IT Business Reviewer
IT Business Reviewer
an electronic document in which data is arranged in the rows and columns of a grid and can be
manipulated and used in calculations. Spreadsheets are digital tools for organizing, analyzing, and storing
data in a structured format. They are widely used across industries for tasks ranging from financial
calculations to project management and data visualization.
Components of Spreadsheets
1. Cells – is where you enter data (text, numbers, dates, etc.). Each cell has a unique identifier called
its "cell reference" (e.g., A1, B3, C4). The basic unit where data is entered.
• IF
Checks a condition and returns one value if TRUE and another if FALSE.
=IF(A1 > 10, "Yes", "No")
If the value in A1 is greater than 10, it returns "Yes" , otherwise "No"
• COUNTIF
Counts the number of cells that meet a specific condition.
=COUNTIF(A1:A5, ">10")
Counts how many cells in A1 through A5 contain a value greater than 10.
• SUMIF
Adds up values that meet a specific condition.
=SUMIF(A1:A5, ">10")
Adds the values in A1 through A5 that are greater than 10.
• AVERAGEIF
Calculates the average of cells that meet a condition.
=AVERAGEIF(A1:A5, ">10")
Averages the values in A1 through A5 that are greater than 10.
• CONCATENATE
Joins multiple text values together.
=CONCATENATE(A1, " " , B1)
Combines the text in A1 and B1 with a space in between. Or you can use =A1 & " " & B1 to
achieve the same result.
• MID
Extracts characters from the middle of a text string, starting at any position.
=MID(A1, 2, 3)
Starts at the 2nd character in A1 and extracts 3 characters.
• MIN
Returns the smallest value in a range.
=MIN(A1:A5)
Finds the smallest value in the range A1 through A5.
• MAX
Returns the largest value in a range.
=MAX(A1:A5)
Finds the largest value in the range A1 through A5.
• COUNT
Counts the number of cells that contain numbers in a range.
=COUNT(A1:A5)
Counts how many cells in the range A1 through A5 contain numbers.
• COUNTA
Counts the number of non-empty cells.
=COUNTA(A1:A5)
Counts how many cells in the range A1 through A5 are not empty.
1. COLUMN CHARTS - help show data variations over a period and compare the datasets. The
plot shows the categories on the X-axis or the horizontal axis and the values along the Y-axis
or the vertical axis.
2. LINE CHARTS - help display the data trends and behavior at regular intervals. And it is an
ideal graph to analyze the given data when there is more than one data series.
3. PIE CHART – a circle-shaped chart capable of representing only one series of data. A circle-
shaped chart divides itself into various portions to show the quantitative value.
4. BAR CHARTS - help perform comparisons between categories specified in the source data.
In the bar chart, the data is plotted on the Y-axis. Compared to the column chart, these
charts use the Y-axis as the primary axis. This chart is plotted in rows. That is why this is
called a row chart.
5. AREA CHARTS - The Area charts in Excel help visualize a variation over time and focus on
the total value along the trend. It shows the plotted data points’ sum. And thus, the chart
helps understand the relationship between the individual data series to the whole data. It is
similar to the Line graph, except the Area chart shows the region between the trend line and
the X-axis in color.
6. SCATTER CHARTS - Scatter charts in Excel help in displaying and comparing scientific and
statistical data. It is best to use the Scatter chart when we must modify the X-axis scale, get
a logarithmic scale axis, or not have evenly spaced values along the X-axis.
SORTING DATA - sorting allows you to arrange data in a specific order, either alphabetically (for text) or
numerically (for numbers), making it easier to analyze and view.
FILTERING DATA - filters help you hide data that doesn't meet certain criteria, allowing you to focus on
specific subsets of your data. Filters are often used when you want to view only specific records that match
certain conditions (e.g., show only sales data from a certain region).
CONDITIONAL FORMATTING - a powerful tool that automatically changes the appearance (color, font,
border) of cells based on the values within those cells. It’s helpful when you want to visually emphasize
certain data points (e.g., highlight cells with high sales, or show dates that are overdue).
TOP/BOTTOM RULES - You can format cells that are in the top 10% or bottom 10% of a range.
Data Bars – Adds horizontal bars to show data values relative to others.
Color Scales – Color cells based on a gradient (e.g., green for higher values, red for lower values)
ICON SETS - Adds icons (e.g., arrows or traffic lights) based on the values in the cells.
ARRAY FORMULA - An array formula in Excel evaluates all individual values in an array and performs
multiple calculations on one or several items according to the conditions expressed in the formula.
• SHARING AND PERMISSIONS - Sharing and permissions control who can access your
spreadsheet and what they can do with it. Both Google Sheets and Excel Online provide powerful
options for sharing documents and setting granular permissions to either allow others to view,
comment, or edit the spreadsheet.
• CLOUD STORAGE AND COLLABORATION - One of the biggest advantages of cloud-based tools
like Google Sheets and Excel Online is the ability to collaborate in real-time. Multiple users can work
on a document simultaneously, and the changes are reflected instantly.
• VERSION HISTORY - a crucial feature for tracking changes over time, especially when working with
collaborative documents. Both Google Sheets and Excel Online keep a detailed log of all changes
made to a document, allowing you to review or restore previous versions.
• MACRO -Short for "macroinstructions, " macros are sets of recorded or programmed commands
that automate repetitive tasks in software applications like spreadsheets. They allow users to
execute a sequence of actions with a single trigger, such as a keyboard shortcut or button click,
saving time and reducing errors.
• VBA (VISUAL BASIC FOR APPLICATIONS) - A programming language integrated into Microsoft
Office applications, such as Excel, that enables users to write custom scripts to automate tasks,
create user-defined functions, and manipulate data beyond the built-in features of the software.
• GOOGLE APPS SCRIPT - A JavaScript-based scripting platform provided by Google to automate
and extend the functionality of Google Workspace applications, such as Google Sheets. It allows
users to create custom functions, automate workflows, and integrate with external services.
DATA IMPORT AND EXPORT
• IMPORTING DATA - an electronic document in which data is arranged in the rows and columns of a
grid and can be manipulated and used in calculations.
• EXPORTING DATA - The act of saving or transferring data from a spreadsheet to another file format
or location, such as Excel (.xlsx), CSV, PDF, or other compatible formats, for sharing, storage, or use
in different software.
Advantages of Spreadsheets
Challenges of Spreadsheets
BEST PRACTICES
• ORGANIZING DATA -The practice of structuring data in a clear and efficient manner within a
spreadsheet, such as using tables, consistent naming conventions (e.g., for columns or files), and
logical layouts, to improve readability, usability, and maintainability.
• ERROR CHECKING -The process of using built-in tools or techniques (e.g., formula auditing,
validation rules, or conditional formatting) to detect and correct errors in data, formulas, or
calculations, ensuring accuracy and reliability.
• DOCUMENTATION -The act of adding explanatory comments, notes, or descriptions within a
spreadsheet to clarify the purpose of formulas, data sources, or specific entries, making it easier
for users to understand and work with the file.
• PROTECTING SHEETS AND CELLS -A feature in spreadsheet software that restricts editing access
to specific cells, ranges, or entire sheets to prevent unintended modifications, while still allowing
authorized users to view or interact with the data in a controlled way.
• PASSWORD PROTECTION -A security measure that involves setting a password on a spreadsheet
file to limit access, ensuring that only users with the correct password can open, view, or edit the
document.
• AUDIT TRAILS -A record-keeping system that tracks changes made to a document or spreadsheet,
including what modifications were made, when they occurred, and who made them. This helps
maintain accountability, troubleshoot issues, and ensure data integrity by identifying contributors
and their actions.
Database Management System
A database is an electronically stored, systematic collection of data. It can contain any type of data,
including words, numbers, images, videos, and files. You can use software called a database management
system (DBMS) to store, retrieve, and edit data.
A Database Management System (DBMS) is a system that allows users to create, modify, and query
databases while ensuring data integrity, security, and efficient data access. Unlike traditional file systems,
DBMS minimizes data redundancy, prevents inconsistencies, and simplifies data management with
features like concurrent access and backup mechanisms. It organizes data into tables, views, schemas,
and reports, providing a structured approach to data management.
One of its example is MySQL, an open-source relational database management system (RDBMS),
works on a client-server model, allowing users to create databases, store data in tables, and retrieve
information using Structured Query Language (SQL).
Key Features
• Data Storage and Retrieval: Efficient mechanisms for storing data and executing queries to retrieve
it quickly.
• Concurrency Control: Ensures multiple users can access the database simultaneously without
conflicts.
• Data Integrity and Security: Enforces rules to maintain accurate and secure data, including access
controls and encryption.
• Backup and Recovery: Protects data with regular backups and enables recovery in case of system
failures.
Flat-File: A flat file, also known as a text database, stores data in plain text format and is organized
as a single table with no relationships between tables. This type of database was first developed and
implemented by IBM in the early 1970s.
Relational Databases: A relational database is a type of database that stores and organizes data
in a collection of tables. These tables are related to each other through the use of a common field known
as a primary key. Relational databases are used to store, organize and retrieve data quickly and efficiently.
They are the most common type of database used in business applications.
• Structure: A relational database is a type of database organizing data into linked tables, enabling
complex data relationships. A flat file, on the other hand, is a simple file that contains a single table
of data, with no relationships between tables.
• Data Integrity: Relational databases enforce data integrity through the use of primary and foreign
keys, which ensures that data is stored in a consistent and accurate format. Flat files do not have
any built-in mechanism for enforcing data integrity.
• Data Model: Relational databases use a relational data model, which is based on the mathematical
concept of a relation. It is a high-level data model that provides a way to organize and manage data
in a logical and consistent way. Flat files use a flat data model, which is a simple data model that
stores data in a single table with no relationships.
• Data Access: Relational databases provide a variety of data access methods, including SQL, which
allows for complex queries and data manipulation. Flat files can only be accessed and manipulated
through simple file I/O operations.
• Performance: Relational databases are optimized for performance, with indexes, caching and
other techniques to improve query speed. Flat files, on the other hand, can be slow when dealing
with large datasets and complex queries.
• Scalability: Relational databases can handle large amounts of data and handle the concurrent
access from multiple users. Flat files are not designed to handle large amounts of data and are not
well-suited for concurrent access.
• Data storage: Both relational databases and flat files are used for storing data.
• Data organization: Both relational databases and flat files organize data into tables.
• Data retrieval: Both relational databases and flat files can be used to retrieve data.
• Compatibility: Both relational databases and flat files can be used with a variety of programming
languages and platforms.
• Data Backup: Both Relational databases and flat files can be backed up and restored.
RDBMS organizes data into tables (relations) composed of rows and columns. It uses primary keys
to uniquely identify rows and foreign keys to establish relationships between tables. Queries are written in
SQL (Structured Query Language), which allows for efficient data manipulation and retrieval.
Examples: MySQL, Oracle, Microsoft SQL Server and Postgre SQL.
2. NoSQL DBMS
NoSQL systems are designed to handle large-scale data and provide high performance for
scenarios where relational models might be restrictive. They store data in various non-relational formats,
such as key-value pairs, documents, graphs, or columns. These flexible data models enable rapid scaling
and are well-suited for unstructured or semi-structured data.
ADVANTAGES
DISADVANTAGES
Importance of Database
Databases are used for storing, maintaining and accessing any sort of data. They collect
information on people, places or things. This information is gathered in one place so it can be observed
and analyzed. Databases can be thought of as an organized collection of information.
What is Database?
Dr. Edgar F. Codd played the biggest role in shaping modern databases.
Early Beginnings
• Pre-Computer Databases:
o Before computers, people stored data using ledgers, filing cabinets, and punch cards.
• Punch Card System (1890s)
o Developed by Herman Hollerith for the U.S. Census.
• Charles Bachman created the Integrated Data Store (IDS) in 1964, the first database management
system (DBMS).
• IBM developed IMS (Information Management System) for NASA's Apollo program.
Kinds of Databases
1. Structured Database:
A structured database is a database that follows a fixed format for organizing and storing data. It
uses tables with rows and columns, making it easy to search, filter, and retrieve information. These
databases are commonly managed using Relational Database Management Systems (RDBMS) like
MySQL, PostgreSQL, and Oracle.
Example: Medical Records Database – Stores patient information, including names, medical
history, prescriptions, and test results, in an organized way.
2. Free-Form Database:
A free-form database does not follow a strict structure like a structured database. Instead, it stores
unstructured or semi-structured data, making it more flexible. These databases are useful for managing
documents, images, emails, and web pages.
Example: Web Pages Database – Stores different types of content like text, images, and multimedia
without a strict format.
3. Cloud Database:
A cloud database is hosted on cloud computing platforms rather than on a local computer or server.
This type of database allows users to access data from anywhere with an internet connection. It is
scalable, cost-effective, and managed by cloud service providers like Amazon Web Services (AWS), Google
Cloud, and Microsoft Azure.
Example: Google Drive or Dropbox Database – Stores files, documents, and backups in a cloud-
based system, allowing access from any device.
4. Distributed Database:
A distributed database is spread across multiple locations, either within a company’s data centers
or across different regions worldwide. This setup improves performance, reliability, and accessibility since
data is stored in multiple places rather than in a single central location.
Example: Banking Systems – Banks have databases distributed across multiple branches, ensuring
that transactions are processed efficiently even if one server fails.
Types of Databases
Operational Database
Analytical Database
This type of database stores large amounts of historical data for analysis. It is optimized for complex
queries rather than real-time transactions. Businesses use analytical databases to generate reports and
discover trends. Business Intelligence Tools and Google Analytics
Graph Database
A graph database is designed to manage complex relationships between data points. Instead of
traditional tables, it stores data as nodes and edges, making it ideal for applications that require analyzing
relationships. Social Media (Facebook, LinkedIn) and Fraud Detection (Banks, Credit Card Companies)
Document-Oriented Database
A document-oriented database is a type of NoSQL database that stores data in flexible, JSON-like
documents instead of tables. It is useful for handling unstructured or semi-structured data. E-commerce
Platforms (Amazon, Shopee) and Content Management Systems (WordPress, Medium)
Database Models
A database model defines how data is organized, stored, and managed in a database. Each model has a
different way of structuring data and relationships between data elements.
• Hierarchical Model - Data is organized in a tree-like structure with parent-child relationships. Each
parent can have multiple children, but each child has only one parent.
• Network Model - Similar to the hierarchical model but allows multiple parent-child relationships
(many-to-many relationships). Uses a graph structure instead of a strict tree.
• Relational Model - Data is stored in tables (relations) with rows (records) and columns (attributes).
Relationships between tables are established using keys.
• Entity-Relationship Model - A conceptual model that represents data using entities (objects) and
relationships between them. It helps design relational databases.
• Dimensional Model - Uses fact tables and dimension tables to organize data for fast retrieval in
data warehouses.
• Object-Relational Model - A mix of relational and object-oriented database features. Supports
tables like relational databases but also allows storing complex data types like images and videos.
a software that allows users to create, manage, and manipulate relational databases. It organizes
data into tables (rows and columns) and enables users to store, retrieve, update, and delete data
efficiently.
• Uses Tables – Data is stored in structured tables with relationships between them.
• Uses SQL (Structured Query Language) – SQL is used to query, insert, update, and manage data.
• Ensures Data Integrity – Uses constraints like primary keys and foreign keys to maintain accuracy.
• Supports Multi-User Access – Allows multiple users to access and modify data simultaneously.
• Scalability – Can handle large amounts of data and complex queries.
Examples of RDBMS:
• MySQL – Open-source and widely used for web applications. (e.g., WordPress, e-commerce sites)
• PostgreSQL – Advanced, open-source database with strong support for complex queries.
• Oracle Database – Used by large enterprises for high-performance database management.
• Microsoft SQL Server – A Microsoft-developed database commonly used for business applications.
1. Create a database
2. Store, retrieve, and manage data
3. Analyze data
4. Print and share reports
5. Ensure data security and integrity
• One-to-One -A one-to-one relationship means that for every record in one entity (table), there's
exactly one related record in another entity, and vice versa.
• One-to-Many relationships - A one-to-many relationship in databases refers to a scenario where
one entity occurrence is associated with zero, one, or multiple occurrences of another entity.
• Many-to-Many relationship - A many-to-many relationship exists when one or more items in one
table can have a relationship to one or more items in another table.
Spreadsheet Design: Refers to the use of a spreadsheet as a database, which is inefficient for managing
large datasets and relational data due to its limited structure and functionality.
Spreadsheet View: Describes the improper practice of treating a database like a spreadsheet, where all
information is stored in a single table instead of being organized into multiple related tables.
Unnormalized data - causes redundancy, inconsistency, and inefficiency. It leads to repeated data,
making updates difficult and error-prone. Query performance suffers, and maintaining data integrity
becomes more complex. Normalization resolves these issues by organizing data into related tables,
reducing redundancy and improving performance.
Advantages of Database
1. Data Security
2. Data Integration
3. Reduction in Redundancy
4. Scalability
Disadvantages of Database
1. High Costs
2. Complexity
3. Performance Issues
BLOCKCHAIN TECHNOLOGY
A blockchain is a decentralized, distributed digital ledger consisting of records called blocks that
are used to record transactions across many computer so that any involved block cannot be altered
retroactively, without the alteration of all subsequent blocks. Each transaction is stored in a block and
linked to previous blocks, forming a chain.
HISTORY OF BLOCKCHAIN
Types of Blockchain
1. Public Blockchain – a decentralized and open network where anyone can participate and validate
transactions. Example: Bitcoin and Ethereum blockchains
2. Private Blockchain – a restricted blockchain where only authorized participants can access and
validate transactions. Example: Hyperledger Fabric used in enterprise applications
3. Consortium Blockchain – a semi-private blockchain controlled by a group of organizations rather
than a single entity. Example: R3 Corda, used in financial services
4. Hybrid Blockchain – a combination of public and private blockchains that allows selective data
access and transparency. Example: IBM Food Trust, which enhances supply chain transparency
Cryptography
a method of securing data from unauthorized access. In the blockchain, cryptography is used
to secure transactions taking place between two nodes in a blockchain network. Blockchain uses
cryptography (hash functions, public-private key encryption) to secure transactions and ensure data
integrity. Hashing ensures that blocks cannot be altered, and digital signatures authenticate users.
TYPES OF CRYPTOGRAPHY
1. Symmetric-key Cryptography - also known as secret key cryptography, uses the same key for both
encryption and decryption. It is commonly used for secure website connections and data
encryption.
2. Asymmetric-key Cryptography - uses different keys for encryption and decryption: a public key for
sharing information and a private key for decryption and verifying digital signatures.
Consensus Mechanisms - a method used to achieve agreement, trust, and security across a
decentralized computer network.
• Proof of Work (PoW) – miners solve complex mathematical puzzles to validate transactions and
add blocks to the chain. Example: Bitcoin uses PoW for mining new blocks
• Proof of Stake (PoS) – validators are chosen based on the number of coins they hold and stake as
collateral. Example: Ethereum 2.0 transitioned from PoW to PoS for energy efficiency
• Delegated Proof of Stake (DPoS) – coin holders vote for delegates who validate transactions and
maintain the blockchain. Example: EOS blockchain uses DPoS for governance
Smart contract - a self-executing program stored on a blockchain that automatically enforces the terms
of an agreement when predefined conditions are met. It eliminates the need for intermediaries like banks,
lawyers, or brokers, making transactions faster, cheaper, and more secure.
Decentralized Applications (DApps) - an application that runs on a blockchain network instead of being
controlled by a single company or server. Unlike regular apps (e.g., Facebook, PayPal) that rely on a central
authority, DApps operate in a decentralized manner, making them more secure, transparent, and resistant
to censorship. Example: Uniswap, a decentralized exchange (DEX) on the Ethereum blockchain, enables
peer-to-peer cryptocurrency trading.
• Cryptocurrency - Blockchain makes it easier, cheaper, and faster for people and businesses to
raise money. It removes many of the usual obstacles and allows direct buying and selling without
middlemen. Transactions happen quickly and transparently, with lower costs and fewer risks. It also
simplifies record-keeping and ensures financial rules are followed more efficiently.
• Supply Chain Management - Global supply chains are often slow, hard to track, and sometimes
take advantage of people. Blockchain can help by keeping detailed records of assets, improving
how licenses are managed for services, products, and software, and providing clear information
about where consumer goods come from—from the source all the way to the buyer.
• Healthcare Data Management - Using blockchain in healthcare means managing medical records
and tracking supplies quickly, safely, and more efficiently. This could lead to better patient care,
faster breakthroughs in medicine, and help ensure that drugs sold around the world are genuine.
• Voting Systems - Blockchain lets us vote online by recording votes in a secure, unchangeable chain
of blocks. It works without a central authority, meaning votes are verified, private, and hard to
tamper with—making it a promising upgrade to traditional electronic voting
• Identity Verification - Blockchain spreads data across many computers, so there's no single weak
spot for hackers to attack. It uses strong encryption to protect your personal information, making it
very hard to tamper with or steal. Once information is added, it can't easily be changed, which
builds trust. Plus, it lets you control your own data without needing a middleman.
• Decentralized Finance - It acts like an unchangeable digital ledger where every transaction is
recorded, so people can trade, lend, and borrow money directly without banks or middlemen.
Smart contracts—automatic computer programs - handle these transactions for you, making
everything run smoothly and securely
• Sybil attacks: They create many fake identities or "dishonest nodes." Dishonest nodes seem
authentic to blockchain users ("honest nodes").
• Routing Attacks: Attackers intercept and manipulate network traffic between blockchain nodes,
causing delays or discarding transactions, partitioning the network, and performing double-
spending attacks.
• Hacks: can occur through various methods, including Sybil attacks, phishing, exploiting
vulnerabilities in smart contracts, and routing attacks, all of which can compromise the security
and integrity of the blockchain
Blockchain networks like Bitcoin and Ethereum often struggle with slow transaction speeds and high fees
due to network congestion. Layer 2 scaling solutions aim to improve blockchain efficiency by processing
transactions off-chain while maintaining security and decentralization.
Lightning Network (Bitcoin) - A payment protocol that creates off-chain payment channels between
users, allowing instant and low-cost Bitcoin transactions
Optimistic Rollups (Ethereum) - undles multiple transactions into a single batch and submits them to
Ethereum’s main blockchain, reducing network congestion. It assumes transactions are valid unless
challenged.
ZK-Rollups (Zero-Knowledge Rollups) - Uses cryptographic proofs to verify the validity of a batch of
transactions without revealing transaction details. This improves both speed and privacy.
Quantum computing is a new type of computing that uses the principles of quantum mechanics to
process information at speeds far beyond classical computers. While this technology has the potential to
solve complex problems, it also poses a major risk to blockchain security
Blockchain Interoperability
Interoperability refers to the ability of different blockchain networks to communicate and share
information seamlessly. Currently, most blockchains operate in isolation, making it difficult to transfer
assets or data between them.
Impact:
The internet is evolving, and Web3 represents the next major shift. Unlike today’s internet, which is
controlled by big companies like Google, Facebook, and Amazon, Web3 aims to give users control over
their own data, identity, and digital assets using blockchain technology.
Web3 is the next generation of the internet, built on blockchain and decentralization. It allows users
to interact online without relying on centralized companies to store and manage their data.
It was first outlined in 1991 by Stuart Haber and W. Scott Stornetta, two researchers who wanted to
implement a system where document timestamps could not be tampered with.
What is Cryptocurrency?
There are problems with bank transactions, such as Technical Issues, Hacking ,Transfer Limits, and Higher
Transfer Fees. To solve these, the concept of cryptocurrency come into existence.
Example of Blockchain:
OTHER TERMINOLOGIES
Blockchain works by verifying and adding transactions to a digital ledger. Transactions are grouped
into blocks, which are validated through consensus mechanisms before being added to the chain. Each
block is linked to the previous one, making it immutable.
PROS OF BLOCKCHAIN
CONS OF BLOCKCHAIN
Impact:
INTERNET
The Internet is the global system of interconnected computer networks that uses the Internet
protocol suite to communicate between networks and devices. It is a network of networks that consists of
private, public, academic, business, and government networks of local to global scope, linked by a broad
array of electronic, wireless, and optical networking technologies.
History of Internet
• 1962 - a scientist J.C.R Licklider proposed the idea of networks of computers that could talk to one
another.
• 1969 - first ever message was sent to one computer to another computer through the ARPANET
(Advanced Research Project Agency Network).
• 1971 - Ray Tomlinson created the electronic mail, or e-mail between the users of ARPANET. @
symbol were created along this year, it is for them to tell the person’s name and the host name.
• 1991 - Tim Berners-Lee invented World Wide Web, where it all began. It is an entire network
information that was accessible to anyone with an internet connection.
• 1992 - there’s an internet browser called Erwise, which is the first to have a graphic interface. The
following year, 1993, Mosaic was created and popularized surfing the web and influence many of
the web browsers.
There are two main concepts that are fundamental to the way the Internet functions: packets and
protocols.
In networking, a packet is a small segment of a larger message. Each packet contains both data
and information about that data. The information about the packet's contents is known as the "header, "
and it goes at the front of the packet so that the receiving machine knows what to do with the packet
Protocols Connecting two computers, both of which may use different hardware and run different
software, is one of the main challenges that the creators of the Internet had to solve. It requires the use of
communications techniques that are understandable by all connected computers, just as two people who
grew up in different parts of the world may need to speak a common language to understand each other.
An Internet service provider (ISP) is any company that provides Internet access to consumers and
businesses. The Internet is provided through a variety of channels, including cable, DSL, fiber optics, dial-
up, and wireless, with most ISPs offering all options. Most large telecommunication companies, such as
mobile and cable companies, are ISPs.
The two main types of ISPs are cable or DSL. Cable connections are used by multiple neighbors,
which can affect the cable access speed. Telephone service providers offer DSL connections, which
connect a DSL router to a phone jack or phone cable.
The internet and world wide web go hand in hand. Without web, the internet is much harder to
navigate and without the Internet there is no Web. But they’re not the same thing.
A web browser is a software application that allows users to access and navigate websites on the Web.
• Google Chrome
• Mozilla Firefox
• Microsoft Edge
• Safari
• Opera
Functions of a Web Browser:
A search engine is a website that helps users find information on the Web by indexing and ranking web
pages.
• Google
• Bing
• Yahoo
• DuckDuckGo
• Baidu
the secure version of HTTP, which is the primary protocol used to send data between a web browser
and a website. HTTPS is encrypted in order to increase the security of data transfer. This is particularly
important when users transmit sensitive data, such as by logging into a bank account, email service, or
health insurance provider.
INTERNET APPLICATION
The Internet is a powerful tool that has revolutionized the way we communicate, do business, and
manage data. In this discussion, we will explore six key Internet applications that are widely used in
personal, professional, and commercial activities.
1. Communication Applications
• Email has been around since the early days of the Internet and remains a primary mode of
communication.
• It is used in business, education, and personal interactions for sending messages, documents, and
formal correspondence.
• Example: Businesses use Gmail and Outlook to communicate with employees and clients.
• Social media platforms allow users to share thoughts, news, and multimedia instantly.
• It is used for networking, entertainment, marketing, and even activism.
• Example: Businesses use Facebook and Instagram for promotions, while professionals network on
LinkedIn.
• Unlike emails, messaging apps provide real-time communication through text, voice, and video.
• Features like group chats, stickers, and encryption make these apps user-friendly and secure.
• Example: WhatsApp and Telegram are widely used for personal and business communication.
• E-commerce enables people to buy and sell goods online, making shopping more accessible.
• Platforms like Amazon, Shopee, and Lazada provide a variety of products at competitive prices.
• Digital payment methods make transactions secure and convenient.
• Online banking allows customers to manage accounts, transfer money, and pay bills without
visiting a bank.
• Mobile banking apps provide 24/7 access to financial services.
• Example: PayPal and GCash make international and local transactions easier.
• Cloud computing allows individuals and businesses to store data online instead of on physical
devices.
• Companies like Google Drive and Dropbox provide secure, remote access to files.
• It enhances productivity by allowing collaboration in real time.
1. Dial-Up Connection
A dial-up connection is established between your computer and the ISP server using a modem. A
dial-up Connection is a cheap and traditional connection that is not preferred these days as this type of
connection is very slow.
2. Broadband Connection
Broadband refers to high-speed internet access that is faster than traditional dial-up access. It is
provided through either cable or telephone composition. It does not require any telephone connection
that’s why here we can use telephone and internet connection simultaneously. In this connection, more
than one person can access the internet connection simultaneously.
4. Cable
It is a form of broadband access cable modem that can provide extremely fast access to the
internet. The speed of this connection varies which can be different for uploading data transmission or
downloading.
It uses a cable modem to provide an internet connection and operates over cable TV lines. The
speed of cable connection ranges from 512k to 20Mbps.h
5. Wireless Connection
As the name suggests wireless connection does not use telephone lines or cables to connect to the
internet. The wireless connection uses a radio frequency band to connect to the internet. It is also an
always-on connection and this connection can be accessed from anywhere and speed may vary for
different locations. It ranges from 5Mbps to 20Mbps.
• 3G (Third Generation)
3G was introduced in the early 2000s and provided data speeds of up to 2 Mbps. This technology
enabled mobile internet access, video calls, and multimedia messaging. It made web browsing and email
more accessible on mobile devices.
• 4G (Fourth Generation)
4G was launched in the late 2000s to early 2010s, significantly improving internet speeds up to 1
Gbps. This technology supported HD video streaming, online gaming, and better voice quality through
Voice over LTE (VoLTE). It introduced LTE and LTE-Advanced as standard network technologies, enhancing
overall mobile connectivity.
• 5G (Fifth Generation)
5G started rolling out in the late 2010s, offering speeds of up to 10 Gbps with ultra-low latency. It is
designed to support real-time applications like autonomous vehicles, smart cities, and advanced IoT
networks. 5G also improves network capacity, making it ideal for high-demand applications and large-
scale device connectivity.
A private network is exclusive to a specific individual or organization, meaning the general public
cannot access it. These networks typically use dedicated servers and equipment. They may be set up to
facilitate internal communications, safeguard sensitive data, or accelerate specific organizational
processes.
A public network refers to any network that is open and accessible to the general public, i.e.,
anyone and everyone. These networks are typically unsecured, meaning users don’t have to input a
password or authorization to connect. Examples include public Wi-Fi hotspots at coffee shops, airports,
and hotels.
A. Routers
Router is a networking device that forwards data packets between computer networks. One or more
packet-switched networks or subnetworks can be connected using a router. By sending data packets to
their intended IP addresses, it manages traffic between different networks and permits several devices to
share an Internet connection.
• Broadband Routers: These are one of the important kinds of routers. It is used to do different types
of things. it is used to connect computers or it is also used to connect to the internet.
• Wireless routers: These routers are used to create a wireless signal in your office or home.
• Wired Routers: Wired Router is used to connects multiple wired devices using an Ethernet cable,
It takes the transmission data from the modem and distribute it to a further network, it is widely
used in schools and small offices.
• Virtual Router: They are implemented using a software on the virtual machine and they are more
flexible and scalable.
B. Undersea Cables
also known as “Submarine Communication” they are used for power transmission to oil rigs, carry
power generated from offshore wind farms to power stations, and create inter-country and island
connections. Submarine communication cables carry around 90% of the world’s cross-continent data
traffic.
C. Data Center
a physical room, building or facility that houses IT infrastructure for building, running and delivering
applications and services. It also stores and manages the data associated with those applications and
services
D. Satellite Internet
a wireless connection created by signals transmitted between a satellite and an antenna (or dish)
on a home or business. Unlike land-based internet services such as fiber, cable, or DSL, it doesn’t rely on
wires to transmit data
Social media and digital communication encompass the use of online platforms and technologies
to share information, ideas, and messages, including text, images, and videos, fostering virtual
communities and interactions.
• The evolution of social media has been fueled by the human impulse to communicate and by
advances in digital technology. It is a story about establishing and nurturing personal connect scale.
• Digital communication has changed the modern business environment. We already covered email
communications, but sometimes you may need to communicate over the phone or video
conference. A video conferencing application like Zoom, Teams, Skype, or Google Meet is a great
way to speak in real time even though you are in different locations.
• Other times you may want to communicate with someone in a manner that is shorter and more
immediate than email. In your personal group of family and friends, you would typically send a text
message in this case. In the business world, you may want to use an instant messaging application
to send a message.
• Social media wields cultural influence on fashion and food trends, family and adolescent health
issues, world news and local events, political and community action events. Social media has
spawned a new type of marketing through the use of a unique, virtual public personality
• Social media has become a complex phenomenon because it is much more than individuals
exchanging words. Social media sites the venues where communications happen are controlled by
their platform owners.
The internet has transformed communication, commerce, and information sharing globally.
However, it also presents numerous ethical and legal challenges.
Cybercrime refers to illegal activities carried out via the internet that can harm individuals, organizations,
or governments.
2 types of Hacking
Prevention methods: Implement firewalls, use data encryption, and keep security systems updated
regularly.
2. Identify Theft
Identity theft is a type of cybercrime where someone illegally obtains and uses another person’s
personal information without permission, typically for financial gain or to commit fraud.
• Examples include stealing credit card information, social security numbers, or login credentials.
• Prevention tips: use strong passwords, avoid sharing personal information online, and monitor
financial statements regularly.
3. Online Scams and Fraud
involve the use of deceptive strategies by scammers to illegally obtain personal information or
money from victims. This includes:
• Phishing: Sending fake emails designed to trick individuals into revealing sensitive information.
• Lottery Scams: Claiming the victim has won a prize to persuade them to share personal details or
pay a fee.
• Fake Online Shopping Websites: Creating fraudulent sites to sell non-existent products and
collect payment information.
involves applying these technologies responsibly, ensuring they are used in ways that respect
human rights, promote fairness, and avoid causing harm
• Transparency
• Privacy and Data Protection
• Fairness and Non-Discrimination
• Accountability
• Security
• Social and Environmental Responsibility
FUTURE OF INTERNET
• 5G and faster connectivity - a kind of network that is designed to be fast and enables to connect
everyone together. The faster the network, the more efficient it brings.
• Internet of Things - refers to a network of physical devices, vehicles, appliances, and other physical
objects that are embedded with sensors, software, and network connectivity, allowing them to
collect and share data. Ex. Wearable devices, smart appliances, and transportation (connected to
internet).
• Artificial Intelligence and automation - AI uses algorithms and data to simulate human
intelligence, enabling machines to perform tasks such as pattern recognition, natural language
processing, and decision-making. Automation allows repetitive tasks to be done without human
intervention.
• The role of Metaverse - Metaverse is a virtual, interconnected universe where individuals can
seamlessly work, play and socialize. The importance of the metaverse lies in its potential to redefine
the way we live, work and connect. It fosters unprecedented levels of collaboration and connectivity
by breaking down geographical barriers. Ex. Virtual Reality Headset, Pokemon Go, Roblox, and etc.
Introduction to Internet
Internet
A global system of interconnected computer networks that use the standard Internet protocol suite
(TCP/IP) to serve billions of users worldwide. It is a network of networks that consists of millions of private,
public, academic, business, and government networks, of local to global scope, that are linked by a broad
array of electronic, wireless and optical networking technologies.
The Internet carries a vast range of information resources and services, such as the inter-linked
hypertext documents of the World Wide Web (WWW) and the infrastructure to support electronic mail.
Basic Structure
• Servers - a powerful computer or system that stores, processes, and serves data or resources to
clients over the internet or a network.
• Clients - refers to any device or software that requests data or services from another device on the
network.
• Data Packets - The internet doesn't transfer data in large chunks but breaks it down into data
packets. These are small units of data that contain part of the overall message you’re sending or
receiving.
• Internet Service Providers (ISPs) - a company that provides the infrastructure to access the
internet, like AT&T, Comcast, or Vodafone. ISPs connect homes, businesses, and data centers to
the larger internet.
• IP Address - Internet Protocol (IP) address is the unique identifying number assigned to every device
connected to the internet.
• Domain Names - the text that a user types into a browser window to reach a particular website.
• Domain Name System - is a naming database in which internet domain names are located and
translated into Internet Protocol (IP) addresses. The domain name system maps the name people
use to locate a website to the IP address that a computer uses to locate that website.
• HTTP and HTTPS - Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure are
protocols used for transferring website data.
• TCP and IP - Transmission Control Protocol and Internet Protocol are a suite of protocols that
ensure data is sent and received reliably and correctly.
Electronic Mail (Email) - a paperless method of sending messages, notes or letters from one person to
another or even many people at the same time via Internet.
Social Media - an app that can serve as a platforms where users can able to share information, and
connect with virtual communities through text, video, photos, and etc.
Cloud Computing - refers to the use of hosted services, such as data storage, servers, databases,
networking, and software over the internet. The data is stored on physical servers, which are maintained
by a cloud service provider.
Online Communication - This is where users interact with each other through texts, calls, video calls,
group chats, personal message, and etc. This is perfect for online set up and when other users’ is far away.
• A system of interconnected documents and multimedia content accessible via the Internet.
• Invented by Tim Berners-Lee in 1989.
• Operates on a client-server model where web browsers (clients) request and receive data (server).
• Primarily focused on delivering and displaying hypertext documents and multimedia.
• Requires a web browser to navigate and access web pages using URLs.
• Primarily uses HTTP/HTTPS for accessing and transferring web content.
• A service and application layer that operates on the Internet.
Internet
Importance of Browsers
• Web browsers are the primary tools for navigating the internet, enabling users to visit websites, view
web pages, and interact with online content.
• They provide a user-friendly interface with features like address bars, back/forward buttons, tabs,
and bookmarks for easy navigation and management of web pages.
• Browsers offer various customization options, such as bookmarks, extensions, and themes,
allowing users to personalize their browsing experience.
• Cybersecurity Threats - Hacking, phishing, and malware are the common types of cyber-attacks.
This can happen when someone is trying to get your personal or organizational data unauthorized.
Phishing where when you click links that requires you to put your sensitive information. And
malware cause your computers servers, clients, or computer networks to be harm or damage.
• Privacy Concerns - Entering and clicking to get access on specific networks or websites might
cause concerns about data privacy. As connecting to networks allow the threats or attacks to occur.
Reminder to be careful and mindful of what you connect and click.
• Misinformation and Fake news - Many people uses internet now. They tend to create a fake news
and post it online. And as a user of the Internet, we must know how to differentiate real information
to false information. Learn to fact check and use internet correctly.
• Digital divide - Digital divide is the gap between people who have access to modern information
coming from the technologies and internet, and those who don't. This creates disadvantage from
people who don't, as it hinders them the access to information, jobs opportunity, and social
isolation.