server, SSL (secure sockets layer), encryption, public and private keys, digital signatures

o internet threats: for example, global viruses, hackers, spam, phishing, pharming, spyware, adware

o other:

Page 11: Web viewCheck with the teacher, ... (american standard code for information interchange) and unicode. analog and digital ... applications such as word processing, desktop

bookmarking, online collaborative applications, podcasts, photocasts, vidcasts, social networking sites, templates, tagging, viral marketing, webcasts, widgets, virtual worlds and learning environments

o web databases, encyclopediaso online advertising and marketing

technologies: for example, banners, pop-ups, cookies

o push–pull technologies: for example, email newsletters

o content management systems: for example, Moodle, Blackboard

o E-commerce technology: for example, business-to-business (B2B), business-to-consumer (B2C),

o consumer-to-consumer (C2C), payment services, secure transactions

o The World Wide Web Consortium (W3C)

Personal & PublicCommunicationsLook for articles that discuss the wealth of information available to society that can be accessed on demand and has changed the way in which people behave. The social impacts and ethical issues related to a plethora of devises and means of communication may include the health implications of mobile devices, unauthorized access to wireless networks, interception of communications, storage of personal communications for security purposes, andtracking of people. How these devices work independently and as part of a network should also include weighing their benefits and drawbacks. Future developments of these converging technologies and their compatibility can be evaluated.

o face-to-face communication versus via technology

o mobile phones and associated services and uses

o personal mobile devices such as laptops and PDA

o undetected intrusions into IT systems

o personal digital assistants (PDAs) and handheld digital devices

o global positioning systems (GPS), navigation systems and geotagging

o cell/mobile phoneso digital radio and TVo embedded systemso videoconferencingo remote access: for example,

teleworking, distance learningo telephony: voice over internet

protocol (VOIP)o accessing, sharing and

distributing text, photos, video, audio and television via IT devices

o synchronization of information between portable systems, desktop systems, servers and web-based services

o social effects of telecommutingo effect on the environment of

personal communication devices

o social effects of widespread use of teleconferencing and video conferencing

o other:

Multimedia & Digital MediaLook for articles involving the use and integration of media (for example, text, images and graphic elements, animation, sound and music, and video)

o design and creation concepts such as data integrity and storage

o design guidelines for creating multimedia/digital media

o design methods: for example, site map, storyboard

o primary and secondary data

o copyright issueso intellectual property rightso licensingo biased informationo reliability of datao surveillance and privacyo selecting a commercial

Page 12: Web viewCheck with the teacher, ... (american standard code for information interchange) and unicode. analog and digital ... applications such as word processing, desktop

to create digital products that are available online or offline. These technologies make information accessible through different media and online services. It is important to be aware of the actual uses of multimedia/digital media and the practical work in this topic. Evaluation of their effectiveness in various scenarios is also appropriate.Multimedia/digital media raises questions about a range of impacts, issues and solutions that must be investigated, including copyright, intellectual property, and current practices and policies used to grant permission for use.

o multimedia file formats: for example, text formats, audio formats, video formats, presentation formats, image/graphics formats

o policies, copyright, citing sources, Creative Commons, licensing and watermarking

o digital rights management (DRM)o storage, processing and access

concepts such as file formats, loading time, and portability

o folder and file management: importance of file and folder naming, appropriate folder structures

o tutorials: for example, help pages, online manuals

o templates and wizards, online and provided with software

o importing and exporting datao integrating software applications

and online tools: for example, embedded videos, web-based databases

o text-processing softwareo formatting: for example, page

layout, fonts, headers and footerso text file formats: for example,

PDF, RTF, TXTo typographyo Software types: for example,

albums, animated, 3D, bitmapped, vector, photo editing, photo casting, simulation

o bit depth, color depth (grayscale, shades of gray, millions of colors)

o layers, grouping, divisions, alignment

o resolution, pixels, dots per inch (dpi)

o image file formats: for example, JPG, GIF, TIF

o computer-generated imagery (CGI)

o audio-editing software, podcastso digital audio: for example, MIDI

(musical instrument digital interface), MP3 (MPEG-1 audio layer 3), MP4(MPEG-4 part 14), WAV (waveform audio format)

o audio file formats: for example, MP3, MP4, WAV

o video-editing software, vidcasts and special effects (for example, morphing, transitions)

o digital video: for example, AVI (audio video interleave), MPEG (Moving Picture Experts Group), video CODECs (coder-decoders)

o video file formats: for example, AVI, MOV, MP4,etc.

providero social impacts of speech-

enabled input / outputo economic effects of DTP on

businesso the effects of word processing

and DTP on the workplace like job loss

o other:

Page 13: Web viewCheck with the teacher, ... (american standard code for information interchange) and unicode. analog and digital ... applications such as word processing, desktop

o software types to house and display the multimedia components: for example, word processing, desktop publishing, presentations, web pages

o differences in files (for example, graphics, images, audio, video) for print and online versions

o inserting and manipulating objects (graphics, sound or video files)

o tables: cell merge, borders, cell padding, cell spacing, nested tables

o layerso links: relative and absolute,

internal and external, for example, anchors, pop-ups

o word processing and desktop publishing (DTP)

o referencing and reviewing: for example, spellchecker, thesaurus, outliners, word count

o word processing versus page layouto appropriate use of templateso effective use of word processing

functionso appropriate use of fonts, white

space and line spacing to create output which communicates effectively

o inline and floating graphicso interactive multimedia,

slideshows and websiteso applications and online tools used

for creating and making available interactive multimedia, games, presentations, slideshows and websites

o use of scripting in creating web pages (for example, HTML, JavaScript, URL links to online media)

o integration of online tools

DatabasesLook for articles showing how databases are used in schools, retail stores, online shopping, reservations, etc.). Databases lie at the heart of most IT systems whether in businesses, organizations or other institutions.Databases enable organizations to maintain accurate and comprehensive records. In order to appreciate therole that databases play, there must be an understanding of

o tableo field, data types, key field/primary

key, secondary keyo recordo flat-file database, relational

database, normalizationo database management systemo specialized databases: for example,

web databases, online encyclopedias

o design and creation concepts like updating data

o data validation: data types, range check, check digit, field size, input mask, drop-down list

o data integrity, reliability,

o privacy of information in different cultures

o rights of individuals with respect to the storage of personal data,

o ethical issues related to the collection and use of personal data

o ethical issues related to the selling of data stored in databases.

o database securityo other:

Page 14: Web viewCheck with the teacher, ... (american standard code for information interchange) and unicode. analog and digital ... applications such as word processing, desktop

how they work, which can only be gained from the design and creation of basic relational databases as well as by examining how databases are used in the specified topics listed under each of the 6 ITGS scenarios: business & employment, education & training, the environment, health fields, home & leisure, and politics & government (2012 ITGS Guide: pgs. 23-25).The increasing use of databases raises a range of social impacts and ethical issues such as the rights of individuals with respect to the storage and potential sale of their personal data or the ease of data miningand data matching. Discussing these issues and evaluating possible solutions is useful.

redundancyo queries: for example, searching,

sorting, filtering, use of Boolean operators (AND, NOT, OR)

o data entry formo report generationo macroso transfer of data between databases

and other applicationso storage and access concepts such as

data mining and data matchingo presentation concepts such as

special purpose databases in libraries or encyclopedia systems

o design and creation concepts like updating data

o storage and access concepts such as data mining and data matching

o presentation concepts such as special purpose databases in libraries or encyclopedia systems

o design and creation concepts like cell, cell format

Spreadsheets & Modeling and SimulationsLook for “what-if” articles with statistics, data, graphs or financial details used to discuss real-world what-if scenarios. The increasing capabilities of computers have allowed individuals and organizations to develop software that can be used to test “what-if” scenarios and create simulations and models of real-world events.Spreadsheets, through the use of worksheets and graphs, can be used to manage, predict using a series of “what-if” scenarios, and display financial details of businesses.Modeling and simulations can be used to recreate or predict the conditions that may result from an event, for example, the areas that will be affected by coastal flooding as a result of different levels of globalwarming. It is important to be aware of the benefits of creating accurate spreadsheets, models andsimulations, as well as, the social impacts that could result from simulations

o storage and access concepts such as data transfer between a data base and a spreadsheet.

o presentation concepts like select print, use of appropriate graph or chart and special purpose spreadsheets

o cell types, such as text, number, date, currency, hyperlinks. Etc.

o formulas, such as relative and absolute cell references

o sorting, filtering, and replicating data

o types of chartso formatting and presentation, such

as test/fonts, background, paragraphs, and pages

o data validation, verification and testing

o functions, such as math, text, logic, date, etc.

o protection for sheets and workbooks

o cell lockingo advanced functions, such as lookup,

pivot tables, macros, etc.o worksheet modeling: “what-if”

analysis (scenarios, goal seek tool)o modelso simulationso different types of models and

simulationso virtual reality, augmented reality,

gaming, such as MMORPG (massively multiplayer online roleplaying game)

o graphics and animations (2D, 3D)o visualization of datao feedback loop

o privacy of information in different cultures

o rights of individuals with respect to the storage of personal data,

o ethical issues related to the collection and use of personal data

o ethical issues related to the selling of data stored in spreadsheets.

o reliability of predictions based on computer models like in global warming

o security issues involved in military simulations

o social impact of reliance on simulations to examine issues of public policy

o other:

Page 15: Web viewCheck with the teacher, ... (american standard code for information interchange) and unicode. analog and digital ... applications such as word processing, desktop

being unable to replicate the real world, and the ethical issues that may arise during the development of the model.

o the validity of a modelo the verification of the results of a

simulationo reproducibility of resultso relationship of a model to realityo relationship between a model and a

simulationo faulty or hidden assumptionso processing power needed to create

complex modelso visualization of informationo correspondence of the model with

reality

Project ManagementLook for articles focused on the creation of a product. All IT development requires a management method. Knowledge and understanding of the productdevelopment life cycle (PDLC) is often used as a framework to develop IT solutions.

o stakeholders: client, end-user(s), developer

o the need for project managemento data collectiontechniques for

content and product designo citing of sourceso role of testingo processes usedo technical manualso end-user documentationo end-user training

Product development life cycle (PDLC) has these 11 steps:

o investigation of existing systemso feasibility studyo requirements specificationso project scheduleo appropriate design techniqueso product designo product developmento data captureo product testing and debuggingo technical documentationo client and end-user evaluation

o other:

IT Systems in OrganizationsLook for articles about Most organizations, at some stage of their development, require the introduction of a new IT system, as well as, the maintenance and eventual retirement of their current systems. Their ability to manage this change can determine the future viability of their organization. Look for articles about this situation or about real IT professionals who maintain legacy systems or develop new systems.

o development methodologies: agile development and waterfall development

o project management methodologies: PRINCE2 (projects in controlled environments 2); SSADM (structured systems analysis and design method); PMBoK (project management body of knowledge); CMMI (capability maturity model integration)

o iterationo time constraints, tasks, resources,

and milestoneso Gantt and Pert chartso modeling systems: entities, entity

relationship diagrams (ERD), data flow diagrams, etc.

o maintenance of legacy systemso system support: internal support,

o the need for IT systems in organizations

o the role of IT systems in organizations

o organizational IT policieso IT personnel and

organizational structure, such as Information System (IS) managers, support staff, network manager, database administrator

o development personnel: manager, programmer, analyst, project manager, etc.

o incident management and escalation

o other:

Page 16: Web viewCheck with the teacher, ... (american standard code for information interchange) and unicode. analog and digital ... applications such as word processing, desktop

maintenance contracts, etc.

System development life cycle (SDLC) includes these steps:

1. analysis of current situation2. organizational requirements3. methods of data collection:

questionnaires, interviews. observation, literature searches

4. feasibility study5. identification of possible IT

solutions6. requirements specification7. justification of preferred IT

solution8. project plan (who, why, what, when

and how part of the project)9. project goals, scope and

constraints, such as financial, time, technical, human-resource-related, risks,

10. communication, procurement, quality

11. project initiation document12. design considerations13. inputs, data structure, processes,

outputs, user interface14. prototyping15. development of the IT solution16. initial testing, alpha testing17. quality assurance and quality

control18. implementation19. training and support of staff,

documentation to support the new IT system

20. changeover methods: direct, phased and parallel running

21. beta testing22. maintenance23. phase out

Robotics, Artificial Intelligence & Expert SystemsLook for articles highlighting products that can imitate human behavior. The increasing capability of IT systems has allowed developers to implement systems that attempt tounderstand and imitate human behavior. These systems have already had profound effects on society, although their effectiveness is largely determined by the accuracy of the algorithms that underpin them.The increasing use of

o why robots don't have android human-like forms

o processing power in relation to the capabilities and limitations of robots

o the capabilities and limitations of robots with respect to vision, touch, sound and movement

o Input devices: for example, camera, sensors, microphones

o O utput devices: for example, claws, wheels, motors, relays, speakers

o robot, android, cyborgo sensors: for example, heat,

proximity, magnetism, light, humidity, pH

o artificial intelligenceo artificial intelligence versus

computational intelligence

o social and economic effects of replacing people with robots in the work place

o ethical decisions regarding the use of robots in situations that endanger human beings

o social impact of human interaction with robots

o reliability of robotic deviceso handing over decision-making

to a computero social impact and ethical

considerations regarding the use of robotics in medicine and surge

o robot rightso robots as smart weaponso reliability of AI systemso costs of AI, robotics, and

Page 17: Web viewCheck with the teacher, ... (american standard code for information interchange) and unicode. analog and digital ... applications such as word processing, desktop

robotics, artificial intelligence (AI) and expert systems raises a range of ethical issues. For example, at which point should humans hand over key decision-making to a computer? Should robots have the same rights as humans? What social impacts might arise with the replacement of human workers or the creation of smart weapons?

o man or machine: Turing test, CAPTCHA (completely automated public Turing test to tell computers

o and humans apart)o capabilities and limitations: for

example, learning to identify human emotions, evaluation of living

o things and machines (intuition, prior knowledge, judgment)

o AI techniques: searching, pattern recognition, heuristics, machine learning

o fuzzy logic, set theoryo machine learning: can machines

become independent?o natural language communication

and translatorso neural networks: similarity to

biological systemso pattern recognition: OCR (optical

character recognition), image analysis, speech recognition, speech

o synthesizerso processing and storage

requirements for AIo processing requirements for AIo collection / creation of a

knowledge baseo storage requirements for

common-sense knowledgeo identifying domains that are

suitable for expert systemso Collection, creation and

maintenance of knowledge baseo creation of inference engine,

inference rule (“if–then” rules), chaining, suitable domains for expert systems

o expert systems, knowledge base, knowledge engineer, expert system shells, inference engine, domain, common-sense knowledge

o purpose of an algorithm within expert systems: for example, fault finding, product development

o embedded systems: for example, cell/mobile phones, GPS, washing machines

o internet search engineso smart systems: for example, used at

home or in warfare, medicine, carso use of artificial intelligence (AI): for

example, language translation, chess, voice recognition, modeling, games, predictive text, business intelligence systems

o use of expert systems: for example, medical diagnosis, fault diagnosis, flight simulators, fraud detection

o use of robots: for example, in industry, health, warfare, airlines,

expert systemso implications of creative

production by computers using AI

o responsibility for the performance of an expert system

o social impact of using smart machines in everyday life

o responsibility for the performance of an expert system

o other:

Page 18: Web viewCheck with the teacher, ... (american standard code for information interchange) and unicode. analog and digital ... applications such as word processing, desktop

space, underwater exploration

3. STAKEHOLDERSThese are the people, groups, and organizations mentioned in your article. Find them in your story by answering the questions below, and then highlight the PRIMARY stakeholder in pink. Can’t find any stakeholders? Then pick a new article!

Who initiated and controls this IT system?Who is responsible (decided to do the work) for this IT system?Who is accountable (gets financial and legal consequences) for this IT system?Who can benefitfrom this IT system?Who can losefrom this IT system?What are the economic (money) advantages and/or disadvantages of the IT system on thestakeholders?What are the political advantages and/or disadvantages of the IT system on thestakeholders?What are the cultural advantages and/or disadvantages of the IT system on thestakeholders?What are the legal advantages and/or disadvantages of the IT system on thestakeholders?What are the environmental advantages and/or disadvantages of the IT system on thestakeholders?What are the

Page 19: Web viewCheck with the teacher, ... (american standard code for information interchange) and unicode. analog and digital ... applications such as word processing, desktop

ergonomic (physical comfort) advantages and/or disadvantages of the IT system on thestakeholders?What are the health advantages and/or disadvantages of the IT system on thestakeholders?What are the psychological advantages and/or disadvantages of the IT system on thestakeholders?Describe a feasible solution to overcome one of the disadvantages mentioned above.

4. SOCIAL AND ETHICAL ISSUES State briefly how each of these issues relates to your article’s topic, the IT system and/or stakeholders. If it’s not stated directly in the article, use your ITGS knowledge to make a connection. Check theses terms and memorize their definitions from the ITGS Guide 2012, pages 21-22. Highlight the PRIMARY concern in blue.

reliability & integritysecurityprivacy & anonymityintellectual propertyauthenticitythe digital divide & equality of accesssurveillanceglobalization and cultural diversitypolicies, rules, or lawsstandards & protocolspeople and machinesDescribe one major problem emerging from one of the impact areas above.Describe two alternative ethical decisions or feasible solutions to that problem.What is a possible

Page 20: Web viewCheck with the teacher, ... (american standard code for information interchange) and unicode. analog and digital ... applications such as word processing, desktop

consequence of each of these two decisions or solutions?Evaluate why one is better than the other.

PART 2: THE 4 EXAM QUESTIONSStraight from the exam you will take.

Time yourself to see how long it takes you to complete all 4 sections:

Start Time:End Time:

Your goal is to write the 4 most complete responses in 1 hour. Keeping time will help you get a feel for how much you can do in 60 minutes, so that you can pace yourself and avoid feeling nervous or rushed during the actual Paper 2 exam.

You must use complete sentences and indent the beginning of each new paragraph.Criterion A Make reference to relevant social/ethical concerns and

stakeholdersIdentify (name) an ITGS social or ethical issue in the article. *Choose your specific issue thoughtfully, since you will have to use it again in criterion B to show how it relates to the IT system.

(indent)

Describe (= use details) the social/ethical issue identified above.

(indent)

Identify (name) the relationship between one primary stakeholder to the IT system in the article.

(indent)

Describe the relationship between this primary stakeholder and the IT system identified above.

(indent)

Page 21: Web viewCheck with the teacher, ... (american standard code for information interchange) and unicode. analog and digital ... applications such as word processing, desktop

Write approximately 100 words total, and highlight each individual ITGS key term.

TOTAL WORD COUNT =

Score Your Criterion A Answer Using the IB Paper 2 Rubric Above:Explain how your original answer matches the score description.*If it is not worth the full marks, go back and fix the original answer with red text until it matches the highest possible score.

You must use complete sentences and indent the beginning of each new paragraph.Criterion B Make reference to relevant stakeholders, information

technologies, data and processes.Identify (name) ALL of the major components of the IT system using appropriate technical IT terminology.

(indent)

Write a detailed description of the step-by-step process of how the IT system works, which goes beyond what’s written in the

(indent)

Page 22: Web viewCheck with the teacher, ... (american standard code for information interchange) and unicode. analog and digital ... applications such as word processing, desktop

article. Show that you have a clear understanding of this process.Explain (by including reasons or causes) the relationship between the IT system in the article and the social/ethical concern you identified in Criterion A above. Be sure to use ITGS terminology.

(indent)

Write approximately 150 words total, and highlight each individual ITGS key term.

TOTAL WORD COUNT =

Page 23: Web viewCheck with the teacher, ... (american standard code for information interchange) and unicode. analog and digital ... applications such as word processing, desktop

Score Your Criterion B Answer Using the IB Paper 2 Rubric Above:Explain how your original answer matches the score description.*If it is not worth the full marks, go back and fix the original answer with red text until it matches the highest possible score.

You must use complete sentences and indent the beginning of each new paragraph.Criterion C Evaluate the impact of the social/ethical issues on relevant

stakeholders.Identify a social/ethical problem for the relevant stakeholders.

(indent)

Write a detailed description of the impact of any social and/or ethical issues on the stakeholders. DO NOT COPY FROM THE ARTICLE.

(indent)

Analyze the impact of the social/ethical issues on the stakeholders by breaking down the relationship to show the essential elements or its structure.

(indent)

Evaluate the impact of the social/ethical issues on the stakeholders by weighing the strengths and limitations (pros and cons, or positives and negatives). Refer back to the info in the article with explicit and well-developed references. Use ITGS terminology.

(indent)

Write approximately 250 words total, and highlight each individual

TOTAL WORD COUNT =

Page 24: Web viewCheck with the teacher, ... (american standard code for information interchange) and unicode. analog and digital ... applications such as word processing, desktop

ITGS key term.

Score Your Criterion B Answer Using the IB Paper 2 Rubric Above:Explain how your original answer matches the score description.*If it is not worth the full marks, go back and fix the original answer with red text until it matches the highest possible score.

Score Your Criterion C Answer Using the IB Paper 2 Rubric Above:Explain how your original answer matches the score description.*If it is not worth the full marks, go back and fix the original answer with red text until it matches the highest possible score.

You must use complete sentences and indent the beginning of each new paragraph.Criterion D Evaluate one solution that addresses at least one

problem identified in Criterion CPropose, and then write a detailed description of ONE possible solution to any problem(s) identified in criterion C. DO NOT COPY TEXT FROM

(indent)

Page 25: Web viewCheck with the teacher, ... (american standard code for information interchange) and unicode. analog and digital ... applications such as word processing, desktop

THE ARTICLE.Evaluate this solution by talking about both its strengths and potential weaknesses. Make a reference back to the info in the article.

(indent)

Identify areas for future development. Make sure you have used ITGS terminology.

(indent)

Write approximately 250 words total, and highlight each individual ITGS key term.

TOTAL WORD COUNT =

Score Your Criterion D Answer Using the IB Paper 2 Rubric Above:Explain how your original answer matches the score description.*If it is not worth the full marks, go back and fix the original answer with red text until it matches the highest possible score.

Page 26: Web viewCheck with the teacher, ... (american standard code for information interchange) and unicode. analog and digital ... applications such as word processing, desktop

Please Add all Four Word Counts from Above =(they must total between 725 and 775 words- if not, go back and adjust)Did you remember to HIGHLIGHT each ITGS flashcard word you used in all responses?

SUBMIT THIS ASSIGNMENT (as a pdf file)TO THE TEACHER ONLINE AS SOON AS YOU HAVE FINISHED. TURN IN YOUR CLIP. YOU WILL BE

POSTING IT ON OUR CLASS WIKI AS SOON AS IT IS SCORED.

COPY AND PASTE YOUR HIGHLIGHTED CURRENT EVENT BELOW.

YELLOW = Theme/Topic; GREEN = IT System; BLUE = Social/Ethical Issues; PINK = Stakeholders

*You may stop highlighting after 500 words, but include the entire article.

New IT Vocabulary Term Definition1234567

PASTE URL HERE: --------------------------------------------------------------------------------------------------------------------------------------------(paste highlighted article here)