LIVING in The IT ERA
LIVING in The IT ERA
LIVING in The IT ERA
Overview
Living in the IT Era will look at communication and information technologies, with a focus on
information technology and its components, especially as they are used by the Millennial Generation.
examines the science, culture, and ethics of information technology, as well as how it has impacted
modern life and interpersonal interactions and how it can be used to advance one's career and social
standing. The course's objective is to help students comprehend how communication and information
technologies develop as well as the cultural, economic, political, and social implications of such
technologies for society. Living in the IT Era is designed to give students a comprehensive
understanding of the social, cultural, and economic ramifications of new communication technologies
and to promote critical thinking about "new media" generally.
Students will study how to understand the changing information ecology and how it affects both
the media industry and media viewers through exams and media-related assignments. Students will
research convergent media issues and the effects of extensive new media use on consumers as part of
their course projects.
The concept of ICT can be traced back to the 19th century with the development of the
telegraph and the telephone. These two inventions revolutionized the way people worked and
interacted socially by making it possible for one person to communicate with another person in
a different location in real or near-real time.
In the middle of the 20th century, radio and television introduced the concept of mass
communication, and by the end of the century, the internet had become a mainstream tool for
communication, commerce and entertainment. Its use continued to grow rapidly in the following
years, revolutionizing the way people work and digitally transforming the way people
communicate ( Andrew Whitworth, March 2014).
The beginning of Information Communication Technology (ICT) can be traced back
when humans started to use objects to communicate with one another. There are four main
period in history that divide the era of ICT.
a. Pre-mechanical
It cab be traced back thousands of years ago, around 3000 BCE to 1450 CE.
Sumerian Pictogram- dating back 3100 BCE that shows the earlist form of communication
among humans. During this period, humans started communicating with one another using
words and pictograms curved in rocks.
Abacus – considered to be the first counting device similar to the modern calculator and
process information.
b. Mechanical
Concentrated primarily on the development of machines that will enhance calculation
speed. Pascaline, it is arithmetic Machine-adding, machine to be produced in any
quantity and actually used. It design and build by French Mathematician-philosopher
Blaise Pascal (1642 and 1644)(Addition and Subtraction)
The Analytical Engine – invented by Charles Babbage “Father of the Computers”
Contained such as the arithmetic logic unit, control flow and integrated memory and
first programmable mechanical computer.
c. Electromechanical
The use of electricity for information handling and transfer bloomed, use of telegraph to
transmit information over long distances (Telegraph). Example: Empty Can with rope
Alexandre Graham Bell- he was granted the patent for the telephone.
The telephone converts sounds into electricity and enables the telephone network to
transmit it over copper wires.
d. Electronic Periods
The last period in Information Technology (ICT) history is electronic era. It started in 1940’s
and continues to the present. The four main event founding this period are the late vacuum
tubes period, the transistor, integrated circuits and last the computer processors period.
d.1. Vacuum tube – contain electrodes for controlling electron flow and were used in
early computers as a switch or amplifier.
d.2. Transistor – rapidly replace the vacuum tube as an electronic signal regulator. The
transistor fueled the trend toward miniaturization (act of making smaller version) in
electronics
d.3. Integrated circuits – 1959
- its is chip was made from silicon
- a precursor idea to the IC was to create small ceramic
substrates( micromodules) containing a single miniaturized.
d.4. Computer processors – central processing unit
- major events and releases of computer processors
- integrated electronic circuits that performs the calculations that run a
computer. Its preforms arithmetic, logical, unit/output(i/o) and other basic instructions
that are passed from an operating system.
LESSON 2 : Uses of ICT in our Daily Lives
1. EDUCATION
1. Insecurity of data - any action that could jeopardize the confidentiality, integrity or availability of
data. Data security threats can come from a variety of sources, including hackers, insider
threats, natural disasters and human error.
2. Fraud - To avoid hackers' internet fraud attempts, users need to understand common examples
of internet fraud and tactics.
3. Unemployment - Technological unemployment occurs when developments in technology and
working practices cause some workers to lose their jobs
4. Virus threat - computer virus is a type of malicious software, or malware, that spreads between
computers and causes damage to data and software. Computer viruses aim to disrupt systems,
cause major operational issues, and result in data loss and leakage.
LESSON 3 : COMMUNICATION
Communication technology refers to all the tools used to send, receive, and
process information. In today’s fast climate, efficiency and convenience are the keys to
successful communication technology. Things are a bit different now. The
incorporation of technology into different types of communication has made it easier
than ever to share information. Even though there are an overwhelming amount of
gadgets, software, and tools associated with communication technology, it is not
uncommon for the modern day communicator to be an expert at them all.
Types of communication technology
Technology has reinvented the way people communicate. Originally simple
devices have evolved into communication channels that create connections worldwide.
There are four main types of communication technology that have contributed to the
ease of sending messages: telephone, radio, television, and internet.
Telephone
The telephone revolutionized verbal communication. Speaking with someone
across the country can be done just as easily as speaking with someone down the
street. The world, strengthening relationships and eliminating the worries of long-
distance communication.
RADIO
The radio’s ability to reach a large audience at a low cost continues to
motivate a lot of communicators to take full advantage of the tool. Information
providers, such as advertisers and newscasters, spend substantial amounts of time
communicating with their massive audiences using radio technology. Radio technology
transformed the way information is delivered to large audiences and continues to
strengthen mass communication.
Television
Television is another way to reach extensive audiences, but it brought a new
perk to the table: visual communication. Television provides audiences with the best of
both worlds: information and visuals to accompany it. This advantage caused the
television to replace the radio as the leading tool for mass communication.
Internet
The internet removes the need for communicators to have a separate device
for each different type of communication technology. With the Internet, you can do it all
in one place. The tools available on the internet make any type of communication
effortless. Verbal and nonverbal communication can be accomplished with video
conferencing software. Written messages can be sent through email. Electronic
versions of pictures can be sent to and from any internet device.
Lesson 4: Job Opportunities
Its refers to a particular job that may be a steppingstone to loftier ambitions.
Common examples of career opportunities for recent college graduates include
management trainee, production assistant and technician.
Lesson 5: Education
In a digital age dominated by apps, multimedia tools and smart devices,
there’s no escaping the fact that Information and Communication Technology (ICT) has
become an integral part of our lived. And it’s here to stay.
Lesson 6: Socialization
For students, setting out on their educational journey, ICT can be a
fundamental component of the learning experience. With the effective use of
technology in classrooms, allied with more conventional teaching processes, there’s no
limit to the positive development of a young mind—whether that’s in the guises of
academic achievement and improved learning outcomes, enhanced creative thinking,
or the development of skills that will prove vital in later life.
This era of ICT continues to influence our livestyle both positively and
negatively. some of the issues that result from the use of ICT inthe society. This
include:
1. Effects on Employment
2. Effects on automated production
3. Issues of workers health
4. Cultural Effects
5. Breath through in ICT
1. Effects on Employment
The introduction of computers at the workplace has resulted in Creation of new
jobs, Replcement of computer illitrate workers and Displacement of jobs
a. Job Creation
ICT has introduced new employment opportunities that never existed before.
The new job titles are computer operators, programmers, network administrators, ICT
science etc
b. Job Replacement
The workers that are computer illitrate are replaced with those who are computer
literate
c. Job Displacement
Here the workers do not lose their jobs instead they are are moved to another
place or departmnet
2. Automated Production
- Used in manufacturing industries to automate their process in order to reduce cost,
increase production e.g computer-controlled robots
4. Cultural Effects
ICT has presented challenges to our moral and cultural values. ICT has changed the
way we talk, affected our privacy, human rights and integrity e.g
- Use of internet
- Computer related crime e.g. hacking, eavesdropping etc.
- Use of computers to forge certificates, passport and other documents.
- Has been used as a complaint platform against aspects of the society g drug abuse
Chapter 2 : History of Computer : History of Basic Computing Period in Information
Technology
A. Computer
A computer is a device that receives information (in the form of digital data)
and manipulates it to obtain results.
The history of computers dates back more than 200 years. Initially theorized
by mathematicians and businessmen, mechanical computers were designed and
built in the 19th century to solve increasingly complex computational problems.
Advances in technology allowed for ever more complex computers in the early
20th century, and computers became larger and more powerful.
B. Definition
A programmable electronic device designed to accept data, perform prescribed
mathematical and logical operations at high speed, and display the results of
those operations. Mainframes, desktop and laptop computers, tablets, and
smartphones are some of the different types of computers: Compare analog
computers and digital computers. A computer program or algorithm:
C. Types
Computers come in many different types and can be classified in two ways based
on their size and data processing capabilities.
Types of computers
There are two bases for determining the type of computer. We will discuss the
types of computers based on their size and data processing capabilities. We will
discuss each type of computer in detail. First let's see what a computer is.
Super Computer - is a computer that performs at or near the highest
operational rate for computers. Supercomputers are designed in such a way that
they can process huge amounts of data, such as processing billions of instructions
or data in just one second. This is because thousands of processors are
interconnected in supercomputers. It is mainly used in scientific and engineering
applications such as weather forecasting, scientific simulation, and nuclear energy
research. It was first developed by Roger Cray in 1976.
Characteristics of Supercomputers
Supercomputers are the computers that are the fastest and they are also very
expensive.
It can calculate up to ten trillion individual calculations per second,
this is also the reason which makes it even faster.
It is used in the stock market or big organizations for managing the
online currency world such as Bitcoin etc.
It is used in scientific research areas for analyzing data obtained
from exploring the solar system, satellites, etc.
Mainframe computer - designed in such a way that it can support hundreds or
thousands of users at the same time. It also supports multiple programs at the
same time, which often handle large volumes of data.
Characteristics of Minicomputer
Its weight is low.
Because of its low weight, it is easy to carry anywhere.
less expensive than a mainframe computer.
It is fast.
Abacus
The history of computers begins with the birth of the abacus, considered
the first computer. The Chinese are believed to have invented the abacus
about 4,000 years ago.
It is a wooden stand on which metal rods with beads are attached. The
balls are moved by the abacus operator according to certain rules to perform
arithmetic calculations. The abacus is still used in some countries such as
China, Russia and Japan. An image of the tool is shown below;
Different engine
In the early 1820s, it was designed by Charles Babbage, known as the
“father of modern computing.” It is a mechanical calculator capable of
performing simple calculations. It was a steam-powered calculator designed to
solve numerical tables such as logarithm tables.
Analytical Engine
This computer was also developed by Charles Babbage in 1830. It was a
mechanical calculator that used punched cards as input. He can solve any
math problem and store information in permanent memory.
Tabulation machine
It was invented in 1890 by Herman Hollerith, an American statistician. It
was a mechanical tabulating machine based on punched cards. It can compile
statistics and record or organize data or information. This machine was used in
the 1890 United States census. Hollerith also founded the Hollerith Tablet
Company, which later became International Business Machines (IBM) in 1924.
F. Basic Computing Periods-Ages
History of Computer: Generations of Computer
Computer generations document the evolution of technology to differentiate
computers in terms of diverse hardware and software. Everything you need to
know about 1st to 5th generation computers.
There are 5 Generations of computers and all of them have been discussed below
along with their features.
First Generation Computers (1940-1956)
The first generation computers were introduced using vacuum tube
technology that could control the flow of electrons in a vacuum. These tubes
are commonly used in switches, amplifiers, radios, televisions, etc. The first
generation of computers were heavy and bulky and not ideal for programming.
Application Software
Application software products are designed to satisfy a particular need of a particular
environment. All software applications prepared in the computer lab can come under the
category of Application software.
Application software may consist of a single program, such as Microsoft's notepad for
writing and editing a simple text. It may also consist of a collection of programs, often called a
software package, which work together to accomplish a task, such as a spreadsheet package.
Examples of Application software are the following:
Payroll Software
Student Record Software
Inventory Management Software
Income Tax Software
Railways Reservation Software
Microsoft Office Suite Software
Microsoft Word
Microsoft Excel
Microsoft PowerPoint
Productivity software simply means any application or program that enables one to
produce or create, among others, graphs, databases, documents, presentations, audio
or video clips, and worksheets. We commonly use productivity software in businesses
and offices. Common types of productivity software include database management
systems (DBMS), word processors, spreadsheet applications, and graphics software.
In essence, productivity software assists people to perform assigned tasks in addition
to enhancing communication and collaboration.
Initially, productivity software was for business use. Nowadays, various types
are even used to achieve personal productivity as well. Most of the productivity
software tools are now available on tablets and smartphones, besides just computers.
1. Reliability
It is enticing to purchase productivity software at a significantly lower price. But, always
remember you will use it to store and share critical business or company data. Do not
compromise the safety and security of your business data by picking unreliable
productivity software, just because it is inexpensive.
6. Accessibility
When choosing your business productivity tool, prioritize the one with a mobile version.
Select business productivity software which you can access via the web besides the
iOS and Android devices. By this, you can easily access your business data from
anywhere, at any time.
7. Profitability
When planning to purchase productivity software, invest your time on doing a cost-
benefit analysis to determine if it is the right solution. You should especially consider
the benefits it brings against its cost of acquisition and maintenance. Analyze and
figure out if investing in your preferred productivity tool provides more value that can
cover the correlated expenses. Having a budget is necessary to keep you in check to
avoid investing your money, time, and energy over wrong products. Consider
productivity software with the highest return.
Note: If you need productivity software for your business, company, or personal use,
ensure it not only satisfies your needs but also aligns with your goal. At MindManager,
we offer a business productivity tool that brings clarity and structure to your processes,
projects, and plans.
GAMES SOFTWARE
Game Software means the network games listed in Appendix A and also
includes game patches (feature or map upgrades) if mentioned in this Agreement. This
game software can connect to the network's service software after installing the user
software, thereby allowing users to play games with other users.
Gaming software is a type of application that allows users to play video games
on their computers or other devices. There are different types of gaming software
available, each with its own set of features and benefits. Here is a look at some of the
most popular types of gaming software:
Desktop Gaming Software: This type of gaming software is designed to be
installed on a computer’s hard drive and played on a desktop or laptop computer.
Desktop gaming software typically offers better graphics and performance than mobile
or web-based games.
Mobile Gaming Software: Mobile gaming software is designed to be played on
smartphones and tablets. Mobile games are usually less graphic-intensive than
desktop games, but they can still be quite addictive.
How does gaming software work?
The most important thing to understand about gaming software is how it
works. There are two types of gaming software: server-based and client-based.
Server-based gaming software is hosted on a remote server and players connect to
the server to play the game. Client-based gaming software is installed on each player’s
computer and the game is played locally without an internet connection.
Server-based gaming software has several advantages over client-based
gaming software. The most important advantage is that servers can be configured to
provide a variety of different game types, which gives players more options to choose
from. Another advantage of server-based gaming software is that it can be updated
more easily than client-based gaming software.
What are the benefits of using gaming software
There are many benefits of using gaming software. One of the main benefits is
that it can help improve your gaming skills. Gaming software can also help you to stay
organized and keep track of your progress. Additionally, gaming software can provide
you with tips and tricks to make your gaming experience more enjoyable.
How to choose the best gaming software for you?
ANTI VIRUS AND SECURITY SOFTWARE
Antivirus software (antivirus program) is a security program designed to
prevent, detect, search and remove viruses and other types of malware from
computers, networks and other devices. Often included as part of a security package,
antivirus software can also be purchased as a standalone option.
Typically installed on a computer as a proactive approach to cybersecurity, an
antivirus program can help mitigate a variety of cyber threats, including keyloggers,
browser hijackers, Trojan horses, worms, rootkits, spyware, adware, botnets, phishing
attempts and ransomware attacks.
Due to the constantly evolving nature of cybercrimes and new versions of
malware being released daily, including zero-day attacks, no antivirus program can
offer detection and protection against all threat vectors.
Phishing
Phishing attacks use email or fraudulent websites to try to trick you into
providing personal or financial information to compromise an account or steal money
by posing as a trustworthy entity. They may claim there’s a problem with payment
information or that they’ve noticed activity on an account and ask you to click on a link
or attachment and provide personal information.
Antivirus programs and computer protection software.
Antivirus programs and computer protection software are designed to evaluate
data such as web pages, files, software and applications to help find and eradicate
malware as quickly as possible.
Most provide real-time protection, which can protect your devices from
incoming threats; scan your entire computer regularly for known threats and provide
automatic updates; and identify, block and delete malicious codes and software.
How does antivirus work?
Antivirus software begins operating by checking your computer programs and
files against a database of known types of malware. Since new viruses are constantly
created and distributed by hackers, it will also scan computers for the possibility of new
or unknown types of malware threats.
How antivirus software works
Antivirus software typically runs as a background process, scanning
computers, servers or mobile devices to detect and restrict the spread of malware.
Many antivirus software programs include real-time threat detection and protection to
guard against potential vulnerabilities and perform system scans that monitor device
and system files, looking for possible risks.
Antivirus software usually performs the following basic functions:
Midterm Examination
References
Note: This module is collected from different site, book for students of ISPSC Main Campus. It is not
sold. It contains information about the subject LIVIN IN THE IT ERA. It is used to be a student's guide to fully
understand the lesson. Its contents come from various books and links verified by specialized specialists and
placed on one part of the paper so that students can find them more easily.