LIVING in The IT ERA

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 26

vv

Overview
Living in the IT Era will look at communication and information technologies, with a focus on
information technology and its components, especially as they are used by the Millennial Generation.
examines the science, culture, and ethics of information technology, as well as how it has impacted
modern life and interpersonal interactions and how it can be used to advance one's career and social
standing. The course's objective is to help students comprehend how communication and information
technologies develop as well as the cultural, economic, political, and social implications of such
technologies for society. Living in the IT Era is designed to give students a comprehensive
understanding of the social, cultural, and economic ramifications of new communication technologies
and to promote critical thinking about "new media" generally.
Students will study how to understand the changing information ecology and how it affects both
the media industry and media viewers through exams and media-related assignments. Students will
research convergent media issues and the effects of extensive new media use on consumers as part of
their course projects.

Chapter 1 : Introduction to Information and Communication Technology (ICT)


ICTs influence an individual's, household's, firm's, or country's access to information,
people, services, and technology. ICTs go beyond the typical talk of the information "haves"
and "have-nots," which implies that ICTs are only about access to information or computer
technology. Tele-access is a term used to describe how ICTs influence how people may
access a variety of social and economic resources, both electronically mediated and
unmediated.
The term "information and communications technology" (ICT) refers to a broad range
of communication tools and services, such as videoconferencing and distance learning, as well
as hardware and software for computers, networks, satellite systems, mobile phones, and other
devices. Traditional and traditional approaches to the design, implementation, and validation of
ICT systems often address one or two primary system problems at a time, such as an
enterprise system's stability or functional correctness, or a database's security and privacy. A
different engineering activity is frequently used to handle additional aspects.
This division of duties has resulted in system engineering procedures that are not
intended to recognize, reflect, or control the interactions between such elements, such as the
interactions between security and safety in contemporary auto electronics or between security,
privacy, and dependability in connected medical devices. However, current ICT developments
and innovation point to the need for a fusion of fields and risk domains in order to cope with
such interdependencies in an efficient and foresighted manner. However, identifying and
reducing composite risks in systems continues to be difficult due to the inherent complexity of
such interdependencies and the changing operational settings.
The environment that requires risk management and mitigation be a central and
integral part of engineering methods for future ICT systems. To address the requirements of
the modern computing environment, we need a new approach to risk, where risk modeling is
included in design as its integral part. In this chapter, we identify some of the key challenges
and issues that a vision of risk engineering brings to current engineering practice; notably,
issues of risk composition, the multidisciplinary nature of risk, the design, development, and
use of risk metrics, and the need for an extensible risk language. The chapter provides an initial
view on the foundational mechanisms we need to build in order to support the vision of risk
engineering: risk ontology, risk modeling and composition, and risk language.
Lesson 1 : History of ICT

The concept of ICT can be traced back to the 19th century with the development of the
telegraph and the telephone. These two inventions revolutionized the way people worked and
interacted socially by making it possible for one person to communicate with another person in
a different location in real or near-real time.
In the middle of the 20th century, radio and television introduced the concept of mass
communication, and by the end of the century, the internet had become a mainstream tool for
communication, commerce and entertainment. Its use continued to grow rapidly in the following
years, revolutionizing the way people work and digitally transforming the way people
communicate ( Andrew Whitworth, March 2014).
The beginning of Information Communication Technology (ICT) can be traced back
when humans started to use objects to communicate with one another. There are four main
period in history that divide the era of ICT.
a. Pre-mechanical
It cab be traced back thousands of years ago, around 3000 BCE to 1450 CE.

Sumerian Pictogram- dating back 3100 BCE that shows the earlist form of communication
among humans. During this period, humans started communicating with one another using
words and pictograms curved in rocks.
Abacus – considered to be the first counting device similar to the modern calculator and
process information.

b. Mechanical
Concentrated primarily on the development of machines that will enhance calculation
speed. Pascaline, it is arithmetic Machine-adding, machine to be produced in any
quantity and actually used. It design and build by French Mathematician-philosopher
Blaise Pascal (1642 and 1644)(Addition and Subtraction)
The Analytical Engine – invented by Charles Babbage “Father of the Computers”
Contained such as the arithmetic logic unit, control flow and integrated memory and
first programmable mechanical computer.
c. Electromechanical
The use of electricity for information handling and transfer bloomed, use of telegraph to
transmit information over long distances (Telegraph). Example: Empty Can with rope
Alexandre Graham Bell- he was granted the patent for the telephone.
The telephone converts sounds into electricity and enables the telephone network to
transmit it over copper wires.

d. Electronic Periods
The last period in Information Technology (ICT) history is electronic era. It started in 1940’s
and continues to the present. The four main event founding this period are the late vacuum
tubes period, the transistor, integrated circuits and last the computer processors period.
d.1. Vacuum tube – contain electrodes for controlling electron flow and were used in
early computers as a switch or amplifier.
d.2. Transistor – rapidly replace the vacuum tube as an electronic signal regulator. The
transistor fueled the trend toward miniaturization (act of making smaller version) in
electronics
d.3. Integrated circuits – 1959
- its is chip was made from silicon
- a precursor idea to the IC was to create small ceramic
substrates( micromodules) containing a single miniaturized.
d.4. Computer processors – central processing unit
- major events and releases of computer processors
- integrated electronic circuits that performs the calculations that run a
computer. Its preforms arithmetic, logical, unit/output(i/o) and other basic instructions
that are passed from an operating system.
LESSON 2 : Uses of ICT in our Daily Lives
1. EDUCATION

Contributes greatly to education because it improves the way of education and


provides a better educational environment, through the use of computers, tablets, data
displays, interactive electronic boards, and others in the process of communicating
information to students .UNESCO pursues a comprehensive educational system,
enhanced by information and communications technology, which focuses on the main
challenges in joint work, whether in the field of communications, information, science,
and education. ICT is applied in the education sector in the following ways:
1. Research for teaching materials, online conference etc.
2. ICT or computers are used as a reference tools.
3. ICT or computer is used by the researchers to collect and process data.
4. Computers are used as administrative tools.
5. ICT offers interactive learning.
2. FINANCE AND BANKING

Used daily by financial companies, to trade financial instruments, to report a


business's earnings, and to keep records of personal budgets. ICT allows rapid
calculation of financial data and provides financial services companies with strategic
and innovative benefits as well as electronic transfer of money, through the use of
credit cards, or e-commerce, which includes the purchase and payment via the Internet
and others. ICT helps deal with security concerns, legal issues and access to global
markets. ICT is applied in the banking sector in the following ways:
1. Banks use computers to control the entire banking system.
2. On-line transactions by customers are possible 24 hour.
3. Accessing company account by businessmen On-line.
4. Supervision of banking activities by bank administrators
3. INDUSTRIES
The role in various sectors and industries. Similarly, IT strives to make things
simpler in the manufacturing sector as well. In an industry that automates things for the
benefit of humankind, IT helps to make the manufacturing process less cumbersome
and more automated. ICT is applied in the industries in the following ways:
1. Computers are used to facilitate production planning and control system.
2. Automation in the production of goods.
3. Researchers use computers to analyse and collect data for future reference.
4. Computers are used by administrators to oversee the entire operations in
the factory.
4. COMMERCE
The role of ICT in business is seen in however it will facilitate your company
become a lot of productive, increase performance, save money, improve the client
expertise, streamline communications and enhance social control decision- creating. It
additionally play a task in serving to corporations expand globally and in providing
workers access to company data where and whenever they have. From 2017 to 2023,
e-commerce app sessions have increased by 95%, while downloads have only
increased by 5%.
1. ICT makes buying and selling easier.
2. Computers are used by customers to connect On-line with Suppliers.
3. Computers are used to keep record of transaction.
4. ICT is applied as a means of communication between customers and the
producers.
6. ON THE SOCIETY
1. Faster communication speed.
2. Lower communication cost.
3. Reliable mode of communication.
4. Effective sharing of information.
5. Borderless communication

TECHNOLOGY NEGATIVE IMPACT IN THE SOCIETY

1. Insecurity of data - any action that could jeopardize the confidentiality, integrity or availability of
data. Data security threats can come from a variety of sources, including hackers, insider
threats, natural disasters and human error.
2. Fraud - To avoid hackers' internet fraud attempts, users need to understand common examples
of internet fraud and tactics.
3. Unemployment - Technological unemployment occurs when developments in technology and
working practices cause some workers to lose their jobs
4. Virus threat - computer virus is a type of malicious software, or malware, that spreads between
computers and causes damage to data and software. Computer viruses aim to disrupt systems,
cause major operational issues, and result in data loss and leakage.
LESSON 3 : COMMUNICATION
Communication technology refers to all the tools used to send, receive, and
process information. In today’s fast climate, efficiency and convenience are the keys to
successful communication technology. Things are a bit different now. The
incorporation of technology into different types of communication has made it easier
than ever to share information. Even though there are an overwhelming amount of
gadgets, software, and tools associated with communication technology, it is not
uncommon for the modern day communicator to be an expert at them all.
Types of communication technology
Technology has reinvented the way people communicate. Originally simple
devices have evolved into communication channels that create connections worldwide.
There are four main types of communication technology that have contributed to the
ease of sending messages: telephone, radio, television, and internet.
Telephone
The telephone revolutionized verbal communication. Speaking with someone
across the country can be done just as easily as speaking with someone down the
street. The world, strengthening relationships and eliminating the worries of long-
distance communication.
RADIO
The radio’s ability to reach a large audience at a low cost continues to
motivate a lot of communicators to take full advantage of the tool. Information
providers, such as advertisers and newscasters, spend substantial amounts of time
communicating with their massive audiences using radio technology. Radio technology
transformed the way information is delivered to large audiences and continues to
strengthen mass communication.
Television
Television is another way to reach extensive audiences, but it brought a new
perk to the table: visual communication. Television provides audiences with the best of
both worlds: information and visuals to accompany it. This advantage caused the
television to replace the radio as the leading tool for mass communication.
Internet
The internet removes the need for communicators to have a separate device
for each different type of communication technology. With the Internet, you can do it all
in one place. The tools available on the internet make any type of communication
effortless. Verbal and nonverbal communication can be accomplished with video
conferencing software. Written messages can be sent through email. Electronic
versions of pictures can be sent to and from any internet device.
Lesson 4: Job Opportunities
Its refers to a particular job that may be a steppingstone to loftier ambitions.
Common examples of career opportunities for recent college graduates include
management trainee, production assistant and technician.

Lesson 5: Education
In a digital age dominated by apps, multimedia tools and smart devices,
there’s no escaping the fact that Information and Communication Technology (ICT) has
become an integral part of our lived. And it’s here to stay.
Lesson 6: Socialization
For students, setting out on their educational journey, ICT can be a
fundamental component of the learning experience. With the effective use of
technology in classrooms, allied with more conventional teaching processes, there’s no
limit to the positive development of a young mind—whether that’s in the guises of
academic achievement and improved learning outcomes, enhanced creative thinking,
or the development of skills that will prove vital in later life.

Lesson 7: Impact of ICT in the Society

This era of ICT continues to influence our livestyle both positively and
negatively. some of the issues that result from the use of ICT inthe society. This
include:
1. Effects on Employment
2. Effects on automated production
3. Issues of workers health
4. Cultural Effects
5. Breath through in ICT

1. Effects on Employment
The introduction of computers at the workplace has resulted in Creation of new
jobs, Replcement of computer illitrate workers and Displacement of jobs

a. Job Creation
ICT has introduced new employment opportunities that never existed before.
The new job titles are computer operators, programmers, network administrators, ICT
science etc

b. Job Replacement
The workers that are computer illitrate are replaced with those who are computer
literate

c. Job Displacement
Here the workers do not lose their jobs instead they are are moved to another
place or departmnet

2. Automated Production
- Used in manufacturing industries to automate their process in order to reduce cost,
increase production e.g computer-controlled robots

3. Issues of workers health


- This are effects on our health e.g. Repetitive strain Injuries, Eyestrain, Headache,
electromagnetic emission and environmental issues

4. Cultural Effects
ICT has presented challenges to our moral and cultural values. ICT has changed the
way we talk, affected our privacy, human rights and integrity e.g
- Use of internet
- Computer related crime e.g. hacking, eavesdropping etc.
- Use of computers to forge certificates, passport and other documents.
- Has been used as a complaint platform against aspects of the society g drug abuse
Chapter 2 : History of Computer : History of Basic Computing Period in Information
Technology

A. Computer
A computer is a device that receives information (in the form of digital data)
and manipulates it to obtain results.

The history of computers dates back more than 200 years. Initially theorized
by mathematicians and businessmen, mechanical computers were designed and
built in the 19th century to solve increasingly complex computational problems.
Advances in technology allowed for ever more complex computers in the early
20th century, and computers became larger and more powerful.

B. Definition
A programmable electronic device designed to accept data, perform prescribed
mathematical and logical operations at high speed, and display the results of
those operations. Mainframes, desktop and laptop computers, tablets, and
smartphones are some of the different types of computers: Compare analog
computers and digital computers. A computer program or algorithm:
C. Types
Computers come in many different types and can be classified in two ways based
on their size and data processing capabilities.
Types of computers
There are two bases for determining the type of computer. We will discuss the
types of computers based on their size and data processing capabilities. We will
discuss each type of computer in detail. First let's see what a computer is.
Super Computer - is a computer that performs at or near the highest
operational rate for computers. Supercomputers are designed in such a way that
they can process huge amounts of data, such as processing billions of instructions
or data in just one second. This is because thousands of processors are
interconnected in supercomputers. It is mainly used in scientific and engineering
applications such as weather forecasting, scientific simulation, and nuclear energy
research. It was first developed by Roger Cray in 1976.

Characteristics of Supercomputers
Supercomputers are the computers that are the fastest and they are also very
expensive.
It can calculate up to ten trillion individual calculations per second,
this is also the reason which makes it even faster.
It is used in the stock market or big organizations for managing the
online currency world such as Bitcoin etc.
It is used in scientific research areas for analyzing data obtained
from exploring the solar system, satellites, etc.
Mainframe computer - designed in such a way that it can support hundreds or
thousands of users at the same time. It also supports multiple programs at the
same time, which often handle large volumes of data.

Mini Computer – its medium-sized multiprocessor computer. In this type of


computer, there are two or more processors and supports 4 to 200 users at the
same time. Mini computers are similar to microcontrollers. Mini computers are
used in places like institutes or departments for various tasks like billing,
accounting, inventory management, etc. It is smaller than a central computer but
larger than a microcomputer.

Characteristics of Minicomputer
Its weight is low.
Because of its low weight, it is easy to carry anywhere.
less expensive than a mainframe computer.
It is fast.

Workstation Computer - designed for engineering or scientific applications. It


includes a fast processor, with a large amount of RAM and a high-speed graphics
adapter. This is a single-user computer. It is often used to perform a specific task
with high precision.
Characteristics of Workstation Computer
It is expensive or high in cost.
They are exclusively made for complex work purposes.
It provides large storage capacity, better graphics, and a more
powerful CPU when compared to a PC.
It is also used to handle animation, data analysis, CAD, audio and
video creation, and editing.

Personal Computer (PC) - It is basically a general-purpose computer designed for


individual use. It consists of a microprocessor as a central processing unit(CPU),
memory, input unit, and output unit. This kind of computer is suitable for personal
work such as making an assignment, watching a movie, or at the office for office
work, etc.

Characteristics of Personal Computer (PC)


In this limited number of software can be used.
It is the smallest in size.
It is designed for personal use.
It is easy to use.

Server Computer - combined data and programs. The working of a server


computer is that it does not solve a bigger problem like a supercomputer but it
solves many smaller similar ones.
D. Application of ICT in our Daily Lives
Applying IT in communication
a. IT is used to send information to people by electronic mail (e-mail) over
the Internet.
b. Many people use GSM (mobile phones) for communication.
c. Audio and video conferencing are also done via the Internet. Through
video conferencing, people in different remote locations can discuss
different topics. Each of these contributes to the topic under discussion.
Instant chat and messaging

IT applications in timing and control


a. Washing machine
b. Air conditioning system
c. Programming the microwave
d. Traffic lights are turned off and on according to a program running on a
computer that manages traffic in the city.
e. Control equipment used for scientific research.
f. Monitor and report the status of security devices
g. Monitor and report weather conditions and other atmospheric activities.
h. Processing and control equipment used in aircraft, ships, oil rigs,
automated teller machines (ATMs), etc.

Applying IT in information processing/management


a. Type letters, notes and other documents. Disseminate and share
information.
b. Maintain records and inventory, store, retrieve and manipulate data and
information.
c. Transmission of information.

E. History of Computer: Basic Computing Periods


The first counting devices were used by primitive people(belonging to a
society in which people live in a very simple way, usually without industries or
a writing system). They used sticks, stones and bones as counting tools. As
human intelligence and technology improved over time, more and more
computer devices were developed.

Abacus
The history of computers begins with the birth of the abacus, considered
the first computer. The Chinese are believed to have invented the abacus
about 4,000 years ago.
It is a wooden stand on which metal rods with beads are attached. The
balls are moved by the abacus operator according to certain rules to perform
arithmetic calculations. The abacus is still used in some countries such as
China, Russia and Japan. An image of the tool is shown below;
Different engine
In the early 1820s, it was designed by Charles Babbage, known as the
“father of modern computing.” It is a mechanical calculator capable of
performing simple calculations. It was a steam-powered calculator designed to
solve numerical tables such as logarithm tables.

Analytical Engine
This computer was also developed by Charles Babbage in 1830. It was a
mechanical calculator that used punched cards as input. He can solve any
math problem and store information in permanent memory.

Tabulation machine
It was invented in 1890 by Herman Hollerith, an American statistician. It
was a mechanical tabulating machine based on punched cards. It can compile
statistics and record or organize data or information. This machine was used in
the 1890 United States census. Hollerith also founded the Hollerith Tablet
Company, which later became International Business Machines (IBM) in 1924.
F. Basic Computing Periods-Ages
History of Computer: Generations of Computer
Computer generations document the evolution of technology to differentiate
computers in terms of diverse hardware and software. Everything you need to
know about 1st to 5th generation computers.

There are 5 Generations of computers and all of them have been discussed below
along with their features.
First Generation Computers (1940-1956)
The first generation computers were introduced using vacuum tube
technology that could control the flow of electrons in a vacuum. These tubes
are commonly used in switches, amplifiers, radios, televisions, etc. The first
generation of computers were heavy and bulky and not ideal for programming.

Second Generation Computers (1956-1963)


The second generation of computers revolutionized technology by
using transistor technology instead of bulky vacuum tubes. A transistor is a
device made of semiconductor material that opens or closes an electrical
circuit. These transistors were invented at Bell Labs, making second-
generation computers more powerful and faster than previous computers.
Transistors made these computers smaller and generated less heat than the
vacuum tubes they replaced. The second generation of computers also
introduced the use of processors, memory, and input/output units. The
programming languages used for second generation computers were
FORTRAN (1956), ALGOL (1958), and COBOL (1959).
Third Generation Computers (1964-1971)
The development of third generation computers occurred with the
transition from transistors to integrated circuits also known as ICs. The third
generation of computers were fast and reliable. The integrated circuits used in
these computers are made from silicon and are called silicon chips. A single
integrated circuit has multiple transistors, registers, and capacitors fabricated
on a silicon wafer. This generation of computers has increased memory space
and efficiency. Higher level languages such as BASIC (Beginner General
Purpose Symbolic Instruction Code) were used and minicomputers were
introduced around this time.

Fourth Generation Computers (1971-Present)


The period from 1972 to 2010 is considered the period of the fourth
generation of computers. Microprocessor technology is used to develop the
fourth generation of computers. The main advantage of these computers is
that the microprocessor can contain all the circuitry necessary to perform
arithmetic, logic and control functions on a single chip. In the fourth generation,
computers are very small in size and are also portable. Technologies such as
multiprocessing, multiprogramming, time sharing, runtime, and virtual memory
were also introduced at this time. In the fourth generation, personal computers
and computer networks became a reality.
Fifth Generation Computers (Present and Beyond)

The fifth generation of computers is built using technology called


artificial intelligence (AI). This technology encourages computers to behave
like humans. Several applications of AI have been seen in features like voice
recognition, entertainment, etc. The speed of fifth generation computers is the
highest while the size is the smallest. So far, over the years, great
improvement has been seen in different generations of computers in terms of
speed, accuracy, etc.
Chapter 3: Basic Computer Hardware and Software
You've undoubtedly heard of the word’s hardware and software at some point. You
almost certainly use both on a regular basis, whether with your smartphone or personal computer. Let's
take a closer look at what these two terms mean and why they're significant. A brain-computer interface
(BCI) allows people with and without impairments to communicate non-muscularly. BCI devices are
made up of both hardware and software. BCI hardware uses a collection of device components to
capture signals from the brain, either invasively or non-invasively. Following that, BCI software
transforms these signals into device output commands and offers feedback. Basic research,
clinical/translational research, consumer goods, and emergent applications are the four areas in which
BCI applications may be classified (Rowson, J. A. (2020, June).
Hardware
Hardware represents the physical and tangible components of a computer, i.e. the
components that can be seen and touched.
a. Input devices − keyboard, mouse, etc.
b. Output devices − printer, monitor, etc.
c. Secondary storage devices − Hard disk, CD, DVD, etc.
d. Internal components − CPU, motherboard, RAM, etc.
Relationship between Hardware and Software
Hardware and software are mutually dependent on each other. Both of them must
work together to make a computer produce a useful output.
Software cannot be utilized without supporting hardware.
Hardware without a set of programs to operate upon cannot be utilized and is useless.
To get a particular job done on the computer, relevant software should be loaded into
the hardware.
Hardware is a one-time expense.
Software development is very expensive and is a continuing expense.
Different software applications can be loaded on a hardware to run different jobs.
A software acts as an interface between the user and the hardware.
If the hardware is the 'heart' of a computer system, then the software is its 'soul'. Both
are complementary to each other.
Software is a set of programs, which is designed to perform a well-defined function. A
program is a sequence of instructions written to solve a particular problem.
two types of software:
System Software
The system software is a collection of programs designed to operate, control, and
extend the processing capabilities of the computer itself. System software is generally prepared
by the computer manufacturers. These software products comprise of programs written in low-
level languages, which interact with the hardware at a very basic level. System software serves
as the interface between the hardware and the end users.
Some examples of system software are Operating System, Compilers, Interpreter,
Assemblers, etc.

Application Software
Application software products are designed to satisfy a particular need of a particular
environment. All software applications prepared in the computer lab can come under the
category of Application software.
Application software may consist of a single program, such as Microsoft's notepad for
writing and editing a simple text. It may also consist of a collection of programs, often called a
software package, which work together to accomplish a task, such as a spreadsheet package.
Examples of Application software are the following:
Payroll Software
Student Record Software
Inventory Management Software
Income Tax Software
Railways Reservation Software
Microsoft Office Suite Software
Microsoft Word
Microsoft Excel
Microsoft PowerPoint

Productivity software simply means any application or program that enables one to
produce or create, among others, graphs, databases, documents, presentations, audio
or video clips, and worksheets. We commonly use productivity software in businesses
and offices. Common types of productivity software include database management
systems (DBMS), word processors, spreadsheet applications, and graphics software.
In essence, productivity software assists people to perform assigned tasks in addition
to enhancing communication and collaboration.

Initially, productivity software was for business use. Nowadays, various types
are even used to achieve personal productivity as well. Most of the productivity
software tools are now available on tablets and smartphones, besides just computers.

1. Reliability
It is enticing to purchase productivity software at a significantly lower price. But, always
remember you will use it to store and share critical business or company data. Do not
compromise the safety and security of your business data by picking unreliable
productivity software, just because it is inexpensive.

2. Time monitoring capability


Time is a very precious asset, especially in business. For instance, you cannot afford
to see your employees misuse their precious time, especially when you pay them
hourly. With business productivity software that has a time tracking ability, you can
better organize your team and time. This will not only save you money, but also time
and productivity.
3. Employee tracking features
By properly monitoring your employees, you may increase their productivity around
tasks. For instance, this may be easy if your employees work from their offices
compared to when they work remotely at home. Therefore, when purchasing a
business productivity tool, ensure it can effectively supervise your employees, whether
they are working from home or at your company's physical office.

4. Multi-platform software compatibility


Your employees have different habits and preferences. When you are selecting your
business productivity software, put this under consideration. For instance, your
employees may prefer different devices or use distinct operating systems. Your
productivity software should be compatible with a pool of operating systems.

5. Project management features


When choosing your business productivity software, pick the one that allows you to
organize, delegate and supervise your projects. Pick a productivity tool that also
updates you on project progress. Business productivity software that gives you
complete control over your projects.

6. Accessibility
When choosing your business productivity tool, prioritize the one with a mobile version.
Select business productivity software which you can access via the web besides the
iOS and Android devices. By this, you can easily access your business data from
anywhere, at any time.

7. Profitability
When planning to purchase productivity software, invest your time on doing a cost-
benefit analysis to determine if it is the right solution. You should especially consider
the benefits it brings against its cost of acquisition and maintenance. Analyze and
figure out if investing in your preferred productivity tool provides more value that can
cover the correlated expenses. Having a budget is necessary to keep you in check to
avoid investing your money, time, and energy over wrong products. Consider
productivity software with the highest return.

Note: If you need productivity software for your business, company, or personal use,
ensure it not only satisfies your needs but also aligns with your goal. At MindManager,
we offer a business productivity tool that brings clarity and structure to your processes,
projects, and plans.

Graphic Design Software


Graphic design software refers to apps and programs that graphic designers
use to create, edit, and manipulate digital images. They allow designers edit and resize
images, produce original illustrations, combine text, color, and shapes, and bring their
vision to life.
Graphic design has been defined as “the art and practice of planning and
projecting ideas and experiences with visual and textual content” (Cezzar 2014).
Although librarians do not generally think of themselves as graphic designers, their
work frequently involves graphic design. Even in the age of desktop publishing, many
graphic design tools are expensive and present a steep learning curve. However, in
recent years free or low-cost online tools and resources have emerged that promise to
enable anyone to create attractive, professional-quality graphic materials.
Basis for Current Interest
An ongoing trend in libraries of all kinds has been a shift from library-centered
thinking to user centered thinking. Instead of merely providing access or offering
services and waiting for people to take advantage of them, libraries have increasingly
adopted a proactive approach to understand the needs and goals of their users,
develop services that meet those needs, and then assess the impact of those services.
One part of this emphasis on usability is an understanding of the importance of good
communication, including visual communication, and the necessity of communicating
the value of libraries to stakeholders.
Currently, graphic design has been shifted from traditional hand-drawing to
computer-aided design comprehensively, which allows the design concept to be
effectively transformed into gorgeous realistic graphics. Through the functional analysis
and hands-on application of three professional design software (CorelDRAW,
Photoshop, and Flash), their characteristics and application directions are analyzed
and compared in this paper. In addition, the necessity and development trend of
computer graphics software in graphic art design are pointed out.
Web Browser
A web browser is a program that allows you to access websites. When a user
requests a web page from a certain website, the browser receives the page's files from
a web server and displays it on the user's screen. Browsers are used on a variety of
devices such as desktop computers, laptop computers, tablets, and smartphones.
Web Browsers are software installed on your PC. To access the Web, you
need a web browser, such as Netscape Navigator, Microsoft Internet Explorer or
Mozilla Firefox.
Currently you must be using any sort of Web browser while you are navigating
through our site tutorialspoint.com. On the Web, when you navigate through pages of
information, this is commonly known as web browsing or web surfing.
There are four leading web browsers − Explorer, Firefox, Netscape, and
Safari, but there are many others browsers available. You might be interested in
knowing Complete Browser Statistics. Now we will see these browsers in bit more
detail. While developing a site, we should try to make it compatible to as many
browsers as possible. Especially sites should be compatible to major browsers like
Explorer, Firefox, Chrome, Netscape, Opera, and Safari.
Internet Explorer
Internet Explorer (IE) is a product from software giant Microsoft. This is the
most commonly used browser in the universe. This was introduced in 1995 along with
Windows 95 launch and it has passed Netscape popularity in 1998.
Google Chrome
This web browser is developed by Google and its beta version was first
released on September 2, 2008 for Microsoft Windows. Today, chrome is known to be
one of the most popular web browsers with its global share of more than 50%.
Mozilla Firefox
Firefox is a new browser derived from Mozilla. It was released in 2004 and has
grown to be the second most popular browser on the Internet.
Safari
Safari is a web browser developed by Apple Inc. and included in Mac OS X. It
was first released as a public beta in January 2003. Safari has very good support for
latest technologies like XHTML, CSS2 etc.
Opera
Opera is smaller and faster than most other browsers, yet it is full- featured.
Fast, user-friendly, with keyboard interface, multiple windows, zoom functions, and
more. Java and non-Java-enabled versions available. Ideal for newcomers to the
Internet, school children, handicap and as a front-end for CD-Rom and kiosks.
Konqueror
Konqueror is an Open Source web browser with HTML 4.01 compliance,
supporting Java applets, JavaScript, CSS 1, CSS 2.1, as well as Netscape plugins.
This works as a file manager as well as it supports basic file management on local
UNIX filesystems, from simple cut/copy and paste operations to advanced remote and
local network file browsing.
Lynx
Lynx is a fully-featured World Wide Web browser for users on Unix, VMS, and
other platforms running cursor-addressable, character-cell terminals or emulators.

Video and Audio Editing Software


Video editing software is useful for a variety of tasks, including filmmaking,
audio commentary, and ordinary video content editing. The user manipulates parts of
video, pictures, and audio on a sequence in NLE software. These clips may be clipped,
edited, and modified in a variety of ways.
A video editor, or video editing software, is software used for post-production
video editing of digital video sequences using a non-linear editing system (NLE).
Traditional flatbed celluloid film editing equipment and analog video tape editing
devices have been replaced.
Video editing software is useful for a variety of tasks, including filmmaking,
audio commentary, and ordinary video content editing.
Once a project is complete, the editor can then export to movies in a variety of
formats in a context that may range from broadcast tape formats to compressed video
files for web publishing (such as on an online video platform or personal website),
optical media, or saved to mobile devices.
To facilitate editing, source video typically has a higher resolution than the
desired output. Therefore, higher resolution video needs to be downscaled during
exporting, or after exporting in a process known as transsizing.
Visual effects
As digital video editing advanced, visual effects became possible, and is part
of the standard toolkit, usually found in prosumer and professional grade software.
A common ability is to do compositing techniques such as chroma keying or
luma keying, among others, which allow different objects to look as if they are in the
same scene.

GAMES SOFTWARE
Game Software means the network games listed in Appendix A and also
includes game patches (feature or map upgrades) if mentioned in this Agreement. This
game software can connect to the network's service software after installing the user
software, thereby allowing users to play games with other users.
Gaming software is a type of application that allows users to play video games
on their computers or other devices. There are different types of gaming software
available, each with its own set of features and benefits. Here is a look at some of the
most popular types of gaming software:
Desktop Gaming Software: This type of gaming software is designed to be
installed on a computer’s hard drive and played on a desktop or laptop computer.
Desktop gaming software typically offers better graphics and performance than mobile
or web-based games.
Mobile Gaming Software: Mobile gaming software is designed to be played on
smartphones and tablets. Mobile games are usually less graphic-intensive than
desktop games, but they can still be quite addictive.
How does gaming software work?
The most important thing to understand about gaming software is how it
works. There are two types of gaming software: server-based and client-based.
Server-based gaming software is hosted on a remote server and players connect to
the server to play the game. Client-based gaming software is installed on each player’s
computer and the game is played locally without an internet connection.
Server-based gaming software has several advantages over client-based
gaming software. The most important advantage is that servers can be configured to
provide a variety of different game types, which gives players more options to choose
from. Another advantage of server-based gaming software is that it can be updated
more easily than client-based gaming software.
What are the benefits of using gaming software
There are many benefits of using gaming software. One of the main benefits is
that it can help improve your gaming skills. Gaming software can also help you to stay
organized and keep track of your progress. Additionally, gaming software can provide
you with tips and tricks to make your gaming experience more enjoyable.
How to choose the best gaming software for you?
ANTI VIRUS AND SECURITY SOFTWARE
Antivirus software (antivirus program) is a security program designed to
prevent, detect, search and remove viruses and other types of malware from
computers, networks and other devices. Often included as part of a security package,
antivirus software can also be purchased as a standalone option.
Typically installed on a computer as a proactive approach to cybersecurity, an
antivirus program can help mitigate a variety of cyber threats, including keyloggers,
browser hijackers, Trojan horses, worms, rootkits, spyware, adware, botnets, phishing
attempts and ransomware attacks.
Due to the constantly evolving nature of cybercrimes and new versions of
malware being released daily, including zero-day attacks, no antivirus program can
offer detection and protection against all threat vectors.

Common types of cyber threats


As the Internet of Things (IoT) grows, so does the risk of cybercrime for mobile
phones and other internet-connected devices, not just your personal computer.
According to Verizon’s 2022 Data Breach Investigations Report, 45% of organizations
had recently experienced a mobile-related compromise. You need to protect yourself
against malware.
Malware
Malware, short for “malicious software,” is a blanket term that refers to a wide
variety of software programs designed to do damage or do other unwanted actions to a
computer, server or computer network Common examples include viruses, spyware
and trojan horses. Malware can slow down or crash your device or delete files.
Criminals often use malware to send spam, obtain personal and financial information
and even steal your identity.
Spyware
Spyware is a type of malware that attaches itself and hides on a computer’s
operating system without your permission to make unwanted changes to your user
experience. It can be used to spy on your online activity and may generate unwanted
advertisements or make your browser display certain website sites or search results.

Phishing
Phishing attacks use email or fraudulent websites to try to trick you into
providing personal or financial information to compromise an account or steal money
by posing as a trustworthy entity. They may claim there’s a problem with payment
information or that they’ve noticed activity on an account and ask you to click on a link
or attachment and provide personal information.
Antivirus programs and computer protection software.
Antivirus programs and computer protection software are designed to evaluate
data such as web pages, files, software and applications to help find and eradicate
malware as quickly as possible.

Most provide real-time protection, which can protect your devices from
incoming threats; scan your entire computer regularly for known threats and provide
automatic updates; and identify, block and delete malicious codes and software.
How does antivirus work?
Antivirus software begins operating by checking your computer programs and
files against a database of known types of malware. Since new viruses are constantly
created and distributed by hackers, it will also scan computers for the possibility of new
or unknown types of malware threats.
How antivirus software works
Antivirus software typically runs as a background process, scanning
computers, servers or mobile devices to detect and restrict the spread of malware.
Many antivirus software programs include real-time threat detection and protection to
guard against potential vulnerabilities and perform system scans that monitor device
and system files, looking for possible risks.
Antivirus software usually performs the following basic functions:

Scans directories or specific files against a library of known malicious


signatures to detect abnormal patterns indicating the presence of malicious software.
Enables users to schedule scans so they run automatically.
Removes any malicious software it detects either automatically in the
background or notifies users of infections and prompts them to clean the files.
To scan systems comprehensively, antivirus software must generally be given
privileged access to the entire system. This makes antivirus software itself a common
target for attackers, and researchers have discovered remote code execution and
other serious vulnerabilities in antivirus software products in recent years.
Benefits of antivirus software
The purpose of antivirus software isn't only to defend a system against security
threats and vulnerabilities, but also to provide real-time protection through automated
vulnerability scans.
Antivirus software provides the following benefits:
Virus and malware protection. The main benefit of antivirus software is to
protect against malicious viruses, such as malware and spyware. Most cyber threats
today present themselves as multipronged threat vectors that can attack system data,
steal confidential information, spy on system resources and degrade system
performance simultaneously. Therefore, having reliable antivirus software running at all
times is imperative.
Protection against spam and pop-ups. One of the most common ways viruses
infiltrate and infect a system is through pop-up advertisements and spam-based
webpages. Antivirus software keeps the system secure by automatically blocking pop-
ups and spam coming from malicious websites.
Web protection. Antivirus software helps protect against scam websites threat
actors use to gather credit card and bank information from unsuspecting users. By
restricting access to harmful websites, a reliable antivirus program can prevent users
from accessing unauthorized networks.
Real-time protection. Antivirus software acts as a real-time shield that scans
each inbound file and program. Depending on the settings of the antivirus program,
once an infected file or program is detected, it's either automatically deleted or moved
to a quarantine folder for further analysis. A quarantined file is prevented from
interacting with the rest of the machine and its programs to mitigate damage.
Boot-scan command. Sophisticated viruses can often duplicate themselves
while the system is active. However, an antivirus program can prevent a virus from
self-replicating by invoking a boot-scan command. This command shuts down the
operating system (OS), restarts the computer and scans the entire hard drive for
viruses and malware. During the scan, the virus is detected and doesn't get a chance
to self-replicate due to the deactivation of the OS.
Dark web scanning. Data from most data breaches, such as ransomware
attacks, is often leaked on the dark web. Many antivirus tools can help organizations
discover if their sensitive data is leaked on the dark web. For example, if they find an
associated email address or account number on the dark web, they can notify the user
and update the password to a new and more complex one.
Protection from external devices. Most people regularly plug in external
devices, such as hard drives and USB adapters, to their computers. Antivirus software
scans all attached devices and peripherals to thwart potential viruses from entering the
system through external sources.
The Utility Software is system software that helps to maintain the proper and
smooth functioning of a Computer System. It assists the Operating System to manage,
organize, maintain, and optimize the functioning of the computer system.
Utility Software performs certain tasks like virus detection, installation, and
uninstallation, data backup, deletion of unwanted files, etc. Some examples are
antivirus software, file management tools, compression tools, disk management tools,
etc.
Utility Software Types
Antivirus- is a malicious software that enters the system along with a host
program. Moreover, it multiplies with time and makes several copies which in turn
slows down and corrupts the system.
File Management System - These utility software are used to manage files of
the computer system. Since files are an important part of the system as all the data is
stored in the files. Therefore, this utility software help to browse, search, arrange, find
information, and quickly preview the files of the system.
Compression Tools - An important part of a computer is storage space, it is
very important to maintain this storage. Therefore, we use certain utility software to
compress big files and decrease their size, these are compression tools.The format of
the files changes while compressing and we cannot access or edit them directly. In
addition, we can easily decompress the file and get the original file back. Examples of
compression tools are WinZip, WinRAR, WinAce, PeaZip, 7-Zip, etc.
Disk Management Tools - This utility software are used to manage data on
disks. Moreover, they perform functions like partitioning devices, manage drives, etc.
Examples of disk management tools are MiniTool Partition Wizard, Paragon Partition
Manager, etc
Disk Cleanup Tool - This utility software helps to free up the disk space. In
addition, the files which are no longer in use are removed from the disk. Examples are
Razer Cortex, Piriform Cleaner, etc.
Disk Defragmenter - This utility software helps to reduce the fragmentation and
hence, reduces the access speed. Defragmenting refers to rearranging files and
storing them in contiguous memory locations. Moreover, saves time in reading from
files and writing files to disk. Examples of disk defragmenters are Perfect disk,
Defragged, etc.
Backup Utility - This utility software helps to back up the files, folders,
databases, or complete disks. Moreover, backup refers to duplicating the disk
information so that the data can be restored if any data loss happens.
Advantages of Utility Software
1. Enhances performance.
2. Manages space.
3. Manages files and data.
4. Helps to customize interface and desktop.
5. Helps to remove useless files.
6. Keep the system safe and secure.
7. Helps to recover files after a loss.

Midterm Examination
References

1. Ratheeswari, K. (2018). Information communication technology in education. Journal of


Applied and Advanced research, 3(1), 45-47.
2. Buhalis, D., & O'Connor, P. (2005). Information communication technology revolutionizing
tourism. Tourism recreation research, 30(3), 7-16.
3. Peansupap, V., & Walker, D. H. (2006). Information communication technology (ICT)
implementation constraints: A construction industry perspective. Engineering, construction
and architectural management, 13(4), 364-379.
4. Duque, R., Collins, M., Abbate, J., Azambuja, C. C., & Snaprud, M. (2007). History of ICT.
Past, present and future of research in the Information society, 33-45.
5. Haigh, T. (2011). The history of information technology. Annual review of information
science and technology, 45(1), 431-487.
6. Hinostroza, J. E., Guzmán, A., & Isaacs, S. (2002). Innovative uses of ICT in Chilean
schools. Journal of Computer Assisted Learning, 18(4), 459-469.
7. Mahant, M., Shukla, A., Dixit, S., & Patel, D. (2012). Uses of ICT in Agriculture.
International Journal of Advanced Computer Research, 2(1), 46.
8. Scrimshaw, P. (2004). Enabling teachers to make successful use of ICT.
9. Floridi, L. (2007). A look into the future impact of ICT on our lives. The information society,
23(1), 59-64.
10. Van Reenen, J., Bloom, N., Draca, M., Kretschmer, T., Sadun, R., Overman, H., &
Schankerman, M. (2010). The economic impact of ICT. Final report, (2007/0020).
11. Williams, M. R. (1985). A history of computing technology. Prentice-Hall, Inc..
12. Harrington, W. G. (1984). A brief history of computer-assisted legal research. Law. Libr. J.,
77, 543.
13. Englander, I., & Wong, W. (2021). The architecture of computer hardware, systems
software, and networking: An information technology approach. John Wiley & Sons.
14. Petzold, C. (2000). Code: The hidden language of computer hardware and software.
Microsoft Press.
15. Zlatanov, N. (2016). Arduino and open source computer hardware and software. J. Water,
Sanit. Hyg. Dev, 10(11), 1-8.

Note: This module is collected from different site, book for students of ISPSC Main Campus. It is not
sold. It contains information about the subject LIVIN IN THE IT ERA. It is used to be a student's guide to fully
understand the lesson. Its contents come from various books and links verified by specialized specialists and
placed on one part of the paper so that students can find them more easily.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy