0% found this document useful (0 votes)
72 views25 pages

Midterms

Databases evolved from early file systems to overcome several limitations: (1) File systems required extensive programming for tasks like ad hoc queries and changing structures; (2) They lacked data independence, so data access was dependent on physical storage; (3) This structural dependence made them vulnerable to security issues and inconsistent data. Modern database systems address these problems through data modeling, logical data independence from physical storage, and centralized management of data.

Uploaded by

jules200303
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
72 views25 pages

Midterms

Databases evolved from early file systems to overcome several limitations: (1) File systems required extensive programming for tasks like ad hoc queries and changing structures; (2) They lacked data independence, so data access was dependent on physical storage; (3) This structural dependence made them vulnerable to security issues and inconsistent data. Modern database systems address these problems through data modeling, logical data independence from physical storage, and centralized management of data.

Uploaded by

jules200303
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

pDatabase Distributed database - data distributed across

several different sites.


Data - raw facts Operational - supports a company’s day-to-day
- Are the foundation of information, which is operations
the bedrock of knowledge. - Transactional or production databases
- Building blocks of information Database warehouse - stores data used for
Information - result of processing raw data to tactical or strategic decisions
reveal meaning. Also requires context to reveal Unstructured data - exist in their original state
meaning. Structured data - result from formatting
- Produced by processing data - Structure applied based on type of
- Used to reveal meaning in data processing to be performed
Raw data must be formatted for storage, Semistructured data - have been processed to
processing and presentation. some extent
Accurate, relevant, timely information is the key
to good decision making. XML (Extensible markup language)
Good decision making is the key to organization - Represents data elements in textual
survival. formal
XML database - supports semistructured XML
Database - shared, integrated computer structure data
that stores collection of: Examples:
- End-user data - raw facts of interest to - MS ACCESS
end user - MS SQL SERVER
- Metadata - data about data - IBM DB2
Provides description of data - MYSQL
characteristics and relationships in data - ORACLE RDBMS
Complements and expands the value of
data. Database design - focuses on design database
DBMS (Data management system) structure used for end-userdata
- Collection of programs - Designer must identify database’s
- Manages structure and controls access to expected use
data. Well designed database - facilitates data
Advantages management and generates accurate and
- Is the intermediary between the user and valuable information.
the database Poorly designed database - causes
- Database structure stored as file collection difficult-to-trace errors
- Can only access files through DBMS
- Enables data to be shared Evolution of File system data processing
- Integrates many users’ view of the data Reasons for studying file systems:
- Improved data sharing - Complexity of database design is easier to
- Improved data security und
- Better data integration - Understanding file system problems helps
- Minimized data inconsistency to avoid problems with DBMS systems
- Improved data access - Knowledge of file systems is useful for
- Improved decision making converting file systems to database
- Increased end-user productivity systems.
File systems typically composed of collection of
Types of Databases file folders, each tagged and kept in cabinet
- Organized by expected use
Databases - can be classified according to: Contents of each file folder are logically related
- Number of users Manual systems
- Database location/s - Served as a data repository for small data
- Expected type and extent of use collections
Single-user database - supports only one user - Cumbersome for large collections
at a time Computerized file systems
Multiuser Database - supports multiple users at - Data processing (DP) Specialist
the same time. converted file structure from manual
- Workgroup and enterprise databases. system
Centralized database - data located at a single - Wrote software that managed the data
site - Designed the application programs
Initially, computer file systems resembled manual Data inconsistency - different and conflicting
systems. versions of same data occur at different places
As number of files increased, file systems evolved Data anomalies - abnormalities when all
- Each file used its own application program changes in redundant data are not made
to store, retrieve, and modify data correctly.
- Each file was owned by an individual or - Update anomalies
department that commissioned its - Insertion anomalies
creation. - Deletion anomalies

File systems were an improvement over manual Lack of Design and Data-Modeling Skills
system Most users lack the skill to properly design
- File systems used for more than two databases, despite multiple personal productivity
decades tools being available.
- Understanding the shortcomings of file Data-modeling skills are vital in the data design
systems aids in development of modern process.
databases Good data modeling facilitates communication
- Many problems not unique to file systems between the designer, user, and the developer.
Even simple file system retrieval task required
extensive programming Database systems - consists of logically related
- Ad hoc queries impossible data stored in a single logical data repository.
- Changing existing structure difficult - Maybe physically distributed among
Security features difficult to program multiple storage facilities.
- Often omitted system environments - DBMS eliminates most of file system’s
Summary of file system limitations: problems
- Requires extensive programming - Current generation stores data structures,
- Cannot perform ad hoc queries relationships between structures, and
- System administration is complex and access paths
difficult - Also defines, stores, and manages
- Difficult to make changes to existing all access paths and components.
structures Database system - defines and regulates the
- Security features are likely to be collection, storage, management, use of data.
inadequate 5 major parts of database system:
Structural dependence - access to a file is 1. Hardware - all the system’s physical
dependent on its own structure devices.
- All file systems programs must be 2. Software - three types of software
modified to conform to a new file structure. required
Structural independence - change file structure - Operating system software
without affecting data access - DBMS software
Data dependence - data access changes when - Application programs and utility
data storage characteristics change software.
Data independence - data storage 3. People - all users of the database system
characteristics do not affect data access. - System and database
Logical data format - how human views the data administrators
Physical data format - how computer must work - Database designers
with data - Systems analysts and
Each program must contain programmers
- Lines specifying opening of specific file - End users
type 4. Procedures - instructions and rules that
- Record specification govern the design and use of the
- Field definitions database system
File system structure makes it difficult to combine 5. Data - collection of facts stored in the
data from multiple sources database.
– Vulnerable to security breaches
Organizational structure promotes storage of Database systems - created and managed at
same data in different locations different levels of complexity.
– Islands of information Database solutions must be cost effective as
Data stored in different locations is unlikely to be well as tactically and strategically effective.
updated consistently Database technology already in use affects
Data redundancy - same data stored selection of a database system.
unnecessarily in different places
DBMS FUNCTIONS - Query language is a nonprocedural
language
Most functions are transparent to end users - Structured Query Language (SQL) is the
- Can only be achieved through the DBMS defacto query language
Data dictionary management - Standard supported by majority of
- DBMS stores definitions of data elements DBMS vendors
and relationships (metadata) in a data Database communication interfaces
dictionary - Current DBMS accept end-user requests
- DBMS looks up required data component via multiple different network
structures and relationships environments
- Changes automatically recorded in the - Communications accomplished in several
dictionary ways
- DBMS provides data abstraction and - End users generate answers to
removes structural and data dependency queries by filling in screen forms
Data storage management through Web browser
- DBMS creates and manages complex - DBMS automatically publishes
structures required for data storage predefined reports on a Web site
- Also stores related data entry forms, - DBMS connects to third party
screen definitions, report definitions etc. systems to distribute information
- Performance tuning : activities that make via e-mail.
the database perform more efficiently. Database system provides framework in which
- DBMS stores the database in multiple strict procedures and standards enforced
physical data files. - Role of human changes from
programming to managing organization’s
Data transformation and presentation resources
- DBMS transforms data entered to conform - Enables more sophisticated use of the
to requires data structures data
- DBMS transforms physically retrieved data Data structures - created within the database
to conform to user’s logical expectations and their relationships determine effectiveness.
Security management
- DBMS creates a security system that Disadvantages of database systems:
enforces user security and data privacy - Increased costs
- Security rules determine which users can - Management complexity
access the database, which items can be - Maintaining currency
accessed etc. - Vendor dependence
Multiuser access control - Frequent upgrade/replacement cycles
- DBMS uses sophisticated algorithms to Chapter 2
ensure concurrent access does not affect Designers, programmers, and end users see data
integrity in different ways.
Backup and recovery management Different views of same data lead to designs that
- DBMS provides backup and data recovery do not reflect organization’s operation
to ensure data safety and integrity Data modeling reduces complexities of database
- Recovery management deals with design
recovery of database after a failure Various degrees of data abstraction help reconcile
- Critical to preserving database’s varying views of same data
integrity
Data integrity management Data models - relatively simple representations
- DBMS promotes and enforces integrity of complex real-word data structures.
rules Often graphical
- Minimizes redundancy Model - an abstraction of a real-word object or
- Maximizes consistency event. Useful in understanding complexities of the
- Data relationships stored in data dictionary used real world environment.
to enforce data integrity Data modeling - iterative and progressive
- Integrity is especially important in transaction
oriented database systems Importance of Data Models
● Facilitate interaction among the designer,
Database access languages and applications the applications programmer, and the end
programming interfaces user
- DBMS provides access through a query ● End users have different views and needs
language for data
● Data model organizes data for various
users
● Data model is an abstraction
Cannot draw required data out of the data
model

Data model Basic Building Block

Entity - anything about which data are to be


collected and stores
Attribute - a characteristic of an entity
Relationship - describes an association between
among entities
- One-to-many (1:M)relationship
- Many-to-many (M:N or M:M) relationship
- One-to-one (1:1) relationship
Constraint - restriction placed on the data

Business rules
Descriptions of policies, procedures, or, principles
within a specific organization
- Apply to any organization that stores and
uses data to generate information
Description of operation to create/enforce actions
within an organization’s environment
- Must be in writing and kept up to date
- Must be easy to understand and widely
disseminated
Describe characteristics of data as viewed by the
company

MULTIMEDIA
Multimedia - combination of two or more media to design for governmental services and nonprofit
- Integration of text, graphics, drawings, services applications as well.
moving images. Animation, audio and any
other media where every type of Entertainment and Fine Arts - develop special
information can be presented, stored, effects in movies and animations. Multimedia
transmitted and processed digitally. games are a popular pastime and are software
- Allows the content to be presented in a programs available either as CD-ROMS or online.
nonlinear way, which allows the user to be Some video games also use multimedia features.
active rather than passive.
Interactivity - fundamental feature of Multimedia artists - minds are able to blend
multimedia. techniques using different media that in some way
- The ability of the user to interact with an incorporates interaction with the viewer.
application.
Media - evolved to mean ‘facilitating or linking Peter Greenaway - melded cinema with opera
communication’ - be it via phone, the web, TV or and all sorts of digital media. Another approach
some other instrument. entails the creation of multimedia that can be
displayed in a traditional fine arts arena, such as
When using more than one type of medium, it is an art gallery.
referred to as Multimedia.
Education - multimedia is used to produce
Major Features of multimedia computer-based training courses that lets the
user go through a series of presentations, text
Multimedia presentations - viewed in person on about a particular topic, and associated
stage, projected, transmitted, or played locally illustrations in various information formats.
with a media player.
Multimedia games & simulations - used in a Edutainment - informal term used to describe
physical environment with special effects, with combining education with entertainment
multiple users in an online network, or locally with
an offline computer, game system, or simulator. Engineering - software engineers may use
multimedia in computer simulations for anything
Usage from entertainment to training such as military or
industrial training.
Video games may include a combination of text,
audio, still images, animation, video, and Multimedia for software interfaces are often done
interactivity content forms. as a collaboration between creative professionals
and software engineers.
A presentation using Powerpoint. Corporate
presentations may combine all forms of media Industry - multimedia is used as a way to help
content. present information to shareholders, superiors
and co-workers. Also helpful in providing
Virtual reality uses multimedia content. employee training, advertising and selling
Applications and delivery platforms of multimedia products all over the world via virtually unlimited
are virtually limitless. web-based technologies.

Multimedia finds its application in various areas Mathematical & Scientific Research -
including but not limited to, advertisements, art, multimedia are used for modeling and simulation.
education, entertainment, engineering, medicine,
mathematics, business, scientific research, and Medicine - doctors can get trained by looking at a
spatial temporal applications. virtual surgery or they can simulate how the
human body is affected by diseases spread by
Creative industries - use multimedia for a variety viruses and bacteria and then develop techniques
of purposes ranging from fine arts, to to prevent it.
entertainment, to commercial art, to journalism, to
media, and software services provided for any of Effective PPT
the industries listed below.
- When making PPT consider the type of
Commercial - exciting presentations are used to presentation (Lecture, discussion)
grab and keep attention in advertising. - Don’t make your presentation
Commercial multimedia developers may be hired powepointless.
● Structure your presentation - Always title your graphs.
● Keep it simple (background, font, Other features
colour) - Avoid sound effects in powerpoint
● Minimal content on slides-6/6 - Avoid embedded programs and action
● Avoid pointless animations buttons for advanced users
● Only use pictures if they assist - Refrain from trite clip art
● Ensure accuracy with content and - Choose pictures that highlight your point
equipment - Use a screen capture if appropriate
Spelling and Grammar
The outline - Proof your slides for spelling mistakes,
- 1st or 2nd slide should have an outline use of repeated words, grammatical errors
- Follow outline for your presentation you might have made
- Place main points on outline slide - Have someone check your presentation
Slide layout Conclusion slide
- Use point form, not complete sentences - Use and effective and strong closing
- Maximum 6 points per slide - Use a conclusion slide
- Avoid wordiness: keywords only
- Showing one point at a time will focus Typography - from the Latin words typos (type)
attention on one point, prevent reading and graphos (written)
ahead and help your presentation focused - The art of creating and setting type with
- Do not use distracting animation the purpose of honoring the text it sets
- Do not go overboard with animation - The art and technique of arranging type
- Use consistent animation that involves the selection of typeface,
- Slide transitions should not be distracting fontsize, leading, tracking, kerning.
- Be consistent with transitions - never It’s important to design labels for titles, screens,
random menus, and buttons or tabs using words that have
- Worst effects : Checkerboard or Comb the precise and powerful meaning to express
Fonts what you need to say.
- Use different size to show hierarchy GO BACK is more powerful than previous
- Title font is 36 point Quit is more powerful than cLOSE
- Main point 28 point Typeface - family of graphic characters usually
- Text is 24 point includes many type sizes and styles.
- Use a standard font like arial - Set of one or more fonts, in one or more
- Use at least an 18-point font and bold sizes, designed with stylistic unity
- Capitalize only when necessary - They usually comprise an alphabet of
- Don’t use a complicated font letters, numbers, punctuation marks, and
Spacing special characters.
- If you have a set of points space them out - Families of fonts
on the slide rather than in one corner - Ex. Arial
Colour Font - collection of character of a single size and
- Use a font color that contrasts sharply with style belonging to a particular typeface family
the background - Variations of a typeface
- Use color to reinforce the logic of your - Ex. Arial underline
structure Courier is a typeface while courier 12-point italic
- Use color to emphasize a point but only is a font
use this occasionally
- Using a different color for each point is Font styles - boldface, italics
unnecessary Attributes - underline, outline
- Trying to be creative can also be bad Type sizes - expressed in point (1/72 of an inch)
Background
- Use a simple background
- Use backgrounds that contrasts with
text/imagery
- Use the same background consistently
throughout your presentation
Baseline - horizontal guideline indicating where
Graphs
the bottom of the characters
- Use graphs rather than just charts and
X height - height of the lowercase letters with no
words. Data in graphs is easier to
ascender or descender
comprehend and retain rather than raw
Ascender - part of the lowercase letter that
data.
extends above x-height
Descender - part of the lowercase letter that Rasterizing - converting mathematical
extends below x-height representation of font to a recognizable symbol
displayed on screen or in printed output.

The direction and degree of incline in the axis of a


font with contrast
It could be diagonal (oblique or biased) vertical, or
horizontal.

Point sizes are not exactly the same height.


Serif - short line or Weights
finishing stroke that
crosses or projects from
stems or strokes in a
character
Bracket - also called a
fillet; a shape that
appears in a character
at the junction of a serif
and a main stroke
Hairline - thinnest Condensed and extended
stroke of a letter

Slab - bold, rectangular appearance and


something has fixed widths, meaning all Typeface categories
characters occupy the same amount of horizontal
space Old style - formed the way scribes held their
Wedge - junction of the serif and the stem are pens in the late 1400s
diagonal rather than bracketed - Most readable because they were meant
Leading - pronounced as ledding for long lines of text
- Space vertically between lines of text - Warm and graceful
Kerning - spacing between character pairs

Tracking - horizontal space between each Modern - industrial revolution = mechanical point
character of view
- Old style typefaces were becoming
obsolete
- Elegant but severe and cold
- Not very readable

Script - emulates handwriting


- Classy and formal
- In the 1400s only the rich could afford
books, were made by scribes who wrote in
Slab serif - also known as square serif script
All characters occupy the same amount of
horizontal space, as printed by a typewriter
- Industrial revolution = advertising
- Advertising needed thick typefaces
- Thickening modern typefaces made it
impossible to read. Thickened serifs
instead
- Mostly egyptian names because
archeology was the in thing due to finding
the rosetta stone Decorative -enhances a theme
- Most slab serifs are called clarendons - Not meant for anything but for decoration
because it epitomizes the letterform - Not to be used as text
- Adds punch to a publication
- Creates a look or emphasizes content
- If overused, it can destroy a design

Distressed - mac put desktop publishing in the


hands of the masses
- Rules of traditional typography were
demolished. Users became more
interested in typefaces and many
manipulated their own

Sans serif - Sans is french for without


- In 1816 william caslon created the 2-line
egyptian where he removed the serifs
because he hated them.
- The bauhaus motto “form follows function”
stripped typefaces to their bare essentials
- Futura is the epitome of this letterform
- Large x-height creates a presence
Legibility - informal measure of how easy it is to
distinguish one letter from another. Structure - use typefaces from families with
Readability - gauge of how easily words phrases different structure
and blocks of copy can be read - Never put typefaces from the same family
structure on the same page
Combining typefaces - Ensure that the contrast is emphasized
- Limit to only 3 families
Concordant - one family, safe but dull
Contrast - typefaces are clear and distinct from
each other.
Conflicting - 2 or more typefaces that are similar
in style, size, weight, etc.
- Disturbing because visual attraction is not
concordant or contrasting
Ways to achieve contrast

Color - you can change the color of one typeface


- Typists also refer to density of text as color Weight - refers to the thickness of the strokes
- Strokes can be bold, semi-bold,
extra-bold, regular, light etc.
- Great for organizing information
- Again, emphasize the contrast

Direction - direction of how a text is read

Shapes

3 variables that can be applied to shapes and


Form - refers to the shape of the block of letters. forms:
Variances in shape color, value and texture
- These variables determining a form’s
basic appearance and aesthetic character
Constructions through combinations, repetition
and pattern.
- Complex forms, patterns, symbols,
graphic icons, and images can all be
Size - contrast big type with small type created through these methods of
Make the contrast obvious. construction
Treatments applied to rendering and
presentational styles of shape and form.
- Consider using treatments from these
categories to alter and enhance the final
presentation of a shape, form or
construction
Logo - began as basic shapes – shapes whose
forms were colored, textured, altered and
adjusted until a viable icon revealed itself to the
designer presiding over their transformation.
3 methods of construction

Union - simply the combined forms of alike or


different shapes. Explore! Vary the size, rotation
and placement of the components as you look for
effective unions between them.
Punch - try punching the contour of one shape
through another. Work with two or more shapes,
alike, or different, take the resulting form and
punch it further or apply other means of alteration
Crop - shapes can be cropped or contained
within the boundary of other shapes

Construction Composition
- Mini compositions can be created by
stacking or placing shapes next to each
other
- Can be built using forms within forms
- Visual contrasts generates visual energy
- Shapes can be mixed and colors varied as
the basis of visually pattern or graphic
element
- Literal form has been placed within bold
geometric form
- Visual bond between overlapping images
is strengthened by a shared conveyance
or movement
- Representational images can be built of
shapes – a common means of creating
icons and simple graphic elements
Construction Repetition
- Surprisingly versatile means of creating
potent graphic images
Construction Patterns
- Have long been used to add richness and
depth to designs and other works of art
- Can be used within compositions to
support backdrops for text, icons, etc.
- Can give life and energy to areas of a
printed or digital designs that are usually
blank
STS 200 BCE - Historian Polybius describes
communication by means of fire signals.
Antiquity

Medicine & Health


Medicine and health encompasses the study of 530 BCE - According to tradition, Anaximander
prevention, cure, and understanding of disease invents the first sundial.
as well as the investigation of physical and mental
wellbeing. 9 CE - An adjustable caliper is in use in China.
Built from brass along the lines of a modern
600 BCE - Susruta performs first cataract adjustable wrench, it measures in tenths of a unit
operations and plastic surgery about the size of an inch.
512 BCE - Alcmaeon of croton is the first person
to dissect human cadavers for scientific purposes 400 CE - Hypatia of Alexandria develops the
300 BCE - Herophilus dissects the human body hydroscope (also called hydrometer), an
40 CE - De materia medica by Greek physician instrument for determining the specific gravity of a
Pedanius Dioscarides deals with the medical liquid. It consists of a sealed tube weighted at one
properties of about 600 plants and nearly a end
thousand drugs
170 CE - Galen of Pergamum is the first to take a Communication (1660-1735)
person’s pulse and use it in diagnosing problems
Cerebri Anatome (1664) - 1st published in 1664
Mathematics - most complete and accurate account of the
nervous system
- first to use the term Neurology
CHRONICLE 600 BCE - first descriptions of the “circle of Willis” and the
eleventh cranial nerve (the nerve of Willis).
The Chinese text Arithmetic - considered as one of Willis' greatest discovery

Classic of the Gnomon and the Circular Paths of Velocity of Light (1676)
Heaven, written about this time, contains the first - danish astronomer Ole Romer became the
known proof of a version of the Pythagorean first person measure the speed of light.
theorem. ーsolved the problem using a much longer
distance over which measure the velocity of light.
5 CE - Mathematican Liu Hsin is the first person ーthe speed of light is 240,00 km (1500,00 mi)
known to use decimal fraction per second.
ーstudied Jupiter, its moon, and Earth to measure
300 CE - Abacus is used in Europe,although the velocity of light.
counting boards based on the same principle had ーit took 16 minutes longer for the light to travel
been used by the ancient Greeks and Romans as when earth is the farthest away from Jupiter than
much as a thousand years earlier. when the earth is the closest
ーThis is also the reason that light was moving at
Biology a finite speed.

Aristotle was the first to classify living organisms


on a grand scale, separating animals into those Philosophiæ Naturalis Principia Mathematica /
with blood and those without. Principia (1687) ーwritten by Sir Isaac Newton
- published on July 5, 1687 by the Royal Society
in London
50 BCE - Lucretius suggests that some - considered as one of the most important works
organisms have adaptations that help them in the history of science
survive while others are less fitted to survival and - written in order to layout his ideas about the
become extinct. His famous poem De rerum fundamental laws of physics and mathematics
natura was published after his early death. - one of the first works that set the standard of
precision and rigor needed in scientific
Communication investigation
It introduced several important ideas:
Greek traveler and historian Hecataeus of Miletus - first law of motion (law of inertia)
(Turkey) develops a map of the world showing - second law of motion (law of force and
Europe and Asia as half disks surrounded by acceleration)
ocean. - third law of motion (law of action and
reaction) Thomas Newcomen - The first commercially
- the universal law of gravitation successful engine that could transmit continuous
power to a machine was developed in 1712 by
Daily Courant (1702) ーpublished on March 11, Thomas Newcomen.
1702
- first English-language daily newspaper Thomas Savery - was an English inventor and
- produced by Elizabeth Mallet. engineer. He invented the first commercially used
- Elizabeth published articles under the alias E. steam-powered device, a steam pump which is
Mallet. often referred to as the "Savery engine"
- Contained only one page of news (initially with
a focus on international affairs), later adding Renaissance and Scientific Revolution (1453
advertisements on the reverse side. through 1659)
- Inspires the development of other news
publications, and kickstarts London's famous 1508 - Gotz of the Iron Hand
newspaper industry, which would cluster on Fleet - Gottfried von Berlichingen was a German
Street close to where the Courant had its birth. Imperial Knight mercenary and poet.
- In 1504 , enemy cannon fire jolted his
Steam Engine - Alternately, lifting with steam and blade against himself, maiming his right
letting the steam cool back into water is the arm at the elbow. German doctors
simplest form of a steam engine. amputated his hand and wrist, seemingly
- is a heat engine that performs mechanical work putting an end to his military career
using steam as its working fluid - Berlichingen commissioned a local
blacksmith to forge and engineer an iron
Aelopile - was created by Heron of Alexandria. prosthesis capable of wielding a sword.
- His extraordinary military feats and
Giambattista della Porta recognized the two legendary iron hand prosthesis, von
advantageous aspects of steam: Berlichingen is deeply associated with
Renaissance lore.
- By creating pressure steam - Johann Wolfgang von Goethe wrote a play
- By condensing based on the autobiography of the
charismatic mercenary von Berlichingen.
Denis Papin - had studied medicine and physics, The play includes a line that has been
who first thought of using steam to move a piston associated with von Berlichingen for
in a cylinder to deliver work. He started working centuries, which is his response to a
for the French Academy of Science and became surrender ultimatum during a siege: "Tell
the assistant of Christiaan Huygens, the Dutch him he can kiss my ass."
astronomer who was one of the founding 1522 - Juan Sebastian del Cano
members of the academy. - On August 4, 1526, Spanish navigator
Juan Sebastián del Cano completes the
also experimented with such devices, found that first voyage around Earth after original
steam was not only a much better agent to create commander Ferdinand Magellan is killed.
a vacuum, but could be used to deliver work. After Magellan’s death in the Philippines, a
series of men took command of the
His simple steam engine of 1690, also called expedition, but none of them stayed in
Papin’s cylinder, consisted of a cylinder closed charge for longer than a few months. As
at the bottom, containing water, and sealed off by one of the few remaining men, Cano took
a movable piston. charge of one of the two surviving ships,
the Victoria, later that year. He safely
Christiaan Huygens - as then experimenting brought the expedition home to Spain,
with air pumps and with a gunpowder engine. despite scurvy, starvation, and
One Huygens’s aims was to create a vacuum by harassment by the Portuguese.
exploding gunpowder engine. One of Huygens’s
aims was to create a vacuum by exploding 1577 - Dutchman’s Log
gunpowder in a cylinder with a piston. The piston - The use of the Dutchman's log for
would shoot to the top of the cylinder and thus measuring the speed of a ship is known.
create a vacuum. Unlike the log-and-line, it uses marks on
the side of the ship. The interval between
British engineer Thomas Savery and later the first and last mark passing a floating
Thomas Newcomen, devised the first machines object indicates the measure of the ship's
that put steam to work. speed.
- • This invention is attributed to the Escapement 725
Portuguese Bartolomeu Crescêncio, who - The most important part of the mechanical
designed it in the end of the 15th century clock. Invented in China.
or in the beginning of the 16th century. - The Tang dynasty Buddhist monk Yi Xing
along with government official Liang
1602 - Barium Sulfide Lingzan made the escapement
- Vincenzio Casarido discovers barium
sulfide Calendar 1000
- e (BaS) is a sulfide of barium found - A calendar with a year of 360 days divided
naturally as the mineral barite. It is in 12 months of 27 or 28 days is
colorless, although like many sulfides, it is introduced in India.
commonly obtained in impure colored - The Indians add an extra month at regular
forms. It is considered to be the most intervals
important synthetic material of barium, - About this time, the seven-day week was
being the precursor to barium carbonate introduced to China by Persians or
and the pigment lithopone. Barium is a merchants from central Asia.
metallic alkaline earth metal with the Matchsticks 568
symbol Ba, and atomic number 56. - A note from the text of Cho Keng Lu
1608 - The Telescope (1366) described a sulfur match (small
- German-Dutch optician Hans Lippershey sticks of pinewood impregnated with
invents the telescope sulfur). A book called the Records of the
- In 1608, Lippershey laid claim to a device Unworldly and the Strange written by
that was able to magnify an object three Chinese author Tao Gu
times. His invention had a concave Gunpowder 868 – Chinese scientists began to
eyepiece aligned with a convex objective make gunpowder. Chinese monks/Taoist
lens. alchemsits discovered saltpeter (potassium
- According to one story, he was inspired to nitrate), which is the main ingredient of
create his invention after seeing two kids gunpowder, while in their pursuit of a potion of
in his store holding up two lenses to make immortality.
a distant weathervane look closely. Others Yard (1101) - Henry I introduces the yard, a
alleged at the time that he stole the design length equal to the length of his arm
from Zacharias Jansen, another eyeglass Multicolor Printing (1107) - invented by the
manufacturer. chinese. They introduced banknotes printed in six
colors in order to make early paper money harder
Medieval period (from 530 through 1452) - saw to counterfeit
major technological advances, including the Saint Pierre Cathedral 1225 - work on this
adoption of vertical windmills, spectacles, cathedral began on 1225
mechanical clocks, and greatly improved water - According to the tourist office's Walk
mills, building techniques, mathematics, medicine Beauvais brochure, it "symbolizes the
and agriculture in general.For our topic, it is about power of the Bishops of Beauvais, the
the history of science and technology during the Counts of the city since the 11th Century.
Medieval period, from 530 through 1452. These
include the major advancements and inventions Enlightenment and the Industrial Revolution
in the fields of science and technology during the (1736 - 1819)
time period.
Enlightenment - coined to reflect a change in the
Algebra 835 philosophical approach. Has produced numerous
- Invented by Muhammad ibn Musa books, essays, inventions, scientific discoveries,
al-Khwarizmi, known as the father of laws, wars and revolution. It is often equated with
algebra. the latter of the 18th century.
- He wrote Kitab al-Jabr, which is where the In England it is the period of the Industrial
word ‘Algebra’ is derived from Revolution
- Gives a universal method for solving all
equations of the first and second degree Leyden Jar - 1745 - Edwald Georg con Kleist
with positive roots. - an electrical component that stores a high
voltage of a voltage electric charge.
Typically consists of a glass jar with metal
foil. It was the original form of the
capacitor.
Hydrogen Cyanide - 1765 - Karl Wilhelm reading, investigation, study or research
Scheele
- discovered by a swedish chemist Communication - act of transmitting messages
- Colorless, poisonous, chemical compound and a process whereby information is exchanged
called prussic acid between individuals
- It is commercially used for mining,
chemical synthesis, dyes and pesticides.
Submarine - 1776 David Bushnell Technology - application of science used to solve
- Named the Turtle problems
- Used extensively in search and rescue
operations ICT is the technology required for information
- Were originally invented in order to processing.
improve human understanding of the Devices:
marine government • Electronic computers
Chemical Bleaching 1785 John Fitch • Communication devices
- Was discovered by the French chemist • Software application
Berthollet, in Javel on the outskirts of
Paris.
- Effective in whitening textiles. Used to convert, store, protect, process, transmit,
Gas Turbine - 1791 John Barber retrieve information from anytime, anywhere:
- John Barber patented the first gas turbine
engine ICT Definitions
- Turbines are extremely important because
of the fact that nearly all electricity is
• United Nations Educational, Cultural, and
produced by turning mechanical energy,
Scientific Organization (UNESCO) “The
scientific, technological and engineering
LIVING IN THE IT ERA
disciplines and the management techniques used
to handle transmit information with men and
1.AI - receive and interpret dictation or
machines.”
understand commands
2. product and food technology- deals with
combining design and marketing to create • Official IBM Glossary “ICT is the use of
product computer based information systems and
3.digital subscriber line - transmits digital communications systems to process, transmit,
information using telephone line and store data and information.
4.LAN - system where computers and other
devices connect with each other using one “The convergence of computers, microelectronics
location( and communications constitute the information
5.communication - is an act of transmitting and communication technology for the purpose of
messages. It is a process whereby information is acquisition, processing, storage and
exchanged between individuals using symbols, dissemination of information.”
signs or verbal interactions
6. assistive technology - software where people
which less abilities in accessing computer WHAT IS ICT?
7. polymorphic virus - this virus has the
capability to evade anti-virus programs since it - Information communications technology
can change codes every time an infected file is - Technology used for communicating
performed information:
8.BIM/building information modeling - digital - Uses for information: Locate, save, send,
technology that enables a design and edit.
construction of buildings to be visualized
9. Fluorometer - digital technology that enables
a design and construction of buildings to be EXAMPLES AND USES
visualized Communication Devices
10. fiber optic ^ it is one of the best broadband ⮚ INTERNET CONNECTION
options that are available in the market and it • Video Conference – call multiple people
uses light signals to transmit information around the world simultaneously
• Chat – when we ran out of battery
⮚ Cellular Network
• Send texts and call people in contacts
Information - the knowledge obtained from • Mobile data for web browsing and
applications
⮚ Payphones
• When ran out of load or battery

Information
⮚News can be read online
• Focusing on web content versus
paper-based content
⮚Books can now be read online
• Online modules, Google Scholar
⮚Research journals are also available
online
• Can be retrieved with relative ease
Changes in ICT 2017 and beyond

⮚E-learning - Students can learn anywhere and


anytime Investment on Information-Based Products
– increase of consumer gathered
– revenues produced by these tools be twice than
⮚Online Records System - Can be stored online that of non-tech based sources
and retrieved from anywhere
Greater Need to Build Skilled Tech Teams
⮚ Software - Every software has different set of
purposes Digital Platforms for Customer Support
- AutoCAD – Computer Aided Design – 60% of all customer interactions in the PH will
- Audacity – Music production software - take place in digital channels (2019)
Office Applications – MS Word, Powerpoint, Excel – Both facilitated by call centers and that aren’t
– Result of the increasing number of Filipinos
Cartoon Animation - Done instead of drawing who are on social media
every frame
Cybersecurity – Business’ Top Priority
⮚Survey Results / Election Results - Automated Cybersecurity – one of the foundations of their
counting; sent directly to the main office strategies
•Security breach trends and tactics
• Susceptibility to malicious attacks
ICT IN THE PHILIPPINES
• Philippines is the “ICT Hub of Asia”
• Dubbed by international companies Tech Adoption from Government Support
• Employment in this industry was forecast to Technology adoption – key strategy for economic
grow in the next two years, reaching as much as growth
1.43 million people in 2022. • PH – 71/193 countries on e-government
• Selfiest cities around the World • By Time development (UN)
Magazine • DICT – spearhead the nation’s ICT use
for economic growth and public service

Global Trends in ICT

Technological Convergence - existing


technologies merge to create new forms
– synergy of technological achievements to work
on a goal or task

Social Media - websites,application, or online


channel that enables web user to create, discuss,
modify and exchange user-generated content

Mobile Technologies - devices that prioritize


being portable, compact and lightweight.
Brands of Mobile Devices coherence, culture, tradition and social norms and
values. Living standard of people has highly risen
Symbian - original platform by NOKIA devices up and has become sophisticated due to
technology

Windows Mobile - developed by microsoft for


smartphones and pocket PCs Technology impact on culture
Technology has a crucial impact on fundamental
aspects of all our cultures including language, art,
Windows Phone OS - closed course and mobility, education and religion. Culture of a
proprietary OS developed by microsoft community acts as a standard for perceiving,
judging and evaluating the technology.
Blackberry OS - proprietary mobile OS
developed by Blackerry Technology Impact on Tradition
As seen in TED talks, Sherry Turkle says “As we
Android OS - open source OS (Google) expect more from technology; we start to expect
less from each other.” Tradition style thrives if
they have their recognized value. Technology
iOS – developed by Apple helps to modify method of production or
industrialization rather than killing the tradition.
Assistive Media - software or hardware which Thus, technology allows preservation of tradition
aid people with less abilities in accessing if beneficiary part is taken into account.
computers.
Technology impact on Social Values
Artificial Intelligence- branch of computer Technology plays a crucial role to strengthen
science focused with making computer work and interpersonal connection. It has contributed in the
act like humans. sector of health, transportation, electricity, etc. to
all the demographic factors of society eg: Modern
farming replaced primitive farming allowing
Robotics - Field of computer science and
increased crops, less time investment, etc.
engineering concerned with creating devices that
can move and react to sensory input
Code of Conduct for IT professionals
IT staff performing regular duties may have
Virtual reality- Three-dimensional
access to data in applications, emails, and file
computer-generated environment that can be
systems or on desktops, servers and networks,
explored and interacted with a person
and other systems that must be protected by the
University. In performing their duties IT staff will
Augmented reality- A technology that comply with applicable University policies
superimposes a computergenerated image on a
user’s view of the real world, thus providing a
• We have access to user’s electronic information,
composite view.
some of which may be personal and confidential.

Internet of Things / IoT - Billions of physical


• We require access to user’s electronic
devices around the world that are now connected
information in order to develop, test, implement
to the internet, collecting and sharing data
and support the University’s applications, systems
and networks and to ensure they run properly; to
Cloud computing - The process of storing and protect against threats such as attacks, malware,
accessing data and programs over the internet and viruses; to protect the integrity and security of
instead of your computer’s hard drive. information; to help support business continuity;
and to help deal with threats to campus safety
IT, CULTURE AND THE SOCIETY and the safety of individuals.
Technology not only increased humans’ life span
but also the way how we live (Barbara Bray). • We only obtain the information we need to
Initiated with the use of printing press, allowed the perform our job or which we have been directed
masses to receive news, read books and attend to obtain by proper University or legal authorities.
school. Communities developed within large cities • We only use the information gathered for the
to protect and sustain the different cultures. Every purpose for which it was obtained, properly
nation and its community has its own identical protect the information while in our possession,
and dispose of it properly once it is no longer The Influence of IT on Culture and Social
needed for business purposes. • We will not Behavior
peruse or examine user’s electronic information The implementation of Technology has an impact
for any purpose other than to address a specific on societal values by changing expectations and
issue. realities. Overemphasizing technology has
created the following effects:
We understand any failure to meet the Code of ● Unemployment - can be caused by
Conduct is considered a violation of trust and is automation of tasks that were previously
grounds for disciplinary action up to and including performed by humans or by the
dismissal. • We will sign a yearly acknowledgment replacement of workers by machines
that we have received, read, and understood this ● Employment - IT can also open up a lot
Code of Conduct. of job opportunities for those who are
technologically inclined.
● Cultural Lag - occurs when changes in
Negative Practices in Social Media material culture occur before or at a faster
rate than changes in non material culture.
Copyright - The exclusive legal right, given to an Code of Conduct for IT professionals
originator or an assignee to print, publish, ● Contribute to society and human
perform, film, or record literary, artistic, or musical well-being
material, and to authorize others to do the same. ● Avoid harm to others
Copyright infringement is the violation, piracy or ● Be honest and trustworthy
theft of a copyright holder's exclusive rights ● Be fair and take actions not to discriminate
through the unauthorized use of a copyrighted
material or work. Negative Practices on Social Media
● Cyberbullying
● Illegal market
Plagiarism - An act or instance of using or ● Child exploitation
closely imitating the language and thoughts of ● Child grooming
another author without authorization ● Misinformation
● Cybersex
Computer addiction ● invasion of privacy
● Data leaking
Offline: generally used when speaking about
ISSUES ON INFORMATION CONTROL AND
excessive gaming behavior, which can be
PRIVACY
practiced both offline and online.
Online: Also known as “Internet Addiction”, gets
Electronic Surveillance - involves monitoring
more attention in general from scientific research
people with technology, often without their
than offline computer addiction, mainly because
knowledge. This can be done through video or
most cases of computer addiction are related to
recording devices.
the excessive use of the Internet
Personal information - provided to companies
Virtual Self -The persona you create about
when users sign-up for accounts, such as
yourself virtually.
facebook, instagram, or grocery discount cards.
Hacking - Unauthorized access of or interference
These companies then sell the personal
with computer systems, servers, or other
information to other companies that use the data
information and communication systems
to market the user.
Computer-related forgery, fraud and/or
Identity Theft - occurs when someone steals an
identity theft - An attempt to obtain sensitive
individual’s information to commit a crime, such
information such as usernames, passwords, and
as fraud. Identity thieves can use this data to
credit card details and (indirectly money), often
make purchases, apply for credit cards, get
for malicious reasons
medical services, or apply for a job.
Electronic Theft - illegal downloading
Spyware - a small computer program that gets
Cyberbullying - The use of electronic
stored on a user’s hard drive. The program
communication to bully a person, typically by
collects the user’s habits and transmits that
sending a message of an intimidating or
information to a third party, all without the user’s
threatening nature
content.
Child pornography - Form of child sexual
Cookies - small data files that websites use to
exploitation
track users visiting the site. Third party cookies
Cyber defamation - Is an unprivileged false
are typically the ones that cause personal data to
statement of fact which tends to harm the
reputation of a person or company
be compromised because they follow and record 3. Construction Technology - deals with
the user as they do business online. the study of equipment and advanced
methods that are beneficial for building
Republic Act 10173 - Data Privacy Act of 2012 several basic and advanced structures.
- An act protecting individual personal 4. Assistive technology- - refers to
information in information and maintaining and improving an individual's
communications systems in the functioning and independence while
government and the private sector, promoting one's well-being.This
creating for this purpose a national privacy technology has the widest application for
commission, and for other purposes. individuals with disabilities, thus aiming to
1. It protects the privacy of individuals while improve their quality of life. (e.g. artificial
ensuring free flow of information to limbs and arms, wheelchairs, walkers, and
promote innovation and growth; crutches.)
2. Regulates the collection, recording, 5. Medical Technology - the most valued in
organization, storage, updating or the realm of medicines today as it is
modification, retrieval, consultation, use, equipped to improve your health, save
consolidation, blocking, erasure or lives, and contribute to sustainable
destruction of personal data; and healthcare.Medical technology aids in
3. Ensures that the philippines complies with more efficient and accurate health
international standards set for data assessments, diagnosis, management of
protection through National Privacy health ailments, and treatment, along with
Commission (NPC) implications in the field of pharmacology.
Computer Ethical Issues (e.g. robotic surgery, therapeutic devices,
biometrics, and diagnostic imaging)
Computer Crime - an intellectual, white-collar 6. Entertainment technology - beneficial for
crime. creating and improving an entertaining
- Computer Theft (stealing funds via experience in human life. (e.g. virtual
computer) reality, augmented reality, interactive
- Unauthorized Computer Entry environments, automation, simulations,
- Hacking and audio-visual areas.)
Privacy - the privacy issue focuses on the 7. Business Technology - the
computer’s most basic functions. ever-increasing reliance upon the realm of
- Capacity to store information by several types of businesses
- Organize while optimizing processes.
- Exchange 8. Architecture Technology - the
Harmful Actions - refers to the damage or subcategory in the discipline and is
negative consequences to the IT such as loss of predominantly practiced by architectural
important information, destruction of property and engineers and architects across the world.
undesirable substantial impacts. Modern application of technology in
Piracy - an activity in which the creation of illegal designing buildings such as Building
copy of the software is made. Information Modeling (BIM), renderings,
generative design, 3D printing, and IoT.
Different types of Technologies 9. Aerospace Technology - the requisite
1. Artificial Intelligence - a type of scientific knowledge and equipment that
technology that refers to the intelligence are being used and developed for
showcased and demonstrated by aviation.
machines that directly contrasts with the 10. Robotics Technology - elated to artificial
natural intelligence of humankind or intelligence and deals with the utilization
animals. ( e.g.Smart assistants on our of machines, operation, instructions and
devices, such as Siri, Google Assistant, communication satellites. (e.g. One of the
and Alexa.) industries that widely use this technology
2. Information Technology - involves the is healthcare, which has immensely
use of computer systems—hardware and beneficial medical robotics implications.)
software— and telecommunications for 11. Agriculture Technology - a kind of
the purpose of storing, sending, and modern technology derived from the basic
retrieving information (e.g. performance necessities of agriculture.
management software, content 12. Product and Food Technology - deals
management software, and telephone and with combining design and marketing to
radio equipment.) create a product that can be sold.
13. Educational Technology - improves the implement technologies for sports. This
learning process by replacing or technology has helped take sports to the
implementing the more traditional next level with innovative training
approaches with scientific and techniques and designing better
technological tools competitive surroundings.
14. Operational Technology (OT) - refers to 26. Electrical Engineering Technology -
the use of software and hardware for combines science and the principles of
controlling industrial equipment in order to electrical engineering for improved design,
carry out security measures. installation, operation, and maintenance of
15. Forensic Science Technology - An electrical systems.
important area to add more precision to 27. 3D Printing Technology - makes the
criminal justice, forensic science task of printing objects in three dimensions
technology helps identify facts in the achievable and more efficient. One of the
investigation process with the help of most prominent technologies for this
scientific knowledge surrounding the purpose is CAD software, which helps
elements of evidence design the object, which is then entered
16. Space Technology- a field that helps into a printer to create the object.
space scientists plan and execute space 28. Quantum Technology - A subfield of
exploration, spaceflight, and the physics, quantum technology has various
observation of Earth. It is mainly used for applications in fields, such as
communication and navigation and to communication technology, electric and
support human activities beyond Earth’s magnetic sensors, quantum computing,
atmosphere. modeling, metrology, and cryptology
17. Communication Technology - deals with 29. Industrial & Manufacturing Technology
the transfer of information in the form of - helps improve industrial and
messages among machines and people manufacturing processes and operations
18. Hospitality Technology - aids in client with scientific techniques
interactions in the hospitality sector using 30. Marine Technology - helps come up with
technological infrastructures, such as sophisticated eq
software and networking means
19. Superintelligence - The use of artificial Classification of Technology according to its
intelligence and computer systems to field of use
facilitate the betterment of human life is
referred to as superintelligence. This form Communication - The sending and receiving of
of technology replaces various operations messages.
that humans would have to do otherwise Construction - The design and development of
accomplish manually new buildings and structures.
20. Blockchain Technology - a web-based Energy - The power/fuel of technology.
monetary system that allows information Considered the “food” of technology. All other
to be encrypted. Initially created for digital areas depend on it.
assets, this technology is currently used to Manufacturing - The design and development of
create applications for online stock products
exchanges and even social media sites. Transportation - The movement of people or
21. Environmental Technology - the use of goods. Many methods: cars, trucks, airplanes,
scientific knowledge and techniques that trains, pipelines
help improve the environment. Bio-related Technology - Technology related to
22. Biotechnology - It is based on biology life. This includes all technologies used in the
and makes use of biochemical and cellular medical field.
processes to come up with technologies.
Biotechnology aims to improve our lives. COMMUNICATION DEVICES
23. Vehicle Technology - aims at bringing Smartphone - The first smartphone was the IBM
down carbon emissions while enhancing Simon, which was released in 1993, but the
the comfort of the vehicle. The internal modern smartphone industry was revolutionized
parts of cars and aircraft are upgraded by the release of the iPhone by Apple in 2007.
from time to time for improved efficiency. Television - The first practical television was
24. Military Technology - aims at creating invented by John Logie Baird in 1926, and major
better tools, weapons, and equipment to television manufacturers include Samsung, LG,
better equip military personnel for wars. Sony, and Panasonic.
25. . Sports Technology - the use of Computer - The first electronic computer was
scientific knowledge to design and invented by John Atanasoff and Clifford Berry in
1937, and major computer manufacturers include
IBM, Apple, HP, and Dell. BIOTECHNOLOGY
Incubators - laboratory incubators are commonly
CONSTRUCTION DEVICES used for the growth and storage of bacterial
Prefabrication - is the process of constructing cultures.
building components off-site and assembling DNA Analyzer - processes DNA samples and
them on-site. This technique has become DNA generated through electrophoresis, PCR,
increasingly popular in recent years, as it can and other techniques.
speed up construction times and reduce costs. PCR Tubes - among the various laboratory tubes,
One of the pioneers of prefabricated construction PCR tubes are used in the Polymerase Chain
was the American architect Buckminster Fuller, Reaction (PCR) and real-time experiments. This
who developed the concept of the geodesic technique allows scientists to replicate small
dome. amounts of DNA.
Building Information Modeling (BIM) - is a Fluorometer - A fluorometer is a machine that is
digital technology that enables the design and capable of accurately measuring extremely low
construction of buildings to be visualized and concentrations of nucleic acids.
simulated in a virtual environment. This
technology has become increasingly popular in Computer network is a cluster of computers over
recent years, as it can help reduce errors and a shared communication path that works for the
improve efficiency. The concept of BIM was first purpose of sharing resources from one computer
developed by Chuck Eastman at the Georgia to another, provided by or located on the network
Institute of Technology in the 1970s. nodes.
Some of the uses of computer networks are the
ENERGY following:
Solar Technologies - 1883 ➢ invented by
Charles Fritts ➢ Converts sunlight into electrical
- Communicating using email, video, instant
energy either through photovoltaic (PV) panels or
through mirrors that concentrate solar radiation. messaging, etc.
This energy can be used to generate electricity or
be stored in batteries or thermal storage. - Sharing devices such as printers,
Hydropower - 1882 British-American engineer
scanners, etc.
James Francis developed the first modern water
turbine. Or hydroelectric power, is a renewable
source of energy that generates power by using a - Sharing files
dam or diversion structure to alter the natural flow
of a river or other body of water. - Sharing software and operating programs
on remote systems
MANUFACTURING
3D Printer - 1981 ➢ Created by Chuck Hull ➢ - Allowing network users to easily access
3D printers produce complex objects from digital and maintain information.
models. This technology can be used with
plastics, metals, or even concrete Types of Networks
Artificial Intelligence - 1951 ➢ Created by
Christopher Strachey ➢ Artificial intelligence Wired Network - as we all know, “wired” refers to
(A.I.) is any technology that mimics human any physical medium made up of cables. A wired
intelligence. This technology can collect network employs wires to link devices to the
information and use it to change how tasks are Internet or another network, such as laptops or
completed. desktop PCs.

TRANSPORTATION - Dial Up is the first extensively used


Car - The automobile was invented by Karl Benz internet access method that enabled
in 1885, and the first mass-produced car was the digital connectivity
Ford Model T, produced by the Ford Motor - It requires telephone lines to establish a
Company. connection to the internet
Airplane - 1903 ➢ Orville and Wilbur Wright ➢ - Cable Internet is one of the popular
Also called aeroplane or plane, any of a class of methods for providing fast-speed internet.
fixed-wing aircraft that is heavier than air, It uses a coaxial copper cable which is
propelled by a screw propeller or a high-velocity also used for cable TV service
jet, and supported by the dynamic reaction of the - Digital Subscriber Line (DSL) transmit
air against its wings digital information using established
telephone lines. It is often applied to
asymmetric DSL, which means you get network. VPNS use tunneling protocols that
different speeds of uploading and create encrypted connections between the
downloading data. network and client devices. Network traffic travels
- Coaxial is a copper-based coaxial cables over VPN service’s secure, encrypted tunnels
and is thick, multiwire cable that can be instead of a public network effectively hiding a
used for both high bandwidth and high user’s IP address and data from ISPs and
connectivity connections. cybersecurity hackers.
- Twisted pair is a shielded, copper-based,
twisted pair cable used in local area HOW DOES IT CONNECT TO DEVICES?
networks, particularly older types of • A wired network is one where the devices in
networks the network are connected using cables.
- Ethernet is an unshielded, copperbased, Most wired networks are Ethernet networks.
twisted pair cable. The unshielded twisted Wireless networks use radio waves to
pair wiring is the most used network cable connect devices.
and is used on most versions of ethernet.
- Fiber Optic is one of the best broadband • Computer networks connect nodes like
options that are available in the market computers, routers, and switches using
and it uses light signals to transmit cables, fiber optics, or wireless signals.
information. It also has the capability of These connections allow devices in a
sending data over much greater network to communicate and share
distances. information and resources.

Wireless network - Wireless” means without • Networks follow protocols, which define how
wire, media that is made up of electromagnetic communications are sent and received.
waves (EM Waves) or infrared waves. These protocols allow devices to
communicate. Each device on a network
uses an Internet Protocol or IP address, a
Personal Area Network / PAN - is the smallest
string of numbers that uniquely identifies a
and simplest type of network. PANs connected
device and allows other devices to recognize
devices within the range of an individual and are
it.
no larger than about 10 meters.
•If you have a wireless router that also has
Local Area Network/LAN - is a system where Ethernet ports, you can use wired and wireless
computers and other devices connect to each devices together. A LAN that includes both wired
other in one location. LANs use both wired and and wireless devices is sometimes called a
wireless connectivity options. Wireless LAN "mixed network
/WLAN has surpassed traditional wired LAN in •."
terms of popularity, but wired LAN remains the User - the person who utilizes a computer or
more secure and reliable option. network service
User’s intervention - set of behaviors or
Metropolitan Area Network / MAN - is an activities performed by users. Typically in the form
interconnection of several LANs throughout a city, of user-contributed content, where users add their
town or municipality. own contents.
Campus Area Network / CAN - is a network
interconnected, dispersed LANs. Importance is it embodies the views of the users
not the developers, systems analyst, etc.
Wide Area Network / WAN - is the most
expansive type of computer network EXAMPLES: UPLOAD, DOWNLOAD,
configuration. COMMENT, SUBMIT REVIEWS, INTERACT

Content delivery Network / CDN - is a network


of globally distributed servers that deliver Advantages
multimedia content - such as interactive ads or
video content to web based internet users. CDNs – it can reduce or even eliminate errors
use to specialize servers that deliver – by cooperating with users, system developers
bandwidth-heavy rich media content by catching it can find data and information directly from users.
and speeding up delivery time. – helps implement more effective and accessible
solutions.
Virtual Private Network / VPN - creates private – broadens your perspective about the latest
network overlay across an existing public technologies and trends.
– users can monitor progress of the research, and the risk of a data breach.When users are only
address problems, and provide useful feedback. able to access the parts of the system they need,
– help projects to get better insights into their it reduces the chances of them accessing
experience -useful when the project team is sensitive data or functions that they should not
considering the potential impacts of approaches have access to. This can help to prevent data
and techniques on beneficiaries. breaches and unauthorized access to sensitive
information.
Disadvantages
Network security needs to have the highest
– a lot of time and commitment can be required to priority as it protects network systems and
involve users. sensitive data. You can use network security
– expectations of users may be raised only to essentials to protect your assets, maintain your
lead disappointment, for instance if their views integrity, and manage your network traffic more
are not heard and actioned. efficiently.

Network security - Protection of the underlying COMMON APPS USED LIKE LAPTOPS
networking infrastructure from unauthorized Desktop applications are stand-alone application
access, misuse, breaches, intrusions and other which runs on system and laptops. These
threats. applications are installed on the systems via
–involves creating a secure infrastructure for downloading online or buying CDs online or from
devices, applications, users, and applications to the store. Desktop applications are high in
work in a secure manner. efficiency and can be customized by using new
– Protects client data and information, keeping technology in the market.
shared data secure and ensuring reliable access
and network performance as well as protection Internet connection is not required for accessing
from cyber threats. the applications, it works on the local server
– Reduces overhead expenses and safeguards present in the system. Some desktop applications
organizations from costly losses that occur from a such as word editor, photo editing app and media
data breach or other security incident. player allow you to perform different tasks while
other such as gaming apps are developed purely
Network security essentials: for entertainment. When you purchase a
computer or a laptop, there is a set of apps that
are already installed on your desktop.
INSTALLING SECURITY SOFTWARE AND
MAINTAINING BACKUPS
– You must ensure that your workplace installs THE EXAMPLES OF SOME OF THE POPULAR
security software on every device using your DESKTOP APPLICATIONS ARE:
network. Maintaining backups is important; they Word processing applications such as
help you recover from a ransomware attack that Microsoft Word, Microsoft Excel, Microsoft
can block your access to your internal PowerPoint and WPS Office which are designed
documents. With an updated backup, you can to edit the textual content or enter it
wipe your computers, reinstall the necessary
softwares, and recover your data to continue Gaming applications such as Minesweeper and
working as if nothing had happened. Solitaire which are used for entertainment,

Improving passwords - You must utilize Web browsers such as Internet Explorer,
multi-factor authentication to access your Chrome and Firefox which help you to connect to
network, as it considers additional inputs than just the Internet from your computer,
user credentials. Integrating additional password
procedures will improve your security posture by Media player applications such as iTunes,
making it difficult for the hacker to access your Windows Media Player, and VLC media player
network with only user credentials. which let you listen to music, watch videos and
movies and create collections of media content.
Limiting Network Access - Access controls limit
access to information and information processing Graphics and design software such as Adobe
systems. When implemented effectively, they Photoshop, CorelDraw and AutoCAD.
mitigate the risk of information being accessed
without the appropriate authorization, unlawfully
Real-time online communication tools like
Skype, Hangouts, Google Meet, Zoom and
Whatsapp.
DAY TO DAY ACTIVITIES WITH APPS
Multimedia and music streaming software
such as MX Player, BLC Media Player, Spotify, Zoom Best for video conferencing, chatting, and
Pandora, etc. Project management software like phone meetings.
Asana, Zoho, Slack, Forecast, etc.

Facebook Messenger Best for making voice or


MOBILE APPS AND THEIR RELEVANCE TO video calls to friends, family, and people you
DAY TO DAY ACTIVITIES know.
A mobile app (or mobile application) is a
software application developed specifically for
use on small, wireless computing devices, such CapCut Best for editing videos for TikTok and
as smartphones and tablets, rather than desktop Instagram Reels.
or laptop computers.
Cash App Best for paying for goods, services,
Mobile apps have the advantage of utilizing bills, and transferring and receiving money.
features of a mobile device like a camera, contact
list, GPS, phone calls, accelerometer, compass, SOFTWARE APPLICATION SECURITY
etc. Such device features, when used within an
app, can make the user experience interactive
and fun. Antivirus - product is a program designed to
detect and remove viruses and other kinds of
malicious software from your computer or
3 TYPES OF MOBILE APPS BY TECHNOLOGY laptop.It runs in the background automatically
once installed to provide real time protection
•Native apps- are created for one specific against virus attacks.
platform or operating system.
It was in 1987 that German computer security
•Web apps- are responsive versions of websites expert Bernd Robert Fix came up with a program
that can work on any mobile device or OS to get rid of Vienna, a virus that infected .com files
because they’re delivered using a mobile on DOS-based systems. Major players like
browser. Eugene Kaspersky, John McAfee, Ross
Greenberg and others played key roles in the
fast-approaching booming cybersecurity industry.
•Hybrid apps- are combinations of both native
and web apps, but wrapped within a native app,
giving it the ability to have its own icon or be computer virus is a type of malware that
downloaded from an app store attaches itself to other programs, self-replicates,
and spreads from one computer to another. When
a virus infects a computer, it makes copies of
IMPORTANCE OF THE MOBILE APP itself and attaches to other files or documents.
They allow to handle information instantly and in
real-time. It is an excellent communication
channel between organizations and their users or File-infecting Virus A virus that attached itself to
clients. an executable program. It is also called a
parasitic virus which typically infects files with
.exe or .com extensions. Some file infectors can
overwrite host files and others can damage your
hard drive’s formatting.

. Macro Virus This type of virus is commonly


found in programs such as Microsoft Word or
Excel. These viruses are usually stored as part of
a document and can spread when the files are
transmitted to other computers, often through
email attachments.

. Browser Hijacker This virus targets and alters


your browser setting. It is often called a browser •Spyware - This tracks your browsing activity,
redirect virus because it redirects your browser to then steals your data or affects your phone’s
other malicious websites that you don’t have any performance.
intention of visiting. This virus can pose other
threats such as changing the default home page •Trojan: Aptly named, this type of virus hides
of your browser. inside an app to take control of or affect your
phone and data. EXAMPLES OF COMPUTER
4. Web Scripting Virus A very sneaky virus that VIRUSES INCLUDE:
targets popular websites. What this virus does is
overwrite code on a website and insert links that •Morris Worm.
can install malicious software on your device.
Web scripting viruses can steal your cookies and
use the information to post on your behalf on the •Nimda.
infected website.
•ILOVEYOU.
5. Boot Sector Virus These viruses are once
common back when computers are booted from •SQL Slammer.
floppy disks. Today, these viruses are found
distributed in forms of physical media such as
external hard drives or USB. If the computer is •Stuxnet.
infected with a boot sector virus, it automatically
loads into the memory enabling control of your Firewall is a network security device that
computer. monitors and filters

6. Polymorphic Virus This virus has the Packet filtering- A small amount of data is
capability to evade anti-virus programs since it analyzed and distributed according to the filter’s
can change codes every time an infected file is standards.
performed.
Proxy service- Network security system that
7. Resident Virus A resident virus stores itself on protects while filtering messages at the
your computer’s memory which allows it to infect application layer.
files on your computer. This virus can interfere
with your operating system leading to file and
Stateful inspection - Dynamic packet filtering that
program corruption. 8. Multipartite Virus A type of
monitors active connections to determine which
virus that is very infectious and can easily spread
network packets to allow through the Firewall.
on your computer system. It can infect multiple
parts of a system including memory, files, and
boot sector which makes it difficult to contain. Next Generation Firewall (NGFW) - Deep packet
inspection Firewall with application-level
inspection
Main types of phone viruses

Cybercriminals today are sophisticated and can


launch a variety of cyberattacks on your
smartphone. Some viruses that can infect your
phone include:

•Malware - Malware encompasses programs that


steal your information or take control of your
device without your permission.

•Adware - These are ads that can access


information on your device if you click on them.

•Ransomware - These prevent you from


accessing your phone again unless you pay a
ransom to the hacker. The hacker may use
personal data like your pictures as blackmail.

You might also like