1. 1
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
Module in
INTRODUCTION TO
COMPUTING
ROSIE JANE PUIG-SIOSAN, PhD
Associate Professor III
WVSU-PC
PAULINE M. TORION, MIS
Assistant Professor II
WVSU-JC
2. 2
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
Hello there WVSUNIANS! Welcome to our first ever remote class in CC201- Introduction to
Computing. You are so blessed to be reading this module ☺ it means you are safe from the pandemic.
This module in Introduction to computing is intended for first year students of Bachelor of
Science in Information Technology. It is divided into three parts:
First is the introduction to computing which includes the topics on the history of computing,
the ACM requirements, computing profession and industry.
The second part covers computer system organization which consists of hardware and
software. Also included are the specific details on the parts of computer hardware as well as the
different types of software and its applications. Topics on computer security and malware and the
internet protocols are also discussed.
Finally the last part and probably the highlight of this subject are the topics on HTML and the
basics of CSS. This is a very worthwhile topic since all of you will be required to make your own
webpage. Isn’t that exciting?☺ Since this subject is a lecture-laboratory subject, this requires you to
have your computer units or laptops ready for our exercises. For our HTML topic, we will be using
NOTEPAD and any browser in performing your HTML Codes. For those who don’t have these gadgets
ready but have android phones, don’t worry you can still work on our exercises by downloading
WEBMASTER and HTML VIEWER on your android phones.
To pass this subject, you are required to answer/perform the activities and self-assessment
part of the module either through posting or uploading your answers on our Google classroom. The
evaluation activities found at the end of each module serves as a review material to ready you on the
actual quiz which will be taken either online or face to face depending on the situation. Religiously
studying the module and answering the activities at the end of each reading will give you an advantage
as an Information Technology. So I encourage you all to please read, understand, perform our exercises
and have fun while studying.
Kindly read the course outline for the schedule of our lessons and other guidelines. Do not be
overwhelmed for I will be with you every step of this journey. For inquiries, you may refer to my
personal information and contact numbers found in the About your Professor page. HAPPY
LEARNING☺
NOTES TO STUDENTS
3. 3
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
WEST VISAYAS STATE UNIVERSITY
SCHOOL OF INFORMATION AND COMMUNICATIONS TECHNOLOGY
CC201- INTRODUCTION TO COMPUTING
1st
Sem. 2021-2022
COURSE OUTLINE
VISION: A research university advancing quality education, towards societal
transformation and global recognition.
MISSION: WVSU commits to develop lifelong learners empowered to generate
knowledge and technology, and transform communities as agents of
change.
CORE VALUES: Excellence Creativity Innovation and Service
INSTITUTIONAL OUTCOMES FOR INSTRUCTION:
TAGA-WEST
• is a creative and critical thinker
• is an effective and responsible communicator
• has uncompromising personal and professional ethical standards
• is technologically –skilled
• has teaming and collaborative skills
• is socially responsible and has strong national identity
• is globally competitive
• is self-directed, competent, and accountable professionals
• can utilize lifelong learning skills for personal development and
excellence in professional practice
COURSE DESCRIPTION: CC201- INTRODUCTION TO COMPUTING
This course provides an overview of the Computing Industry and Computing
profession, including Research and Applications in different fields; an Appreciation of
Computing in different fields such as Biology, Sociology, Environment and Gaming; an
Understanding of ACM Requirements; an Appreciation of history of computing; and
Knowledge of the Key Components of Computer Systems (Organization and
Architecture), Malware, Computer Security, Internet and Internet Protocols, HTML 4/5
and CSS.
COURSE OUTLINE
4. 4
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
LESSON DELIVERY SCHEDULE
SCHEDULE MODULE TOPIC
Week 1
Orientation
a. Vision, Mission, Goals and Objectives
b. Modular Learning and Remote Learning Rules and
regulations
c. How to use Google classroom
Week 2 Unit 1. Lesson 1. Hardware, Software and IT Services
Industries
Week 3 Unit 1. Lesson 2. IT Professions and Career
Unit 1. Lesson 3. Code of Ethics for ICT Professionals
Week 4 Unit 1. Lesson 3. ACM Code of Ethics for ICT Professionals
Week 5 Unit 2. Lesson 1. Appreciation of Computing in Different Fields
Week 6 Unit 3.Lesson 1. History of Computing
Unit 3.Lesson 2. Emerging Technologies
Week 7 Unit 4. Lesson 1. Hardware
Unit 4. Lesson 2. Input Process, Output, Storage Devices
Week 8 Unit 4. Lesson 3. Operating Systems as part of Software
Week 9 MIDTERM EXAMINATIONS
Week 10 Unit 6. Lesson1. Cybersecurity
Week 11 Unit 7. Lesson 1. Introduction to computer networks and
internet
Week 12 Unit 8. Lesson 1 What is HTML?
Week 13 Unit 8.Lesson 2. Metadata and Text Fundamentals
Week 14 Unit 8. Lesson 3. Document and website structure
Week 15 Unit 8. Lesson 4 CSS Basics
Week 16 Online Presentation of Webpage (First Batch)
Week 17 Online Presentation of Webpage (Last batch)
UNIT TEST
Week 18 FINAL EXAMINATION
GRADING SYSTEM
Lecture (40%) Laboratory (60%)
Components Percentage Components Percentage
Quizzes/Unit Tests 20% Laboratory Activities 20%
Midterm/Final Exam 40% Practical Exam 40%
5. 5
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
Prompt Submission of
Requirements
10% Project (Webpage) 40%
Supplementary Outputs
(Exercises, Module
Drills and Activities)
30%
Total 100% Total 100%
MODE OF TEACHING
The manner of delivering the instruction for this school year is a combination of modular and
remote learning. Modular approach is a learning delivery model wherein students learn specific
learning competencies at their own pace and in their own learning environment through the use of this
module.
While asynchronous remote learning means not having face to face interaction but instead
interaction will be done online asynchronously at the convenience of our homes and at your most
convenient time. For the asynchronous remote learning, we will be using Google classroo and FB group
chat for announcements, submission of assignments and exercises.
POLICIES
1. Every week, one or more unit/lesson is assigned for you to read with assessment and
evaluation activities at the end of each unit/lesson.
2. Assessment will be given every unit either through module or Google Classroom. Quizzes will
be announced.
3. You are encouraged to religiously work on your assigned task and submit your
answers/requirements/activities/quiz in this module preferably every Friday of the Week.
4. Ensure appropriate language used in posts, comments or emails, and that any comment is
on-topic and relevant to the task at hand.
VALUE FOCUS
• Honesty and integrity during examinations
• Discipline in performing work with safety at all times
• Creativity and dedication in making the laboratory exercises and project
CONSULTATION HOURS
Every Monday to Friday 8:00 am to 11:00 am and 1:00 pm to 5:00 pm.
6. 6
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
Page No.
Notes to student i
Course Outline ii
Unit 1. Industry in the Profession
Lesson 1. Hardware, Software and IT Services Industries 1
Lesson 2. IT Professions and Career 10
Lesson 3. Code of Ethics for ICT Professionals, ACM Requirements 20
Unit 2. Appreciation of Computing in Different Fields
Lesson 1. Biology, Sociology, Environment, Gaming etc. 42
Unit 3. Evolution of Computing
Lesson 1. History of Computing 58
Lesson 2. Emerging Technologies 57
Unit 4. Key Components of a Computer System
Lesson 1. Hardware 65
Lesson 2. Input Process, Output, Storage Devices 80
Lesson 3. Operating Systems as part of Software 89
Unit 5. Computer Security
Lesson1. Cybersecurity 105
Unit 6. Networks, Internet and Internet Protocol
Lesson 1. Introduction to computer networks and internet 117
Unit 7. Introduction of HTML and Cascading Style Sheets
Lesson 1 What is HTML? 130
Lesson 2. Metadata and Text Fundamentals 148
Lesson 3. Document and website structure 176
Lesson 4 CSS Basics 187
References 200
About the Professor 204
TABLE OF CONTENTS
7. 7
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
Unit
1
Industry in the
Profession
LEARNING OUTCOMES
INTRODUCTION
The computer hardware, software and IT services industry is a key example of knowledge
production, as the value of what a software company produces is almost entirely in the
knowledge embodied in its products and services. It is a fast growing industry producing high
value services for its customers. Although it is dominated by firms based in major industrialized
countries of the world, it continues to offer great prospects for economic growth and industrial
development within developing economies. Indeed, the software industry has become a
leading source of employment creation and economic growth in the world (Schware, 1995).
In this lesson you will learn about the scope and economics of these dynamic industries.
LEARNING CONTENT
Is there a difference between the computer industry and the information
technology industry?
At the end of the unit, the students must have:
1. Identified computing hardware, software development and IT services industries
2. Explained the different jobs, functions, professions and careers in the field
3. Applied code of ethics for ICT Professionals
Lesson 1. Hardware, Software and IT Services Industries
Computer industry encompasses those
companies that manufacture computers and
components. It is also used more broadly to
include software publishers and peripheral
device manufacturers. (Ex. Apple, Dell,
Hewllet-Packard, IBM and Intel).
8. 8
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
An even broader term, information technology industry (or IT industry), is used to refer
to the companies that develop, produce, sell, or support computers, software, and computer-
related products. It includes companies in the computer industry, software publishers,
communications service vendors such as AT&T, information services such as LexisNexis online
law library, and service companies such as HP Enterprise Services.
Is every company that uses computers part of the IT industry?
A bank uses computers to track money flowing into and out of accounts, but it is classified as
part of the banking industry. Such businesses make use of information technology, but they
are definitely not part of the computer industry and are not considered part of the IT industry
either.
What kinds of companies are included in the IT Industry?
Equipment Manufacturers design and
manufacture computer hardware and
communications products, such as personal
computers, mainframes, mice, monitors,
storage devices, routers, scanners, and
printers. Examples of these companies
include Computer manufacturers (IBM, Dell,
Lenovo, and Hewlett-Packard). Network
hardware companies such as Cisco and its
subsidiary Linksys, are also examples of
equipment manufacturers.
Chipmakers design and manufacture
computer chips and circuit boards,
including microprocessors, RAM, system
boards, sound cards, and graphics cards.
Intel, Texas instruments, AMD, and Taiwan
Semiconductor are examples of
chipmakers.
Software Publishers create computer
software including applications, operating
systems, and programming languages.
Examples of software companies include
Microsoft, Adobe Systems, Oracle
Corporation, Electronic Arts, and Computer
Associates (CA).
9. 9
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
IT Service Companies provide
computer-related services, including
business consulting, Web site design, Web
hosting, Internet connections, computer
equipment repair, network security, and
product support. Classic examples of
service companies include AOL, Google,
and the computer consulting giant
Accenture.
Computer Retailers include companies
that sell computer products through retail
stores, direct sales representatives, mail-
order catalogs, and Web sites. Well-known
computer resellers include CompUSA which
operates retail stores, and mail-order
retailers PC Connection and CDW
What about dot.coms
The 1990s spawned a group of Internet-
based companies that came to be called
dot-coms. The dot-com moniker came from
the companies’ domain names, which
inevitably ended with.com, many of the
companies even incorporated .com into
their-official company names.
Amazon.com was one of the first Internet-
based companies
Unless a dot-com sells computers,
peripherals, or software online, it is
probably not considered part of the
computer industry; but experts disagree on
whether dot-coms rightfully belong to the
IT industry.
10. 10
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
What are outsourcing and offshoring?
Outsourcing is defined as the use of components or labor from outside suppliers.
Most computer companies do not manufacture all the components used to assemble their
computers. Instead they depend on components from other companies, such as
microprocessors from Intel, hard drives from Seagate, and LCD panels from Samsung.
Software publishers also make use of outsourcing by hiring firms to develop products and
manufacture packaging. It offers economies of scale and expertise to companies in the highly
competitive computer industry.
Offshoring
Another technique used by companies to help keep product prices competitive. It is defined
as relocating business processes, such as development and production, to lower-cost locations
in other countries. Computer manufacturer Dell Inc. maintains a team of offshore technicians
to staff customer call centers. It is common now to dial technical support and be connected
to a technician on the other side of the world.
Economic Factors
In print On the Web
PCWorld PC Magazine
Macworld CNET News
Wired InformationWeek
CPU InfoWorld
Mac/Life Wired
Smart Computing ZDNet
What is the significance of Silicon
Valley?
The area of California called Silicon Valley
stretches south and east from San
Fransisco’s Golden Gate Bridge was the
birthplace of integrated circuits,
microprocessors, and personal computers.
Today well-known companies, such as Cisco
Systems, Sun Microsystems, Google, Apple,
Symantec, AMD, Oracle, and Hewlett-
Packard, all have headquarters in our near
California’s Silicon Valley. Although Silicon
Valley has a reputation as the home of the
IT Industry, many top IT players are located
elsewhere.
Where can I find information
about the IT Industry?
Whether you are planning to purchase
a computer, embark on a computing
career, or invest in a computer
company, you can dig up lots of
information on IT and computer
companies from a wide variety of
computer and business publications
11. 11
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
How has the IT industry affected the global economy?
The IT industry has been described as the most dynamic, most prosperous, most economically
beneficial industry the world has ever known. IT industry has unquestionably fueled the
economies of many countries. Worldwide, consumers spend more than $1 trillion on
information technology each year.
What about the U.S. IT industry?
In U.S., the IT industry has had its ups and downs. IBM stock, once a staple of retirement
portfolios, was all but abandoned during a dot-com bubble that began in the late 1990s.
The high rate of dot-com business failures during 2001 and 2002 was a tough jolt of reality
for many stockholders. It affected a wide swath of the economy.
Nonetheless, strength in worldwide markets for IT equipment and services continued to buoy
up the industry, and tech stocks eventually re-emerged as attractive investments.
What does the future hold for the IT Industry?
Population growth and business globalization are two important factors that have contributed
to past investments in information technology. Keeping track of the information relating to all
people certainly seems impossible without the use of computers. Obtaining competitive tools
can be a requirement for success, so information technology would appear to have many
potential customers in the expanding global business market.
Product Life Cycles
How are new computer hardware products developed?
Two factors drive the development of new computer hardware products: marketing and
technology. Hardware manufacturers introduce new products for the same reasons as their
counterpart in other industries. New products are designed to attract customers and generate
sales. New hardware products can also generate sales and add-ons and accessories.
Example (Wi-Fi technology stimulated development of Wi-Fi hubs and cards, enabled
notebook computers, internet access points in coffee shops and airports.
12. 12
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
What are the stages in the life cycle of a typical hardware product?
How does the hardware life cycle affect me as a consumer?
Hardware manufacturers offer a range of products at various price points.
Less powerful devices containing older technology are generally expensive than devices with
the latest and greatest technology.
Is the life cycle of a software product similar to that of a hardware product?
Software like hardware begins with an idea that is shaped by a design team and marketing
experts. Most software products undergo extensive testing before they are released. Unlike
computer hardware products, older versions of software normally do not remain in the
vendor’s product line. Upgrading your existing software is usually less expensive than
replacing it with a brand-new program.
13. 13
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
Market Share
How do computer companies stack up against each other?
Industry analysts often use market share as a gauge of a company’s success. Market share
refers to a company’s share, or percentage, of the total market. Microsoft share of the total
personal computer operating system market is about 90%. The remaining 10% share is
distributed among Apple and several Linux vendors. Competition is fierce in all segments of
the industry, and market share is one indicator of a company’s ability to retain customers and
acquire sales from its rivals.
Marketing Channels
Why are computer equipment and software sold through so many outlets?
Hardware manufacturers and software publishers try to reach consumers by making their
products available through a variety of sources. Computer hardware and software are sold
through marketing outlets. These channels include computer retail stores, mail-order/Internet
outlets, value added resellers, and manufacturer direct.
Industry Regulation
Is the IT industry regulated in any way?
IT industry is regulated by government agencies, but many aspects are self-regulated.
Many governments are enacting laws that restrict access to particular Internet activities and
content. In many countries, export restrictions affect type of technology that can be sold to
foreign governments and individuals.
How does the IT industry perceive government regulation?
Most IT industry leaders oppose regulation.
To avoid further government intervention, the IT industry has taken steps toward self-
regulation.
Several organizations provide a forum for the IT industry to examine issues, express views,
work out self-governing policies, and set standards.
14. 14
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
LET’S DO
IT
Name: ____________________Course,Year, & Section:_________Date Accomplished: ____
Activity 1. Viewing the Video
Please watch the video from your OTG flash drive about the “Information Technology
Industry”. After watching the video clip, answer the following questions. Submit your
output in our Google Classroom.
1. What have you learned about the video? Write your reflection.
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
Activity 2. Answer/Expound the following questions/statements. Each item is worth five
(5) points. Limit your answer in 3-5 sentences only. Submit your output in our Google
Classroom.
1. Make a list of three (3) computer companies mentioned in the lesson. What was the
contribution of each company to the evolution of computers?
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
15. 15
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
________________________________________________________________________________
2. Describe the role of the computer and IT industries in today’s global economy.
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
3. Define the terms outsourcing and offshoring, and then explain how they relate to the IT
industry.
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
4. List five stages in the life cycle of a typical computer hardware product, then explain the
similarities and differences that exist in the life cycle of a software product.
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
16. 16
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
Unit
1
Industry in the
Profession
LEARNING OUTCOMES
INTRODUCTION
Computing professionals perform a variety of tasks: They write specifications for new
computer systems, they design instruction pipelines for superscalar processors, they diagnose
timing anomalies in embedded systems, they test and validate software systems, they
restructure the back-end databases of inventory systems, they analyze packet traffic in local
area networks, and they recommend security policies for medical information systems.
Computing professionals are obligated to perform these tasks conscientiously because their
decisions affect the performance and functionality of computer systems, which in turn affect
the welfare of the systems’ users directly and that of other people less directly.
In this lesson you will learn about workers within the IT industry called computer professionals.
Maybe you will even get a glimpse of your own future if you’re considering a career in IT.
LEARNING CONTENT
What is a computer professional?
In 1999, the U.S. Congress crafted an amendment to the Fair Labor Standards Act that
essentially defines a computer professional as any person whose primary occupation
involves the design, configuration, analysis, development, modification, testing, or security of
the computer hardware or software.
At the end of the unit, the students must have:
1. Identified computing hardware, software development and IT services industries
2. Explained the different jobs, functions, professions and careers in the field
3. Applied code of ethics for ICT Professionals
Lesson 2. IT Professions and Career
17. 17
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
What kinds of jobs are available to computer professionals?
Many computer professionals work in an IT department – the wing of business or an
organization responsible for computer, data, software, and support services.
Historically, IT departments were part of an organization’s Finance department because
computers were initially deployed for accounting and inventory management functions.
• System Analyst investigates the requirements of a business or an organization, its
employees, and its customers in order to plan and implement new or improved
computer services.
• Computer Programmer designs, codes, and tests computer programs. They modify
existing programs to meet new requirements or eliminate bugs.
• Security Specialist analyzes a computer system’s vulnerability to threats from
viruses, worms, unauthorized access, and physical damage. They install and configure
firewalls and antivirus software.
• Database Administrator analyzes a company’s data to determine the most effective
way to collect and store it. They create databases, data entry forms, and reports.
• Network specialist/administrator plans, installs, and maintains one or more local
area networks. These specialists also provide network accounts, and access rights to
approved users.
• Computer Operator works with system software for network servers, mainframes,
and supercomputers. They monitor computer performance, install software patches
and upgrades, perform backups, and restore data as necessary.
• Technical Support Specialist troubleshoots hardware and software problems. Good
interpersonal skills and patience are require for this job.
• Web site Designer creates, tests, posts, and modifies web pages. A good sense of
design and artistic talent are required for this job, along with an understanding of how
people use graphical user interfaces.
Do computer professionals work outside of IT departments?
In addition to jobs in IT departments, computer professionals also find work in companies
that produce computer hardware and software.
• Technical Writer creates documentation for large programming projects and writes
the online or printed user manuals that accompany computers, peripheral devices, and
software.
• Computer salesperson or sales rep, sells computers. They might pay personal
visits to potential corporate customers or staff the order desk of mail-order Computer
Company.
• Quality assurance specialist participates in alpha and beta test cycles of software,
looking for bugs or other usability problems.
• Computer engineer designs and tests new hardware products, such as computer
chips, circuit boards, computers and peripheral devices.
• Manufacturing technician participates in the fabrication of computer chips, circuit
boards, system units, or peripheral devices.
What are the advantages of working in the IT industry?
18. 18
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
Many technology companies offer employee-friendly- working conditions that include child
care, flexible hours, and the opportunity to work from home.
As in any industry, the exact nature of a job depends on the company and the particular
projects that are in the works.
Can I work at an IT job from home?
Workers in many industries are interested in telecommuting – using available technology to
work from home or an off-site location. Telecommuters tend to be more productive and work
longer hours because they have no commute time, and they are not interrupted by routine
office chatter. The internet and telecommunications technologies have made an impact on the
availability of telecommuting opportunities for workers. It has become common for employees
to collaborate through e-mail, fax, groupware, and video conferencing.
Education and Certification
Degree Curriculum Careers
Computer
Engineering
Basic studies in calculus, chemistry, engineering,
physics, computer organization, logic design,
computer architecture, microprocessor design, and
signal processing.
Students learn how to design new computer
circuits, microchips, and other electronic
components, plus they learn how to design new
computer instruction sets and combine electronic
or optical components to provide powerful, cost
effective computing.
Working at a chip
manufacturer, such as Intel,
Motorola, IBM and AMD, or
Texas Instruments
Computer
Science
Courses in programming, algorithms, software
development, computer architecture, data
representation, logic design, calculus, discrete
math and physics
Students investigate the fundamental theories of
how computers solve problems, and they learn
how to write application programs, system
software, computer languages, and device drivers.
Computer programmers,
with good possibilities for
advancement to software
engineers, object
oriented/GUI developers,
and project managers in
technical applications
development
Also theorists, inventors, and
researchers in fields as
diverse as artificial
intelligence, virtual reality,
and computer games
Information
Systems
Coursework in business, accounting, computer
programming, communications, systems analysis,
and human psychology
Programming or technical
support jobs, with good
possibilities for advancement
to system analyst, project
manager, database
19. 19
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
Recommended for students who want to become
computer professionals but lack strong math
aptitude
administrator, network
manager, or other
management positions
Information
Technology
Hands-on coursework with hardware, networks,
Web pages, multimedia, e-mail systems, and
security
Network specialist and
administrators, system
analysts, and help desk
technicians
Software
Engineering
Statistics, software design, programming, systems
analysis, and courses from information systems
and computer science curricula
Programmers, analysts, or
managers on large-scale,
safety critical applications
What are the basic qualifications for IT Industry jobs?
Qualifications for most It industry jobs include some type of higher education, certification, or
computer experience. A bachelor’s degree in a computer-related discipline is as the most
prevalent requirement, but some employers accept a two-year associates degree.
How important is certification?
Certification exam is an objective test that verifies your level of knowledge about a particular
technology or subject. Certification alone is rarely sufficient to qualify you for a job in the IT
industry. A certification exam is an objective test that verifies your level of knowledge about
a particular technology or subject.
JOB HUNTING BASICS
How do I find a job in the IT Industry?
In many ways, finding a job in the IT industry is just like finding a job in any other industry.
Effective job seekers begin by taking stock of their qualifications, identifying job titles relevant
to the skills, identifying potential employers, and considering the geographic area in which
they want to work. They then create a carefully worded resume, and work with employment
agencies and recruiting firms.
How can I use the Internet to find a job?
The Internet has become an important tool for job hunters. In 1994, about 10,000 resumes
were posted on the Web. Today, the Web plays host to millions of resumes. The Internet can
figure into your job hunt in several ways, including researching potential jobs and employers,
posting your resume, locating job leads, and corresponding with potential employers.
20. 20
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
Where do I start?
You should begin by defining the jobs for which you are qualified. In the IT industry, job titles
are not standardized. Non-standardize job titles can pose a problem for job hunters, especially
those who use search engines to locate job openings. Failure to enter one of the many titles
for a job might mean that a job hunter misses a good opportunity. Although many job search
sites maintain their own lists of equivalent job titles, job hunters in the IT industry should take
some time to compile their own lists of equivalent job titles and relevant search terms. You
can compile such a list by entering job titles and computer industry into a general search
engine such as Google. Connect to the sites the search produces and take note of any job
titles that seem applicable.
RESUMES AND WEB PORTFOLIOS
Do I need an online resume?
As a computer professional, you are expected to use technology effectively for everyday tasks.
You can demonstrate this ability to prospective employers by the way you treat your resume.
You can prepare your resume in formats suitable for different computer platforms and delivery
methods.
Print – you should save one version of your resume as a beautifully formatted word
processing file. You might consider using desktop publishing software to put it on high-quality
paper. Make sure that you can output the file that holds your resume into a PDF that can be
read on MAC, PC and Linux computers, in case a prospective employer asks you to send it as
an e-mail attachment.
Email – before sending your resume as an attachment, try to discover the format that is
easiest for your prospective employer to use. PDF is a universally accepted format. Microsoft’s
DOC and DOCX formats are also widely used.
HTML and XML – You might also want to create HTML and XML versions of your resume.
You can paste the HTML version into an HTML-formatted e-mail message or post it on a Web
site provided by your school or ISP. You might also consider developing an XML resume based
on standard XML stylesheets
Should an IT industry resume contain any special elements?
Regardless of the industry in which you seek employment, an effective resume is clear,
correct, and easy to read. When developing your resume, you can ask friends, coworkers, and
career counselors to review your drafts and provide suggestions for improvement.
How can my resume get maximum exposure in an online job databases?
For resumes that become part of a computer-searchable database, experts recommended that
you focus on nouns not verbs. At one time, the trend was to pepper your resume with action
phrases and power verbs, such as “implemented successful solutions” and “creative innovative
algorithms”. When employers use a job site’s search engine to locate potential employees,
however, they routinely search for particular skills by entering nouns associated with
21. 21
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
programming language names, software, computer equipment, analysis methodologies, and
business sectors. Job seekers should try to envision the search terms that employers might
enter, and then include applicable terms in their resumes. In addition to computer-related
terms, employers sometimes search for words that indicate a job applicant’s personality,
communication skills, and work ethic. When appropriate, adjectives such as enthusiastic, team
player, industrious, honest, capable, and experienced can be effective in helping an online
recruiter pull your resume from those submitted by thousands of other applicants.
What other factors are important for online resumes?
Today’s trend to search resumes online has implications for all job seekers, not just those in
the IT industry. For example, you should void formatting your resume into side-by-side
columns because the columns could get scrambled when transferred to an online job
database.
TIPS FOR AN EFFECTIVE RESUME
Be clear and concise
• Eliminate unnecessary words, phrases, and sentences
• Be economical with words when describing tasks, duties, titles, and
accomplishments
• Be brief and to the point without selling yourself short.
Place the most important point first
• List your qualifications by importance and relevance to the job you seek.
• Summarize skills at the top of the resume.
• Use a bold font to emphasize skills and accomplishments that are required for the
position you seek
• Include pertinent information about training, certification, and professional
affiliations, but avoid personal information, such as church affiliation and hobbies,
that is not directly related to the job.
Use language effectively
• Target terms and wording to prospective employers.
• Use industry jargon wherever appropriate.
• Use action verbs to maintain the reader’s interest.
• Use past and present tenses consistently.
• Double-check grammar and spelling
• When posting information in a database, use nouns that describe your skills.
22. 22
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
What is a Web portfolio?
A web portfolio is a hypertext version of your resume, which might contain links to relevant
Web sites, such as past employers, your alma mater, and samples of your work. For example,
a programmer might include a link to one of her particularly well-documented and elegant
programs, or a Web designer might provide links to sites that he/she designed.
Should I jazz up my Web portfolio with multimedia?
Current technology gives you the ability to personalize your Web portfolio with photos, your
favorite music, or even video portraits that demonstrate your speaking and communications
abilities. You might want to keep such multimedia presentations on hand, but supply them
only when requested.
Where do I post my Web portfolio?
You can post your Web portfolio on a professional network, such as LinkedIn. Just remember
that your personal website is an open book to prospective employers. If you don’t want them
to know the details about your spring break, you should remove such extraneous material
from your Web site and social networking site. Even if you don’t mention your Web site or
Facebook page to prospective employers they can find them easily simply by entering your
name in a search engine, such as Yahoo or Google.
JOB LISTINGS
Where can I find a list of job openings?
To find job openings, you can begin with the usual sources of job listings: the newspaper’s
Help Wanted section, your school’s career placement office, and your local state employment
agency. You’ll then move quickly to online resources, such as online newspapers, company
Web sites, and employment services.
How online employment do services work?
An online employment service maintains a database that contains thousands of job openings
posted by employers. The largest employment services span just about every industry. Others
are devoted to specific industries. Several online employment services specialize in the IT
industry.
Do I have to manually search every online employment service?
The Internet offers thousands of employment services, each with unique job announcements.
Searching all these sites manually would be a full-time job in itself. Search agents and
metasearch tools allow you to automate search process across many sites.
A job search agent is an automated program that searches one or more databases and
notifies you when it finds any leads that match your specified criteria. To use a job search
agent, you configure it with keywords that describe the type of job you want, your
geographical limitations, and salary requirements. You then launch the agent and it searches
23. 23
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
for matching job announcements. When a match is found, the search agent generates an e-
mail message with the information you need to view the job posting. A metasearch tool is
a software program that performs broad-based Web searches, such as searching more than
one job database at a time. In some respects, a metasearch tool is similar to a multi-site job
search agent, except that when you use a metasearch tool, you might have to remain online.
Instead of notifying you by e-mail, a metasearch tool supplies a list of links to applicable job
postings, similar to the links provided by a standard search engine, such as Google.
How well do employment services protect my privacy?
Job seekers who post their resumes at online employment services should be aware of
potential threats to their privacy. Without privacy safeguards, the information in your online
resume could be used to compile a profile of you, which could be misused by advertisers or
individuals interested in stealing identities. Some employment services might distribute your
resume or potential information without your authorization. Before posting your resume,
always check the employment service’s privacy policy.
24. 24
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
LET’S DO
IT
Name: __________________Course,Year, & Section:_________Date Accomplished: _____
Activity 1. Viewing the Video.
Please watch the video from your OTG flash drive about the “Information Technology
Careers Preview”. After watching the video clip, answer the following questions. Submit
your output in our Google Classroom.
1. What have you learned about the video? Write your reflection.
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
Activity 2. Answer/Expound the following questions/statements. Each item is worth five
(5) points. Limit your answer in 3-5 sentences only. Submit your output in our Google
Classroom.
1. Define the term computer professionals, and list at least eight (8) job titles that
encompasses. Summarize the current job outlook and working conditions of computer
professionals.
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
25. 25
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
________________________________________________________________________________
2. What IT Profession would you like to have in the future? Why? Describe the skills
needed to function well in that particular job.
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Activity 3. Create your resume and application letter using word processing application.
Assume that you are already an IT graduate. Submit your output in our Google
Classroom. This will be your midterm output.
26. 26
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
Unit
1
Industry in the
Profession
LEARNING OUTCOMES
INTRODUCTION
The ACM Code of Ethics expresses the conscience of the computing profession, and it
affirms an obligation of computing professionals both individually and collectively to use their
skills for the benefit of society.
Computing professionals' actions change the world. To act responsibly, they should reflect
upon the wider impacts of their work, consistently supporting the public good. The Code is
designed to inspire and guide the ethical conduct of all computing professionals, including
current and aspiring practitioners, instructors, students, influencers, and anyone who uses
computing technology in an impactful way.
Additionally, the Code serves as a basis for remediation when violations occur. The Code
includes principles formulated as statements of responsibility, based on the understanding
that the public good is always the primary consideration. Each principle is supplemented by
guidelines, which provide explanations to assist computing professionals in understanding and
applying the principle.
When discussing ethical issues, we often do so from the perspective of the victim. It is quite
possible, however, that at some time in your career, you could become the perpetrator - the
copyright violator, the snoop, or the thief – perhaps without intending to cause harm. This
lesson presents information about professional ethics as they relate to computing and digital
technologies.
At the end of the unit, the students must have:
1. Identified computing hardware, software development and IT services industries
2. Explained the different jobs, functions, professions and careers in the field
3. Applied code of ethics for ICT Professionals
Lesson 3. Code of Ethics for ICT Professionals
27. 27
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
LEARNING CONTENT
What is Professional Ethics?
The term professional ethics refer to on-the-job choices and actions that reflect a person’s
values. It define standards of conduct that specify how workers should behave, particularly in
situations where doing the right thing might not have short-term rewards, or when doing
something of questionable legality seems to offer attractive benefits. It is derived from
principles of right or wrong. In most modern societies, the foundation for ethical decisions
and actions is based on values such as impartiality, fairness, objectivity, honesty, regard for
privacy, commitment to quality, and respect for others.
How are ethics related to laws?
Laws are legislated documentation of permissible behavior based on a community’s ethics.
Although most laws are designed to promote ethical behavior, laws and ethics are not
necessarily the same. Some laws are not ethical or their ethics are controversial. An ethical
person often chooses to do more than the law requires and less than the law allows. As
computers and digital technologies play a more central role in every aspect of daily life, laws
have been created to deal with computer uses and abuses.
Why are professional ethics important for IT workers?
Most computer professionals are hard-working and honest. They take pride in their work and
strive to offer excellent products and services that benefit consumers.
Sometimes, however, computer professionals have to cope with ethical dilemmas in which the
right course of action is not entirely clear, or in which the right course of action is clear, but
the consequences- such as getting fired- are not easy to face. Ethical dilemmas in the
workplace are more common than you might imagine.
What kinds of situations in an IT career might require ethical decisions?
Situations that require computer professionals to make ethical decisions often involve software
copyrights, privacy, conflict of interest, use of work computers, software quality, hacking, and
social responsibility. Sometimes, computer professionals are pressured to participate in
activities that border on being illegal and are clearly unethical.
How would software copyrights become an ethical issue?
Most computer professionals are familiar with the general principles of copyright law and the
provisions of the Digital Millennium Copyright Act. They understand it is illegal to make
unauthorized copies of software and other copyrighted media, such as commercial music and
28. 28
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
movies. Business managers are not always familiar with current copyright restrictions or
choose to ignore them. Computer professionals should stay up to date on current copyright
law that applies to software and other digital media.
What kinds of ethical issues revolve around privacy?
You know it is ethical to respect the privacy of others but business practices can clash with
privacy rights. Network technicians sometimes see the content of e-mail messages or files in
the course of system maintenance or troubleshooting. Computers are increasingly used to
monitor employee activities. Some surveillance is done with employee knowledge and consent,
such as when it is explained in an employment contract or company policy. Computer
professionals should be familiar with laws and company policy applicable to privacy.
How might confidentiality lead to ethical dilemmas?
Confidentiality is the obligation not to disclose willingly any information that should be kept
private. Confidentiality rights apply to individuals and organizations.
Laws in most countries restrict the disclosure of an individual’s medical or financial
information.
With respect to organizations, confidentiality means protecting property information about
company finances, procedures, products, and research that competitors would find valuable.
Can I get into trouble using my work computer for personal activities?
When surveyed, a majority of computer professionals admit that they see no problem using
their work computers for personal activities as long as it has no adverse effect on the
employer.
There is a temptation to use computers, copiers, and network connections at work for personal
activities; the equipment is convenient and usually cutting edge.
It is never a good practice to use facilities at work for personal activities, unless you have a
specific agreement with your employer and your activities do not breach your employment
contract.
Why should I get involved in hacking?
Computer professionals have to keep up with the latest threats from viruses and intrusion
attempts, but “knowing your enemy” can be a two-edged sword. Most computing students
learning about virus and intrusion countermeasures become more than a little curios about
these technologies. Many computer scientists have toyed with the idea of creating virus-killing
programs that autonomously prowl the internet to eradicate viruses before they cause
widespread damage.
29. 29
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
Am I responsible for software quality?
Most computer professionals believe that software should be thoroughly tested to produce
the most reliable and accurate product possible. Software development is an incredibly
complex undertaking. Bugs are virtually impossible to completely eradicate, so most
companies have policies that guide developers on the number, severity, and type of bugs that
are not acceptable when the software ships to customers. Although developers, managers,
and marketers are supposed to be governed by these policies, software testing cycles are
sometimes cut short when deadlines loom. Computer professionals working on such projects
should think carefully about the repercussions of shortened test cycles and speak out when
serious risk to users might result.
Am I responsible for how my software is used?
Technology may be neutral in and of itself, but technology can be put to use in both positive
and negative ways. Some IT projects are clearly not socially responsible. Society would be
better off without spam and viruses. Filtering software and monitoring software can be
misused. Decisions pertaining to social responsibility are not always easy. If you are assigned
to a project of questionable social value, you might have to make an ethical decision about
whether to participate or look for another job.
ETHICAL DECISION MAKING
How do I make ethical decisions?
Ethical decisions that you make on the job can have long-term consequences for your career
and lifestyle, so it is important to approach these decisions seriously. Take time to think about
your situation before responding or taking action. As you examine the immediate situation,
make sure you have a good handle on your long-term and short-term career goals. With the
facts in hand, list your options and consider the advantages and disadvantages of each one.
For help in defining and evaluating your options, you can use strategies:
• Talk to people whose judgement you respect.
• Consider what the most ethical person you know would decide to do.
• Think about what you would do if your actions were made public.
• Look at the problem form opposite perspective.
• Consult a code of professional ethics.
30. 30
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
What is code of ethics?
A code of ethics is a set of guidelines to help professionals thread their way through a
sometimes tangled web of ethical on the-job decisions. Some code of ethics is short and pithy,
whereas others are long and detailed. Even with detailed code of ethics, however, don’t expect
a cookbook that tells you exactly what to do in a particular situation. Expect instead to be
offered some general guidelines that you can apply to a specific situation. Most code of ethics
are created for specific career field, such as medicine, accounting, or IT.
DETAILED CODE OF ETHICS
Association for Computing Machinery (ACM)
The ACM Code as a whole is concerned with how fundamental ethical principles apply
to a computing professional's conduct. The Code is not an algorithm for solving ethical
problems; rather it serves as a basis for ethical decision-making. When thinking through a
particular issue, a computing professional may find that multiple principles should be taken
into account, and that different principles will have different relevance to the issue. Questions
related to these kinds of issues can best be answered by thoughtful consideration of the
fundamental ethical principles, understanding that the public good is the paramount
consideration. The entire computing profession benefits when the ethical decision-making
process is accountable to and transparent to all stakeholders. Open discussions about ethical
issues promote this accountability and transparency.
1. GENERAL ETHICAL PRINCIPLES.
A computing professional should...
Ten Commandments from the Computer Ethics Institute
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around in other people's computer files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy or use proprietary software for which you have not paid.
7. Thou shalt not use other people's computer resources without authorization or
proper compensation.
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program you are
writing or the system you are designing other people.
10. Thou shalt always use a computer in ways that ensure consideration and
respect for your fellow humans.
31. 31
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
1.1 Contribute to society and to human well-being, acknowledging that all people
are stakeholders in computing.
This principle, which concerns the quality of life of all people, affirms an obligation of
computing professionals, both individually and collectively, to use their skills for the benefit of
society, its members, and the environment surrounding them. This obligation includes
promoting fundamental human rights and protecting each individual's right to autonomy. An
essential aim of computing professionals is to minimize negative consequences of computing,
including threats to health, safety, personal security, and privacy. When the interests of
multiple groups conflict, the needs of those less advantaged should be given increased
attention and priority.
Computing professionals should consider whether the results of their efforts will
respect diversity, will be used in socially responsible ways, will meet social needs, and will be
broadly accessible. They are encouraged to actively contribute to society by engaging in pro
bono or volunteer work that benefits the public good.
In addition to a safe social environment, human well-being requires a safe natural
environment. Therefore, computing professionals should promote environmental sustainability
both locally and globally.
1.2 Avoid harm.
In this module, "harm" means negative consequences, especially when those
consequences are significant and unjust. Examples of harm include unjustified physical or
mental injury, unjustified destruction or disclosure of information, and unjustified damage to
property, reputation, and the environment. This list is not exhaustive.
Well-intended actions, including those that accomplish assigned duties, may lead to
harm. When that harm is unintended, those responsible are obliged to undo or mitigate the
harm as much as possible. Avoiding harm begins with careful consideration of potential
impacts on all those affected by decisions. When harm is an intentional part of the system,
those responsible are obligated to ensure that the harm is ethically justified. In either case,
ensure that all harm is minimized.
To minimize the possibility of indirectly or unintentionally harming others, computing
professionals should follow generally accepted best practices unless there is a compelling
ethical reason to do otherwise. Additionally, the consequences of data aggregation and
emergent properties of systems should be carefully analyzed. Those involved with pervasive
or infrastructure systems should also consider Principle 3.7.
A computing professional has an additional obligation to report any signs of system
risks that might result in harm. If leaders do not act to curtail or mitigate such risks, it may
be necessary to "blow the whistle" to reduce potential harm. However, capricious or misguided
reporting of risks can itself be harmful. Before reporting risks, a computing professional should
carefully assess relevant aspects of the situation.
1.3 Be honest and trustworthy.
Honesty is an essential component of trustworthiness. A computing professional should
be transparent and provide full disclosure of all pertinent system capabilities, limitations, and
32. 32
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
potential problems to the appropriate parties. Making deliberately false or misleading claims,
fabricating or falsifying data, offering or accepting bribes, and other dishonest conduct are
violations of the Code.
Computing professionals should be honest about their qualifications, and about any
limitations in their competence to complete a task. Computing professionals should be
forthright about any circumstances that might lead to either real or perceived conflicts of
interest or otherwise tend to undermine the independence of their judgment. Furthermore,
commitments should be honored.
Computing professionals should not misrepresent an organization's policies or
procedures, and should not speak on behalf of an organization unless authorized to do so.
1.4 Be fair and take action not to discriminate.
The values of equality, tolerance, respect for others, and justice govern this principle.
Fairness requires that even careful decision processes provide some avenue for redress of
grievances.
Computing professionals should foster fair participation of all people, including those
of underrepresented groups. Prejudicial discrimination on the basis of age, color, disability,
ethnicity, family status, gender identity, labor union membership, military status, nationality,
race, religion or belief, sex, sexual orientation, or any other inappropriate factor is an explicit
violation of the Code. Harassment, including sexual harassment, bullying, and other abuses
of power and authority, is a form of discrimination that, amongst other harms, limits fair
access to the virtual and physical spaces where such harassment takes place.
The use of information and technology may cause new, or enhance existing, inequities.
Technologies and practices should be as inclusive and accessible as possible and computing
professionals should take action to avoid creating systems or technologies that disenfranchise
or oppress people. Failure to design for inclusiveness and accessibility may constitute unfair
discrimination.
1.5 Respect the work required to produce new ideas, inventions, creative works,
and computing artifacts.
Developing new ideas, inventions, creative works, and computing artifacts creates
value for society, and those who expend this effort should expect to gain value from their
work. Computing professionals should therefore credit the creators of ideas, inventions, work,
and artifacts, and respect copyrights, patents, trade secrets, license agreements, and other
methods of protecting authors' works.
Both custom and the law recognize that some exceptions to a creator's control of a
work are necessary for the public good. Computing professionals should not unduly oppose
reasonable uses of their intellectual works. Efforts to help others by contributing time and
energy to projects that help society illustrate a positive aspect of this principle. Such efforts
include free and open source software and work put into the public domain. Computing
professionals should not claim private ownership of work that they or others have shared as
public resources.
33. 33
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
1.6 Respect privacy.
The responsibility of respecting privacy applies to computing professionals in a
particularly profound way. Technology enables the collection, monitoring, and exchange of
personal information quickly, inexpensively, and often without the knowledge of the people
affected. Therefore, a computing professional should become conversant in the various
definitions and forms of privacy and should understand the rights and responsibilities
associated with the collection and use of personal information.
Computing professionals should only use personal information for legitimate ends and
without violating the rights of individuals and groups. This requires taking precautions to
prevent re-identification of anonymized data or unauthorized data collection, ensuring the
accuracy of data, understanding the provenance of the data, and protecting it from
unauthorized access and accidental disclosure. Computing professionals should establish
transparent policies and procedures that allow individuals to understand what data is being
collected and how it is being used, to give informed consent for automatic data collection, and
to review, obtain, correct inaccuracies in, and delete their personal data.
Only the minimum amount of personal information necessary should be collected in a
system. The retention and disposal periods for that information should be clearly defined,
enforced, and communicated to data subjects. Personal information gathered for a specific
purpose should not be used for other purposes without the person's consent. Merged data
collections can compromise privacy features present in the original collections. Therefore,
computing professionals should take special care for privacy when merging data collections.
1.7 Honor confidentiality.
Computing professionals are often entrusted with confidential information such as
trade secrets, client data, nonpublic business strategies, financial information, research data,
pre-publication scholarly articles, and patent applications. Computing professionals should
protect confidentiality except in cases where it is evidence of the violation of law, of
organizational regulations, or of the Code. In these cases, the nature or contents of that
information should not be disclosed except to appropriate authorities. A computing
professional should consider thoughtfully whether such disclosures are consistent with the
Code.
2. PROFESSIONAL RESPONSIBILITIES.
A computing professional should...
2.1 Strive to achieve high quality in both the processes and products of
professional work.
Computing professionals should insist on and support high quality work from
themselves and from colleagues. The dignity of employers, employees, colleagues, clients,
users, and anyone else affected either directly or indirectly by the work should be respected
throughout the process. Computing professionals should respect the right of those involved
to transparent communication about the project. Professionals should be cognizant of any
serious negative consequences affecting any stakeholder that may result from poor quality
work and should resist inducements to neglect this responsibility.
34. 34
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
2.2 Maintain high standards of professional competence, conduct, and ethical
practice.
High quality computing depends on individuals and teams who take personal and
group responsibility for acquiring and maintaining professional competence. Professional
competence starts with technical knowledge and with awareness of the social context in which
their work may be deployed. Professional competence also requires skill in communication, in
reflective analysis, and in recognizing and navigating ethical challenges. Upgrading skills
should be an ongoing process and might include independent study, attending conferences or
seminars, and other informal or formal education. Professional organizations and employers
should encourage and facilitate these activities.
2.3 Know and respect existing rules pertaining to professional work.
"Rules" here include local, regional, national, and international laws and regulations,
as well as any policies and procedures of the organizations to which the professional belongs.
Computing professionals must abide by these rules unless there is a compelling ethical
justification to do otherwise. Rules that are judged unethical should be challenged. A rule may
be unethical when it has an inadequate moral basis or causes recognizable harm. A computing
professional should consider challenging the rule through existing channels before violating
the rule. A computing professional who decides to violate a rule because it is unethical, or for
any other reason, must consider potential consequences and accept responsibility for that
action.
2.4 Accept and provide appropriate professional review.
High quality professional work in computing depends on professional review at all
stages. Whenever appropriate, computing professionals should seek and utilize peer and
stakeholder review. Computing professionals should also provide constructive, critical reviews
of others' work.
2.5 Give comprehensive and thorough evaluations of computer systems and their
impacts, including analysis of possible risks.
Computing professionals are in a position of trust, and therefore have a special
responsibility to provide objective, credible evaluations and testimony to employers,
employees, clients, users, and the public. Computing professionals should strive to be
perceptive, thorough, and objective when evaluating, recommending, and presenting system
descriptions and alternatives. Extraordinary care should be taken to identify and mitigate
potential risks in machine learning systems. A system for which future risks cannot be reliably
predicted requires frequent reassessment of risk as the system evolves in use, or it should not
be deployed. Any issues that might result in major risk must be reported to appropriate parties.
2.6 Perform work only in areas of competence.
A computing professional is responsible for evaluating potential work assignments.
This includes evaluating the work's feasibility and advisability, and making a judgment about
whether the work assignment is within the professional's areas of competence. If at any time
before or during the work assignment the professional identifies a lack of a necessary
expertise, they must disclose this to the employer or client. The client or employer may decide
35. 35
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
to pursue the assignment with the professional after additional time to acquire the necessary
competencies, to pursue the assignment with someone else who has the required expertise,
or to forgo the assignment. A computing professional's ethical judgment should be the final
guide in deciding whether to work on the assignment.
2.7 Foster public awareness and understanding of computing, related
technologies, and their consequences.
As appropriate to the context and one's abilities, computing professionals should share
technical knowledge with the public, foster awareness of computing, and encourage
understanding of computing. These communications with the public should be clear,
respectful, and welcoming. Important issues include the impacts of computer systems, their
limitations, their vulnerabilities, and the opportunities that they present. Additionally, a
computing professional should respectfully address inaccurate or misleading information
related to computing.
2.8 Access computing and communication resources only when authorized or
when compelled by the public good.
Individuals and organizations have the right to restrict access to their systems and
data so long as the restrictions are consistent with other principles in the Code. Consequently,
computing professionals should not access another's computer system, software, or data
without a reasonable belief that such an action would be authorized or a compelling belief
that it is consistent with the public good. A system being publicly accessible is not sufficient
grounds on its own to imply authorization. Under exceptional circumstances a computing
professional may use unauthorized access to disrupt or inhibit the functioning of malicious
systems; extraordinary precautions must be taken in these instances to avoid harm to others.
2.9 Design and implement systems that are robustly and usably secure.
Breaches of computer security cause harm. Robust security should be a primary
consideration when designing and implementing systems. Computing professionals should
perform due diligence to ensure the system functions as intended, and take appropriate action
to secure resources against accidental and intentional misuse, modification, and denial of
service. As threats can arise and change after a system is deployed, computing professionals
should integrate mitigation techniques and policies, such as monitoring, patching, and
vulnerability reporting. Computing professionals should also take steps to ensure parties
affected by data breaches are notified in a timely and clear manner, providing appropriate
guidance and remediation.
To ensure the system achieves its intended purpose, security features should be
designed to be as intuitive and easy to use as possible. Computing professionals should
discourage security precautions that are too confusing, are situationally inappropriate, or
otherwise inhibit legitimate use.
In cases where misuse or harm are predictable or unavoidable, the best option may
be to not implement the system.
36. 36
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
3. PROFESSIONAL LEADERSHIP PRINCIPLES.
Leadership may either be a formal designation or arise informally from influence over
others. In this section, "leader" means any member of an organization or group who has
influence, educational responsibilities, or managerial responsibilities. While these principles
apply to all computing professionals, leaders bear a heightened responsibility to uphold and
promote them, both within and through their organizations.
A computing professional, especially one acting as a leader, should...
3.1 Ensure that the public good is the central concern during all professional
computing work.
People—including users, customers, colleagues, and others affected directly or
indirectly—should always be the central concern in computing. The public good should always
be an explicit consideration when evaluating tasks associated with research, requirements
analysis, design, implementation, testing, validation, deployment, maintenance, retirement,
and disposal. Computing professionals should keep this focus no matter which methodologies
or techniques they use in their practice.
3.2 Articulate, encourage acceptance of, and evaluate fulfillment of social
responsibilities by members of the organization or group.
Technical organizations and groups affect broader society, and their leaders should
accept the associated responsibilities. Organizations—through procedures and attitudes
oriented toward quality, transparency, and the welfare of society—reduce harm to the public
and raise awareness of the influence of technology in our lives. Therefore, leaders should
encourage full participation of computing professionals in meeting relevant social
responsibilities and discourage tendencies to do otherwise.
3.3 Manage personnel and resources to enhance the quality of working life.
Leaders should ensure that they enhance, not degrade, the quality of working life.
Leaders should consider the personal and professional development, accessibility
requirements, physical safety, psychological well-being, and human dignity of all workers.
Appropriate human-computer ergonomic standards should be used in the workplace.
3.4 Articulate, apply, and support policies and processes that reflect the
principles of the Code.
Leaders should pursue clearly defined organizational policies that are consistent with
the Code and effectively communicate them to relevant stakeholders. In addition, leaders
should encourage and reward compliance with those policies, and take appropriate action
when policies are violated. Designing or implementing processes that deliberately or
negligently violate, or tend to enable the violation of, the Code's principles is ethically
unacceptable.
37. 37
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
3.5 Create opportunities for members of the organization or group to grow as
professionals.
Educational opportunities are essential for all organization and group members.
Leaders should ensure that opportunities are available to computing professionals to help
them improve their knowledge and skills in professionalism, in the practice of ethics, and in
their technical specialties. These opportunities should include experiences that familiarize
computing professionals with the consequences and limitations of particular types of systems.
Computing professionals should be fully aware of the dangers of oversimplified approaches,
the improbability of anticipating every possible operating condition, the inevitability of
software errors, the interactions of systems and their contexts, and other issues related to the
complexity of their profession—and thus be confident in taking on responsibilities for the work
that they do.
3.6 Use care when modifying or retiring systems.
Interface changes, the removal of features, and even software updates have an impact
on the productivity of users and the quality of their work. Leaders should take care when
changing or discontinuing support for system features on which people still depend. Leaders
should thoroughly investigate viable alternatives to removing support for a legacy system. If
these alternatives are unacceptably risky or impractical, the developer should assist
stakeholders' graceful migration from the system to an alternative. Users should be notified
of the risks of continued use of the unsupported system long before support ends. Computing
professionals should assist system users in monitoring the operational viability of their
computing systems, and help them understand that timely replacement of inappropriate or
outdated features or entire systems may be needed.
3.7 Recognize and take special care of systems that become integrated into the
infrastructure of society.
Even the simplest computer systems have the potential to impact all aspects of society
when integrated with everyday activities such as commerce, travel, government, healthcare,
and education. When organizations and groups develop systems that become an important
part of the infrastructure of society, their leaders have an added responsibility to be good
stewards of these systems. Part of that stewardship requires establishing policies for fair
system access, including for those who may have been excluded. That stewardship also
requires that computing professionals monitor the level of integration of their systems into
the infrastructure of society. As the level of adoption changes, the ethical responsibilities of
the organization or group are likely to change as well. Continual monitoring of how society is
using a system will allow the organization or group to remain consistent with their ethical
obligations outlined in the Code. When appropriate standards of care do not exist, computing
professionals have a duty to ensure they are developed.
4. COMPLIANCE WITH THE CODE.
A computing professional should...
38. 38
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
4.1 Uphold, promote, and respect the principles of the Code.
The future of computing depends on both technical and ethical excellence. Computing
professionals should adhere to the principles of the Code and contribute to improving them.
Computing professionals who recognize breaches of the Code should take actions to resolve
the ethical issues they recognize, including, when reasonable, expressing their concern to the
person or persons thought to be violating the Code.
4.2 Treat violations of the Code as inconsistent with membership in the ACM.
Each ACM member should encourage and support adherence by all computing
professionals regardless of ACM membership. ACM members who recognize a breach of the
Code should consider reporting the violation to the ACM, which may result in remedial action
as specified in the ACM's Code of Ethics and Professional Conduct Enforcement Policy.
The Code and guidelines were developed by the ACM Code 2018 Task Force: Executive Committee Don
Gotterbarn (Chair), Bo Brinkman, Catherine Flick, Michael S Kirkpatrick, Keith Miller, Kate Varansky, and
Marty J Wolf. Members: Eve Anderson, Ron Anderson, Amy Bruckman, Karla Carter, Michael Davis,
Penny Duquenoy, Jeremy Epstein, Kai Kimppa, Lorraine Kisselburgh, Shrawan Kumar, Andrew
McGettrick, Natasa Milic-Frayling, Denise Oram, Simon Rogerson, David Shamma, Janice Sipior, Eugene
Spafford, and Les Waguespack. The Task Force was organized by the ACM Committee on Professional
Ethics. Significant contributions to the Code were also made by the broader international ACM
membership. This Code and its guidelines were adopted by the ACM Council on June 22nd, 2018.
This Code may be published without permission as long as it is not changed in any way and it carries
the copyright notice. Copyright (c) 2018 by the Association for Computing Machinery.
How effective are code of ethics?
Professional code of ethics is not without controversy. For example, the code published by the
Computer Ethics Institute has drawn fire from critics, such as Dr. N. Ben Fairweather, the
Center for Computing and Social Responsibility’s resident philosopher and research fellow who
states “it is easy to find exceptions to the short dos and don’ts of the “ten commandments”…
indeed, every time such as short code of ethics falls into unwarranted disrepute, the whole
idea of acting morally is brought into disrepute too. “ Dr. Fairweather seems to suggest that
hard and fast rules might not apply to all situations.
Where I can find codes of ethics for IT?
IT professionals have access to codes of ethics published by many professional organizations
such as the Computer Ethics Institute, the British Computer Society, the Australian Computer
Society, and the Association for Computing Machinery.
How should I apply codes of ethics to my situation?
A code of ethics can provide guidelines, but it might not offer ready answers to very dilemma
that arises in the course of your career. When confronted with a difficult ethical decision, you
should consider ethical guidelines, but also consider the policies of your workplace and
39. 39
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
relevant laws. Ethical decisions can be difficult, and sometimes the results of your decision-
good or bad- are not apparent right away.
Should I blow the whistle on unethical behavior?
A widely accepted definition of Whistleblowing is the disclosure by an employee(or
professional) of confidential information that relates to some danger, fraud, or other illegal or
unethical conduct connected with the workplace, be it of the employer or not fellow
employees.
A whistleblower is someone in an organization who decides to speak out against on the-job
activities that are contrary to the mission of the organization or threaten the public interest.
Is whistleblowing effective?
Whistleblowers have focused public attention on corporate abuses at Enron and WorldCom,
revealed major problems in the way the FBI investigated potential terrorists prior to 9-11, and
uncovered defects in the body armor supplied to the US president and combat troops.
Although whistleblowing might seem effective, the consequences of whistleblowing can be
extreme.
Is there any way to safely blow the whistle on unethical business practices?
Whistleblowing is risky under any circumstances. For example, a computer system
administrator working for a state agency noticed the boss spent the majority of his time
playing solitaire on his computer. After several e-mail messages up the chain of command
were ignored, the system administrator installed Win-Spy software, which grabbed
incriminating screenshots of his boss’s computer several times per day over a period of several
months. When the system administrator showed this evidence to his superiors, he was fired
for violating his boss’s privacy. His boss received only a light reprimand. As a whistleblower,
the system administrator did some things right, but he missed some important measures that
might have led to a more positive outcome.
40. 40
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
LET’S
DO IT
Name: ____________________Course,Year, & Section:_________Date Accomplished: ____
Activity 1. Discuss whether the actions described are moral or professional, and be
prepared to explain your reasoning for making these judgments. If you believe
something should have been done differently, or some action should be taken in
response to what is described in the scenario. Submit your output in our Google
Classroom.
Case 1: Access to User Files, Child Pornography Morgan McSorley, a system administrator for
a large corporation, is installing a new software package on the PC used by employee Kelly
Smith. The company has not authorized Morgan to read other people’s files (email, web-logs,
files in the user’s home folders). However, in the course of installing the software, Morgan
accidentally comes across directories with files that have suspicious sounding names. Morgan
opens a few of the files and finds they contain child pornography. Morgan knows this is in
violation of company policy, and believes also that possessing such images is against the law.
What should Morgan do?
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
Case 2: Anti-Worm. A new worm is spreading across the Internet, affecting PCs by exploiting
a security hole in a commonly used operating system. Chris Smart creates an anti-worm that
exploits the same security hole on these machines in order to execute and spread, but this
41. 41
Lecture Notes in CC 201 – Introduction to Computing
Property of WVSU
anti-worm will download a patch into the PC to protect the machine from the original worm.
Chris releases his anti-worm, taking precautions that it cannot be traced back to its creator.
It spreads quickly across the Internet, and like all such programs consumes great amounts of
bandwidth and installs itself on millions of PCs. In the end, system administrators perceive it
to be just another worm, and they fight it in the same way they protect systems from other
instances of malware.
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
Case 3: Software Recommendation Alex Jones calls the Department of Computer Science at
Enormous State University seeking advice on how to improve the security of Jone’s business’
local area network. Alex ends up speaking to Prof. Lee Smith, an expert in the field. Prof.
Smith answers several of Alex’s questions about network security, and then Alex asks for a
recommendation for a software package to fight security problems. Prof. Smith tells Alex about
a program called NetCheks and that it received the top-rating from a respected magazine that
reviewed such packages. Prof. Smith does not mention that the magazine gave another
product a “best buy” rating that had fewer features but a much lower price. Prof. Smith also
fails to mention that NetCheks is the product of a spin-off company started by Smith’s former
grad student at E.S.U., and that Smith owns a 3% stake in the company.
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________