0% found this document useful (0 votes)
19 views28 pages

It Era Midterm

The document covers netiquette and computer ethics, emphasizing the importance of responsible online behavior and communication. It outlines key objectives, rules for proper online conduct, and various forms of cybercrime, including hacking, identity theft, and cyberbullying, along with relevant laws in the Philippines. Additionally, it discusses the risks associated with internet privacy and the significance of respecting others' privacy and intellectual property online.

Uploaded by

meguminarts67
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views28 pages

It Era Midterm

The document covers netiquette and computer ethics, emphasizing the importance of responsible online behavior and communication. It outlines key objectives, rules for proper online conduct, and various forms of cybercrime, including hacking, identity theft, and cyberbullying, along with relevant laws in the Philippines. Additionally, it discusses the risks associated with internet privacy and the significance of respecting others' privacy and intellectual property online.

Uploaded by

meguminarts67
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 28

COLLEGE OF INFORMATION TECHNOLOGY

First Semester, A.Y. 2023-2024


MODULE 3
The Netiquettes and Computer Ethics
Overview
The Netiquette and The Computer ethics discusses about the ethical issues in the field of computer. May it
be in online or practicing in professional.

I. Objectives
At the end of this module, you should be able to:
• Discuss the importance of being a responsible netizen by following the rules of common courtesy online
and the informal “rules of the road” of cyberspace.
• Discuss the difference between privacy and security.
• Explain various risks to internet privacy

II. Lecture

Netiquette
What is Netiquette?
What is Netiquette? Simple stated, it’s network etiquette – that is the etiquette of cyberspace and “etiquette”
means the forms of required by good breeding or prescribed by authority to be required in social or official
life. In other words, netiquette is a set of rules for behaving properly online.
Netiquette, or network etiquette, is concerned with the "proper" way to communicate in an online
environment. Consider the following "rules," adapted from Virginia Shea's the Core Rules of Netiquette,
whenever you communicate in the virtual world.
When you use e-mail, instant messenger, video calls, or discussion boards to communicate with others
online, please be sure to follow the rules of professional online communications known as netiquette.
These rules will help you communicate with instructors, classmates, and potential employers more
effectively and will help prevent misunderstandings.

REMEMBER THE GOLDEN RULE – Even though you may be interacting with a computer screen, you are
communicating with a real person who will react to your message. Make a good impression - treat others
with the same respect that you would like to receive and avoid confrontational or offensive language.
To help convey meaning when creating messages, it is sometimes acceptable to include appropriate
emoticon symbols, such as a smiley face :) However, for professional communications these would be

1
inappropriate.

AVOID SLANG, ACRONYMS, AND TEXT TALK – Communicating effectively in college and business
environments require the use of correct terminology, spelling, and grammar that can easily be understood.
For example, use “your” instead of “ur”.

AVOID “SCREAMING” IN TYPED MESSAGES – Typing an entire message using all capital letters is
known as “screaming”. It is distracting and generally frowned upon in professional environments. It is better
to draw emphasis to selected words or phrases by: using italic or bold text; using a different color for text or
background color; or denoting emphasis using special characters (Example: **Important**).

PROOFREAD YOUR MESSAGES BEFORE SENDING THEM – Proofreading your


messages before you send them is a best practice for effective and efficient communication. Strive to make
your communications concise and free of any:
• Spelling and grammar errors
• Confusing terms or phrases that could be misunderstood
• Errors of omission, such as missing content or recipients
• Errors in accuracy of information
EXERCISE GOOD JUDGMENT WHEN SHARING INFORMATION WITH OTHERS ONLINE – E-mail and
chat messages that you send or receive are considered private and should not be forwarded or copied to
others without gaining the consent of all involved participants. In general, messages posted to discussion
boards and social media sites can be read by the public. You may never know who might read or share
what you post. It is a good practice to always ask a post’s author for permission before sharing a post with
other parties.
 To protect your privacy and safety, do not share online any sensitive personal information such as:
- Your home address or phone number
- Personal conversations
- Social plans, such as vacations
- Financial information
- Usernames, passwords, or hints
- Anything personal that you would not want shared by others over the Internet
 If the material you share with others online came from another source, make every effort to gain
permission from the original author or copyright holder. Copying someone else's work and passing
it off as your own is plagiarism. It damages your reputation and could subject you to serious
academic and legal consequences.

2
RESPECT DIVERSITY IN VIEWPOINTS - Be constructive and respectful when sharing
opinions, beliefs, and criticisms, or responding to those of others in the conversation.
 When sharing a viewpoint that differs from someone else’s, it is a best practice to first acknowledge
the other person by briefly restating what he or she said, but in your own words. This lets the
person know that you are listening and trying to understand them.
 When presenting an opinion or criticism, it is helpful to use phrases that identify to whose point of
view you are referring. If the opinion is yours, you can begin with the phrase “In my experience” or
“In my opinion”. If it is a viewpoint of someone else, make sure you identify that in your message
(Example: “According to Eric Ericson,” or “The president believes”).

Ten Commandments of Computer Ethics


a) Rule 1: Remember the Human When communicating electronically, whether through email, instant
message, discussion post, text, or some other method, practice the Golden Rule: Do unto others as you
would have others do unto you. Remember, your written words are read by real people, all deserving of
respectful communication. Before you press "send" or "submit," ask yourself, "Would I be okay with this if
someone else had written it?"
b) Rule 2: Adhere to the same standards of behavior online that you follow in real life While it can be
argued that standards of behavior may be different in the virtual world, they certainly should not be lower.
You should do your best to act within the laws and ethical manners of society whenever you inhabit
"cyberspace." Would you behave rudely to someone face-toface? On most occasions, no. Neither should
you behave this way in the virtual world.
c) Rule 3: Know where you are in cyberspace "Netiquette varies from domain to domain." (Shea, 1994)
Depending on where you are in the virtual world, the same written communication can be acceptable in one
area, where it might be considered inappropriateq in another. What you text to a friend may not be
appropriate in an email to a classmate or colleague. Can you think of another example?
d) Rule 4: Respect other people's time and bandwidth Electronic communication takes time: time to read
and time in which to respond. Most people today lead busy lives, just like you do, and don't have time to
read or respond to frivolous emails or discussion posts. As a virtual world communicator, it is your
responsibility to make sure that the time spent reading your words isn't wasted. Make your written
communication meaningful and to the point, without extraneous text or superfluous graphics or attachments
that may take forever to download.
e) Rule 5: Make yourself look good online writing.colostate.edu One of the best things about the virtual
world is the lack of judgment associated with your physical appearance, sound of your voice, or the clothes
you wear (unless you post a video of yourself singing Karaoke in a clown outfit.) You will, however, be
judged by the quality of your writing, so keep the following tips in mind: Always check for spelling and
grammar errors Know what you're talking about and state it clearly Be pleasant and polite

3
f) Rule 6: Share expert knowledge The Internet offers its users many benefits; one is the ease in which
information can be shared or accessed and in fact, this "information sharing" capability is one of the
reasons the Internet was founded. So, in the spirit of the Internet's "founding fathers," share what you know!
When you post a question and receive intelligent answers, share the results with others. Are you an expert
at something? Post resources and references about your subject matter. Recently expanded your
knowledge about a subject that might be of interest to others? Share that as well.

g) Rule 7: Help keep flame wars under control What is meant by "flaming" and "flame wars?" "Flaming is
what people do when they express a strongly held opinion without holding back any emotion." (Shea,
1994). As an example, think of the kinds of passionate comments you might read on a sports blog. While
"flaming" is not necessarily forbidden in virtual communication, "flame wars," when two or three people
exchange angry posts between one another, must be controlled or the camaraderie of the group could be
compromised.
Don't feed the flames; extinguish them by guiding the discussion back to a more productive direction.

h) Rule 8: Respect other people's privacy Depending on what you are reading in the virtual world, be it an
online class discussion forum, Facebook page, or an email, you may be exposed to some private or
personal information that needs to be handled with care. Perhaps someone is sharing some medical news
about a loved one or discussing a situation at work. What do you think would happen if this information "got
into the wrong hands?" Embarrassment? Hurt feelings? Loss of a job? Just as you expect others to respect
your privacy, so should you respect the privacy of others. Be sure to err on the side of caution when
deciding to discuss or not to discuss virtual communication.

i) Rule 9: Don't abuse your power Just like in face-to-face situations, there are people in cyberspace who
have more "power" than others. They have more expertise in technology or they have years of experience
in a particular skill or subject matter. Maybe it's you who possesses all of this knowledge and power! Just
remember: knowing more than others do or having more power than others may have does not give you
the right to take advantage of anyone. Think of Rule 1: Remember the human.

j) Rule 10: Be forgiving of other people's mistakes Not everyone has the same amount of experience
working in the virtual world. And not everyone knows the rules of netiquette. At some point, you will see a
stupid question, read an unnecessarily long response, or encounter misspelled words; when this happens,
practice kindness and forgiveness as you would hope someone would do if you had committed the same
offense. If it's a minor "offense," you might want to let it slide. If you feel compelled to respond to a mistake,
do so in a private email rather than a public forum.

Cybercrimes
What is Cyber?
It is the Characteristics of the culture of computers, information, technology and virtual reality.

4
Cybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing,
spamming and child pornography) is used as a tool to commit an offense.
Cybercriminals may use computer technology to access personal information, business trade secrets or
use the internet for exploitative or malicious purposes.

Republic Act No. 10175 Cybercrime Prevention Act of 2012 is a law in the Philippines approved on
September 12,2012 which aims to address legal issues concerning online interactions and internet.
Republic Act No. 10173 Data Privacy Act of 2012 is an act protecting individual personal information.

COMMON FORMS OF CYBERCRIMES:


a. Copyright
The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record
literary, artistic, or musical material, and to authorize others to do the same.
Copyright infringement is the violation, piracy or theft of a copyright holder's exclusive rights through the
unauthorized use of a copyrighted material or work.

b. Plagiarism
An act or instance of using or closely imitating the language and thoughts of another author without
authorization.

c. Computer Addiction
• Offline: generally used when speaking about excessive gaming behavior, which can be practiced both
offline and online.
• Online: Also known as “Internet Addiction”, gets more attention in general from scientific research than
offline computer addiction, mainly because most cases of computer addiction are related to the excessive
use of the Internet.
*Virtual Self -The persona you create about yourself virtually.

CRIMINAL ACTIVITIES
a. Hacking
• Unauthorized access of or interference with computer systems, servers, or other information and
communication systems

5
• Unauthorized access to corrupt, alter, steal, or destroy electronic data using computers or other
information and communication systems without the computer or system owner’s knowledge and consent
• The introduction of computer viruses resulting in the corruption, alteration, theft, or loss of such data
• Illegal Access
• Illegal Interception
• Data Interference
• System Interference
• Misuse of Devices
• Infection of IT Systems with Malware – if the act is committed against critical infrastructure of the
Philippines the, penalty is between 12-20 years reclusion temporal
• Six years up to twelve years of imprisonment also known as prison mayor.

b. Computer-related forgery, fraud and/or identity theft


• An attempt to obtain sensitive information such as usernames, passwords, and credit
card details and (indirectly money), often for malicious reasons.
• Phishing
• Pharming
• Spam
• Maximum of Php 200,000 fine or prison mayor

c. Electronic theft
• Illegal Downloading
• Obtaining files that you do not have the right to use from the internet.
• Digital Piracy
• Practice of illegally copying and selling digital music, video, computer software, etc.
• Copyright Infringement
• Penalty of Php 50,000 – 500, 000 and or prison mayor

d. Cyberbullying

6
• The use of electronic communication to bully a person, typically by sending a message
of an intimidating or threatening nature.
• The Anti-Bullying Act of 2013 (RA 10627)

e. Cybersex
• Willful engagement, maintenance, control, or operation, directly or indirectly of any
lascivious exhibition of sexual organs or sexual activity with the aid of a computer
system for favor or consideration.
• There is a discussion on this matter if it involves “couples” or “people in relationship”
who engage in cybersex.
• Penalty at least Php 200,000 and or prison mayor

f. Child Pornography
• Is a form of child sexual exploitation.
• Unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti- Child
Pornography Act of 2009, committed through a computer system.
• Penalty of 12-20 years of imprisonment or reclusion temporal
g. Cyber Defamation
• Is an unprivileged false statement of fact which tends to harm the reputation of a person or company.
• Penalty of 6-12 years of imprisonment or prison mayor.

Internet Threats

Hacking
Hacking is a term used to describe actions taken by someone to gain unauthorized
access to a computer. The availability of information online on the tools, techniques,
and malware makes it easier for even non-technical people to undertake malicious
activities.
The process by which cyber criminals gain access to your computer.

What it can do:


• Find weaknesses (or pre-existing bugs) in your security settings and exploit them in order to access your
information.

7
• Install a Trojan horse, providing a back door for hackers to enter and search for your information.

Malware
Malware is one of the more common ways to infiltrate or damage your computer.
Malicious software that infects your computer, such as computer viruses, worms, Trojan
horses, spyware, and adware.

What it can do:


• Intimidate you with scareware, which is usually a pop-up message that tells you your computer has a
security problem or other false information.
• Reformat the hard drive of your computer causing you to lose all your information.
• Alter or delete files.
• Steal sensitive information.
• Send emails on your behalf.
• Take control of your computer and all the software running on it.

Pharming
Pharming is a common type of online fraud.
A means to point you to a malicious and illegitimate website by redirecting the legitimate
URL. Even if the URL is entered correctly, it can still be redirected to a fake website.

What it can do:


• Convince you that the site is real and legitimate by spoofing or looking almost identical to the actual site
down to the smallest details. You may enter your personal information and unknowingly give it to someone
with malicious intent.

Phishing
Phishing is used most often by cyber criminals because it's easy to execute and can
produce the results they're looking for with very little effort.

8
Fake emails, text messages and websites created to look like they're from authentic companies. They're
sent by criminals to steal personal and financial information from you. This is also known as “spoofing”.
What it does:
• Trick you into giving them information by asking you to update, validate or confirm your
account. It is often presented in a manner than seems official and intimidating, to
encourage you to take action.
• Provides cyber criminals with your username and passwords so that they can access your accounts (your
online bank account, shopping accounts, etc.) and steal your credit card numbers.

Ransomware
Ransomware is a type of malware that restricts access to your computer or your files
and displays a message that demands payment in order for the restriction to be
removed. The two most common means of infection appear to be phishing emails that
contain malicious attachments and website pop-up advertisements.
What it can do:
• There are two common types of ransomware:
• Lockscreen ransomware: displays an image that prevents you from accessing your computer
• Encryption ransomware: encrypts files on your system's hard drive and sometimes on
shared network drives, USB drives, external hard drives, and even some cloud storage drives, preventing
you from opening them
• Ransomware will display a notification stating that your computer or data have been locked and
demanding a payment be made for you to regain access. Sometimes the notification states that authorities
have detected illegal activity on your computer, and that the payment is a fine to avoid prosecution.

What you can do:


• Do not pay the ransom. These threats are meant to scare and intimidate you, and they do not come from
a law enforcement agency. Even if you submit payment, there is no guarantee that you will regain access
to your system.
• If your computer has been infected (i.e. you are unable to access your computer or your files have been
encrypted), contact a reputable computer technician or specialist to find out whether your computer can be
repaired and your data retrieved.
• In order to lessen the impact of a ransomware infection, be sure to regularly back-up your data with a
removable external storage drive. It's possible that your files might be irretrievable; having an up-to-date
backup could be invaluable.

9
Spam
Spam is one of the more common methods of both sending information out and
collecting it from unsuspecting people.
The mass distribution of unsolicited messages, advertising or pornography to addresses
which can be easily found on the Internet through things like social networking sites,
company websites and personal blogs.
What it can do:
• Annoy you with unwanted junk mail.
• Create a burden for communications service providers and businesses to filter electronic messages.
• Phish for your information by tricking you into following links or entering details with too good- to-be-true
offers and promotions.
• Provide a vehicle for malware, scams, fraud and threats to your privacy.

Spyware (Spyware & Adware)


Spyware and adware are often used by third parties to infiltrate your computer.
What it is:
Software that collects personal information about you without you knowing. They often
come in the form of a ‘free' download and are installed automatically with or without your
consent. These are difficult to remove and can infect your computer with viruses.
What it can do:
• Collect information about you without you knowing about it and give it to third parties.
• Send your usernames, passwords, surfing habits, list of applications you've downloaded, settings, and
even the version of your operating system to third parties.
• Change the way your computer runs without your knowledge.
• Take you to unwanted sites or inundate you with uncontrollable pop-up ads.

Trojan Horses
A Trojan horse may not be a term you're familiar with, but there's a good chance you or
someone you know has been affected by one.
A malicious program that is disguised as, or embedded within, legitimate software.
It is an executable file that will install itself and run automatically once it's downloaded.
What it can do:
• Delete your files.

10
• Use your computer to hack other computers.
• Watch you through your web cam.
• Log your keystrokes (such as a credit card number you entered in an online purchase).
• Record usernames, passwords and other personal information.

Viruses
Most people have heard of computer viruses, but not many know exactly what they are
or what they do.
Malicious computer programs that are often sent as an email attachment or a download
with the intent of infecting your computer, as well as the computers of everyone in your
contact list. Just visiting a site can start an automatic download a virus.
What they can do:
• Send spam.
• Provide criminals with access to your computer and contact lists.
• Scan and find personal information like passwords on your computer.
• Hijack your web browser.
• Disable your security settings.
• Display unwanted ads.
• When a program is running, the virus attached to it could infiltrate your hard drive and also spread
to USB keys and external hard drives. Any attachment you create using this program and send to someone
else could also infect them with the virus.

How will you know if your computer is infected?


Here are a few things to check for:
• It takes longer than usual for your computer to start up, it restarts on its own or doesn't start up at
all.
• It takes a long time to launch a program.
• Files and data have disappeared.
• Your system and programs crash constantly.
• The homepage you set on your web browser is different (note that this could be caused by Adware
that has been installed on your computer).
• Web pages are slow to load.

11
• Your computer screen looks distorted.
• Programs are running without your control.
• If you suspect a problem, make sure your security software is up to date and run it to check for
infection. If nothing is found, or if you are unsure of what to do, seek technical help.

Wi-Fi Eavesdropping
WiFi eavesdropping is another method used by cyber criminals to capture personal
information.
Virtual “listening in” on information that's shared over an unsecure (not encrypted) WiFi
network.
What it can do:
• Potentially access your computer with the right equipment.
• Steal your personal information including logins and passwords.

III. Application/Activity

IV. Assessment

VI. Other References

 https://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT
 https://www.wired.com/story/wired-guide-internet-of-things/
 https://www.forbes.com/sites/jacobmorgan/2014/05/13/simple-explanation-internet-things- that-
anyone-can-understand/#16d8137b1d09
 https://www.vistacollege.edu/blog/careers/it/trends-in-information-technology-for-2019/
 https://www.simplilearn.com/top-technology-trends-and-jobs-article
 https://thebossmagazine.com/future-virtual-reality/
 https://www.livescience.com/34843-augmented-reality.html
 https://www.qualcomm.com/invention/5g/what-is-5g

12
COLLEGE OF INFORMATION TECHNOLOGY
First Semester, A.Y. 2023-2024
MODULE 4
Digital Technology and Social Changes
I. Objectives
At the end of this module, learners are expected to:
• Identify what are the current and emerging trends in technology;
• Understand how technology affects culture and society trough through the different advancements in
technology;
• Asses the positive and negative effects of said advancement
• Explain the role of ICT in social change.

II. Lecture

Internet of Things
The "Internet of things" (IoT) is becoming an increasingly growing topic of conversation both in the
workplace and outside of it. It's a concept that not only has the potential to impact how we live but also how
we work. But what exactly is the "Internet of things" and what impact is it going to have on you, if any?

13
Lightbulbs, along with refrigerators, coffee makers, microwave ovens, baby monitors, security cameras,
speakers, televisions, and thermostats have, in the past few decades, transformed from ordinary objects
into conduits for the future. Embedded with sensors that see, hear, and touch the world around them, they
can turn physical information into digital data. Collectively, these devices — and there are billions of them
around the world—make up the “internet of things.”

Just about anything with network connectivity belongs to the internet of things, from security cameras and
speakers to smart watches and denim jackets. In the “smart home,” these internets enabled gadgets
liberate us from our chores, give us back some of our time, and add a dash of novelty to ordinary
experiences. (“Alexa, turn on the disco lights.”) But the internet of things is about more than just using your
voice to preheat the oven or using your phone to turn off the lights.
The real promise of the internet of things is making our physical surroundings accessible to our digital
computers, putting sensors on everything in the world and translating it into a digital format.
Internet-connected objects could be the key to unlocking predictions about everything from consumer
behavior to climate events, but those same objects could invite hackers into personal spaces and leak
intimate data. Depending on who you ask, the growing internet of things either represents the promise of
technology—the thing that will reinvent modern life as we know it—or that which will be our technological
undoing.

How IoT works


An IoT ecosystem consists of web-enabled smart devices that use embedded systems, such as
processors, sensors and communication hardware, to collect, send and act on data they acquire from their
environments. IoT devices share the sensor data they collect by connecting to an IoT gateway or other
edge device where data is either sent to the cloud to be analyzed or analyzed locally. Sometimes, these
devices communicate with other related devices and act on the information they get from one another. The
devices do most of the work without human intervention, although people can interact with the devices -- for
instance, to set them up, give them instructions or access the data.

The connectivity, networking and communication protocols used with these web-enabled devices largely
depend on the specific IoT applications deployed.
IoT can also make use of artificial intelligence (AI) and machine learning to aid in making data collecting
processes easier and more dynamic.

14
Why IoT is important
The internet of things helps people live and work smarter, as well as gain complete control over their lives.
In addition to offering smart devices to automate homes, IoT is essential to business. IoT provides
businesses with a real-time look into how their systems really work, delivering insights into everything from
the performance of machines to supply chain and logistics operations.
IoT enables companies to automate processes and reduce labor costs. It also cuts down on waste and
improves service delivery, making it less expensive to manufacture and deliver goods, as well as offering
transparency into customer transactions. As such, IoT is one of the most important technologies of
everyday life, and it will continue to pick up steam as more businesses realize the potential of connected
devices to keep them competitive.
How Does This Impact You?
The new rule for the future is going to be, "Anything that can be connected, will be connected." But why on
earth would you want so many connected devices talking to each other? There are many examples for
what this might look like or what the potential value might be. Say for example you are on your way to a
meeting; your car could have access to your calendar and already know the best route to take. If the traffic
is heavy your car might send a text to the other party notifying them that you will be late. What if your alarm
clock wakes up you at 6 a.m. and then notifies your coffee maker to start brewing coffee for you? What if
your office equipment knew when it was running low on supplies and automatically re-ordered more? What
if the wearable device you used in the workplace could tell you when and where you were most active and
productive and shared that information with other devices that you used while working?
On a broader scale, the IoT can be applied to things like transportation networks: "smart cities" which can
help us reduce waste and improve efficiency for things such as energy use; this helping us understand and
improve how we work and live. The reality is that the IoT allows for virtually endless opportunities and
connections to take place, many of which we can't even think of or fully understand the impact of today.

IoT Through the Years


1990
John Romkey creates the first IoT device: a toaster that he controls with his computer

1999
Kevin Ashton coins the term “internet of things” to describe the eyes and ears of a computer

2000
LG introduces its first connected refrigerator with a $20,000 pricetag

2008
The world’s first IoT conference is held in Zurich, Switzerland

2010
Tony Fadell founds Nest, maker of the smart thermostat

15
2013
Oxford Dictionary adds the term “internet of things”

2014
Amazon introduces the Echo speaker, along with the Alexa voice assistant—a new way to control the smart
home
2016
The Mirai botnet infects over 600,000 IoT devices with malware

2020
The number of internet-connected devices, by some estimates, exceeds 20 billion
The first internet-connected “thing” to make use of this new protocol was a toaster. John Romkey, a
software engineer and early internet evangelist, had built one for the 1990 showfloor of Interop, a trade
show for computers. Romkey dropped a few slices of bread into the toaster and, using a clunky computer,
turned the toaster on. It would still be a decade before anyone used the phrase “internet of things,” but
Romkey’s magic little toaster showed what a world of internet-connected things might be like. (Of course, it
wasn’t fully automated; a person still had to introduce the bread.) It was part gimmick, part proof of concept
—and fully a preview of what was to come.
The term “internet of things” itself was coined in 1999, when Kevin Ashton put it in a PowerPoint
presentation for Procter & Gamble. Ashton, who was then working in supply chain optimization, described a
system where sensors acted like the eyes and ears of a computer—an entirely new way for computers to
see, hear, touch, and interpret their surroundings.
As home internet became ubiquitous and Wi-Fi sped up, the dream of the smart home started to look more
like a reality. Companies began to introduce more and more of these inventions: “smart” coffee makers to
brew the perfect cup, ovens that bake cookies with precision timing, and refrigerators that automatically
restocked expired milk. The first of these, LG’s internet-connected refrigerator, hit the market in 2000. It
could take stock of shelf contents, mind expiration dates, and for some reason, came with an MP3 player. It
also cost $20,000. As sensors became cheaper, these internet-connected devices became more affordable
for more consumers. And the invention of smart plugs, like those made by Belkin, meant that even ordinary
objects could become “smart”—or, at least, you could turn them on and off with your phone.
Any IoT system today contains a few basic components. First, there’s the thing outfitted with sensors.
These sensors could be anything that collects data, like a camera inside a smart refrigerator or an
accelerometer that tracks speed in a smart running shoe. In some cases, sensors are bundled together to
gather multiple data points: a Nest thermostat contains a thermometer, but also a motion sensor; it can
adjust the temperature of a room when it senses that nobody’s in it. To make sense of this data, the device
has some kind of network connectivity (Wi-Fi, Bluetooth, cellular, or satellite) and a processor where it can
be stored and analyzed. From there, the data can be used to trigger an action—like ordering more milk
when the carton in the smart refrigerator runs out, or adjusting the temperature automatically given a set of
rules.
Most people didn’t start building an ecosystem of “smart” devices in their homes until the mass adoption of
voice controls. In 2014, Amazon introduced the Echo, a speaker with a helpful voice assistant named Alexa
built in. Apple had introduced Siri, its own voice assistant, four years prior— but Siri lived on your phone,
while Alexa lived inside the speaker and could control all of the “smart” devices in your house. Positioning a
voice assistant as the centerpiece of the smart home had several effects: It demystified the internet of
things for consumers, encouraged them to buy more internet-enabled gadgets, and encouraged developers
to create more “skills,” or IoT commands, for these voice assistants to learn
The same year that Amazon debuted Alexa, Apple came out with HomeKit, a system designed to facilitate
interactions between Apple-made smart devices, sending data back and forth to create a network. These
unifying voices have shifted the landscape away from single-purpose automations and toward a more
holistic system of connected things. Tell the Google Assistant “goodnight,” for example, and the command

16
can dim the lights, lock the front door, set the alarm system, and turn on your alarm clock. LG’s
SmartThinQ platform connects many home appliances, so you can select a chocolate chip cookie recipe
from the screen of your smart fridge and it’ll automatically preheat the oven. Manufacturers bill this as the
future, but it’s also a convenient way to sell more IoT devices. If you already have an Amazon Echo, you
might as well get some stuff for Alexa to control.
By 2014, the number of internet-connected devices would surpass the number of people in the world. David
Evans, the former chief futurist at Cisco, estimated in 2015 that “an average 127 new things are connected
to the internet” every second. Today, there are over 20 billion connected things in the world, according to
estimates from Gartner. The excitement around the brave new internet- connected world has been
matched with concern . All of these objects, brought to life like Pinocchio, have made the world easier to
control: You can let the delivery man in the front door, or change the temperature inside the house, all with
a few taps on a smartphone.

IoT benefits to organizations


The internet of things offers several benefits to organizations. Some benefits are industry-specific, and
some are applicable across multiple industries. Some of the common benefits of IoT enable businesses to:
• monitor their overall business processes;
• improve the customer experience;
• save time and money;
• enhance employee productivity;
• integrate and adapt business models;
• make better business decisions; and
• generate more revenue.

IoT encourages companies to rethink the ways they approach their businesses and gives them the tools to
improve their business strategies.
Generally, IoT is most abundant in manufacturing, transportation and utility organizations, making use of
sensors and other IoT devices; however, it has also found use cases for organizations within the
agriculture, infrastructure and home automation industries, leading some organizations toward digital
transformation.

IoT can benefit farmers in agriculture by making their job easier. Sensors can collect data on rainfall,
humidity, temperature and soil content, as well as other factors, that would help automate farming
techniques.

The ability to monitor operations surrounding infrastructure is also a factor that IoT can help with.

17
Sensors, for example, could be used to monitor events or changes within structural buildings, bridges and
other infrastructure. This brings benefits with it, such as cost saving, saved time, quality-of-life workflow
changes and paperless workflow.

A home automation business can utilize IoT to monitor and manipulate mechanical and electrical systems
in a building. On a broader scale, smart cities can help citizens reduce waste and energy consumption.

IoT touches every industry, including businesses within healthcare, finance, retail and manufacturing.

Pros and cons of IoT

Advantages of IoT
• ability to access information from anywhere at any time on any device;
• improved communication between connected electronic devices;
• transferring data packets over a connected network saving time and money; and
• automating tasks helping to improve the quality of a business's services and reducing the need for human
intervention.

Disadvantages of IoT
• As the number of connected devices increases and more information is shared between devices, the
potential that a hacker could steal confidential information also increases.
• Enterprises may eventually have to deal with massive numbers -- maybe even millions – of IoT devices,
and collecting and managing the data from all those devices will be challenging.
• If there's a bug in the system, it's likely that every connected device will become corrupted.
• Since there's no international standard of compatibility for IoT, it's difficult for devices from different
manufacturers to communicate with each other.

Consumer and enterprise IoT applications


There are numerous real-world applications of the internet of things, ranging from consumer IoT and
enterprise IoT to manufacturing and industrial IoT (IIoT). IoT applications span numerous verticals,
including automotive, telecom and energy.
In the consumer segment, for example, smart homes that are equipped with smart thermostats, smart
appliances and connected heating, lighting and electronic devices can be controlled remotely via
computers and smartphones.

18
Wearable devices with sensors and software can collect and analyze user data, sending messages to other
technologies about the users with the aim of making users' lives easier and more comfortable. Wearable
devices are also used for public safety -- for example, improving first responders' response times during
emergencies by providing optimized routes to a location or by tracking construction workers' or firefighters'
vital signs at life-threatening sites.
In healthcare, IoT offers many benefits, including the ability to monitor patients more closely using an
analysis of the data that's generated. Hospitals often use IoT systems to complete tasks such as inventory
management for both pharmaceuticals and medical instruments.
Smart buildings can, for instance, reduce energy costs using sensors that detect how many occupants are
in a room. The temperature can adjust automatically -- for example, turning the air conditioner on if sensors
detect a conference room is full or turning the heat down if everyone in the office has gone home.

In agriculture, IoT-based smart farming systems can help monitor, for instance, light, temperature, humidity
and soil moisture of crop fields using connected sensors. IoT is also instrumental in automating irrigation
systems.

In a smart city, IoT sensors and deployments, such as smart streetlights and smart meters, can help
alleviate traffic, conserve energy, monitor and address environmental concerns, and improve sanitation.

IoT security and privacy issues


The internet of things brings all the benefits of the internet to items like lightbulbs and thermostats, but it
brings all the problems of the internet, too. Now that people have their speakers, television sets,
refrigerators, alarm clocks, toothbrushes, light bulbs, doorbells, baby monitors, and security cameras
connected to the Wi-Fi, nearly every device in the house can be compromised, or rendered useless.
Consider the whims of internet connectivity: When your Wi-Fi goes down, so do your devices. Router
problems? That means you can’t turn on the heat with your smart thermostat or unlock your smart door
lock. Things that used to be easy become potentially faulty, if not impossible, when they require an Alexa
command or a smartphone control rather than a physical button. Many of these devices also run on
proprietary software—meaning, if their manufacturer goes bunk, gets sold, or stops issuing software
updates, your clever little gadget becomes a useless hunk of plastic.

Risk of bricking aside, connecting things to the internet also leaves those objects, and everything else on
your Wi-Fi network, more vulnerable to hackers. Laura DeNardis, in her recent book The Internet in
Everything, has called this threat to cybersecurity the greatest human rights issue of our time. The risk isn’t
just that some prankster breaks into your smart washing machine and upsets the spin cycle, or that your
Nest camera gets hijacked with a message to subscribe to PewDiePie’s YouTube channel. (Yes, that really
happened.) A hacked smart lock means someone can open your front door. Hack into enough smart water
heaters and you can send a city into a massive blackout. And one vulnerable device can compromise the
whole network. As WIRED’s Lily Hay Newman points out , “IoT devices have been conscripted into

19
massive botnets, compromised for nation-state reconnaissance, hacked to mine cryptocurrency, and
manipulated in assaults on power grids.”

The threat to internet-connected devices comes not just because they’re connected to the internet, but
because device manufacturers have not always designed their products with security as a priority. In 2016,
malware called Mirai exploited these kinds of vulnerabilities in over 600,000 IoT devices to create a
massive distributed denial of service (DDoS) attack. The following year, an attack called Krack infected
nearly every internet-connected device connected to Wi-Fi. The attack was crippling and difficult to defend
against, in part because the internet of things runs on so many disparate operating systems. When a phone
or a computer gets hit with a virus, software makers are generally quick to issue a patch. But things like
routers or internet-connected doorbells don’t usually receive software updates needed to protect against
vulnerabilities, and many of them weren’t built with the same kind of security protocols as computers. After
the Krack attack, one security researcher predicted that we would stitll “find vulnerable devices 20 years
from now.”

Then there’s the question of privacy. If cameras and microphones are studded around your home, they are
definitely watching and listening to you. Everything in the internet of things collects data— and all that data
has value. In a recent study, researchers found that 72 of the 81 IoT devices they surveyed had shared
data with a third party unrelated to the original manufacturer. That means the finer details of your personal
life—as depicted by your smart toothbrush, your smart TV, or your smart speaker—can be repackaged and
sold to someone else. Google and Apple both admitted, last year, that the recordings captured by their
smart speakers are reviewed by contractors, including awkward and intimate snippets of audio. Amazon
has partnerships with over 400 police departments, who use the footage from its Ring doorbell cameras to
keep watch on neighborhoods. An ever-expanding internet of things doesn’t just have consequences for
personal privacy. It can create a network of computer eyes and ears everywhere we go. Because IoT
devices are closely connected, all a hacker has to do is exploit one vulnerability to manipulate all the data,
rendering it unusable. Manufacturers that don't update their devices regularly -- or at all -- leave them
vulnerable to cybercriminals.

Additionally, connected devices often ask users to input their personal information, including names, ages,
addresses, phone numbers and even social media accounts -- information that's invaluable to hackers.
Hackers aren't the only threat to the internet of things; privacy is another major concern for IoT users. For
instance, companies that make and distribute consumer IoT devices could use those devices to obtain and
sell users' personal data.
Beyond leaking personal data, IoT poses a risk to critical infrastructure, including electricity, transportation
and financial services.

The Future of the Internet of Things


One day, the internet of things will become the internet of everything. The objects in our world might sense
and react to us individually all the time, so that a smart thermostat automatically adjusts based on your

20
body temperature or the house automatically locks itself when you get into bed. Your clothes might come
with connected sensors, too, so that the things around you can respond to your movements in real time.
That’s already starting to happen: In 2017, Google announced Project Jacquard, an effort to create the
connected wardrobe of the future.
This vision extends far beyond your clothes, and even your home. You’ll also have smart offices, smart
buildings, smart cities. Smart hospital rooms will have sensors to ensure that doctors wash their hands, and
airborne sensors will help cities predict mudslides and other natural disasters. Autonomous vehicles will
connect to the internet and drive along roads studded with sensors, and governments will manage the
demands on their energy grids by tracking household energy consumption through the internet of things.
The growth of the internet of things could also lead to new kinds of cyber warfare; imagine a bad actor
disabling every smart thermostat in the dead of winter, or hacking into internet-connected pacemakers and
insulin pumps. It could create new class systems: those with robot maids, and those without. Or, as Ray
Bradbury described in one short story from 1950, all the people might disappear—but the smart homes,
preparing meals and sweeping the floors, will live on.
If we’re going to get there—whether we like “there” or not—we’re going to need faster internet. ( Enter :
5G .) We’ll also need to keep all those devices from mucking up the airwaves , and we’ll need to find a
better way to secure the data that’s transmitted across those airwaves. Recently, the Swiss cryptography
firm Teserakt introduced an idea for a cryptographic implant for IoT devices, which would protect the
data that streams from these devices. There are also ideas for creating a better standard for IoT devices,
and plans to help them get along with each other, regardless of which company makes them or which voice
assistant lives inside.

Current Trends and Emerging Technologies


Current Trends in Information Technology
The latest technology methods and best practices of 2019 will primarily stem from current trends in
information technology. Advancements in IT systems relate to what the industry is leaning toward or
disregarding now. Information technology is advancing so rapidly that new developments are quickly
replacing current projections.

A. CLOUD COMPUTING
B. MOBILE COMPUTING AND APPLICATIONS
C. BIG DATA ANALYTICS
D. AUTOMATION
a. Cloud Computing
Cloud computing is a network of resources a company can access, and this method of using a digital drive
increases the efficiency of organizations. Instead of local storage on computer hard drives, companies will
be freeing their space and conserving funds. According to Forbes, 83 percent of enterprise workloads will
be in the cloud by 2020, which means 2019 will show an increasing trend closing in on this statistic.
Cloud storage and sharing is a popular trend many companies have adopted and even implemented for
employee interaction. A company-wide network will help businesses save on information technology

21
infrastructure. Cloud services will also extend internal functions to gain revenue. Organizations that offer
cloud services will market these for external products and continue their momentum.
Organizations will transfer their stored files across multiple sources using virtualization. Companies are
already using this level of virtualization, but will further embrace it in the year to come. Less installation
across company computers is another positive result of cloud computing because the Internet allows direct
access to shared technology and information. The freedom of new products and services makes cloud
computing a growing trend .

b. Mobile Computing and Applications


Mobile phones, tablets, and other devices have taken both the business world and the personal realm by
storm. Mobile usage and the number of applications generated have both skyrocketed
in recent years. Now, 77 percent o f Americans own smartphones — a 35 percent increase since
2011. Pew Research Center also shows using phones for online use has increased and fewer individuals
use traditional Internet services like broadband.
Experts project mobile traffic to increase even further in 2019, and mobile applications, consumer
capabilities, and payment options will be necessary for businesses. The fastestgrowing companies have
already established their mobile websites, marketing, and apps for maximized security and user-
friendliness. Cloud apps are also available for companies to use for on-the-go capabilities.

c. Big Data Analytics


Big data is a trend that allows businesses to analyze extensive sets of information to achieve variety in
increasing volumes and growth of velocity. Big data has a high return on investment that boosts the
productivity of marketing campaigns, due to its ability to enable high-functioning processing. Data mining is
a way companies can predict growth opportunities and achieve future success. Examination of data to
understand markets and strategies is becoming more manageable with advances in data analytic
programs.
This practice in information technology can be observed for its potential in data management positions for
optimal organizations. Database maintenance is a growing sector of technology careers. To convert various
leads into paying customers, big data is an essential trend to continue following in 2019.

d. Automation
Another current trend in the IT industry is automated processes. Automated processes can collect
information from vendors, customers, and other documentation. Automated processes that check invoices
and other accounts-payable aspects expedite customer interactions. Machine processes can automate
repetitive manual tasks, rather than assigning them to employees. This increases organization-wide
productivity, allowing employees to use their valuable time wisely, rather than wasting it on tedious work.
Automation can even produce more job opportunities for IT professionals trained in supporting,
programming, and developing automated processes. Machine learning can enhance these automated

22
processes for a continually developing system. Automated processes for the future will extend to groceries
and other automatic payment methods to streamline the consumer experience.

Emerging Trends in Information Technology


Trends in information technology emerging in 2019 are new and innovative ways for the industry to grow.
These movements in information technology are the areas expected to generate revenue and increase
demand for IT jobs. Pay attention to these technological changes and unique products that enhance
business operations
a. Artificial Intelligence and Smart Machines

What is Artificial Intelligence?


According to Encyclopedia, Artificial intelligence (AI), is the ability of a digital computer or computer-
controlled robot to perform tasks commonly associated with intelligent beings. The term is frequently
applied to the project of developing systems endowed with the intellectual processes characteristic of
humans, such as the ability to reason, discover meaning, generalize, or learn from past experience.

Artificial Intelligence, or AI, has already received a lot of buzz in recent years, but it continues to be a trend
to watch because its effects on how we live, work, and play are only in the early stages. In addition, other
branches of AI have developed, including Machine Learning, which we will go into below. AI refers to
computer systems built to mimic human intelligence and perform tasks such as recognition of images,
speech or patterns, and decision making. AI can do these tasks faster and more accurately than humans.
Five out of six Americans use AI services in one form or another every day, including navigation apps,
streaming services, smartphone personal assistants, ride-sharing apps, home personal assistants, and
smart home devices. In addition to consumer use, AI is used to schedule trains, assess business risk,
predict maintenance, and improve energy efficiency, among many other money-saving tasks.
In fact, Artificial intelligence are already being used in different organization to help solve problems such as
AI face recognition is beginning to help with missing people reports, and it even helps identify individuals for
criminal investigations when cameras have captured their images. According to the National Institute of
Standards and Technology, face recognition is most effective when AI systems and forensic facial

23
recognition experts’ team up. AI will continue to promote safety for citizens in the future as software
improvements shape these applications.
Medical AI is another trend that reflects surprising success. Given patient information and risk factors, AI
systems can anticipate the outcome of treatment and even estimate the length of a hospital visit. Deep
learning is one way AI technology gets applied to health records to find the likelihood of a patient’s recovery
and even mortality. Experts evaluate data to discover patterns in the patient’s age, condition, records, and
more.
Home AI systems are also increasingly popular to expedite daily tasks like listening to tunes, asking for
restaurant hours, getting directions, and even sending messages. Many problem-solving AI tools also help
in the workplace, and the helpfulness of this technology will continue to progress in 2020.
b. Virtual Reality
Virtual reality (VR), the use of computer modeling and simulation that enables a person to interact with an
artificial three-dimensional (3-D) visual or another sensory environment. VR applications immerse the user
in a computer-generated environment that simulates reality through the use of interactive devices, which
send and receive information and are worn as goggles, headsets, gloves, or body suits.

CAVE automatic virtual environment


For instance, CAVE automatic virtual environments actively display virtual content onto room-sized
screens. While they are fun for people in universities and big labs, consumer and industrial wearables are
the wild west.

With a multiplicity of emerging hardware and software options, the future of wearables is unfolding but yet
unknown. Concepts such as the HTC Vive Pro Eye, Oculus Quest and Playstation VR are leading the
way, but there are also players like Google, Apple, Samsung, Lenovo and others who may surprise the
industry with new levels of immersion and usability. Whomever comes out ahead, the simplicity of buying
a helmet-sized device that can work in a living-room, office, or factory floor has made HMDs center stage
when it comes to Virtual Reality technologies.

24
Oculus Rift

Whilst VR is known for transforming the gaming and entertainment industry in particular, with consoles
and handhelds adapting their games for VR the gaming experience has been utterly transformed and
improved all around. The connection between game and player becomes far closer as gamers are
completely immersed into their own gaming world.

VR is also beginning to revolutionize other industries such as healthcare, retail and education, which is
already aiding tasks in the sectors, from helping patients with anxiety relax, and helping students learn
more by experiencing what they are being educated on.

c. Augmented Reality
Augmented reality is a more versatile and practical version of virtual reality, as it does not fully immerse
individuals in an experience. Augmented reality features interactive scenarios that enhance the real world
with images and sounds that create an altered experience.

25
As it happens, phones and tablets are the way augmented reality gets into most people's lives. One of the
most popular ways AR has infiltrated everyday life is through mobile games. In 2016, the AR game
"Pokémon Go" became a sensation worldwide, with over 100 million estimated users at its peak, according
to CNET. It ended up making more than $2 billion and counting, according to Forbes. The game allowed
users to see Pokémon characters bouncing around in their own town. The goal was to capture these
pocket monsters using your smartphone camera, and then use them to battle others, locally, in AR gyms.
Another app called Layar uses the smartphone's GPS and its camera to collect information about the user's
surroundings. It then displays information about nearby restaurants, stores and points of interest.
Augmented reality can impact many industries in useful ways. Airports are implementing augmented-reality
guides to help people get through their checks and terminals as quickly and efficiently as possible. Retail
and cosmetics are also using augmented reality to let customers test products, and furniture stores are
using this mode to lay out new interior design options.
This doesn't mean that phones and tablets will be the only venue for AR. Research continues apace on
including AR functionality in contact lenses, and other wearable devices. The ultimate goal of augmented
reality is to create a convenient and natural immersion, so there's a sense that phones and tablets will get
replaced, though it isn't clear what those replacements will be. Even glasses might take on a new form, as
"smart glasses" are developed for blind people. Like any new technology, AR has a lot of political and
ethical issues. Google Glass, for example, raised privacy concerns. Some worried that conversations might
be surreptitiously recorded or pictures snapped, or thought that they might be identified by face recognition
software. AR glasses, contacts and more, like the Glass - X and Google Lens, though, are moving ahead in
production and sales.
The possibilities for augmented reality in the future revolve around mobile applications and health care
solutions. Careers in mobile app development and design will be abundant, and information technology
professionals can put their expertise to use in these interactive experiences.

d. Blockchain Data
Blockchain data, like the new cryptocurrency Bitcoin, is a secure method that will continue to grow in
popularity and use in 2019. This system allows you to input additional data without changing, replacing, or
deleting anything. In the influx of shared data systems like cloud storage and resources, protecting original
data without losing important information is crucial.

e. Internet of Things
The Internet of Things (IoT) is an emerging movement of products with integrated Wi-Fi and network
connectivity abilities. Cars, homes, appliances, and other products can now connect to the Internet, making
activities around the home and on the road an enhanced experience. Use of IoT allows people to turn on
music hands-free with a simple command, or lock and unlock their doors even from a distance.
Many of these functions are helping organizations in customer interaction, responses, confirmations, and
payments. Remote collection of data assists companies the most. IoT almost acts like a digital personal
assistant. The intelligent features of some of these IoT products can aid in many company procedures.
Voice recognition and command responses will allow you to access stored data on cloud services.

26
IoT enriches the IT industry, especially in job creation. Within the next few years, IoTrelated careers will
increase, and there will be a need for 200,000 additional IT workers, according to IT Pro Today. Design,
troubleshooting, and support of IoT products need extensive training and a specific set of skills.

f. 5G
5G is the 5th generation mobile network. It is a new global wireless standard after 1G, 2G, 3G, and 4G
networks. 5G enables a new kind of network that is designed to connect virtually everyone and everything
together including machines, objects, and devices.

5G wireless technology is meant to deliver higher multi-Gbps peak data speeds, ultra low latency, more
reliability, massive network capacity, increased availability, and a more uniform user experience to more
users. Higher performance and improved efficiency empower new user experiences and connects new
industries.

5G is a unified, more capable air interface. It has been designed with an extended capacity to enable next-
generation user experiences, empower new deployment models and deliver new services. With high
speeds, superior reliability and negligible latency, 5G will expand the mobile ecosystem into new realms.
5G will impact every industry, making safer transportation, remote healthcare, precision agriculture,
digitized logistics — and more — a reality. Broadly speaking, 5G is used across three main types of
connected services, including enhanced mobile broadband, mission-critical communications, and the
massive IoT. A defining capability of 5G is that it is designed for forward compatibility—the ability to flexibly
support future services that are unknown today. Enhanced mobile broadband In addition to making our
smartphones better, 5G mobile technology can usher in new immersive experiences such as VR and AR
with faster, more uniform data rates, lower latency, and lower cost- per-bit. Mission-critical communications
5G can enable new services that can transform industries with ultra-reliable, available, low-latency links like
remote control of critical infrastructure, vehicles, and medical procedures. Massive IoT 5G is meant to
seamlessly connect a massive number of embedded sensors in virtually everything through the ability to
scale down in data rates, power, and mobility—providing extremely lean and low-cost connectivity
solutions.

III. Application/Activity
IV. Assessment
VI. Other References
 https://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT
 https://www.wired.com/story/wired-guide-internet-of-things/
 https://www.forbes.com/sites/jacobmorgan/2014/05/13/simple-explanation-internet-things- that-
anyone-can-understand/#16d8137b1d09
 https://www.vistacollege.edu/blog/careers/it/trends-in-information-technology-for-2019/
 https://www.simplilearn.com/top-technology-trends-and-jobs-article
 https://thebossmagazine.com/future-virtual-reality/
 https://www.livescience.com/34843-augmented-reality.html

27
 https://www.qualcomm.com/invention/5g/what-is-5g

Prepared by:

VENUS T. BOMBAY
Faculty, CIT

28

You might also like