0% found this document useful (0 votes)
13 views12 pages

MIDTERMS

This document discusses the influence of information and communication technology (ICT) in society. It notes both positive influences, such as improved communication, security, and participation in a global society, as well as negative influences like job loss and reduced personal interaction. The document also provides examples of how ICT is used in daily life for business, education, healthcare and other applications. It defines computers and describes the history of computers from early analog machines to modern digital computers and the five generations of computer technology.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views12 pages

MIDTERMS

This document discusses the influence of information and communication technology (ICT) in society. It notes both positive influences, such as improved communication, security, and participation in a global society, as well as negative influences like job loss and reduced personal interaction. The document also provides examples of how ICT is used in daily life for business, education, healthcare and other applications. It defines computers and describes the history of computers from early analog machines to modern digital computers and the five generations of computer technology.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

SOC SCI 101 INFLUENCE OF ICT IN THE SOCIETY

INTRODUCTION TO INFORMATION * Positive Influence


AND COMMUNICATION
 Communication
TECHNOLOGY
 Security
- ICT is the integration of information  ICT allows people to participate in
processing, computing and communication a wider, even worldwide, society
technologies.  ICT facilitates the ability to
-all devices, networking components, perform by using simulations
applications and systems that are  Creation of new more interesting
combined to allow people and jobs
organizations (i.e., businesses, nonprofit * Negative Influence
agencies, governments and criminal
enterprises) to interact in the digital world.  Job loss
- Job Export
* INFORMATION - Multiple workers being replaced
- informare -> “to give form to the mind”, by a smaller number who are able
“to discipline”, “instruct”, “teach”. to do the same amount of work
 Reduced personal interaction
- application of practical sciences to
 Reduced physical activity
industry or commerce.
 Cost
- Knowledge obtained from investigation,  Competition
study, or instruction.
* TECHNOLOGY
- Techne -> art, craft
- Logos -> word speech
- development over time of systematic
techniques for making and doing things.
- machine, piece of equipment, method,
etc., that is created by technology.
USES OF ICT IN OUR DAILY LIVES
 Communication
 Education
 Transportation
 Entertainment and recreation
 Business
 Health care
 Job opportunities
APPLICATION OF ICT IN OUR 2. Digital Computer
DAILY LIVES
- The computers that are commonly used
 Business today are digital computers. They use
 Education distinct values to represent the data
 Healthcare internally. All information are represented
 Retail and Trade using the digits O’s and 1’s.
 Government CHARACTERISTIC OF COMPUTER
 Marketing
 Science  Speed
 Publishing  Accuracy
 Communication  Diligence
 Banking and Finance  Storage capability
 Navigation  Versatility
 Transport HISTORY OF COMPUTER
 Working from Home
2,400 BC
 Military
 Social and Romance * Calculating Machines
 Booking Vacations
- the first mechanical calculating device
 Security and Surveillance
 Weather Forecasting - ABACUS
 Robotics
1617 A.D
Computer * Napier’s Bones
- Compute -> to calculate - purpose of multiplication
- is an electronic machine that accepts - John Napier
data, processes the data by performing
calculations and operations on it, and 16th Century
generates the desired output results. It
* Slide Rule
performs both simple and complex
operations with speed and accuracy. - Edmund Gunter
Types of Computer 17th Century
1. Analog Computer * Pascal’s Calculator
- represents data as variable across a - arithmetic machine or Pascaline
continuous range of values.
- add and subtract two numbers directly
- earliest computers were analog and to perform multiplication and division
computers that measure parameters that through repeated addition or subtraction.
vary continuously in real time, such as
- Blaise Pascal
temperature, pressure and voltage. The
slide rule is an example of an analog * Leibniz’s Multiplication and Dividing
computer.
- Gottfried Leibniz
- Around 1673
19th Century - enormous in size and required a large
room for installation.
* Punch Card System
- used for scientific applications as they
- punched card reader developed by
were the fastest computing device of their
Jacquard to control the power loom in
time.
1801. - The O’s and 1’s are the basis of the
modern digital computer. (UNIVAC, ENIAC, EDVAC)
1823 Second Generation (1956- 1963)
* Babbage’s Analytical Engine Using transistors
- a difference engine - Transistors replaced the vacuum tubes of
the first-generation of computers and
- general-purpose calculating machine
allowed computers to become smaller,
- Charles Babbage (Father of the faster, cheaper, energy efficient, and
Computer) & Lady Ada Lovelace. reliable. The second generation computers
used magnetic core technology for primary
1890 memory and the concept of a stored
* Hollerith’s Punch Card Tabulating program, where instructions were stored in
Machine the memory of computer.

- read the information from a punch card - The instructions were written using the
and process it electronically. assembly language. High level
programming languages, such as early
- Herman Hollerith versions of COBOL and FORTRAN were
GENERATIONS OF COMPUTER also developed during this period.

* Computer Generation - The computation time was in


microseconds.
- Its evolution to its current state
- the size of the computer was reduced.
First Generation (1940- 1956)
- The transistors had to be assembled
Using vacuum tubes manually thus, commercial production of
- used vacuum tubes for circuitry and these computers was very costly, though
magnetic drums for memory. The input to less than the first generation computers.
the computer was through punched cards (PDP-8, IBM 1401 and CDC 1604)
and paper tapes and the output was
displayed as printouts. Third Generation (1964- 1971)

- instructions were written in machine Using integrated circuits


language. first generation computers were - The third generation computers used the
capable of solving only one problem at a Integrated Circuit (IC) chips. In an IC
time. chip, multiple transistors are placed on a
- The computation time was in silicon chip.
milliseconds.
- The keyboard and the monitor were Fifth Generation (present to next)
interfaced through the operating system
Using artificial Intelligence
which allowed different applications to run
at the same time. High-level languages - VLSI technology became ULSI (Ultra
were used extensively for programming in Large Scale Integration) technology,
place of machine and assembly language. resulting in the production of
microprocessor chips having ten million
- The computation time was in
electronic components. The fifth
nanoseconds.
generation computers use Super Large
- The size of these computers was quite Scale Integrated (SLSI) chips that are able
small compared to the second generation to store millions of components on a single
computers. chip.
- Computers became accessible to mass - This generation is based on parallel
audience, were produced commercially, processing hardware and AI (Artificial
and were smaller and cheaper than their Intelligence) software. AI is an emerging
predecessors. branch in computer science, which
interprets the means and method of making
(IBM 370 & PDP 11)
computers think like human beings. All the
Fourth Generation (1971- present) high-level languages like C and C++, Java,
.Net etc., are used in this generation.
Using microprocessors
- The computation time is in
- This era is marked by the development of femtoseconds.
microprocessor. A chip containing
millions of transistors and components, - Personal and commercial computers
and designed using LSI and VLSI became available.
technology. This generation of computers
(IBM desktop PC, HP laptop, Acer
gave rise to the Personal Computer (PC).
notebook, Mac book, etc.)
- This generation of computers supported
Graphical User Interface (GUI), a user-
friendly interface that allows user to
interact with the computer via menus and
icons. High-level programming languages
are used for the writing of programs.
- The computation time is in picoseconds.
- They are smaller than the computers of
the previous generation and can even fit
into the palm of the hand.
- Personal and commercial computers
became available.
(INTEL 404, IBM COMPUTER,
MACINTOSH)
- Every web page is a single HTML
document, and all of them are connected
THE WEB AND THE INTERNET
through hyperlinks (or simply “link”).
The World Wide Web
TYPES OF WEBSITE
- commonly referred to as WWW, W3, or
1. Static Website (READ ONLY)
simply, the "Web" is an interconnected
system of public webpages accessible - Static websites are ones that are fixed and
through the Internet. display the same content for every user,
usually written exclusively in HTML.
Timothy John Berners-Lee OM KBE
Static websites are purely informational.
FRS FREng, FRSA FBCS (TimBL)
The word static refers to something that is
- is an English engineer and computer fixed, that doesn’t move or change in any
scientist best known as the inventor of the way.
World Wide Web.
2. Dynamic website (READ WRITE
- 1989 he drew up a proposal for creating INTERACTIVE)
global hypertext document system that
- A dynamic website is one that can
would make use of the internet.
display different content and provide user
- his goal was to provide researchers with interaction, by making use of advanced
the ability to share their results, programming and databases in addition to
techniques, etc. HTML.

WEB - Instead of being simply informational,


dynamic websites include aspects that are
- World Wide Web, which is also known characterized by interactivity and
as a Web, is a collection of websites or functionality. They are more complex in
web pages stored in web servers accessible terms of building and design, but they are
through the Internet. also more versatile.
- It is the leading information retrieval Key features of DW
service of the Internet.
* Folksonomy
WEBSITE
- allows users to classify websites,
- A collection of web pages which are pictures, documents and other forms of
grouped together and usually connected data so that content may be easily
together in various ways. categorized and located by users.
-Each web page of a given website - Folksonomy is also known as social
provides explicit links —most of the time tagging, collaborative tagging, social
in the form of clickable portion of text— classification and social bookmarking.
that allow the user to move from one page
of the website to another. * Rich User interface

WEB PAGE - content is dynamic and is responsive to


user’s input. An example would be a
- Web page is a part of website which website that shows local content.
comprises links to other web pages.
* User Participation
- the owner of website is not the only one 6. Brochure Websites
who is able to put content. Others are able
- simplified form of business websites.
to place a content on their own by means
Sometimes just a simple brochure site that
of comments, reviews, and evaluation.
includes just a few pages that lay out the
* Long tail basics of a business and provide contact
information.
- services are offered on demand rather
than on a one-time purchase. This is 7. Educational Website
synonymous to subscribing to a data plan
- educational institutions and those
that charges you for the amount of time
offering online courses fall into the
you spent on Internet or a data plan that
category of educational websites.
charges you for the amount of bandwidth
you used. 8. Personal Website
KINDS OF WEBSITES - Many people find value in creating
personal websites to put their own
1. eCommerence website
thoughts out into the world. This category
-people can directly buy products from. includes personal blogs, vlogs, and photo
diaries people share with the world.
2. Business Website
9. Web Portal
- website that’s devoted to representing a
specific business. It should be branded like - collect information in different formats
the business (the same logo and from different sources into one place to
positioning) and communicate the types of make all relevant information accessible to
products and/or services the business the people who need to see it.
offers
10. Wiki or Community Forum Website
3. Entertainment Website
- wiki is any website where various users
- showcases entertaining information for are able to collaborate on content and all
visitors. make their own tweaks and changes as
they see fit.
4. Portfolio Website
THE INTERNET
- devoted to showing examples of past
work. Service providers who want to show - largest computer network in the world
potential clients the quality of the work that connects billions of computer user.
they provide The word internet comes from
combination between “interconnection”
5. Media Website
and “network”.
- collects news stories or other reporting.
Network is a collection of computers and
There’s some overlap here with
devices connected via communication
entertainment websites, but media
channels and transmission media allow to
websites are more likely to include
share resources (hardware, software, data,
reported pieces in addition to or instead of
information). Generally, nobody owns the
content meant purely for entertainment.
internet.
(CNN, GMA, etc.)
History of Internet 4. Mail Server
- ARPA (Advanced Research Project – is an application that receives
Agency) started an experimental computer incoming e-mail from local users and
network in January 2, 1969. Concept – No remote senders and forward outgoing e-
server, but equal importance/participation mail for delivery
to every computer in the network.
5. File Server
- In 1982, the word internet started. In
– is a computer responsible for
1986, the first “free net” created in Case
central storage and management of data
Western Reserve University. In 1991, the
files so that other computer on the same
US government allowed business agencies
network can access them.
to connect to internet.
6. Policy Server
- Robert W. Taylor, who led the
development of the ARPANET (an early – is a security component of a
prototype of the Internet), and Vinton Cerf policy – based network that provides
and Robert Kahn, who developed the authorization services and facilities
Transmission Control Protocol/Internet tracking and control of files.
Protocol (TCP/IP) technologies.
2. IP Address (Internet Protocol)
MAJOR COMPONENTS OF THE
INTERNET – is a numerical label assigned to each
device. This provides identity to a network
1. server device.
- is a computer program that provides 3. Browser
service to another computer program and
its user. – is an application program that provides a
way to look information on the web.
* types or server
4. Internet Service Provider (ISP)
1. Application Server
– is an organization that provides services
– a program in computer that for accessing, using or participating in the
provides the business logic for an internet.
application program.
5. Domain Name System (DNS)
2. Web Server
– is the phonebook of internet. We access
– a computer program that serves information online through domain names.
requested HTML pages or files.
3. Proxy Server
– is a software that acts as an
intermediary between an endpoint device,
such as computer and another server from
which a user is requesting.
- ur responsibility to make sure that the
time spent reading ur word isn’t wasted
RULE #5
NETIQUETTE
CHECK YOURSELF
- Network etiquette
-make yourself look good online
- Code of polite behavior on the internet
RULE #6
Do’s
SHARE YOUR EXPERTISE
* Remember the golden rule
- Information Sharing
* Avoid Slang, Acronyms, and text talk
RULE #7
* Avoid screaming in typed messages
(Caps lock) EXTINGUISHING FLAME WARS
* proofread your messages before sending - don’t feed the flames
them
RULE #8
* Exercise good judgement when sharing
RESPECT PEOPLE’s PRIVACY
information with others online
-don’t invade people’s lives just to get a
* Respect diversity in viewpoints
story
RULE #9
TEN COMMANDMENTS OF
WITH GREAT POWER COMES GREAT
COMPUTER ETHICS
RESPONSIBILITY
RULE #1
- don’t take advantage of anyone just
THE HUMAN ELEMENT because you have the “power”, remember
rule #1.
- respectful communication
RULE #10
RULE # 2
FORGIVE
IF YOU WOULDN’T DO IT IN REAL
LIFE, DON’T DO IT ONLINE -bullshet jak ammo
- do your best to act within the laws and
ethical manners
RULE #3
CYBERSPACE IS A DIVERSE PLACE
-it can be acceptable to one are, where it
might be considered inappropriate in
another.
RULE #4
RESPECT PEOPLE’S TIME AND
BANDWIDTH
legal issues concerning online interactions
and internet.

CYBERCRIME
Republic Act No. 10173
“ONE OF THE MAIN CYBER_RISKS IS
TO THINK THEY DON’T EXIST. THE Data Privacy Act of 2012
OTHER IS TO TRY TO TREAT ALL
-It is an act protecting individual personal
POTENTIAL RISKS”
information in Information and
- Stephanie Nappo Communication System in the
Government and Private Sector, creating
Cyber
for this purpose a National Privacy
- is a prefix that denotes a relationship with Commission and for other purposes.
information technology (IT). Anything
COMMON FORMS OF CYBERCRIMES
relating to computing, such as the internet,
falls under the cyber category. It’ s worth 1. Phishing Attack
noting cyber carries a connotation of a
- use email or malicious websites to solicit
relationship with modern computing and
personal information from an individual or
technology.
company by posing as a trustworthy
Cybercrime organization.
- is defined as a crime in which a computer 2. Malware attack
is the object of the crime (hacking,
- Malware – or malicious software – is one
phishing, spamming and child
of the most popular types of cybercrime
pornography) is used as a tool to commit
because it can manifest itself into
an offense.
numerous formats.
Cybercriminals
3. Online Credential Breach
- are the people who uses computer
- occur in various ways – malware,
technology to access personal information,
phishing attack, credential stuffing, etc. –
business trade secrets or use the internet
but the end result is always the same:
for exploitative or malicious purposes.
cybercriminals have access to employees’
Cybersecurity or customers’ personal online credentials
(user name and password).
- are the technologies and processes
designed to protect computers, networks, 4. Debit or Credit Card Fraud
and data from unauthorized access,
- Theft and fraud committed using a credit
vulnerabilities, and attacks delivered via
or debit card to either obtain goods without
the internet by cybercriminals.
paying or to obtain unauthorized funds
Republic Act No. 10175 from an account is not a new phenomenon.
However, online shopping coupled with
Cybercrime Prevention Act of 2012
the rise in cybercrime has increased the
-is a law in the Philippines approved on amount of cyber fraud seen today.
September 12,2012 which aims to address
Basically, this cybercrime involves the
exploitation of children in the porn
industry.

5. Identity Theft
10. Cyberbullying
- Due to the increasing use of computer
- Cyberbullying is one of the most rampant
networks and electronic data sharing,
crimes committed in the virtual world. It is
accessing consumers’ personally
a form of bullying carried over to the
identifiable information is getting easier
internet. On the other hand, global leaders
for cybercriminals.
are aware of this crime and pass laws and
6. Online Scams acts that prohibit the proliferation of
cyberbullying.
-These are usually in the form of ads or
spam emails that include promises of Internet Threats
rewards or offers of unrealistic amounts of
-An Internet threat or Cyber threat is a
money. Online scams include enticing
malicious act that seeks to damage data,
offers that are “too good to be true” and
steal data, or disrupt digital life in general.
when clicked on can cause malware to
interfere and compromise information. It can also refer to the possibility of a
successful cyberattack that aims to gain
7. Cyber stalking
unauthorized access, damage, disrupt, or
- Cyber stalking is a new form of internet steal an information technology asset,
crime in our society when a person is computer network, intellectual proper ty or
pursued or followed online. A cyber any other form of sensitive data.
stalker doesn’t physically follow his
Hacking
victim; he does it virtually by following
his online activity to harvest information - is a term used to describe actions taken
by someone to gain unauthorized access to
8. Software Piracy
a computer. The availability of information
- Thanks to the internet and torrents, you online on the tools, techniques, and
can find almost any movie, software or malware makes it easier for even non-
song from any origin for free. Internet technical people to undertake malicious
piracy is an integral part of our lives which activities.
knowingly or unknowingly we all
- Find weaknesses (or pre-existing bugs) in
contribute to. This way, the profits of the
your security settings and exploit them in
resource developers are being cut down.
order to access your information.
It’s not just about using someone else’s
intellectual property illegally but also - Install a spyware, providing a back door
passing it on to your friends further for hackers to enter and search for your
reducing the revenue they deserve. information.
9. Child Pornography Malware
- Porn content is very accessible now - is one of the more common ways to
because of the internet. Most countries infiltrate or damage your computer.
have laws that penalize child pornography. Malicious software that infects your
computer, such as computer viruses, been locked and demanding a payment be
worms, Trojan horses, spyware, and made for you to regain access.
adware

-Alter or delete files.


Spam
- Steal sensitive information.
- The mass distribution of unsolicited
- Send emails on your behalf. messages, advertising or pornography to
addresses which can be easily found on the
- Take control of your computer and all the
Internet through things like social
software running on it
networking sites, company websites and
Pharming personal blogs.

- common type of online fraud. A means to -Annoy you with unwanted junk mail.
point you to a malicious and illegitimate
- Create a burden for communications
website by redirecting the legitimate URL.
service providers and businesses to filter
- Convince you that the site is real and electronic messages.
legitimate by spoofing or looking almost
- Phish for your information by tricking
identical to the actual site down to the
you into following links or entering details
smallest details.
with too-good-to-be-true offers and
Phishing promotions.

- used most often by cyber criminals - Provide a vehicle for malware, scams,
because it's easy to execute and can fraud and threats to your privacy.
produce the results they're looking for with
Wi-Fi Eavesdropping
very little effort. Fake emails, text
messages and websites created to look like - another method used by cyber criminals
they're from authentic companies. to capture personal information. Virtual
“listening in” on information that's shared
- Trick you into giving them information
over an unsecure (not encrypted) WiFi
by asking you to update, validate or
network.
confirm your account. It is often presented
in a manner than seems official and - Potentially access your computer with the
intimidating, to encourage you to take right equipment.
action.
- Steal your personal information including
Ransomware logins and passwords.
- type of malware that restricts access to How will you know if your computer is
your computer or your files and displays a infected?
message that demands payment in order
*It takes longer than usual for your
for the restriction to be removed.
computer to start up, it restarts on its own
- Ransomware will display a notification or doesn't start up at all.
stating that your computer or data have
* It takes a long time to launch a program.
* Files and data have disappeared.
* Your system and programs crash
constantly.

* The homepage you set on your web


browser is different (note that this could be
caused by Adware that has been installed
on your computer).
* Web pages are slow to load.
* Your computer screen looks distorted.
* Programs are running without your
control.
* If you suspect a problem, make sure your
security software is up to date and run it to
check for infection. If nothing is found, or
if you are unsure of what to do, seek
technical

You might also like