0% found this document useful (0 votes)
22 views8 pages

LIVITERA MIDTERMS Notes

ICT refers to technologies that provide access to information through telecommunications, such as computers, software, internet, phones, and more. A computer is an electronic device that processes data according to a set of instructions. The history of computers began with early mechanical calculating devices, progressed to electromechanical computers, and now involves modern electronic digital computers. Key developments included Charles Babbage's analytical engine in the 1830s, ENIAC in 1946 as the first general-purpose electronic digital computer, and portable computers emerging in the 1980s.

Uploaded by

VlogBros YT
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views8 pages

LIVITERA MIDTERMS Notes

ICT refers to technologies that provide access to information through telecommunications, such as computers, software, internet, phones, and more. A computer is an electronic device that processes data according to a set of instructions. The history of computers began with early mechanical calculating devices, progressed to electromechanical computers, and now involves modern electronic digital computers. Key developments included Charles Babbage's analytical engine in the 1830s, ENIAC in 1946 as the first general-purpose electronic digital computer, and portable computers emerging in the 1980s.

Uploaded by

VlogBros YT
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

★ ICT ★ COMPUTER

- Infrastructure & components that enable - A programmable machine


modern computing - An electronic device that manipulates
Examples: info./data
a. Software Apps & Operating Systems - Can store, retrieve, & process data
(word, ppt, excel, windows, android, iOS) - Any device aiding humans in performing
b. Web-based Apps & Info. such as Distance various kinds of computation/calculations
Learning - Cell phones ARE considered as computers
c. Telephones/Telecommunication Products
d. Email, www., computers, etc. ➢ 3 PRINCIPAL CHARACTERISTICS
1. It responds to a specific set of instructions in
USE OF ICT IN OUR DAILY LIVES a well-defined manner
A. COMMUNICATION 2. It can execute a pre-recorded list of
- Easier & faster, cheapest means of instructions
communication 3. It can quickly store & retrieve large data
- Chats, e-mail, voicemail, internet in general

B. JOB OPPORTUNITIES
- Employers expect staff to have basic
ICT/computer skills
- Applies to job roles
❖ HISTORY OF COMPUTER
C. EDUCATION
● Earliest computers originally were computed
- ICT can impact student learning when
by HUMANS ( a job title)
teachers are digitally literate & understand
● These human computers were typically
how to integrate into curriculum
engaged in the calculation of mathematical
- Provides flexibility & availability of
expressions
learning materials
● Specialized and expensive, requiring years of
training in mathematics
D. SOCIALIZING
● FIRST USE of the word “COMPUTER”
- Vast adoption of finding partners/friends,
was recorded in 1613 —a person who carried
accessing info. from the news, reach ppl
out calculations, or computations (used until
across the world
mid-20th century)

IMPACTS OF ICT IN THE SOCIETY


➔ TALLY STICKS
● POSITIVE IMPACTS OF ICT
- An ancient memory aid device to record
- Access to information
and document numbers, quantities, &
- Improved access to education
messages
- New tools & opportunities
- Communication
- Info. management
- Security
- People participation
- Distance learning ➔ ABACUS
- Testing & experiments - Mechanical device used to aid an
- Creates more interesting jobs individual in performing mathematical
calculations
- Invented in Babylonia (2400 BC)
● NEGATIVE IMPACTS OF ICT
- Most familiar form was first used in China
- Job loss
(500 BC)
- Reduced personal interaction
- Reduced physical activity - Basic arithmetic operations (+, –, x , ÷)
- Cost
- Competition
➔ NAPIER’S BONE
- By John Napier (1614)
- To multiply, divide, and calculate square
& cube root by moving the rods around &
placing them in specially constructed boards

➔ FIRST COMPUTER PROGRAMMER


- Augusta Ada Byron (1840) —wrote
programs for Analytical Engine & the first
➔ SLIDE RULE computer programmer (suggested to
- By William Oughtred (1622) Babbage that he use the binary system)
- Based on Napier’s ideas abt
logarithms/triangles ➔ SCHEUTZIAN CALCULATION
- For x, ÷, roots, logarithm, trigonometry ENGINE
(not for +/–) - By Per Georg Scheutz (1843)
- Based on Babbage’s difference engine
- The first printing calculator

➔ PASCALINE
- By Blaise Pascal (1642)
- Limited to + and –
- Too expensive
➔ TABULATING MACHINE
- By Herman Hollerith (1890)
- To assist in summarizing info. &
accounting
➔ STEPPED RECKONER - Like excel but manual
- By Gottfried Wilhelm Leibniz (1672)
- A machine that can +, –, x , ÷
automatically

➔ HARVARD MARK 1
➔ JACQUARD LOOM - By Howard H. Aiken (1943)
- By Joseph-Marie Jacquard (1881) - a.k.a IBM Automatic Sequence Controlled
- Automatic loom controlled by punched Calculator (ASCC)
cards - The first electro-mechanical computer

➔ Z1
- By Konrad Zuse in Germany (1936-1938)
➔ ARITHMOMETER
- The first programmable computer;
- By Thomas de Colmar (1820)
requiring punch tape reader
- First reliable, useful, mass–produced, &
successful calculating machine
- Performs the 4 basic math functions

➔ ATANASOFF-BERRY COMPUTER
- By Prof. John Atanasoff & grad. student
➔ DIFFERENCE ENGINE & Clifford Berry (1939-1942)
ANALYTICAL ENGINE - The first electronic digital computing
- By Charles Babbage (1822 & 1834) device
- Automatic, mechanical calculator to tabulate
polynomial functions
- The first mechanical computer, bigger
than a human
➔ ENIAC BASIC COMPUTING PERIODS
- By John Presper Eckert & John Mauchly A. PREMECHANICAL (3000 BC & 1450 AD)
(1946) - “Earliest Age” of IT
- a.k.a Electronic Numerical Integrator and - Early alphabets were developed (e.g.
Computer Phoenician alphabet)
- The first electronic general-purpose - Pens & papers, first books & libraries were
computer developed
- Around 100 A.D. —the first 1-9 system
was created by Indians
- 875 A.D. (775 yrs. later) —the number 0
was invented
- Calculator was the very first sign of info.
➔ UNIVAC 1 processor (abacus)
- By John Presper Eckert & John Mauchly
- a.k.a UNIVersal Automatic Computer 1 B. MECHANICAL (1450-1840)
- The first commercial computer - Technologies like Slide Rule were invented
- Pascaline was a very popular mechanical
computer (by Blaise Pascal)
- Charles Babbage developed engines to
tabulate polynomial equations
➔ EDVAC
C. ELECTROMECHANICAL (1840-1940)
- By Von Neumann (1952)
- The beginnings of telecommunications
- a.k.a Electronic Discrete Variable
- Telegraph —created in 1800s
Automatic Computer
- Morse Code —Samuel Morse in 1835
- The first stored program computer; has a
- Telephone —Alexander Graham Bell
memory to hold stored program & data
(1876)
- First radio —Guglielmo Marconi (1894)
- Mark 1 —first large-scale automatic
digital-computer in the U.S. using punch
cards around 1940 (8 ft. high, 50 ft. long, 2
ft. wide, 5 tons)

➔ THE FIRST PORTABLE COMPUTER D. ELECTRONIC (1940-present)


- Osborne 1 —the first portable computer - ENIAC was the first high-speed
- By Osborne Computer Corporation (1981) digi-computer to solve a full range of
computing problems (680 sq. ft., 30
tons)
- Mainly use vacuum tubes for
calculations

➔ THE FIRST COMPUTER COMPANY 4 MAIN SECTIONS OF DIGITAL


- The Electronic Controls Company COMPUTING
- Founded by John Presper Eckert & John 1ST —era of vacuum tubes & punch cards;
Mauchly in 1949 rotating magnetic drums used for internal
storage
2ND —vacuum tubes to transistors, punch
cards to magnetic tapes, rotating magnetic drums
to magnetic cores for internal storage; high-level
programming were created
(FORTRAN/COBOL)
3RD —transistors to integrated circuits, all
computers used magnetic tape, magnetic core to
metal oxide semiconductors; advanced
programming language BASIC
4TH —CPUs (central processing unit)
contains memory, logic, & control circuits all on
a single chip; personal computer (Apple II); GUI
(graphical user interface) was developed
➢ First Gen.: 1946 – ‘58 ★ THE WEB (www.)
➢ Second: 1957 – ‘64 - Info. organized into web pages containing
➢ Third: 1965 – ‘70 text & graphic images
➢ Fourth: 1971 – Today - www.: is a larger collection of
➢ Fifth: Today – Future interconnected docs./content [connection]
- Website: collection of linked web pages
★ FIRST GENERATION with common theme/focus [collection]
- VACUUM TUBES for circuit & magnetic
drums for memory (huge, takes up space) ★ SIR TIMOTHY JOHN BERNERS–LEE
- Very expensive, uses more electricity & heat (OM KBE FRS FREng FRSA FBCS)
- Relied on machine language (e.g. A = 11001) - a.k.a “Timbl”, an English engr. &
- Input based on punched cards + paper tapes computer scientist
- Only solves one problem at a time - The inventor of the world wide web
(www.)
★ SECOND GENERATION
- TRANSISTORS ( 1 transistor = 40 vacuum VERSIONS OF THE WEB
tubes) ● WEB 1.0 (Read Only Static Web)
- Still uses a lot of heat and punched cards - old internet that only allows to read from
- Cryptic binary machine—symbolic/assembly the internet
language - “Information portal” / “put content
- “Heatsink” together”
- Uses table to position & align elements on
★ THIRD GENERATION page
- INTEGRATED CIRCUIT —all components - Focused on company’s home pages only
put into one chip)
- “Semiconductors” —miniature transistors
placed on silicon chips
- Could carry instructions in billionths of a
seconds

★ FOURTH GENERATION
- MICROPROCESSOR —even smaller chips ● WEB 2.0 (Read-Write Interactive Web)
- Formed networks, which developed Internet - New gen. of web services & apps;
- GUIs (Graphical User Interface), handheld increasing emphasis on human collabs
devices like mouse - Gives the user to control their data
- user-generated content (not the company)
★ FIFTH GENERATION like blogs
- ARTIFICIAL INTELLIGENCE (AI), still - DYNAMIC PAGE —user can create/edit
developing content, can comment, create an account
- Devices that responds to natural language, Examples:
capable of self-learning & self-organizing - Social Networks (social media) like FB,
- Voice recognitions IG, twt, LinkedIn, Google+, pinterest,
tumblr
APPLICATION OF ICT in Daily Lives - Blogs —discussion/informational website
with discrete, diary-style entries like
- Business - Government
Wordpress, Blogger, and Tumblr
- Education - Marketing
- Wikis —hypertext publication
- Healthcare - Science
collaboratively edited/managed by the
- Retail & Trade - Publishing
audience like wikipedia, wikiversity,
- Arts & - Communication
wikibooks, wiktionary, etc.
Entertainment - Transportation
- Video Sharing Sites —lets ppl
- Banking & - Work from home
upload/share video clips with the public
Finance - Social & Romance
like YouTube, FB, Flickr, Veoh, etc.
- Navigation - Security &
KEY FEATURES:
- Military Surveillance
○ Folksonomy – categorize & arrange info.
- Bookings - Robotics
using chosen keywords (e.g. tags, #)
- Weather forecast
○ Rich User Interface – dynamic content
responsive to user’s input
○ User Participation – the owner isn’t the ★ HISTORY OF INTERNET
only one who is able to put content ● JAN. 2, 1969
○ Long Tail – on demand services instead - ARPA [Advance Research Project Agency]
of one-time purchase - “Concept” —no server, but equal
importance to every computer in the
● WEB 3.0 (Read-Write Intelligent Web) network
- Same principle w/ 2.0: a two-way
● 1982
interaction
- The word “internet” started
- Personalized contents for you
- SEMANTIC WEB —framework that ● 1986
allows data to be shared & refused to - First “free net” created in Case Western
deliver content targeting the user Reserve University (Cleveland, Ohio)

TYPES OF WEBSITES ● 1991


➔ ECOMMERCE WEBSITE - U.S. Gov’t. Allowed businesses to connect
- Where you can buy and sell to internet
- Shopee, lazada, shein, etc.
★ Vinton Gray Cerf ForMemRS
➔ BUSINESS WEBSITE - One of the “Fathers of the Internet” along
- Representing a specific business with TCP/IP co-developer Bob Kahn
➔ ENTERTAINMENT WEBSITE - An american internet pioneer
- Visits for entertainment purposes only
MAJOR COMPONENTS
➔ PORTFOLIO WEBSITE A. SERVERS
- To show samples of your past works - Computer program that provides service to
- To show potential clients of your quality another computer & its user
➔ MEDIA WEBSITE Types:
- news/report (GMA, TV5, etc.) 1. Application Server
- A program that provides the business
➔ BROCHURE WEBSITE logic for an application program
- Simplified form of business website; for
businesses that won’t invest a lot into it 2. Web Server
- A program that serves requested html
➔ NONPROFIT WEBSITE pages/files
- Easiest way for donors to make donations
3. Proxy Server
➔ EDUCATIONAL WEBSITE - A software that acts as intermediary
- To provide educational materials/ info. between devices (‘middleman’)
➔ INFOPRENEUR WEBSITE 4. Mail Server
- Unique type of online business - An app that receives incoming emails &
- create/sell info. in the forms of courses, forward outgoing emails
tutorials, ebooks, videos, etc.
- COURSERA.com 5. File Server
- A computer responsible for central
➔ PERSONAL WEBSITE storage & data management for other
- Putting your own thoughts into the world computer to access them
➔ WEB PORTAL 6. Policy Server
- Designed for businesses, orgs., institutions, - A security component of a policy-based
etc. accessible to limited users only network providing authorization services
- CCA portal & tracking/control of files
➔ WIKI/COMMUNITY FORUM WEBSITE
- Users are collaborating on contents & make B. IP ADDRESS (Internet Protocol)
their own changes as they see fit - Numerical label assigned to each device for
own identity
★ THE INTERNET
- Collection of all computers & phones via C. BROWSER
channels - App program that provides a way to look at
- The network of networks info. on the web
- ‘interconnection’ + ‘network’ - Translator of html
- Ex.: google chrome, safari, opera, etc.
D. DOMAIN NAME SYSTEM (DNS)
- The phonebook of internet
- “www.___.com” NETIQUETTE
- Network + Etiquette
- Etiquette of cyberspace; good breeding in
social or official life
- A set of rules to behave properly online
- Proper communication online

VIRGINIA SHEA’S CORE RULES of


E. INTERNET SERVICE PROVIDER (ISP) Netiquette
- An org. that provides service for accessing,
using, or participating in the internet Golden Rule: MAKE A GOOD IMPRESSION
(Wi-Fi) - Treat others w/ the same respect that you
2 Types: like to receive
1. National ISP —internet access to a - Avoid offensive language
specific geographical area (like
Philippines) AVOID SLANGS, ACRONYMS, TEXT TALK
2. Regional ISP —businesses provide - Use correct terminology, spelling, grammar
internet access in cities/towns
(converge, PLDT, broadband, etc.) AVOID ‘SCREAMING’ IN MESSAGES
- All capital letters = screaming
TERMS & DEFINITIONS: - Better use italic/bold text, highlight, or
INTERNET —global network of thousands of special characters like asterisks
computers linked by data lines & wireless
systems PROOFREAD BEFORE SENDING
WEB —collection of billions of web pages you - Check for errors and accuracy of messages
can view w/ a web browser
EMAIL —most common method of EXERCISE GOOD JUDGEMENT WHEN
sending/receiving messages SHARING INFO. WITH OTHERS
SOCMED —websites/apps that allow us to - Emails, info., and chats are private & should
share comments, photos, videos not be shared w/o consent like home
ONLINE GAMING —games to play on the address, phone no., DMs
internet
SOFTWARE UPDATES —operating systems RESPECT DIVERSITY IN VIEWPOINT
and app updates downloaded from the internet - Be respectful & constructive about beliefs,
HTML “Hypertext Markup Language” criticism, or opinions with other people
—code to tell a browser how to place pics, texts,
links to create a web page T – true
URL “Uniform Resource Locator” —web H – helpful
address to connect to a remote source on the I – inspiring
www. N – necessary
BIT —a single digit in the binary numbering K – kind
system
BYTE —plural of bit; consists of eight bits THE 10 RULES:
HTTP “Hypertext Transfer Protocol” —data 1. Practice the Golden Rule
comm. Standard of web pages 2. Adhere to the same standards of behavior
HTTPS “Hypertext Transfer Protocol online you follow in real life
Secure” —a web page w/ special layer of 3. Know where you are in cyberspace
encryption to hide personal info./password from 4. Respect others’ time & bandwidth
others 5. Make yourself look good online
ROUTER —hardware device that acts as traffic 6. Share expert knowledge
cop for network signals from your ISP 7. Help keep flame war under control
ENCRYPTION —mathematical scrambling of 8. Respect others’ privacy
data to hide from eavesdroppers 9. Don’t abuse your power
WEB BOTS —programs/applets (macros & 10. Be forgiving of other people’s
intelligent agents) used on the internet mistakes
SEARCH ENGINE —specialized software that
lets users search for info. by using
keywords/phrases
★ CYBER CRIMINAL ACTIVITIES
- Characteristics of culture of computers, info., 1. HACKING
technology, & virtual reality - unauthorized access/interference with
computer systems, servers, etc. to corrupt,
★ CYBERCRIME steal, destroy data w/o the owner's
- Crime which computer is the object of crime knowledge
& tool to commit the offense - 12-20 yrs. reclusion temporal & 6-12 yrs.
- “Cybercriminals” are the people doing the in prison
cybercrime
2. COMPUTER-RELATED FORGERY,
➢ R.A. 10175 — Cybercrime Prevention Act FRAUD, AND/OR IDENTITY THEFT
of 2012 - To obtain sensitive personal info. like
- Approved: Sept. 12, 2012 passwords, usernames, credit card details,
- To address legal issues about online etc.
interactions - Phishing, pharming
OFFENSES against Confidentiality, Integrity, - P200,000 fine/prison mayor
& Availability of Comp. data & systems
● Illegal access & interception 3. ELECTRONIC THEFT
● Data & System interference - Illegal downloading, copying, selling of
● Misuse of devices music, videos, softwares, etc.
● Cyber squatting - Digital piracy, copyright infringement
COMPUTER-RELATED OFFENSES - P50,000-P500,000/prison mayor
● Forgery, fraud, identity theft
CONTENT-RELATED OFFENSES 4. CYBERBULLYING
● Cybersex - Intimidating, threatening, bullying a person
● Child pornography online
● Unsolicited commercial communications - Anti-bullying Act of 2013 –R.A. 10627
● Libel
OTHER OFFENSES 5. CYBERSEX
● Aiding/abetting in the commissions of - Willful engagement/control of exhibition of
cybercrime sexual organs/activities through online
● Attempt in the commission of cybercrime - P200,000 penalty

➢ R.A. 10173 — Data Privacy Act of 2012 6. CHILD PORNOGRAPHY


- Act to protect individual personal - Child sexual exploitation
information; - Anti-Child Pornography of 2009 –R.A.
- Pertains to race, ethnicity, color, marital 9775
status, age, religious & political affiliations - 12-20 yrs. in prison/reclusion temporal
- health, genetic/sexual orientation, education,
etc. 7. CYBER DEFAMATION
- SSS no., tax returns, health records - Unprivileged false statement of fact to
- Consent is a MUST harm a person’s/company’s reputation
- 6-12 yrs. in prison/prison mayor
COMMON FORMS OF CYBERCRIMES
● Copyright
- Exclusive legal right of an author
● Copyright Infringement
- Violation, piracy, theft of a copyright
holder’s exclusive rights by unauthorized
use of their work
● Plagiarism
- An act or imitating the language and
thoughts of another author w/o
authorization
● Computer Addiction (‘Internet Addiction’)
- Excessive use of internet (can be both
offline and online)
● Category of Cybersecurity Risks that may 9. VIRUSES
cause an undesirable event/action via the - Often sent as an email attachment or
Internet download to infect your computer
- Takes longer than usual for your computer
1. HACKING to startup
- Gain unauthorized access to a computer
- Can be through Trojan Horse 10. WI-FI EAVESDROPPING
- Another method to capture personal info.
2. MALWARE - Virtual “listening in” that’s shared over an
- Malicious software that infects your unsecure Wi-Fi network
computer like worms, trojan horse,
spyware, etc. 11.WORMS
- Intimidating pop-up messages w/ false - It lives in your computer memory
info. - Goal: to destroy/delay devices
- Can reformat/alter your files

3. PHARMING
- Means to point you to a malicious/fake
website by REDIRECTING the legit URL
- May look real to make you enter personal
info.

4. PHISHING
- Fake emails, texts, websites to look
authentic; a.k.a “spoofing”
- To steal personal/financial info.

5. RANSOMWARE
- Demands payment to access your
computer
2 Types:
a. Lock Screen Ransomware – displays
image that prevents you from accessing
computer
b. Encryption Ransomware – files from
USB, flash drive, cloud storage preventing
you to open them

6. SPAM
- Mass distribution of unsolicited texts, ads
- Annoying unwanted junk mails/texts

7. SPYWARE (& ADWARE)


- A software collecting personal info. w/o
you knowing
- Often in the form of “free download” of
applications

8. TROJAN HORSE
- Malicious program that DISGUISES as
legitimate program
- Can watch you through webcam & record
sensitive personal info

You might also like