Ite01 Reviewer (Week 2-5)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

Introduction to ICT (WEEK 2) Data warehouses - designed to handle

large volumes of data and complex


ICT, or Information and Communication
analytical queries.
Technology (or technologies)
- is the infrastructure and components that - It integrates data from multiple sources
enable modern computing. and provides a centralized repository for
- The term has no single, universal
efficient querying and reporting.
definition. It is generally accepted to mean
all devices, networking components, Human Resources - users.
applications and systems that allow people
and organizations to interact in the digital
world. Models of Access to ICT
Devices - anything hardware.
Technology
- anything that makes our life easier Conduits - refer to the channels or
pathways through which individuals or

Components of ICT organizations gain access to ICT services,

Hardware - components are tangible and resources, and capabilities.

can be touched and manipulated. Literacy - It refers to an individual's ability

Software - constitutes a critical component. to access, comprehend, and effectively use

Refers to a set of instructions, programs, or digital information and communication

data that enable computers and other technologies to participate in society, the

devices to perform specific tasks or economy, and various aspects of daily life.

functions.
History of ICT in the Philippines
Telecommunications - interaction in other ● Before 1928 – telecommunications
devices to utilize other devices. was segmented.
● Nov. 28, 1928 – PLDT was given the
- a technology paradigm that involves
franchise to establish and operate
delivering computing services, including telephone services in the
servers, storage, databases, networking, Philippines.
software, and more, over the internet ("the ● 1930 – Philippines was first linked to
the outside world via
cloud") to offer faster innovation, flexible radiotelephone services.
resources, and economies of scale. ● Dec. 20, 1967 – PLDT became a
Databases - structured collection of data Filipino – controlled corporation
bought by Ramon Conjuangco
that is organized for efficient retrieval,
● 1970 – PLDT was nationalized by
modification, and management. To handle the government.
tasks like data storage, retrieval, updating, ● 1981 – PLDT became the country’s
telephone monopoly.
and security.
● 1986 – PLDT was reprivatized. 2. Job Opportunities
● 1987 – Cellular telephone network ➢ Enables organization to
● 1993 – Birth of the Philippine operate more efficiently
Internet ➢ Employing staff with ICT
● 1994 – We have our first internet skills is vital to the smooth
connection running of any business
-Dr. William Torres became the ➢ Use ICT systems effectively
Grandfather of the Philippine allows employees more time
Internet. to concentrate on areas of
● 2010 – 29.8M users of the internet. their job role that requires
● 2011 – Philippines was recognized soft skills
as the Social Networking Capital of ➢ Find jobs in the comfort of
the World. your home
● 2012 – Cybercrime Prevention Act of ➢ provide you a job that you
2012 can easily do at home.
● 2013 – There is a growth on our
Mobile networks. 3. Education
● 2014 – Fastest growing connections ➢ Adds value to teaching and
● 2017 – Internet connection learning
penetration ➢ Helps together information in
● Today’s ICT – The time we spend an easy way
online has an average of 3.2 hours ➢ HOTS
on mobile phones and 5.2 hours on ➢ Integral to the teaching
desktops. learning interaction
➢ Leave students better
prepared to deal with
Uses of ICT in Our Daily Lives ongoing technological
change
1. Communication ➢ ICT tools to communicate,
➢ Easier to communicate create, disseminate, store,
➢ Adopt a global perspectives towards and manage information
issues and ideas
➢ Engage in ethical decision-making 4. Socializing
➢ Cheapest means of communication ➢ Maintain social connections
➢ Helps a lot to build relationship and support networks
➢ Provides students in remote areas ➢ Provide young people with a
access to education. range of benefits, and
opportunities to empower
themselves
➢ Enabling people to
communicate and share
interest in many ways
➢ Faster and increasingly HISTORY OF COMPUTER (WEEK 3)
accessible to non-technical
communities. What is a computer?
❖ It is a programmable machine.
❖ It is an electronic device that
POSITIVE IMPACT OF ICT IN THE manipulates information, or data. It
SOCIETY has the ability to store, retrieve, and
process data.
1. Access to information ❖ It is a machine that manipulates data
2. Improved access to education according to a list of instructions.
3. New tools, new opportunities ❖ Computer is any device which aids
4. Communication humans in performing various kinds
5. Information management of computations or calculations.
6. Security ❖ Is an electronic device which helps
7. Participate in a wider society us to store and process our data or
8. Ability to perform “impossible” instructions at high speed with 100%
experiments through simulations accuracy.
9. Create interesting jobs ❖ A wide range of problems can be
solved with the help of computers.
The problems may be related to
NEGATIVE IMPACT OF ICT IN business, education, medical,
THE SOCIETY banking, etc.
❖ A computer mainly works on the
principle of Input – Process – Output
1. Job loss cycle.
2. Reduced personal interaction ❖ Most computers rely on a binary
3. Reduced physical activities system that uses two variables, 0
4. Cost and 1, to complete tasks such as
5. Competition storing data, calculating algorithms,
and displaying information.

Three Principal Characteristics of


Computer
❖ It responds to a specific set of
instructions in a well-defined
manner.
❖ It can execute a pre-recorded list of
instructions.
❖ It can quickly store and retrieve large
amounts of data.
Computers was born not for entertainment Smartphones and Tables
or email but out of a need to solve a serious
number-crunching crisis.

The word computer comes from the Greek


word “compute” i.e. exactly meaning
calculate.

Different types of Computers


Laptops
Desktop Computer

PCs and Macs


Servers ➔ IBM PC Compatible – this is the
most common type of personal
computer and it typically includes the
Microsoft windows operating system.
➔ Macintosh – All Macs are made by
one company, and they almost
always use the Mac OS X operating
system.

This type of computer began with the


Game Consoles original IBM PC that was introduced in
1981.

Other companies began creating similar


computers, which were called IBP PC
Compatible (often shortened to PC)
The Macintosh computer was introduced
in 1984, and it was the first widely sold
personal computer with a graphical user
interface or GUI.
Applications of Computer in our Lives Mechanical Ages
● Business - is when we first start to see connections
● Education between our current technology and its
● Healthcare ancestors.
● Retail and Trade - can be defined as the time between 1450
● Government and 1840.
● Marketing Science - A lot of new technologies are developed in
● Publishing this era as there is a large explosion of
● Arts and Entertainment interest in this area.
● Communication - Technologies like the slide rule (an analog
● Banking and Finance computer used for multiplying and dividing)
● Transport were invented.
● Navigation - Blaise Pascal: invented the Pascaline
● Working from home which was a very popular mechanical
● Military computer.
● Social and Romance - Charles Babbage: developed the
● Booking Vacations difference engine which tabulated
● Security and Surveillance polynomial equations using the method of
● Weather Forecasting finite differences.
● Robotics

Electromechanical Ages
Benefits of Computers in Normal - Now we are finally getting close to some
Circumstances technologies that resemble our modern-day
● Computer works fast. technology.
● Computer works consistently. - can be defined as the time between 1840
● Computer remembers a huge and 1940. These are the beginnings of
amount of stuff. telecommunication.
● Computers are loyal. - The telegraph was created in the early
● Computer works hard. 1800s.
- Morse code was created by Samuel
Basic Computing Periods –Ages Morse in 1835. The telephone (one of the
most popular forms of communication ever)
Premechanical age was created by Alexander Graham Bell in
1876. - The first radio developed by
- is the earliest age of information
Guglielmo Marconi in 1894. All of these
technology. It can be defined as the time
were extremely crucial emerging
between 3000B.C. and 1450A.D. We are
technologies that led to big advances in the
talking about a long time ago. When
information technology field.
humans first started communicating they
would try to use language or simple picture
drawings known as petroglyphs which were
usually carved in rock. Early alphabets were
developed such as the Phoenician alphabet.
Electronic Ages ● Allowing computers to become
- The electronic age is what we currently smaller, faster, cheaper, more
live in. energy-efficient and more reliable.
- It can be defined as the time between ● Still generated a great deal of heat
1940 and right now. that can damage the computer.
- The ENIAC was the first high-speed,
digital computer capable of being Third Generations
reprogrammed to solve a full range of ● The development of the integrated
computing problems. circuit was the hallmark of the third
- This computer was designed to be used by generation of computers.
the U.S. Army for artillery firing tables. ● Transistors were miniaturized and
- This machine was even bigger than the placed on silicon chips, called
Mark 1 taking up 680 square feet and semiconductors, which drastically
weighing 30 tons - HUGE. It mainly used increased the speed and efficiency
vacuum tubes to do its calculations of computers.
● It could carry out instructions in
billionths of a second.
Generations of Computer ● Much smaller and cheaper
compared to the second-generation
First Generation computers.
● The first computers used vacuum
tubes for circuitry and magnetic Fourth Generations
drums for memory, and were often ● The microprocessor brought the
enormous, taking up entire rooms. fourth generation of computers, as
● They were very expensive to thousands of integrated circuits were
operate and in addition to using a built onto a single silicon chip.
great deal of electricity, generated a ● As these small computers became
lot of heat, which was often the more powerful, they could be linked
cause of malfunctions. together to form networks, which
● relied on machine language, the eventually led to the development of
lowest-level programming language the Internet.
understood by computers, to ● computers also saw the
perform operations, and they could development of GUIs, the mouse
only solve one problem at a time. and handheld devices.
● Input was based on punched cards
and paper tape, and output was Fifth Generations
displayed on printouts. ● based on Artificial Intelligence (AI).
Still in development. The use of
Second Generations parallel processing and
● Transistors replaced vacuum tubes superconductors are helping to
and ushered in the second make artificial intelligence a reality.
generation of computers. ● The goal is to develop devices that
● One transistor replaced the respond to natural language input
equivalent of 40 vacuum tubes.
and are capable of learning and
self-organization.
● There are some applications, such
as voice recognition, that are being
used today.

The Web and the Internet (WEEK 4)

What is the Web?


● The World Wide Web – commonly
referred to as WWW, W3 or the
Web. What is Web Site?
● It is the part of the internet that - It is a collection of linked web pages that
contains websites and webpages. has a common theme or focus.
● It is an interconnected system of
public web pages accessible through
the Internet. Evolution of Web
● It is composed of pages linked by ● Web 1.0 (Read Only Static Web)
hypertext links that are written in ● Web 2.0 (Read-Write interactive
HTML. Web)
● The software to see the World Wide ● Web 3.0 (Read-write intelligent Web)
Web is called a web browser.
● It was invented by Tim Berners-Lee
in 1989. A British scientist. Web 1.0 (Read Only Static Web)
● It is a primary tool used by billions of ● Most read only web. It focused on
people to share, read, and write the company's home pages.
information to interact with other ● Dividing the world wide web into
people via Internet. usable directories.
● It means web is use as “Information
Portal”
● It started with the simple idea “put
content together”
Web 1.0 (Read Only Static Web) Web 2.0 (Read-Write interactive web)
Disadvantage Examples
● Read only web ● Social Networking
● Limited user interaction ● Blogs
● Lack of standards ● Wikis
● Video Sharing Sites
Advantages
● It was the inception of the WWW as Features
we see it today was built on top of it. ● Folksonomy – allows users to categorize
● It provided single access. It did not and classify information using freely chosen
allow malicious content to be keywords.
uploaded without permission from ● Rich User Interface – content is dynamic
the creator. and is responsive to user’s input. An
example would be a website that shows
local content.
Web 2.0 (Read-Write interactive web) ● User Participation – the owner of a
● It is a platform that gives users the website is not the only one who is able to
possibility to control their data. put content. Others are able to place
● This is about user-generated content content on their own by means of
and the read-write web. comments.
● People are consuming as well as ● Long tail – services are offered on demand
contributing information through rather than on a one-time purchase. This is
blogs or sites. synonymous to subscribing to a data plan
● Allow the user to interact with the that charges you for the amount of time you
page known as DYNAMIC PAGE; spend on the Internet.
instead of just reading a page, the
user may be able to comment, or Web 3.0 (Read-write intelligent web)
create a user account. ● Suggested name by John Markoff of the
New York Times for the third generation of
the web.
● In this generation, all the applications on
web or mobile will be upgraded with more
features. It applies the same principles as
Web 2.0.
● It will be more connected, open, and
intelligent, with semantic web technologies,
distributed databases, natural language
processing, machine learning, etc.
Web 3.0 (Read-write intelligent web) Uses of Internet
Types of Websites ➔ Look for information
● Business Website ➔ School works, jobs, and home purpose
● Infopreneur Website ➔ Send and receive electronic mail
● Ecommerce Website ➔ Video Teleconferencing
● Educational Website ➔ Buy and Sell product
● Media Website ➔ Social Networking
● Personal Website ➔ Watch and post video
● Nonprofit Website ➔ Games
● Brochure Website ➔ Take College course
● Portfolio Website ➔ Monitor home while away
● Entertainment Website ➔ Financial transactions
● Wiki or Community Forum Website ➔ Download music and movies

What is Internet? Internet Terms and Definition


● Short form is the “net” ● Internet – a global network of thousands of
● It is a globally connected network system computer networks linked by data lines and
facilitating worldwide communication and wireless systems
access to data resources through a vast ● Web – a collection of billions of web pages
collection of private, public, business, that you can view with a web browser
academic and government networks. ● Email – the most common method of
● You can access and view websites using a sending and receiving messages online
web browser. ● Social media – websites and apps that
● ARPA – Advanced Research Project Agent, allow people to share comments, photos,
started an experimental computer network. and videos
● 1982 – the word internet started ● Online gaming – games that allow people
● First “free net” created in Case Western to play over the internet.
Reserve University 1991. ● Software updates – operating system and
application updates can typically
Major Components of the Internet downloaded from the internet
Servers ● HTML – Hypertext Markup Language is a
➔ IP Address coding language used to tell a browser how
➔ Browser to place pictures, text, multimedia and links
➔ Domain Name System (DNS) to create a web page.
➔ internet Service Provider (ISP) ● URL – Uniform Resource Locator is a web
address used to connect to a remote
Types of Servers resource on the world wide web.
➔ Application Server ● Bit – is a single digit in the binary
➔ Web Server numbering system.
➔ Proxy Server ● Byte – generally consists of eight bits.
➔ Mail Server ● Upload – to upload is to transfer data from
➔ File Server your computer to another.
➔ Policy Server ● Download – to download is to transfer data
from another computer to your computer.
● HTTP – Hypertext Transfer Protocol Secure. The Netiquette and the Computer Ethics
This indicates that the web page has a (WEEK 5)
special layer of encryption added to hide
your personal information and passwords What is Netiquette?
from others. ● It is the short term for Internet Etiquette.
● Router – Combination is the hardware ● It is concerned with the proper way to
device that acts as the traffic cop for communicate in an online environment.
network signals arriving at your home from
your ISP. Ten Examples of Rule to Follow for Good
● Encryption – is the mathematical Netiquette
scrambling of data so that it is hidden from ➢ Avoid posting inflammatory or offensive
eavesdroppers. comments online.
● Web bot – a term that applies to programs ➢ Respect others’ privacy by not sharing
used on the internet. It performs repetitive personal information, photos, or videos that
functions, such as posting messages to another person may not want published
multiple newsgroups or doing searches for online.
information. ➢ Never spam others.
● Search Engine – specialized software that ➢ Show good sportsmanship when playing
lets www browser users search for info on online games
the web. ➢ Thank others who help you online.

Rules of Professional Online


Communications Known as Netiquette
➢ Remember the golden rule.
➢ Avoid slang, acronyms, and text talk
➢ Avoid “SCREAMING” in typed messages
➢ Proofread your message before sending
➢ Exercise good judgement when sharing
information with others
➢ Respect diversity in viewpoints

TEN COMMANDMENTS OF COMPUTER


ETHICS
➔ Rule 1: Practice the golden rule
➔ Rule 2: Adhere to the same standards of
behavior online that you follow in real life.
➔ Rule 3: Know where you are in cyberspace.
➔ Rule 4: Respect other people’s time and
bandwidth.
➔ Rule 5: Make sure you look good online
➔ Rule 6: Share expert knowledge
➔ Rule 7: Help keep flame wars under control.
➔ Rule 8: Respect other people’s privacy
➔ Rule 9: Don’t abuse your power
➔ Rule 10: Be forgiving of other people’s ➔ Computer Addiction – offline: generally
mistakes. used when speaking about excessive
gaming behavior, which can be practiced
What is Cybercrime? both online and online. Online: also known
● It is the characteristics of the culture of as internet addiction, which gets more
computers, information, technology and attention in general from scientific research
virtual reality. than offline computer addiction.
● A crime in which a computer is the object of
the crime. (Hacking, Phishing, spamming, Virtual Self
and child pornography) ➔ The persona you create about yourself
virtually
What is Cybercriminal?
● May use computer technology to access
personal information, business trade, Criminal Activities
secrets or use the internet for exploitative or ➔ Hacking - Unauthorized access of or
malicious purposes. interference with computer systems,
servers, or other information and
Republic Act no. 10175 communication systems. Unauthorized
● Cybercrime Prevention Act of 2012 access to corrupt, alter, steal, or destroy
● Is a law in the Philippines approved on electronic data using computers or other
September 12, 2012 which aims to address information and communication systems
legal issues concerning online interactions without the computer or system owner’s
and the internet. knowledge and consent. Infection of IT
Systems with Malware – if the act is
Republic Act no. 10173 committed against critical infrastructure
● Data Privacy Act of 2012 of the Philippines the penalty is between
● Is an act protecting individual personal 12-20 years reclusion temporal. Six years
information up to twelve years of imprisonment also
known as prison mayor.

Common Forms of Cybercrimes ➔ Computer-related forgery, fraud, and/or


➔ Copyright – the exclusive legal right, given identity theft - An attempt to obtain
to an originator or an assignee to print, sensitive information such as usernames,
publish, perform, film, or record literacy, and passwords, and credit card details and
to authorize others to do the same. (indirectly money), often for malicious
➔ Copyright Infringement – is a violation reasons. Maximum of Php 200,000 fine or
piracy or theft of a copyright holder’s prison mayor
exclusive rights through the unauthorized
use of a copyrighted material or work. ➔ Cyberbullying - The use of electronic
➔ Plagiarism – An act or instance of using or communication to bully a person, typically
closely imitating the language and thoughts by sending a message of an intimidating or
of another author without authorization threatening nature. The Anti-Bullying Act
of 2013 (RA 10627)
➔ Cybersex - Willful engagement, financial information from you. This is also
maintenance, control, or operation, directly known as “spoofing”.
or indirectly of any lascivious exhibition of ➔ Spam - is one of the more common
sexual organs or sexual activity with the aid methods of both sending information out
of a computer system for favor or and collecting it from unsuspecting people.
consideration. Penalty at least Php The mass distribution of unsolicited
200,000 and or prison mayor messages, advertising or pornography to
addresses which can be easily found on the
➔ Child Pornography - Is a form of child Internet through things like social
sexual exploitation. Unlawful or prohibited networking sites, company websites and
acts defined and punishable by Republic personal blogs.
Act No. 9775 or the Anti-Child Pornography ➔ Spyware - Software that collects personal
Act of 2009, committed through a computer information about you without you knowing.
system. Penalty of 12-20 years of They often come in the form of a ‘free'
imprisonment or reclusion temporal download and are installed automatically
with or without your consent. These are
➔ Cyber Defamation - Is an unprivileged difficult to remove and can infect your
false statement of fact which tends to harm computer with viruses.
the reputation of a person or company. ➔ Trojan Horses - may not be a term you're
Penalty of 6-12 years of imprisonment or familiar with, but there's a good chance you
prison mayor. or someone you know has been affected by
one. A malicious program that is disguised
as, or embedded within, legitimate software.
Internet Threats It is an executable file that will install itself
➔ Hacking - The process by which cyber and run automatically once it's downloaded.
criminals gain access to your computer. ➔ Viruses - Malicious computer programs that
➔ Malware - is one of the more common ways are often sent as an email attachment or a
to infiltrate or damage your computer. download with the intent of infecting your
Malicious software that infects your computer, as well as the computers of
computer, such as computer viruses, everyone in your contact list. Just visiting a
worms, Trojan horses, spyware, and site can start an automatic download of a
adware. virus.
➔ Pharming - is a common type of online ➔ Wi-Fi Eavesdropping - is another method
fraud. A means to point you to a malicious used by cyber criminals to capture personal
and illegitimate website by redirecting the information. Virtual “listening in” on
legitimate URL. information that's shared over an unsecure
➔ Phishing - is used most often by cyber (not encrypted) WiFi network.
criminals because it's easy to execute and ➔ Worms - are a common threat to computers
can produce the results they're looking for and the Internet as a whole. A worm, unlike
with very little effort. Fake emails, text a virus, goes to work on its own without
messages and websites created to look like attaching itself to files or programs. It lives
they're from authentic companies. They're in your computer memory, doesn't damage
sent by criminals to steal personal and or alter the hard drive and propagates by
sending itself to other computers in a
network – whether within a company or the
internet itself.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy