0% found this document useful (0 votes)
6 views17 pages

I.T Midterm Reviewer 1

The document provides an overview of the history and evolution of Information and Communication Technology (ICT), detailing its impact on various sectors such as education, research, entertainment, and business. It outlines the development of computer hardware and software from pre-modern computing to modern microprocessors and the internet's evolution from Web 1.0 to Web 3.0. Additionally, it discusses the internal components of computers, types of servers, and the significance of the internet and web technologies.

Uploaded by

Amira Villanueva
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views17 pages

I.T Midterm Reviewer 1

The document provides an overview of the history and evolution of Information and Communication Technology (ICT), detailing its impact on various sectors such as education, research, entertainment, and business. It outlines the development of computer hardware and software from pre-modern computing to modern microprocessors and the internet's evolution from Web 1.0 to Web 3.0. Additionally, it discusses the internal components of computers, types of servers, and the significance of the internet and web technologies.

Uploaded by

Amira Villanueva
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

INFORMATION AND COMMUNICATION ● The continued development of the

TECHNOLOGY (Chapter 1) technological system will inevitably lead to


History of ICT destruction of humanity.
InformationTechnology (IT) History of Hardware and Software
➔ It encompasses the utilization, creation, and 1. Pre-Modern Computing (Abacus) - Abacus, a
oversight of computer-based systems, software, counting device dating back to ancient civilizations.
and networks for the storage, processing, 2. First Generation Computers (ENIAC & UNIVAC) -
transmission, and retrieval of data. Electronic Numerical Integrator and Computer (ENIAC) :
➔ There is no universal definition for ICT due to Developed during World War II (1943-1946), ENIAC was
how broad it is, but it is usually agreed upon the first general-purpose electronic digital computer,
that it has more to do with communication than using vacuum tubes for calculations. UNIVAC I: The first
Information Technology does. commercially produced computer (1951), used for
➔ ICT is more inclusive of technologies that allows business and scientific applications.
you to communicate with others and is a direct 3. Second Generation Computers (Transistors & IBM)
extension of IT. Transistors: Replaced vacuum tubes, leading to smaller,
Impact faster, and more reliable computers. IBM 1401:
Education Introduced in 1959, it became one of the most popular
● ICT has profoundly impacted education by second-generation computers for business use.
introducing e-learning platforms, online 4. Third Generation Computers (Integrated Circuits &
courses, and digital libraries, revolutionizing Mainframes) - Integrated Circuits (ICs): Multiple
transistors on a single chip, greatly increasing computing
access to knowledge dissemination.
power and efficiency. Mainframes and Minicomputers:
Research IBM System/360 (1964) marked the shift towards
● IT supports scientific research by providing compatible families of computers, while DEC’s PDP
computational resources, data processing tools series (1960s) popularized minicomputers.
5. 1970s - Present (Microprocessors, PC, Mobile
and specialized software for tasks such as data
Computing) - Microprocessors: Intel 4004 (1971) and
analysis, simulations, and modeling.
subsequent chips revolutionized computing by
Entertainment
integrating all components of a computer on a single
● ICT has significantly transformed the
chip. Personal Computers (PCs): IBM PC (1981) and
entertainment industry by revolutionizing how
clones popularized PCs for home and business use,
content is created, distributed, and consumed.
leading to a surge in software development and user
Business
accessibility. Mobile Computing: Proliferation of
● ICT serves as the backbone for critical functions
smartphones and tablets, leveraging advances in
such as enterprise resource planning (ERP),
microelectronics and wireless technologies.
customer relationship management (CRM), and
Types of Computers
supply chain management.
1. Supercomputers
Digital Forensic
2. Mainframes
● IT plays a crucial role in digital forensics, aiding
3. Servers
in the investigation and analysis of digital
4. Personal Computers
evidence in legal and criminal inquiries.
5. Embedded System
Theodore Kacyznski (The Unabomber)
Internal Components of a Computer
● Humans are biologically and psychologically
Central Processing Unit
maladapted to life in a technological society.
➔ The brain of the computer that performs ● Computer software refers to a collection of data
calculations and executes instructions. or computer instructions that tell the computer
Motherboard how to work.
➔ The main circuit board that connects all internal ● It is the intangible component of a computer, as
components and allows them to communicate. opposed to the physical hardware.
Memory (RAM) System Software
➔ Temporary storage used by the CPU to store System software is essential for managing the hardware
data that is being processed. and creating an environment for applications to run. The
Storage Drives (HDD/SSD) main component of system software is the operating
➔ Devices that store data permanently. Hard Disk system (OS).
Drives (HDD) use spinning disks, while A. Operating System (OS)
Solid-State Drives (SSD) use flash memory. - The core software that manages hardware
Power Supply Unit (PSU) resources and provides common services for
➔ Converts electrical power from an outlet into application software. Popular operating systems
usable power for the computer's internal include Microsoft Windows, macOS, Linux, and
components Android. The OS handles tasks like memory
Graphics Processing Unit (GPU) management, process scheduling, file
➔ Handles rendering of images, video, and management, and device control.
animations. Essential for gaming, video editing, B. Device Drivers
and graphic design. - These programs allow the OS to communicate
➔ The Graphics Processing Unit (GPU) is also used with hardware devices like printers, graphics
for computing tasks beyond rendering images cards, and keyboards.
and videos e.g. mining cryptocurrencies. C. Utility Programs
Peripheral Devices - These perform maintenance tasks such as virus
Input Devices scanning, disk cleanup etc.
➔ Allow users to input data into the computer. Application Software
Examples include keyboards, mice, scanners, Productivity Software
and microphones. - Tools that assist users in creating documents,
Output Devices spreadsheets, presentations, and other
➔ Display or output data from the computer. work-related tasks.
Examples include monitors, printers, and - Examples include Microsoft Office (Word, Excel,
speakers. PowerPoint), Google Workspace, and Adobe
Storage Devices Acrobat.
➔ External devices for storing data. Examples Media Players
include external hard drives, USB flash drives, - Software for playing audio and video files.
and memory cards. Examples include VLC Media Player, Windows
Network Devices Media Player, and iTunes.
➔ Enable computers to connect to networks. Web Browsers
Examples include modems, routers, and - Applications for accessing and navigating the
network adapters. internet.
Computer Software - Examples include Google Chrome, Mozilla
Firefox, Microsoft Edge, and Safari
Graphics and Design Software 1965
- Tools for creating and editing images, videos, - First wide-area network experiment by
and animations. Lawrence Roberts and Thomas Merrill.
- Examples include Adobe Photoshop, Illustrator, 1966
and Premiere Pro. - Lawrence Roberts joins ARPA to develop
Communication Software ARPANET.
- Programs that facilitate communication through 1969
email, instant messaging, and video - ARPANET was established, connecting four
conferencing. nodes at UCLA, SRI, UCSB, and the University of
- Examples include Microsoft Outlook, WhatsApp, Utah.
and Zoom 1970
Games and Entertainment Software - First cross-country link installed by AT&T.
- Applications designed for entertainment, 1972
including video games and other interactive - Ray Tomlison introduces network email.
media. 1973
THE WEB AND THE INTERNET (Chapter 2-3) - Vint Cerf and Bob Kahn develop TCP/IP Protocol.
The Internet 1974
➔ The internet is a worldwide network of - First use of the term “Internet” to describe the
interconnected computer networks that use the interconnected network.
Internet Protocol (IP) suite to enable 1976
communication between networks and devices. - Ethernet developed by Robert Metcalfe.
➔ It is often described as a ”network of networks” 1978
because it connects private, public, academic, - TCP split into TCP and IP.
business, and government networks, ranging 1981
from local to global in scope. These connections - BITNET and CSNET were established for
are made possible through a variety of academic networking.
technologies, including electronic, wireless, and 1984
optical networking. - First use of the term “Internet” to describe
1957 interconnected networks.
- Time sharing - share the processing power of 1985
one computer with multiple users. - NSFNET created to promote networking in
1961 academia
- Leonard Kleinrock publishes the first paper on 1988
packet-switching theory. - NSFNET upgraded to T1 speed (1.544 Mbps)
1962 1990
- J.C.R Licklider conceives the idea of a galactic - ARPANET decommissioned.
network of interconnected computers. 1991
1964 - Tim Berners-Lee introduced the World Wide
- Paul Baran and Donald Davies independently Web.
develop concepts of packet switching. 1993
- Mosaic web browser released, popularizing the
Web.
1995 Types of ISP:
- NSFNET is decommissioned, and Internet 1. National ISP
backbone traffic moves to private networks. 2. Regional ISP
2000 - present CHECK YOUR UNDERSTANDING
- Continued growth and expansion of the Question :
Internet, with significant advances in speed, You’re a historian documenting the evolution of galactic
accessibility, and applications such as social communication technologies. You stumble upon an
media, e-commerce, and cloud computing. ancient earth document from the 1960s about a
Major Components of the Internet visionary who imagined a network connecting every
A. Servers planet in the galaxy. Which earthling’s idea is this?
Types of Servers: Answer :
1. Application Server The Dreamer of the Galactic Network, JCR Licklider.
- business logic, application program Question :
2. Web Server You’re an intergalactic traveler on a mission to establish
- HTML pages, files, serve requests communication between earth and the distant planet
3. Proxy Server Zog to connect the two planets, you need a network
- Intermediary, endpoint device, user request that can handle data from multiple galaxies. Which of
4. Mail Server the following options would be your best choice for this
- Incoming e-mail, outgoing email, delivery cosmic connection?
5. File Server Answer :
- Central storage, data files, network access Massive, universe-spanning network of interconnected
6. Policy Server systems using the Internet Protocol (IP) suite.
- Security, policy-based network, authorization, The World Wide Web
tracking control - It is commonly referred to as the Web, is an
B. Browser information system that allows users to access
documents and other resources through
Uniform Resource Locator (URL). These
resources can be connected by hyperlinks and
are accessible via the Internet.
C. Domain Name System - Information on the Web is transferred using the
Hypertext Transfer Protocol (HTTP). Users
interact with the Web through web browsers,
while the content is hosted on web servers. It is

D. IP Address (Internet Protocol) important to note that the Web is not the same
as the Internet; the Internet existed for over
twenty years before the Web was developed,
serving as the foundation for Web technologies.

E. Internet Service Provider 1988


- The World Wide Web begins as a CERN project
called ENQUIRE, initiated by the British scientist
Tim Berners-Lee.
1990 - One of the first known Web purchases takes
- The world’s first website and server go live at place: a pepperoni pizza with mushrooms and
CERN, running in Tim Berners-Lee’s NeXT extra cheese from Pizza Hut.
computer. The server bears the message , “This - Yahoo! was created by Stanford University
machine is a server. DO NOT POWER DOWN” graduate students Jerry Yang and David Filo,
- He developed the first Web browser called originally named “Jerry and David’s Guide to the
WorldWideWeb. World Wide Web”.
- Archie, the first tool to search the internet, is Evolution of Web
developed by McGill University students Alan Web 1.0 (Read Only) Decentralized
Emtage. ● Initial Version: Known as Web 1.0.
1991 ● Content Creation: Small number of individuals
- The term “surfing the internet” is coined and created content for a broad audience.
popularized. ● Information Access: Allowed direct access to
- Tim Berners-Lee posts the first photo on the original sources of information.
Web, featuring the band “Les Horribles ● Design Purpose: Simplified information
Cernettes”. discovery, prioritizing information seeker’s
- The line-mode browser launches, becoming the needs.
first readily accessible browser for the World ● Nickname: Referred to as the ”read-only” Web.
Wide Web. ● Features: Lacked forms, images, controls, and
- The first Web server outside of Europe was up interactive features of the modern internet.
to SLAC, the Stanford Linear Accelerator Center Web 2.0 (Participatory, Centralized)
in California. ● Content Creation: Extensive creation by many
1993 users.
- CERN management decided that the Web ● Information Access: Interactive and
should act as an open standard for all to use. participatory.
- The National Center for Supercomputing ● Design Purpose: Fosters interaction and
Applications (NCSA) releases Mosaic 1.0, the participation.
first web browser to become popular with the ● Nickname: Referred to as the ”participatory
public. social Web.
- The New York Times writes about Mosaic and ● Features: Emphasizes users, communities,
the World Wide Web for the first time, partnerships, discussions, and social media.
describing it as a “map to the buried treasure of ● Popularized through mobile internet access and
the Information Age”. apps like Tiktok, Twitter, Snapchat, Uber, Google
- Marc Andreessen proposes the IMG HTML tag Drive and Youtube.
to allow the display of images on the Web. Web 3.0 (No Intermediaries, Decentralized)
1994 ● Content Creation: Emphasizes decentralization
- The First International World Wide Web and openness.
conference hailed as the “Woodstock of the ● Information Access: Enhanced user utility
Web” was organized at CERN by Robert Cailliau. through decentralized platforms.
- Approximately 11 million American households ● Design Purpose: Utilizes AI and ML for
are “equipped to ride the information intelligent, autonomous internet functions.
superhighway”.
Functions as a ”global” by analyzing content
compared to
conceptually and contextually. Web 1.0
● Nickname: Referred to as the ”read, write, Static websites The dawn of Dispersed
executre Web. Originally referred to as web-based apps processes

theSemantic Web by Tim Berners-Lee. Totally Features include Combination of


● Features: Shift from centralized platforms (e.g. web-based cloud-based the World Wide
content document Web with a
Facebook, Google, Twitter) to distributed and exploration storage and formalized
anonymous services. video playback, system for
etc. representing
● IPFS and STEEMIL (Examples) information
Web 3.0 Some of the component that are existing and
Linking and Everything is Computing in
are in use today: bookmarking shifting online the edge,
relevant content with data and streaming
1. Cross Platforms
programs being videos in real
2. Web Decentralized Structure housed on time
remote servers.
3. Confidence in Blockchain Innovation
4. The Rise of Cryptocurrency Type of Website : E-Commerce
Key Differences Between Web Versions Features : Direct purchases, Shopping cart functionality,

Web 1.0 Web 2.0 Web 3.0 and Credit card payment options.
Example : Amazon
Read Only Socialize, write, Execute, write,
and read socialize, read
Type of Website : Business
Original Material Shared Material Combined Features : Represents a specific business, Branded with
materials
the Business’ logo, and Communicates products or
The World Wide Scriptable Web The World Wide services offered.
Web as a visual Web of linked
and interactive data Example : Apple (Philippines)
experience
Type of Website : Entertainment
Website Blogs and wikis Waves and
homepages real-time feeds Features : Purely for entertainment purposes.
Example : Netflix
Web, file, SE, The use of IM, Digital assistants
email, P2P, file Ajax, JavaScript may help you
Type of Website : Portfolio
sharing, content, frameworks, and organize your
and business Adobe Flex life’s data, Features : Showcases examples of past work, used by
portals ontologies, and
service providers to display quality of work, focused on
databases
collecting work samples.
Maintain your Pay attention to Pay attention to
attention on the the locals each person Example : Linked in
business at hand
Type of Website : Media
Banner Interactive Behavioral
Features : Collect news stories and reporting, may
advertising advertising advertising
overlap with entertainment websites, and include
reported places and possibly entertainment.
Key Features Between Web Versions Example : BBC
Version 1.0 Version 2.0 Version 3.0
Type of Website : Brochure
User-server Interaction with Web-based, Features : Simplified form of business websites,
interaction is users is intelligent apps,
disabled enhanced and features provides basic information about a business, and
suitable for business not heavily reliant on online individuals creating content, and it didn’t have many
presence. features. What nickname did humans give this early
Example : Mang Inasal version of the web?
Answer : The Read-Only Web
Type of Website : Nonprofit
Question : You’ve just been hired as the chief
Features : Represents a nonprofit organization,
information officer for a futuristic space colony. Your
facilitates donations, and provides information about
first task is to set up a system that allows all colonists to
the nonprofit to potential donors.
access vital documents and resources, no matter where
Example : Philippine Red Cross
they are in the galaxy. Which system will you implement
Type of Website : Educational to ensure easy access to these resources?
Features : Represents educational institutions or online Answer : A solar system-wide network that connects
course providers and provides educational materials or planets through the World Wide Web.
information about the institutions. Question : As the captain of a spaceship, your crew
Example : Harvard University relies heavily on interacting with the internet for
communication and entertainment. You’ve noticed that
Type of Website : Infopreneur
the web version used in your ship allows everyone to
Features : Combines aspects of business and
create and share content, making it highly interactive.
E-Commerce websites, sells information products like
Which version of the web are you using?
courses, tutorials, videos, or eBook, and represents an
Answer : Web 2.0, the participatory social Web.
online business model focused on selling knowledge.
Online Communication and Collaboration
Example : MasterClass
Types of Online Communication
Type of Website : Personal ● Communicating effectively online is a crucial
Features : Created for personal expression, includes digital skill for both the workplace and
personal blogs, vlogs, and photo diaries, and not university studies.
necessary aimed at making money. ● Text-based: Email, discussion forums, texts,
Example : NeilPatel by NP digital messaging, and chat.

Type of Website : Web Portal ● Video and audio: Online meetings and

Features : Designed for internal use by business, conferences, screen and application sharing,

organizations, or institutions, collects information from virtual worlds, and gaming.

various sources in one place, and often includes login ● Social media: Platforms that use text, images,

and personalized views for different users. and video.

Example : Microsoft Advantages of Online Communication


1. Flexibility
Type of Website : Wiki or Community Forum 2. Increased productivity and efficiency
Features : Collaborative content creation by multiple 3. Skill development
users and allows users to make tweaks and changes. 4. Cost Efficiency
Example : Reddit Disadvantages of Online Communication

Check your understanding 1. Word or time limits

Question : You’re a historian on a distant planet and 2. Lack of visual or tonal cues

discover an ancient earth document describing the first 3. Conversation pace

version of the web. The web was simple, with only a few 4. Difficulty retracting statements
Collaborative Documents abundant with information about our identities,
residences, and means of sustenance. Until the
advent of computers around 1990, this
information was primarily written on paper,
published in newspapers or magazines, and
stored in libraries and office files.
● Information technology, commonly known as IT,
is generally the use of technology to solve
problems.
Online Meetings and Videoconferencing
● It encompasses a broad spectrum of tasks,
including the development of hardware and
software, network administration, database
management, and tech support.
INFORMATION COMMUNICATIONS TECHNOLOGY:
● ICT encompasses technologies facilitating
communication, collaboration, and integration
across various information systems. It includes
Microsoft 365 Productivity Tools telecommunication networks, internet
1. Microsoft Excel technologies, multimedia systems, and digital
2. Microsoft Word tools that enable the exchange and sharing of
3. Microsoft Powerpoint information.
Check your Understanding IT/ICT in education
Question : You’re an AI from the distant future tasked - Students now engage in remote learning, access global
with teaching a history class about the evolution of educational resources, and participate in interactive
online communication on earth. When discussing the learning experiences facilitated by digital technologies.
Covid 19 pandemic, which significant change in This transformation has democratized education,
communication practices would you highlight? enhancing accessibility and flexibility for learners across
Answer : The widespread adoption of online diverse ages and backgrounds.
communication and collaboration tools. Entertainment
Question : Imagine you’re living in a world where people -Digital entertainment platforms, streaming services,
only communicate via telepathy, but you’ve discovered online gaming, and social media networks have become
an ancient earth concept called “Online components of our daily lives, providing users
Communication.” What might be a challenge of using worldwide with a wide range of immersive experiences.
text-based communication from the past compared to ICT drives ongoing innovation in entertainment,
your current telepathic chats? enhancing accessibility, interactivity, and personalization
Answer : Text lacks the visual or tonal cues of of content tailored to user preferences.
face-to-face interaction. Business
Important Notes (Chapter 1) : - Businesses leverage ICT to streamline operations,
INFORMATION TECHNOLOGY boost productivity, and achieve competitive advantages
● Information technologies are powerful because in global markets. Through e- commerce platforms,
people have a strong desire for information, and digital marketing strategies, and data analytics tools,
IT facilitates easy access to it. The world is powered by ICT, businesses expand their reach to global
customers, optimize processes, and drive innovation in 3. Leftist activism is a form of pseudo-rebellion
product development and service delivery. that serves to distract attention from the
IT System problem of technology
- Every hardware and software used within a network of HISTORY OF HARDWARE AND SOFTWARE
individuals constitutes an IT system. This includes - The history of information technology encompasses
anything used to help you store, retrieve, manipulate, the development of both computer hardware and
and communicate data. software. Charles Babbage is recognized for constructing
Research the first mechanical computer in the 1820s. More than a
- IT supports scientific research by providing century later, in 1946, a team at the University of
computational resources (e.g. computer algebras, Pennsylvania unveiled the first programmable,
graphing softwares etc.), data processing tools, and general-purpose computer, known as the Electronic
specialized software for tasks such as data analysis, Numerical Integrator and Computer (ENIAC). The ENIAC
simulations, and modeling in fields like physics, biology, weighed 30 tons and occupied 1800 square feet of
chemistry, mathematics, and environmental science. space. It supported most hardware and software
Digital forensics components that modern programmers recognize. The
- Digital forensics utilizes specialized tools and ENIAC could read inputted data, hold information in
techniques to assist experts in retrieving, preserving, memory, step through programming instructions, create
and examining data from computers, mobile devices, and call sub-programs, loop through code, and print
and digital storage media. output.
Treatise against Technology - Eventually, these shared tasks were consolidated into
Theodore Kacyznski (The Unabomber) computer programs known as operating systems. The
INDUSTRIAL SOCIETY AND ITS FUTURE Operating System (OS) functions as the brain of the
- Kaczynski was an American Mathematician and computer, managing all its components. Elements such
prodigy specializing in Complex Analysis. Around 1971, as the computer mouse, keyboard, display monitor,
he left academia and pursued a primitive lifestyle. Upon motherboards, and storage drives come together to
witnessing the destruction of the wilderness around his form a functional computer only when the OS
cabin, he concluded that primitive way of living was recognizes them and coordinates their actions. When
becoming impossible. He seeks to fight the you move your mouse, tap your screen, type on your
advancement of technology through extreme methods keyboard, or make a phone call, the OS interprets these
such as nation-wide bombing. actions and instructs the components on how to
- Kacyznski murdered 3 people and injured several respond to achieve the desired result.
others in his campaign against people he believed to be Computer Hardware and Software
advancing modern technology TYPES OF COMPUTERS
Summarized from “Industrial Society and Its Future” by 1. Supercomputers: These are powerful machines used
Theodore Kacyznski for complex calculations, theorem proving, weather
1. Modern technology constitutes an indivisible, forecasting, and simulations.
self- perpetuating system that is not under 2. Mainframes: powerful systems used by businesses
human control. and government organizations for critical applications,
2. Since the technological system cannot be bulk data processing, and large-scale transaction
controlled, and hence cannot be reformed, a processing.
revolutionary overthrow of the system is
necessary to avert catastrophe.
3. Servers: These are computers that provide data, ➔ Samuel Morse invents the telegraph,
resources, and services to other computers over a revolutionizing long-distance communication by
network. transmitting electrical signals over a wire laid
4. Personal computers: General purpose computers between stations.
used for different personal tasks e.g. desktops, laptops, ➔ Alexander Graham Bell patents the telephone,
tablets. allowing voice communication over distances.
5. Embedded Systems: Specialized computers integrated The Electronic Period (1940...)
into other devices like cars, appliances, and medical ➔ The dawn of the Electronic Numerical Period
equipment. Integrator and Computer (ENIAC), the first
The Evolution of Information and communication electronic and general purpose computer,
Technology (ICT) marked a revolutionary period in computing.
The Premechanical Period (8000 BCE - 1450) ➔ The transistor was invented in 1947. The
➔ Humans started communicating with one electronic device has properties and functions
another using words and pictograms carved in similar to vacuum tubes, but it is lightweight
rocks. They started to write symbols as and faster. The first full transistor was
substitutes for pictures to depict ideas, objects, developed in 1957 and was faster than vacuum
and animals. computers and was faster than vacuum
➔ Humans realized that stone tablets are too computers.
heavy and bulky. The information to be stored ➔ The Integrated circuit (IC) is a device that is
was growing and was becoming enormous, and composed of a group of transistors and circuit
writing these pieces of information in stone elements compressed in a single package.
tablets was impractical. ➔ Circuits are integrated in a chip or a single
➔ When paper was finally produced from the package, limiting the distances between
papyrus plant, storing information was components, resulting in a faster operating
revolutionized. They compiled records written speed.
on pieces of paper and bound them together, ➔ In 1999, the first BlackBerry smartphone was
eventually giving birth to books. introduced, paving the way for mobile
➔ In the late stages of this period, humans started communication and computing.
using the numerical system. ➔ Apple launched the iPod in 2001, leading to the
➔ They started to optimize and invent devices and era of portable digital media.
techniques in counting. The "Abacus" was the ➔ Apple released the iPhone in 2007,
most popular device created from China. revolutionizing smartphones with its touch
The Mechanical Period (1450-1840) interface and app ecosystem.
➔ The highlight of this period is the advent of the ➔ In 2003, the first Android phone, the Wit
mechanical calculator called Pascaline, which Dream, was released, introducing competition
was invented by the famous mathematician and innovation in the smartphone market.
inventor Blaise Pascal along with Wilhelm ➔ Apple introduced the iPad in 2010, popularizing
Schickard. tablet computing.
➔ Charles Babbage invented the Analytical Engine, ➔ In 2020, the global rollout of 5G technology
which is considered the first programmable begins, promising faster and more reliable
mechanical computer. This earned him as the internet connections.
"Father of Computers.”
➔ From the first telegraph to the smartphones of Question : HOW SHOULD WE ASK A QUESTION IN AN
today, each breakthrough has built upon the ONLINE MEETING?
last, pushing the boundaries of what's possible. Answer : Use the “Raise your Hand” button.

THE NETIQUETTE AND THE COMPUTER ETHICS Question : WHY SHOULD YOU NEVER SEND EMAILS,
CYBER/COMPUTER ETHICS TEXTS, OR IMS WHEN YOU’RE ANGRY OR UPSET?
● It refers to the code of responsible behavior on Answer : You may not have the best judgment when
the Internet. your emotions are running high.
● This includes social media etiquettes and CYBERCRIME
communication etiquettes. ● Cybercrime refers to illegal activities that
NETIQUETTES involve targeting or utilizing computers,
1. ETHICAL computer networks, or networked devices.
- It means we should share our information and TYPES OF CYBERCRIME
expertise online without any copyright 1. EMAIL AND INTERNET FRAUD
violations. 2. IDENTITY FRAUD
2. RESPECTFUL 3. FINANCIAL THEFT OR CARD PAYMENT DATA
- It means we should not indulge in any insulting, 4. THEFT AND SALE OF CORPORATE DATA
degrading or intimidating online behavior which 5. CYBER EXTORTION
is cyber bullying. 6. RANSOMWARE ATTACKS
3. RESPONSIBLE 7. CRYPTOJACKING
- It means we should respect other people’s 8. CYBER ESPIONAGE
privacy and the freedom or personal expression. 9. SYSTEMS INTERFERENCE
CYBER BULLYING 10. INFRINGING COPYRIGHT
● This happens when a person is harassed, 11. ILLEGAL GAMBLING
humiliated, embarrassed, threatened or 12. SELLING ILLEGAL ITEMS ONLINE
tormented through the use of digital 13. SOLICITING, PRODUCING, OR POSSESSING
technology. CHILD PORNOGRAPHY
SOCIAL MEDIA ETIQUETTES EXAMPLES OF CYBERCRIME
1. Protecting personal information 1. MALWARE ATTACKS
2. Being careful with online friendships 2. PHISHING
3. Managing sensitive and confidential files 3. DISTRIBUTED DOS ATTACKS
4. Beware of fake news HOW TO PROTECT YOURSELF AGAINST CYBERCRIME
ONLINE MEDIA ÉTIQUETTES 1. Keep software and operating system updated
1. The importance of being precise 2. Use anti-virus software and keep it updated
2. Mindfulness during online meetings 3. Use strong passwords
3. Politeness and digital behavior 4. Never open attachments in spam emails
4. Building digital credibility 5. Do not click on links in spam emails or untrusted
CHECK YOUR UNDERSTANDING websites
Question : WHY SHOULD WE NOT USE CAPITAL LETTERS 6. Do not give out personal information unless
WHILE COMMUNICATING? secure
Answer : You are shouting. 7. Contact companies directly about suspicious
requests
8. Be mindful of which website URLs you visit 2. MULTIEXPERIENCE
9. Keep an eye on your bank statements ● Multiexperience refers to the various
overlapping modes of interaction and interfaces
CURRENT TRENDS
between a user and digital technology.
1. Hyper Automation
● It’s about creating a cohesive experience across
● It is the integration of advanced technologies to
web, mobile, wearable, conversational,
automate tasks and processes beyond
immersive technologies, and more.
traditional automation.
EXAMPLES
● Combines technologies like AI, ML, RPA, and
Domino’s Anyware
decision-making tools.
- This platform enables customers to order pizza
● Aims to automate as many business and IT
using various devices and interfaces, including
processes as possible
smartwatches, voice assistants, and social
EXAMPLES
media platforms.
Retail
BMW India’s Contactless Experience
- In retail, hyper automation can optimize
- This allows customers to explore and purchase
inventory management, customer service, and
vehicles through a fully digital and contactless
supply chain operations.
process, integrating web, mobile, and
Healthcare
augmented reality (AR) touchpoints.
- Hyper Automation can improve regulatory
Retail Apps
compliance and fraud detection in healthcare.
- Many retail apps now allow users to check stock
Banking
availability, add items to their grocery list, and
- In the banking sector, hyper automation can
communicate with customer service through
enhance customer onboarding, loan
web apps, mobile apps, and wearables
processing, and compliance.
Benefits of Multiexperience
Accounts Payable
1. Enhanced customer engagement
- Hyper Automation can streamline the AP
2. Increased customer satisfaction
process by automating the receipt, processing,
3. Brand differentiation
and payment of invoices.
4. Improved efficiency
Benefits of Hyper Automation
5. Increased revenue
1. Increased efficiency
Multiexperience Challenges
2. Enhanced accuracy
1. Consistency across platforms
3. Scalability
2. Integration complexity
4. Improved compliance
3. Security and privacy
5. Employee empowerment
4. Performance optimization
Hyper Automation Challenges
5. User behavior understanding
1. Difficulty and Time Consumption
6. Development and maintenance costs
2. Measuring success
7. Testing and quality assurance
3. Overwhelming marketplace of tools
3. DEMOCRATIZATION
4. Change management
● The process of making advanced technologies
accessible and usable by a broader, including
those without specialized technical skill.
EXAMPLES Virtual Assistants
Printing Press - AI-powered virtual assistants help with tasks like
- One of the earliest examples is the invention of scheduling, reminders, and information
the printing press by Johannes Gutenberg in the retrieval, enhancing productivity.
15th century. Chatbots
Affordable Computers - These AI-driven tools provide quick responses
- Various types of computers are available at and solutions to user queries, improving
different price points , making them accessible customer service and support.
to a broader audience. Exoskeletons
Online Information Access - Wearable devices that enhance physical
- The internet has made information more easily capabilities, often used in rehabilitation and
accessible. industrial applications.
Benefits of Democratization Prosthetic Limbs
1. Enhanced employee productivity - Advanced prosthetics that restore or enhance
2. Innovation limb functionality for individuals with
3. Increased agility and efficiency amputations.
4. Increase customer satisfaction 3D Bioprinting
Drawbacks of Democratization of Technologies - This technology is used to create biological
1. Inequality structures, such as tissues and organs,
2. Negative impact on society potentially revolutionizing medical treatments.
3. No privacy Pros of Human Augmentation
4. Negative impact on employment 1. Enhanced capabilities and collaboration
4. HUMAN AUGMENTATION 2. Optimized performance
● Enhancing human abilities through the use of 3. Range of Applications - healthcare,
technology. This can include physical, cognitive, manufacturing, finance and military
and sensory enhancements. Cons of Human Augmentation
EXAMPLES 1. Ethical questions
Virtual Reality (VR) 2. Perceptions of unfair competition
- VR creates immersive digital environments that 3. Other potential risks
can enhance learning, training, and 5. DATA POLICING
entertainment experiences. ● Data policing refers to the practices and
Augmented Reality (AR) regulations involved in monitoring, managing,
- AR overlays digital information onto the real and ensuring the responsible use of data.
world, improving tasks like navigation, ● Crucial for protecting privacy, ensuring data
maintenance, and education. security, and maintaining compliance with legal
Mixed Reality and ethical standards.
- This combines elements of both VR and AR to EXAMPLES
create interactive experiences that blend the Crime Analytics
physical and digital worlds. - This involves analyzing large datasets to identify
patterns and trends in criminal activity.
Predictive Crime Profiling EXAMPLES
- Using data to predict where and when crimes Recommender Systems
are likely to occur. - These systems use supervised learning to
Network Analysis of Criminal Gangs suggest products, services, or content to users
- This application uses data to map out the based on their preferences and past behavior.
relationships and interactions within criminal Computer Vision
networks. - Unsupervised learning is used in computer
Intelligence Gathering vision to identify patterns and features in
- Leveraging various data sources, including social images without labeled data.
media and surveillance data, to gather Fraud Detection
intelligence on criminal activities and potential - Semi-supervised learning helps in detecting
threats. fraudulent activities by combining a small
Benefits of Data Policing amount of labeled data with a large amount of
1. Crime prevention unlabeled data.
2. Resource optimization Self-Driving Cars
3. Improved decision-making - Reinforcement learning is crucial for training
4. Enhanced investigations autonomous vehicles to make decisions and
5. Transparency and accountability navigate safely.
6. Community trust Video Games
7. Cost Savings - Reinforcement learning is used to create
8. Enhanced collaboration intelligent agents that can learn and adapt to
Drawbacks of Data Policing different game scenarios.
1. Privacy concerns Spam Detection
2. Bias and discrimination - Supervised learning is employed to filter out
3. Over-reliance on technology spam emails by recognizing patterns in the
4. Data security risks content.
5. Cost and resource allocation Market Prediction
6. Ethical issues - Supervised learning models predict stock and
7. Accuracy and reliability housing market trends based on historical data.
8. Public trust Customer Segmentation
6. MACHINE LEARNING - Unsupervised learning helps businesses
● Machine learning is a subfield of artificial segment their customers into different groups
intelligence that involves training algorithms on based on purchasing behavior and other factors.
data sets to develop models. Benefits of Machine Learning
● Often powers many of the digital goods and 1. Enhanced decision-making
services we use every day. 2. Automation
Types of Machine Learning 3. Personalization
1. Supervised learning 4. Scalability
2. Semi-supervised learning 5. Improved security
3. Unsupervised learning 6. Cost optimization
4. Reinforcement learning 7. Trend identification
Drawbacks of Machine Learning Service Industry
1. Data dependency - Robotics technology is used in the service
2. High computational costs industries such as hotels, malls, banks, etc. to
3. Complexity and underfitting provide customer service like answering
4. Bias and discrimination queries, providing information, and guiding
5. Security vulnerabilities customers.
6. Ethical concerns Military and Defense
7. Dependency on expertise - Robotics technology is being used in military
7. ROBOTIC PROCESS and defense to perform tasks such as
● It is a technology that uses software robots, or surveillance, reconnaissance, and bomb
“bots,” to automate repetitive tasks typically disposal.
performed by humans. Drawbacks of Robotic Process
● These bots can handle tasks such as data 1. Handling complex tasks
extraction, form filling, and file movement. 2. High initial investment
APPLICATIONS 3. Scalability issues
Manufacturing 4. Impact on employment
- Robotics is widely used in manufacturing to 5. Software dependency
automate repetitive tasks, increase productivity 6. Security challenges
and improve quality. 8. Blockchain
Transportation ● A decentralized, distributed ledger technology
- Self-driving cars, drones, and autonomous that securely records transactions across a
vehicles are examples of robotics applications in network of computers.
transportation. ● Best known for their crucial role in
Healthcare cryptocurrency systems for maintaining security.
- Robotics technology is increasingly being used APPLICATIONS
in healthcare to assist with surgeries, Money Transfer
rehabilitation, and other medical procedures. - Blockchain is widely used in financial services to
Agriculture facilitate secure and efficient money transfers.
- Agricultural robots are being used to plant and Smart Contracts
harvest crops, monitor crop growth, and - These are automated agreements that execute
perform other tasks to increase efficiency and when predefined conditions are met.
reduce labor costs. Internet of Things (IoT)
Construction - Blockchain enhances IoT security by providing a
- Robotics technology is being used in decentralized and tamper-proof ledger.
construction to automate tasks such as Personal Identity Security
bricklaying, concrete pouring, and other - Blockchain helps in securing personal identities
labor-intensive tasks. by storing data in a decentralized manner.
Space Exploration Healthcare
- Robotics technology plays an important role in - Blockchain is used to secure electronic health
space exploration as it can be used to explore records (EHRs) and streamline clinical trial
other planets, moons, and asteroids. research.
Logistics & Supply Chain Management Customer Service
- Blockchain provides end-to-end visibility and - Voice recognition is used in call centers to
traceability in supply chains. provide 24/7 service, automate responses, and
Non-Fungible Tokens (NFTs) analyze call patterns.
- NFTs are digital assets that represent ownership Voice Biometrics for Security
of unique items like art, music, and videos. - This application uses a person’s voice to
Government authenticate their identity, enhancing security
- Blockchain can improve government efficiency in various sectors.
by securing documents and providing Automotive
transparent record-keeping. - In-car voice recognition systems allow drivers to
Pros of Blockchain Technology make calls, set directions, and control music
1. Enhanced security without taking their hands off the wheel.
2. Transparency Advantages of Voice Search
3. Decentralization 1. Faster than typing
4. Cost efficiency 2. Advancements in Voice User Interfaces (VUI)
5. Speed and efficiency 3. Boosts productivity
6. Immutability 4. Instant access to information
7. Accessibility 5. Breaking language barriers
Drawbacks of Blockchain Technology Drawbacks of Voice Search
1. Transaction limitations 1. Privacy of voice recorded data
2. High energy consumption 2. Error and misinterpretation of words
3. Scalability issues 10. Analytics
4. Regulatory concerns ● It is the process of gathering and analyzing data
9. Voice Search from a range of digital sources. And when used
● Voice search functionality works through the correctly, it can help inform your marketing
automatic speech recognition system (ASR) to decisions.
transform voice signals into text. ● Retail Retailers use data analytics to anticipate
● Speech recognition technology has made our customer demands, ensuring merchandise
lives even easier and shopping more effortless. availability.
APPLICATIONS EXAMPLES
Voice Search Banking and Finance
- This is arguably the most common use of voice - Financial institutions use data analytics to
recognition technology. manage risk, avoid errors, and prevent fraud.
Speech to Text Construction
- Voice recognition enables hands-free - Data analytics helps construction companies
computing, allowing users to write emails, with design and modeling, incorporating
compose documents, and send texts without environmental concerns, and integrating
typing. stakeholder inputs.
Smart Home Devices Transportation
- Voice commands are used to control smart - Transport authorities use data analytics to
home devices, such as turning on lights, capture customer journey preferences, mitigate
adjusting thermostats, and boiling water.
unexpected problems, and deliver personalized
programs.
Media and Entertainment
- Companies in this sector use data analytics to
understand consumer usage patterns and
deliver personalized content.
Education
- Educational institutions use data analytics to
track student progress, fine-tune teaching
methods, and structure syllabi.
Healthcare
- The medical industry uses data analytics to
improve patient care and community
well-being. Wearable trackers collect health
data, helping physicians make better medical
decisions.
Public Services
- Governments use data analytics to understand
financial markets, research health-related fields,
conserve environmental resources, and detect
crime.
Disadvantages of Analytics
1. Data quality issues
2. Privacy concerns
3. Complexity and skill gap
4. Cost of implementation
5. Integration challenges
6. Bias and interpretation
7. Security risks
8. Lack of scalability
Advantages of Analytics
1. Improved decision-making
2. Enhanced operational efficiency
3. Better customer understanding
4. Competitive
5. Risk mitigation
6. Cost savings
7. Innovation and product development
8. Performance monitoring

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy