I.T Midterm Reviewer 1
I.T Midterm Reviewer 1
D. IP Address (Internet Protocol) important to note that the Web is not the same
as the Internet; the Internet existed for over
twenty years before the Web was developed,
serving as the foundation for Web technologies.
Web 1.0 Web 2.0 Web 3.0 and Credit card payment options.
Example : Amazon
Read Only Socialize, write, Execute, write,
and read socialize, read
Type of Website : Business
Original Material Shared Material Combined Features : Represents a specific business, Branded with
materials
the Business’ logo, and Communicates products or
The World Wide Scriptable Web The World Wide services offered.
Web as a visual Web of linked
and interactive data Example : Apple (Philippines)
experience
Type of Website : Entertainment
Website Blogs and wikis Waves and
homepages real-time feeds Features : Purely for entertainment purposes.
Example : Netflix
Web, file, SE, The use of IM, Digital assistants
email, P2P, file Ajax, JavaScript may help you
Type of Website : Portfolio
sharing, content, frameworks, and organize your
and business Adobe Flex life’s data, Features : Showcases examples of past work, used by
portals ontologies, and
service providers to display quality of work, focused on
databases
collecting work samples.
Maintain your Pay attention to Pay attention to
attention on the the locals each person Example : Linked in
business at hand
Type of Website : Media
Banner Interactive Behavioral
Features : Collect news stories and reporting, may
advertising advertising advertising
overlap with entertainment websites, and include
reported places and possibly entertainment.
Key Features Between Web Versions Example : BBC
Version 1.0 Version 2.0 Version 3.0
Type of Website : Brochure
User-server Interaction with Web-based, Features : Simplified form of business websites,
interaction is users is intelligent apps,
disabled enhanced and features provides basic information about a business, and
suitable for business not heavily reliant on online individuals creating content, and it didn’t have many
presence. features. What nickname did humans give this early
Example : Mang Inasal version of the web?
Answer : The Read-Only Web
Type of Website : Nonprofit
Question : You’ve just been hired as the chief
Features : Represents a nonprofit organization,
information officer for a futuristic space colony. Your
facilitates donations, and provides information about
first task is to set up a system that allows all colonists to
the nonprofit to potential donors.
access vital documents and resources, no matter where
Example : Philippine Red Cross
they are in the galaxy. Which system will you implement
Type of Website : Educational to ensure easy access to these resources?
Features : Represents educational institutions or online Answer : A solar system-wide network that connects
course providers and provides educational materials or planets through the World Wide Web.
information about the institutions. Question : As the captain of a spaceship, your crew
Example : Harvard University relies heavily on interacting with the internet for
communication and entertainment. You’ve noticed that
Type of Website : Infopreneur
the web version used in your ship allows everyone to
Features : Combines aspects of business and
create and share content, making it highly interactive.
E-Commerce websites, sells information products like
Which version of the web are you using?
courses, tutorials, videos, or eBook, and represents an
Answer : Web 2.0, the participatory social Web.
online business model focused on selling knowledge.
Online Communication and Collaboration
Example : MasterClass
Types of Online Communication
Type of Website : Personal ● Communicating effectively online is a crucial
Features : Created for personal expression, includes digital skill for both the workplace and
personal blogs, vlogs, and photo diaries, and not university studies.
necessary aimed at making money. ● Text-based: Email, discussion forums, texts,
Example : NeilPatel by NP digital messaging, and chat.
Type of Website : Web Portal ● Video and audio: Online meetings and
Features : Designed for internal use by business, conferences, screen and application sharing,
various sources in one place, and often includes login ● Social media: Platforms that use text, images,
Question : You’re a historian on a distant planet and 2. Lack of visual or tonal cues
version of the web. The web was simple, with only a few 4. Difficulty retracting statements
Collaborative Documents abundant with information about our identities,
residences, and means of sustenance. Until the
advent of computers around 1990, this
information was primarily written on paper,
published in newspapers or magazines, and
stored in libraries and office files.
● Information technology, commonly known as IT,
is generally the use of technology to solve
problems.
Online Meetings and Videoconferencing
● It encompasses a broad spectrum of tasks,
including the development of hardware and
software, network administration, database
management, and tech support.
INFORMATION COMMUNICATIONS TECHNOLOGY:
● ICT encompasses technologies facilitating
communication, collaboration, and integration
across various information systems. It includes
Microsoft 365 Productivity Tools telecommunication networks, internet
1. Microsoft Excel technologies, multimedia systems, and digital
2. Microsoft Word tools that enable the exchange and sharing of
3. Microsoft Powerpoint information.
Check your Understanding IT/ICT in education
Question : You’re an AI from the distant future tasked - Students now engage in remote learning, access global
with teaching a history class about the evolution of educational resources, and participate in interactive
online communication on earth. When discussing the learning experiences facilitated by digital technologies.
Covid 19 pandemic, which significant change in This transformation has democratized education,
communication practices would you highlight? enhancing accessibility and flexibility for learners across
Answer : The widespread adoption of online diverse ages and backgrounds.
communication and collaboration tools. Entertainment
Question : Imagine you’re living in a world where people -Digital entertainment platforms, streaming services,
only communicate via telepathy, but you’ve discovered online gaming, and social media networks have become
an ancient earth concept called “Online components of our daily lives, providing users
Communication.” What might be a challenge of using worldwide with a wide range of immersive experiences.
text-based communication from the past compared to ICT drives ongoing innovation in entertainment,
your current telepathic chats? enhancing accessibility, interactivity, and personalization
Answer : Text lacks the visual or tonal cues of of content tailored to user preferences.
face-to-face interaction. Business
Important Notes (Chapter 1) : - Businesses leverage ICT to streamline operations,
INFORMATION TECHNOLOGY boost productivity, and achieve competitive advantages
● Information technologies are powerful because in global markets. Through e- commerce platforms,
people have a strong desire for information, and digital marketing strategies, and data analytics tools,
IT facilitates easy access to it. The world is powered by ICT, businesses expand their reach to global
customers, optimize processes, and drive innovation in 3. Leftist activism is a form of pseudo-rebellion
product development and service delivery. that serves to distract attention from the
IT System problem of technology
- Every hardware and software used within a network of HISTORY OF HARDWARE AND SOFTWARE
individuals constitutes an IT system. This includes - The history of information technology encompasses
anything used to help you store, retrieve, manipulate, the development of both computer hardware and
and communicate data. software. Charles Babbage is recognized for constructing
Research the first mechanical computer in the 1820s. More than a
- IT supports scientific research by providing century later, in 1946, a team at the University of
computational resources (e.g. computer algebras, Pennsylvania unveiled the first programmable,
graphing softwares etc.), data processing tools, and general-purpose computer, known as the Electronic
specialized software for tasks such as data analysis, Numerical Integrator and Computer (ENIAC). The ENIAC
simulations, and modeling in fields like physics, biology, weighed 30 tons and occupied 1800 square feet of
chemistry, mathematics, and environmental science. space. It supported most hardware and software
Digital forensics components that modern programmers recognize. The
- Digital forensics utilizes specialized tools and ENIAC could read inputted data, hold information in
techniques to assist experts in retrieving, preserving, memory, step through programming instructions, create
and examining data from computers, mobile devices, and call sub-programs, loop through code, and print
and digital storage media. output.
Treatise against Technology - Eventually, these shared tasks were consolidated into
Theodore Kacyznski (The Unabomber) computer programs known as operating systems. The
INDUSTRIAL SOCIETY AND ITS FUTURE Operating System (OS) functions as the brain of the
- Kaczynski was an American Mathematician and computer, managing all its components. Elements such
prodigy specializing in Complex Analysis. Around 1971, as the computer mouse, keyboard, display monitor,
he left academia and pursued a primitive lifestyle. Upon motherboards, and storage drives come together to
witnessing the destruction of the wilderness around his form a functional computer only when the OS
cabin, he concluded that primitive way of living was recognizes them and coordinates their actions. When
becoming impossible. He seeks to fight the you move your mouse, tap your screen, type on your
advancement of technology through extreme methods keyboard, or make a phone call, the OS interprets these
such as nation-wide bombing. actions and instructs the components on how to
- Kacyznski murdered 3 people and injured several respond to achieve the desired result.
others in his campaign against people he believed to be Computer Hardware and Software
advancing modern technology TYPES OF COMPUTERS
Summarized from “Industrial Society and Its Future” by 1. Supercomputers: These are powerful machines used
Theodore Kacyznski for complex calculations, theorem proving, weather
1. Modern technology constitutes an indivisible, forecasting, and simulations.
self- perpetuating system that is not under 2. Mainframes: powerful systems used by businesses
human control. and government organizations for critical applications,
2. Since the technological system cannot be bulk data processing, and large-scale transaction
controlled, and hence cannot be reformed, a processing.
revolutionary overthrow of the system is
necessary to avert catastrophe.
3. Servers: These are computers that provide data, ➔ Samuel Morse invents the telegraph,
resources, and services to other computers over a revolutionizing long-distance communication by
network. transmitting electrical signals over a wire laid
4. Personal computers: General purpose computers between stations.
used for different personal tasks e.g. desktops, laptops, ➔ Alexander Graham Bell patents the telephone,
tablets. allowing voice communication over distances.
5. Embedded Systems: Specialized computers integrated The Electronic Period (1940...)
into other devices like cars, appliances, and medical ➔ The dawn of the Electronic Numerical Period
equipment. Integrator and Computer (ENIAC), the first
The Evolution of Information and communication electronic and general purpose computer,
Technology (ICT) marked a revolutionary period in computing.
The Premechanical Period (8000 BCE - 1450) ➔ The transistor was invented in 1947. The
➔ Humans started communicating with one electronic device has properties and functions
another using words and pictograms carved in similar to vacuum tubes, but it is lightweight
rocks. They started to write symbols as and faster. The first full transistor was
substitutes for pictures to depict ideas, objects, developed in 1957 and was faster than vacuum
and animals. computers and was faster than vacuum
➔ Humans realized that stone tablets are too computers.
heavy and bulky. The information to be stored ➔ The Integrated circuit (IC) is a device that is
was growing and was becoming enormous, and composed of a group of transistors and circuit
writing these pieces of information in stone elements compressed in a single package.
tablets was impractical. ➔ Circuits are integrated in a chip or a single
➔ When paper was finally produced from the package, limiting the distances between
papyrus plant, storing information was components, resulting in a faster operating
revolutionized. They compiled records written speed.
on pieces of paper and bound them together, ➔ In 1999, the first BlackBerry smartphone was
eventually giving birth to books. introduced, paving the way for mobile
➔ In the late stages of this period, humans started communication and computing.
using the numerical system. ➔ Apple launched the iPod in 2001, leading to the
➔ They started to optimize and invent devices and era of portable digital media.
techniques in counting. The "Abacus" was the ➔ Apple released the iPhone in 2007,
most popular device created from China. revolutionizing smartphones with its touch
The Mechanical Period (1450-1840) interface and app ecosystem.
➔ The highlight of this period is the advent of the ➔ In 2003, the first Android phone, the Wit
mechanical calculator called Pascaline, which Dream, was released, introducing competition
was invented by the famous mathematician and innovation in the smartphone market.
inventor Blaise Pascal along with Wilhelm ➔ Apple introduced the iPad in 2010, popularizing
Schickard. tablet computing.
➔ Charles Babbage invented the Analytical Engine, ➔ In 2020, the global rollout of 5G technology
which is considered the first programmable begins, promising faster and more reliable
mechanical computer. This earned him as the internet connections.
"Father of Computers.”
➔ From the first telegraph to the smartphones of Question : HOW SHOULD WE ASK A QUESTION IN AN
today, each breakthrough has built upon the ONLINE MEETING?
last, pushing the boundaries of what's possible. Answer : Use the “Raise your Hand” button.
THE NETIQUETTE AND THE COMPUTER ETHICS Question : WHY SHOULD YOU NEVER SEND EMAILS,
CYBER/COMPUTER ETHICS TEXTS, OR IMS WHEN YOU’RE ANGRY OR UPSET?
● It refers to the code of responsible behavior on Answer : You may not have the best judgment when
the Internet. your emotions are running high.
● This includes social media etiquettes and CYBERCRIME
communication etiquettes. ● Cybercrime refers to illegal activities that
NETIQUETTES involve targeting or utilizing computers,
1. ETHICAL computer networks, or networked devices.
- It means we should share our information and TYPES OF CYBERCRIME
expertise online without any copyright 1. EMAIL AND INTERNET FRAUD
violations. 2. IDENTITY FRAUD
2. RESPECTFUL 3. FINANCIAL THEFT OR CARD PAYMENT DATA
- It means we should not indulge in any insulting, 4. THEFT AND SALE OF CORPORATE DATA
degrading or intimidating online behavior which 5. CYBER EXTORTION
is cyber bullying. 6. RANSOMWARE ATTACKS
3. RESPONSIBLE 7. CRYPTOJACKING
- It means we should respect other people’s 8. CYBER ESPIONAGE
privacy and the freedom or personal expression. 9. SYSTEMS INTERFERENCE
CYBER BULLYING 10. INFRINGING COPYRIGHT
● This happens when a person is harassed, 11. ILLEGAL GAMBLING
humiliated, embarrassed, threatened or 12. SELLING ILLEGAL ITEMS ONLINE
tormented through the use of digital 13. SOLICITING, PRODUCING, OR POSSESSING
technology. CHILD PORNOGRAPHY
SOCIAL MEDIA ETIQUETTES EXAMPLES OF CYBERCRIME
1. Protecting personal information 1. MALWARE ATTACKS
2. Being careful with online friendships 2. PHISHING
3. Managing sensitive and confidential files 3. DISTRIBUTED DOS ATTACKS
4. Beware of fake news HOW TO PROTECT YOURSELF AGAINST CYBERCRIME
ONLINE MEDIA ÉTIQUETTES 1. Keep software and operating system updated
1. The importance of being precise 2. Use anti-virus software and keep it updated
2. Mindfulness during online meetings 3. Use strong passwords
3. Politeness and digital behavior 4. Never open attachments in spam emails
4. Building digital credibility 5. Do not click on links in spam emails or untrusted
CHECK YOUR UNDERSTANDING websites
Question : WHY SHOULD WE NOT USE CAPITAL LETTERS 6. Do not give out personal information unless
WHILE COMMUNICATING? secure
Answer : You are shouting. 7. Contact companies directly about suspicious
requests
8. Be mindful of which website URLs you visit 2. MULTIEXPERIENCE
9. Keep an eye on your bank statements ● Multiexperience refers to the various
overlapping modes of interaction and interfaces
CURRENT TRENDS
between a user and digital technology.
1. Hyper Automation
● It’s about creating a cohesive experience across
● It is the integration of advanced technologies to
web, mobile, wearable, conversational,
automate tasks and processes beyond
immersive technologies, and more.
traditional automation.
EXAMPLES
● Combines technologies like AI, ML, RPA, and
Domino’s Anyware
decision-making tools.
- This platform enables customers to order pizza
● Aims to automate as many business and IT
using various devices and interfaces, including
processes as possible
smartwatches, voice assistants, and social
EXAMPLES
media platforms.
Retail
BMW India’s Contactless Experience
- In retail, hyper automation can optimize
- This allows customers to explore and purchase
inventory management, customer service, and
vehicles through a fully digital and contactless
supply chain operations.
process, integrating web, mobile, and
Healthcare
augmented reality (AR) touchpoints.
- Hyper Automation can improve regulatory
Retail Apps
compliance and fraud detection in healthcare.
- Many retail apps now allow users to check stock
Banking
availability, add items to their grocery list, and
- In the banking sector, hyper automation can
communicate with customer service through
enhance customer onboarding, loan
web apps, mobile apps, and wearables
processing, and compliance.
Benefits of Multiexperience
Accounts Payable
1. Enhanced customer engagement
- Hyper Automation can streamline the AP
2. Increased customer satisfaction
process by automating the receipt, processing,
3. Brand differentiation
and payment of invoices.
4. Improved efficiency
Benefits of Hyper Automation
5. Increased revenue
1. Increased efficiency
Multiexperience Challenges
2. Enhanced accuracy
1. Consistency across platforms
3. Scalability
2. Integration complexity
4. Improved compliance
3. Security and privacy
5. Employee empowerment
4. Performance optimization
Hyper Automation Challenges
5. User behavior understanding
1. Difficulty and Time Consumption
6. Development and maintenance costs
2. Measuring success
7. Testing and quality assurance
3. Overwhelming marketplace of tools
3. DEMOCRATIZATION
4. Change management
● The process of making advanced technologies
accessible and usable by a broader, including
those without specialized technical skill.
EXAMPLES Virtual Assistants
Printing Press - AI-powered virtual assistants help with tasks like
- One of the earliest examples is the invention of scheduling, reminders, and information
the printing press by Johannes Gutenberg in the retrieval, enhancing productivity.
15th century. Chatbots
Affordable Computers - These AI-driven tools provide quick responses
- Various types of computers are available at and solutions to user queries, improving
different price points , making them accessible customer service and support.
to a broader audience. Exoskeletons
Online Information Access - Wearable devices that enhance physical
- The internet has made information more easily capabilities, often used in rehabilitation and
accessible. industrial applications.
Benefits of Democratization Prosthetic Limbs
1. Enhanced employee productivity - Advanced prosthetics that restore or enhance
2. Innovation limb functionality for individuals with
3. Increased agility and efficiency amputations.
4. Increase customer satisfaction 3D Bioprinting
Drawbacks of Democratization of Technologies - This technology is used to create biological
1. Inequality structures, such as tissues and organs,
2. Negative impact on society potentially revolutionizing medical treatments.
3. No privacy Pros of Human Augmentation
4. Negative impact on employment 1. Enhanced capabilities and collaboration
4. HUMAN AUGMENTATION 2. Optimized performance
● Enhancing human abilities through the use of 3. Range of Applications - healthcare,
technology. This can include physical, cognitive, manufacturing, finance and military
and sensory enhancements. Cons of Human Augmentation
EXAMPLES 1. Ethical questions
Virtual Reality (VR) 2. Perceptions of unfair competition
- VR creates immersive digital environments that 3. Other potential risks
can enhance learning, training, and 5. DATA POLICING
entertainment experiences. ● Data policing refers to the practices and
Augmented Reality (AR) regulations involved in monitoring, managing,
- AR overlays digital information onto the real and ensuring the responsible use of data.
world, improving tasks like navigation, ● Crucial for protecting privacy, ensuring data
maintenance, and education. security, and maintaining compliance with legal
Mixed Reality and ethical standards.
- This combines elements of both VR and AR to EXAMPLES
create interactive experiences that blend the Crime Analytics
physical and digital worlds. - This involves analyzing large datasets to identify
patterns and trends in criminal activity.
Predictive Crime Profiling EXAMPLES
- Using data to predict where and when crimes Recommender Systems
are likely to occur. - These systems use supervised learning to
Network Analysis of Criminal Gangs suggest products, services, or content to users
- This application uses data to map out the based on their preferences and past behavior.
relationships and interactions within criminal Computer Vision
networks. - Unsupervised learning is used in computer
Intelligence Gathering vision to identify patterns and features in
- Leveraging various data sources, including social images without labeled data.
media and surveillance data, to gather Fraud Detection
intelligence on criminal activities and potential - Semi-supervised learning helps in detecting
threats. fraudulent activities by combining a small
Benefits of Data Policing amount of labeled data with a large amount of
1. Crime prevention unlabeled data.
2. Resource optimization Self-Driving Cars
3. Improved decision-making - Reinforcement learning is crucial for training
4. Enhanced investigations autonomous vehicles to make decisions and
5. Transparency and accountability navigate safely.
6. Community trust Video Games
7. Cost Savings - Reinforcement learning is used to create
8. Enhanced collaboration intelligent agents that can learn and adapt to
Drawbacks of Data Policing different game scenarios.
1. Privacy concerns Spam Detection
2. Bias and discrimination - Supervised learning is employed to filter out
3. Over-reliance on technology spam emails by recognizing patterns in the
4. Data security risks content.
5. Cost and resource allocation Market Prediction
6. Ethical issues - Supervised learning models predict stock and
7. Accuracy and reliability housing market trends based on historical data.
8. Public trust Customer Segmentation
6. MACHINE LEARNING - Unsupervised learning helps businesses
● Machine learning is a subfield of artificial segment their customers into different groups
intelligence that involves training algorithms on based on purchasing behavior and other factors.
data sets to develop models. Benefits of Machine Learning
● Often powers many of the digital goods and 1. Enhanced decision-making
services we use every day. 2. Automation
Types of Machine Learning 3. Personalization
1. Supervised learning 4. Scalability
2. Semi-supervised learning 5. Improved security
3. Unsupervised learning 6. Cost optimization
4. Reinforcement learning 7. Trend identification
Drawbacks of Machine Learning Service Industry
1. Data dependency - Robotics technology is used in the service
2. High computational costs industries such as hotels, malls, banks, etc. to
3. Complexity and underfitting provide customer service like answering
4. Bias and discrimination queries, providing information, and guiding
5. Security vulnerabilities customers.
6. Ethical concerns Military and Defense
7. Dependency on expertise - Robotics technology is being used in military
7. ROBOTIC PROCESS and defense to perform tasks such as
● It is a technology that uses software robots, or surveillance, reconnaissance, and bomb
“bots,” to automate repetitive tasks typically disposal.
performed by humans. Drawbacks of Robotic Process
● These bots can handle tasks such as data 1. Handling complex tasks
extraction, form filling, and file movement. 2. High initial investment
APPLICATIONS 3. Scalability issues
Manufacturing 4. Impact on employment
- Robotics is widely used in manufacturing to 5. Software dependency
automate repetitive tasks, increase productivity 6. Security challenges
and improve quality. 8. Blockchain
Transportation ● A decentralized, distributed ledger technology
- Self-driving cars, drones, and autonomous that securely records transactions across a
vehicles are examples of robotics applications in network of computers.
transportation. ● Best known for their crucial role in
Healthcare cryptocurrency systems for maintaining security.
- Robotics technology is increasingly being used APPLICATIONS
in healthcare to assist with surgeries, Money Transfer
rehabilitation, and other medical procedures. - Blockchain is widely used in financial services to
Agriculture facilitate secure and efficient money transfers.
- Agricultural robots are being used to plant and Smart Contracts
harvest crops, monitor crop growth, and - These are automated agreements that execute
perform other tasks to increase efficiency and when predefined conditions are met.
reduce labor costs. Internet of Things (IoT)
Construction - Blockchain enhances IoT security by providing a
- Robotics technology is being used in decentralized and tamper-proof ledger.
construction to automate tasks such as Personal Identity Security
bricklaying, concrete pouring, and other - Blockchain helps in securing personal identities
labor-intensive tasks. by storing data in a decentralized manner.
Space Exploration Healthcare
- Robotics technology plays an important role in - Blockchain is used to secure electronic health
space exploration as it can be used to explore records (EHRs) and streamline clinical trial
other planets, moons, and asteroids. research.
Logistics & Supply Chain Management Customer Service
- Blockchain provides end-to-end visibility and - Voice recognition is used in call centers to
traceability in supply chains. provide 24/7 service, automate responses, and
Non-Fungible Tokens (NFTs) analyze call patterns.
- NFTs are digital assets that represent ownership Voice Biometrics for Security
of unique items like art, music, and videos. - This application uses a person’s voice to
Government authenticate their identity, enhancing security
- Blockchain can improve government efficiency in various sectors.
by securing documents and providing Automotive
transparent record-keeping. - In-car voice recognition systems allow drivers to
Pros of Blockchain Technology make calls, set directions, and control music
1. Enhanced security without taking their hands off the wheel.
2. Transparency Advantages of Voice Search
3. Decentralization 1. Faster than typing
4. Cost efficiency 2. Advancements in Voice User Interfaces (VUI)
5. Speed and efficiency 3. Boosts productivity
6. Immutability 4. Instant access to information
7. Accessibility 5. Breaking language barriers
Drawbacks of Blockchain Technology Drawbacks of Voice Search
1. Transaction limitations 1. Privacy of voice recorded data
2. High energy consumption 2. Error and misinterpretation of words
3. Scalability issues 10. Analytics
4. Regulatory concerns ● It is the process of gathering and analyzing data
9. Voice Search from a range of digital sources. And when used
● Voice search functionality works through the correctly, it can help inform your marketing
automatic speech recognition system (ASR) to decisions.
transform voice signals into text. ● Retail Retailers use data analytics to anticipate
● Speech recognition technology has made our customer demands, ensuring merchandise
lives even easier and shopping more effortless. availability.
APPLICATIONS EXAMPLES
Voice Search Banking and Finance
- This is arguably the most common use of voice - Financial institutions use data analytics to
recognition technology. manage risk, avoid errors, and prevent fraud.
Speech to Text Construction
- Voice recognition enables hands-free - Data analytics helps construction companies
computing, allowing users to write emails, with design and modeling, incorporating
compose documents, and send texts without environmental concerns, and integrating
typing. stakeholder inputs.
Smart Home Devices Transportation
- Voice commands are used to control smart - Transport authorities use data analytics to
home devices, such as turning on lights, capture customer journey preferences, mitigate
adjusting thermostats, and boiling water.
unexpected problems, and deliver personalized
programs.
Media and Entertainment
- Companies in this sector use data analytics to
understand consumer usage patterns and
deliver personalized content.
Education
- Educational institutions use data analytics to
track student progress, fine-tune teaching
methods, and structure syllabi.
Healthcare
- The medical industry uses data analytics to
improve patient care and community
well-being. Wearable trackers collect health
data, helping physicians make better medical
decisions.
Public Services
- Governments use data analytics to understand
financial markets, research health-related fields,
conserve environmental resources, and detect
crime.
Disadvantages of Analytics
1. Data quality issues
2. Privacy concerns
3. Complexity and skill gap
4. Cost of implementation
5. Integration challenges
6. Bias and interpretation
7. Security risks
8. Lack of scalability
Advantages of Analytics
1. Improved decision-making
2. Enhanced operational efficiency
3. Better customer understanding
4. Competitive
5. Risk mitigation
6. Cost savings
7. Innovation and product development
8. Performance monitoring