0% found this document useful (0 votes)
388 views17 pages

Living in The It Era-Module 3

This document provides an overview of IT trends in 2020, discussing 12 key trends: 1) Cloud Computing, 2) Mobile Apps, 3) Big Data Analytics, 4) Automation, 5) Artificial Intelligence, 6) Smart Technology, 7) Virtual Reality, 8) Augmented Reality, 9) Blockchain Data, 10) Cyber Security, 11) Growth of IoT Networks, and 12) Predictive Analytics Implementations. These trends are transforming industries through improved efficiency, connectivity, data-driven insights, and more immersive digital experiences. The widespread adoption of these technologies signals massive changes to how information technology is used.

Uploaded by

adel antegra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
388 views17 pages

Living in The It Era-Module 3

This document provides an overview of IT trends in 2020, discussing 12 key trends: 1) Cloud Computing, 2) Mobile Apps, 3) Big Data Analytics, 4) Automation, 5) Artificial Intelligence, 6) Smart Technology, 7) Virtual Reality, 8) Augmented Reality, 9) Blockchain Data, 10) Cyber Security, 11) Growth of IoT Networks, and 12) Predictive Analytics Implementations. These trends are transforming industries through improved efficiency, connectivity, data-driven insights, and more immersive digital experiences. The widespread adoption of these technologies signals massive changes to how information technology is used.

Uploaded by

adel antegra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

SOUTHERN LEYTE STATE UNIVERSITY – MAIN CAMPUS

SOGOD, SOUTHERN LEYTE


INSTITUTE OF ARTS AND SCIENCES

MA. RHADEL ANN LUZON – TALAGUIT


INSTRUCTOR
TABLE OF CONTENTS

Learning Plan --------------------------------------------------------------------- 3

Introduction --------------------------------------------------------------------- 3

Opening Activity ------------------------------------------------------------ 3

Key to Remember ------------------------------------------------------------ 3

Definition --------------------------------------------------------------------- 4

Lesson Proper

Unit 3 – IT Trends, Issues, and Challenges ----------------------- 4

Lesson 1 – IT Trends ----------------------------------------- 4

Lesson 2 – IT Issues and Challenges ---------------------- 10

Chapter Key Point ----------------------------------------------------------- 13

Activity -------------------------------------------------------------------- 14

Post Test -------------------------------------------------------------------- 14

References -------------------------------------------------------------------- 16

2|P age
• LEARNING PLAN

It describe how the given IT trends affect the Filipino’s way of living. Discuss the issues
and challenges in IT that different sectors face. Research further on the influence of IT on a
specific sector.

• INTRODUCTION

This chapter features article and studies showing trends in IT from recent
years. The topics include the industry sector’s use of technology specifically in IoT
and automation. Articles regarding online banking as well as the business sector’s
online presence through e-commerce are likewise included.

OPENING ACTIVITY

• OPENNING ACTIVITY
1. Go online and open your web browser.
2. On the address bar, type in ph.news.yahoo.com/tech.
3. Identify news articles about the top technologies in the Philippines
and read them. Take note if necessary.
4. Discuss about the advantages and disadvantages of these
technologies to Filipinos.

• KEY TO REMEMBER

API – Application Program Interface


DBG – Disruptive Business Group
E-Mar – Electronic Medication Administration Record
GFS – Global Filipino School Program
HRDO – Human Resource Development Office
PLDT – Philippine Long Distance Telephone Company
PSE – Philippine Stock Exchange
RFID – Radio Frequency Identification
SECB – Security Bank Corporation

3|P age
WHO – World Health Organization

• D E F I N I T I O N O F T ERMS

Cloud foundry – delivers enterprise-level services that can easily integrate with
cloud application.
Data Security – refers to protective digital privacy measures that are applied to
prevent unauthorized access to computers, databases, and websites. Data security
also protects data from corruption.
E-commerce – is a term of any type of business and commercial transaction that
involves the transfer of information across the internet.
E-health – refers to the use of information and communications technologies in
health care.
Industry Sector – (in the Philippines) is made up of local and foreign companies
that provide different products and services to Filipinos.
Trojan – is a malicious program which initially appears to be useful, routine, or
interesting in order to persuade a victim to install it.
Virus - is a computer program usually hidden within another program that inserts
itself into other programs or file.

• LESSON PROPER

UNIT 3
IT Trends, Issues, and Challenges

LESSON 1 – IT Trends

Trends That Will Transform the Information


Technology Industry Outlook in 2020

The information technology industry is experiencing a boom like never before,


and more and more brands are looking to expand in this area because of the immense

4|P age
amount of potential. Information technology has a variety of applications which is also
why it has proven to be such a beneficial key component in the entire structure that
industries now have. With the growing importance of this, it becomes important to
understand the important aspects of this industry and the key components that make it
the revolutionary tool that it is.

Information Technology Trends

Every year, new trends arise within this industry and it becomes important for
professionals to be familiar with these different trends and all that they entail. No matter
what profession one is working in, being familiar with these can improve your
professional standing and can help you understand what the potential upgrades are for
the industry that you are already working in.

1. Cloud Computing
One of the biggest trends that have emerged during the past
year is that of cloud computing. More and more industries
are realizing that it is important for a company to have a
designated place for all of their digital information and
resources, and having a well-protected place that can take care
of everything and keep the information safe has almost
become a necessity. Cloud computing is the go-to solution
for brands who want to improve the work that they do and
make it more efficient in a digital space.

2. Mobile Apps

Mobile applications have only grown


in popularity over the past few years, and
this year, they are surfacing in bigger and
better ways. Brands and industries all over
the world are trying to find ways in which
one can improve their work through the use
of mobile apps and through the
implementation of new resources that can
make working on the go more efficient.

5|P age
3. Big Data Analytics

Big data analytics is a trend that has grown


over the past few years, and this is something
that is now being implemented in almost
every kind of industry that makes use of large
scale production processes and
manufacturing and supply. Big data analytics
allows brands to process their information in
a better manner and enables them to reach a
much better understanding of the areas they
need to develop.

4. Automation
Automation is one trend
that has largely hit the
manufacturing and production
units and is something that is
estimated to only grow more in
the coming years. Automation has
also enabled processes to work at
a faster pace and enables
companies to reach their goals in
a much more efficient manner.

5. Artificial Intelligence
While automation is growing,
artificial intelligence is now starting
to see the light of day. The past year
saw the introduction of several new
mediums of artificial intelligence and
this year, industries are looking at
ways in which they can grow these
resources and implement it the work
that they do. Artificial intelligence is
now starting to see implementation
on a larger scale which is only set to grow more over the coming years.

6|P age
6. Smart Technology
Smart machines that use
artificial intelligence or automation are
on the rise, even in small scale units
and smaller implementations. Homes
are now becoming smarter as a result
of smart technology being used and
opted for in homes. Simple tools such
as Alexa have become an essential part
of homes, and these are only estimated
to increase over the next year.

7. Virtual Reality
The gaming industry has always
been one that has experienced growth
alongside the field of information
technology and virtual reality has
taken this one step further giving
customers the very epitome of digital
experience. Virtual reality gaming has
already started to become popular as a
result of new technology and this improves the manner in which the industry can grow.

8. Augmented Reality
Augmented reality is another
approach to ‘artificial experiences’ that
individuals are now being given access to
and this is something that has improved
the manner in which the field has been
able to develop. Augmented reality is
seeing a lot more applicability outside
the gaming industry as well, and is
something that is seeing more
implementation as compared to virtual reality.

9. Block Chain Data


Crypto currency might have been at an all-time high in 2017 and 2018, but the fact
remains that this is something that is yet to see a significant amount of development.
Block chain technology is only now starting to grow in popularity and is being
implemented by industries across the world for all that it offers.

7|P age
10. Cyber Security
With the growth of digital
mediums and technology, the potential
threats that people can face are only
rising. Because of this, cyber security has
had to grow extensively over the past few
years, simply to stay in touch with the
growth that is being experienced.
Industries all over the world are also
realizing the importance of investing in
cyber security, which is why the field is
experiencing growth at such a rapid pace.

11. Growth of IoT Networks


The Internet of Things (IoT) is a concept that
all digital devices are connected by a single medium
through which one would be able to control
everything within their homes. More and more
brands are realizing that this is indeed the way of the
future and is something that is within technological
reach. More brands are beginning to incorporate this
concept and the statistics that showcase this are
prevalent enough to attest to positive growth in this
regard.

12. Predictive Analytics Implementations


Predictive Analytics is the process of
analysing large volumes of data to be able to come to
a conclusion regarding the possible outcomes that a
situation might have. Market analysts see this as an
incredibly valuable tool for brands to note whether
they should be moving in a particular direction or
not. This has proven to be an incredibly efficient
method of analysis and saves the industry an
incredible amount of money in the process.

13. Cloud Migration


Cloud computing has proven to be incredibly
beneficial for businesses who want to move in a digital
direction and who want to maintain better records of
their digital data. Cloud Computing is something that
has grown over the past few years and the statistics of

8|P age
this showcase positive results in this regard. More than 74% of CFOs state that cloud
computing was one of the most beneficial things for the growth of their businesses.

14. Rise of Data Officers


With the growing importance of information technology and data analytics, data
officers have become even more important in institutions and industries all over the
world. The number of positions open within this are plenty and are growing as more and
more businesses are in need of someone proficient in this.

15. Quantum Computing Applications


Quantum Computing is a process of
conducting complex equation and processes to
be able to perform several complex tasks or
processing of large volumes of information with
absolute ease. This is something that has proven
to be incredibly beneficial for a variety of
different industries, which is why it is
something that is seeing a massive amount of
growth.

16. Smart Technology


Homes are now becoming smarter
thanks to the numerous integrated devices
that work to make our lives easier. Things
like Alexa and other supplementary
resources have proven to be incredibly
beneficial in this regard and make homes
significantly more efficient and safer in the
process.

17. Open Source Solutions


Open Source programs are those which give users accesses to some of the main
files and framework in a particular program, enabling them to modify it with absolute
ease. As more and more users become technologically proficient, giving them the option
to work with applications themselves is proving to be incredibly beneficial.

9|P age
18. Edge Computing

Edge computing is one phenomenon that has grown


over the past few years and is seeing a wide scale of
implementation currently. Edge computing is when
large volumes of data are processed near the edge of the
network rather than where the data is mainly being
generated. This is meant to make this processing more
efficient and optimized. More development mediums
are choosing to go in for this form of computing over
traditional types because of the efficiency that it brings. This also attests to the fact that
more methods of computing and program generation are on the rise.

19. Rise of Chatbots


While most tech advancements are
helping us move towards the greater good,
some of them aren’t as beneficial as we might
think. In 2019, the number of chatbots that
were being used is far more than what we
expected. Chatbots aren’t however always
bad because in some situations, have
improved the customer service that we have
access to. Chatbots are a program to respond
to certain queries in certain ways and are
designed to help customers with some of the
more basic functions that they would need. These are of course still not in a position
wherein they are a complete substitute for real live customer service, which is what
has helped them still stay in development.

LESSON 2 – IT ISSUES AND CHANGES


INDUSTRY

With the introduction of computer systems at work, one main issue raised is
maintaining the computer system’s security and integrity. Modes of communication
within an office environment normally entail exchanging of emails or discussions in local
chat rooms. This scenario opens the door of malicious software that can be shared, wither
intentionally or not, to the entire organization. Malicious software, or malware, is a
general term used to describe any type of software that can cause harm to a computer
system. Example of malware include the following:

10 | P a g e
1. VIRUS

Is a type of computer program that, when executed,


replicates itself by modifying other computer programs
and inserting its own code. When this replication
succeeds, the affected areas are then said to be "infected"
with a computer virus.

2. WORM

 is a standalone malware computer program


that replicates itself in order to spread to other
computers.[1] It often uses a computer network to
spread itself, relying on security failures on the
target computer to access it. It will use this machine
as a host to scan and infect other computers. When
these new worm-invaded computers are controlled, the worm will
continue to scan and infect other computers using these computers as
hosts, and this behavior will continue.

3. TROJAN

 Is any malware which misleads users of its true


intent. The term is derived from the Ancient Greek
story of the deceptive Trojan Horse that led to the fall
of the city of Troy. Trojans may allow an attacker to
access users' personal information such as banking
information, passwords, or personal identity. It can
also delete a user's files or infect other devices
connected to the network. Ransom ware attacks are often carried out
using a Trojan.

4. SPYWARE

 Is a type of malware that aims to gather information


about a person or organization, without their
knowledge, and send such information to hack another
entity without the consumer's consent. Furthermore,
spyware asserts control over a device without the
consumer's knowledge, sending confidential
information to another entity with the consumer's
consent, through cookies.

11 | P a g e
5. RANSOMWARE

 Is a type of malware from crypto virology that


threatens to publish the victim's data or
perpetually block access to it unless a ransom is
paid. While some simple ransom ware may lock
the system in a way which is not difficult for a
knowledgeable person to reverse, more
advanced malware uses a technique called
crypto viral extortion, in which it encrypts the
victim's files, making them inaccessible, and
demands a ransom payment to decrypt them. In
a properly implemented crypto viral extortion attack, recovering the
files without the decryption key is an intractable problem – and difficult
to trace digital currencies such as Ukash or Bitcoin and other crypto
currency are used for the ransoms, making tracing and prosecuting the
perpetrators difficult.

BANKING

While online banking maybe convenient, there are still skeptics to this given the
sensitive data being transacted online: money. Recently, a supposed faulty system
upgrade caused customers of Bank of the Philippine Island (BPI) to either lose money
from their accounts or receive huge amounts of money that were not theirs.

EDUCATION

With online learning being accepted into schools as part of the teaching and
learning methodology, one of the things that schools need to consider is monitoring and
management. Having learning management system does not necessarily mean students
are constrained into using it to learn. There are more websites that offer learning
opportunities for student such as TIME for kids, National Geographic and NASA, among
others. However, the use of LMS still poses issues and challenges to both students and
teachers.

BUSINESS

As previously discussed, some companies use adware to track information about


their customers for marketing purposes. You might ask, how is that possible?

Whenever you buy items online in sites like Lazada, Amazon, or Zalora, your
personal details, such as your name, gender, items purchased, etc. are saved by these
retailers. Later on, while browsing other websites such as Facebook, you notice
advertisements streaming at the bottom of the page. The advertisements include items
from Lazada or Amazon which you were browsing earlier. How did Facebok know what
you were looking at in those sites?

12 | P a g e
An adware is a program designed to display advertisements on your computer,
redirect your search requests to advertising websites, and collect marketing-type data
about yourself – for example, the types of websites that you visit – so that customized
advertisements can be displayed.

Is it a big thing? It depends. An Adware can be considered a legitimate alternative


offered to consumers who do not wish to pay for software. There are many as-supported
programs, games, or utilities that are distributed as adware, which is often called as
freeware. Some applications have pop-up advertisements that if a user wishes to remove
them, a certain fee should be paid to make the apps ad-free.

HEALTH

Patients records are always kept confidential. However, with the introduction of
technology, and with hospitals and clinics leaning towards automation, patient records
have shifted from paper to digital. With this, concerns regarding data security and data
confidentiality of patients have increased. But why is there such an interest in patient
record?

According to the International Association of Privacy Professionals, “a medical


records is more valuable than a credit card on the black market. According to the World
Privacy Forum, a medical record, including the name, address, Social Security number and
health ID number, typically goes for $50 on the online black market [whereas] an active
credit card sells just $3.” This makes it more lucrative for cyber criminals as patient data
becomes digital.

In the Philippines, hospitals are required to comply with the Data Privacy Act
(DPA) of 2012 and implement data protection measures in their data processing systems
to protect the confidentiality of the patients’ personal information and medical records.

The HIPAA Security Rule establishes national standards to protect individuals’


electronic personal health information that is created, received, used, or maintained by a
covered entity. The Security Rule requires appropriate administrative, physical and
technical safeguards to ensure the confidentiality, integrity, and security of electronic
protected health information.

• CHAPTER KEY POINT

 Two major trends are seen in the industry sector – automation and the application
of Internet of Things (IoT) – hence, the introduction of smart industries
 Online banking, e-learning (distance learning), e-commerce, and e-health are
products of these trends.

13 | P a g e
 Despite these trends, the security and integrity of computer systems are at risk.
Various malwares and adware pose threat on the confidentiality of information.
Fraud online transactions have also become prevalent.

• ACTIVITY

Research further on the influence of IT on any of the following sector:


 Banking
 Education
 Health
 Business
 Others

ANSWER: ACTIVITY MODULE 3

NAME: ___________________________________________ COURSE YR&SEC: _____________________

____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________

14 | P a g e
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________

• POST TEST

1. It refers to a technology that supports activities involving information, such as


gathering, processing, storing, and presenting data.
2. It refers to processed information that helps fulfil people’s daily tasks.
3. It is a type of an input device that lets you select options from on-screen menus.
4. It is like a personal computer but it has a more powerful microprocessor and a
higher-quality monitor.
5. It is the period in human history characterized by the shift from traditional
industry that the Industrial Revolution brought through industrialization, to an
economy based on information computerization.
6. It is a method of representing numbers that has 2 as its base and uses only the
digits 0 and 1; each successive digit represents a power of 2.
7. It refers to the interconnection of information technology devices within the
range of an individual person, normally, within the range of 10 meters.
8. This is a broad term that incorporates all procedures and forms of connecting and
communicating between two or more devices using a wireless signal.
9. It hosts the application software installed in the system.
10. It is type of connector for transmitting audio/video data compatible with
computers, projectors, and digital televisions.

15 | P a g e
11. It allows a user to execute financial transactions via the internet.
12. It refers to the voluminous amount of data from traditional and digital sources
that could be mined for valuable insights on human behavior such as trends,
patterns, and associations, in turn boosting business intelligence.
13. It refers to the use of information and communications technology in health care.
14. It is a stand-alone malware that replicates itseld in order to spread to other
computers.
15. It is a type of malware that can block access to a victim’s data.

ANSWER: POST TEST-MODULE 3

NAME: ___________________________________________ COURSE YR&SEC: _____________________

____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________

16 | P a g e
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________

Use another sheet of paper if space provided is not enough.

• REFERENCES

Books:
Haynes, M. & Brown, R. (n.d.). Everything computers of S.C., Inc. Retrieved from
http://everythongcomputersofsc.com/index.html
RALEIGH, NC / WAKE FOREST, NC (HQ) / CHICAGO, IL / TOMS RIVER, NJ / ANN
ARBOR, MI. retrieved from https://linchpinseo.com/trends-in-the-
information-technology-industry

Websites:

https://homepage.cs.uri.edu/faculty/wolfe/book/Readings/Reading04.htm#:~
:text=The%20computer%20does%20its%20primary,that%20executes%2
0stored%20program%20instructions.

http://tutorialspoint.com/basics_of_computers/basics_of_computers_number_sy
stem.htm#:~:text=The%20technique%20to%20represent%20and,%2C%20hex
adecimal%20number%20system%2C%20etc

17 | P a g e

You might also like