You are on page 1of 63

The digital age

1. Introduction
1.1 Technologies of information and
communication
• "Information is an organized set of processed
data, which constitute a message that changes
the state of knowledge of the subject or
system that receives said message."
• It includes devices and applications that serve
to communicate information
• Examples: Radio, television, mobile phones,
computer systems
1.2 Internet of things
Digital interconnection between everyday
objects and the Internet
Examples: Appliances, smartwatch, smartTV,
cameras, streetlights, traffic lights...
2. Computer Networks
Set of interconnected computers that share
resources, information and services.
File servers, NAS
Printers
Internet connection
Intranet
… ..
2.1 Services from Internet
Internet services:
WWW (World Wide Web, web pages)
Electronic Mail (e-mail)
Telephony VoIP (Voice over Internet Protocol),
videoconference
Messenger services
Storage
Social Networks
2.3 Protocol TCP / IP
TCP / IP protocol: set of rules that regulate
communication between machines on the
Internet
TCP / IP is organized in layers or modules, it is a
way to divide a complex problem into smaller
problems to facilitate its implementation.
"Divide and conquer"
2.3.1 Layered model
Each device on the network
has these layers (modules)
The TCP / IP layers are:
Application layer: user
applications ie. browser
Transport layer: manages
communication
Internet layer: sends the data
in the form of packets
(datagrams)
Network access layer
(hardware, network card)
2.3.2 Datagrams
The data at the time of transmission is
encapsulated in packets or datagrams
Each package has two parts:
Header: information about the package itself (origin,
destination, size, etc)
Data: the data that should be sent
A datagram resembles a letter, the header would be
the destination and the sender, and the data would
be the letter that the envelope contains.
Datagram
Datagram
2.3.4 Protocols TCP / IP
• TPC / IP is composed of a series of protocols, the
most used:
– HTTP (HyperText Transfer Protocol)
– SMTP (Simple Mail Transfer Protocol)
– POP3 (Post Office Protocol)
– FTP (File Transfer Protocol)
– SSH (Secure Shell)
– IP (Internet Protocol): transmits the datagrams over a
network
– Ethernet, PPP, ATM
TCP / IP protocols
2.3.4.1 System Binary. Range of
integers
• Formula to know the range of integers as a
function of number of bits (digits, figures):
• B^n
• B = base of the number system (in binary system 2)
• n = width of digits
Example. Range of integers
• How many numbers can we represent in the
binary system with 8 digits ?
–B=2
–n=8
– Answer: 2 ^ 8 = 256
2.3.4.2 Ranges of binary integers
Digits Representable Range (in decimal) Range (in binary)
numbers
1 2 0 to 1 0 ... 1

2 4 0 to 3 00 ... 11

3 8 0 to 7 000 ... 111

4 16 0 to 15 0000… 1111

5 32 0 to 31 00000… 11111

6 64 0 to 63 000000 ... 111111

7 128 0 to 127 0000000 ... 11111111

8 256 0 to 255 00000000 ... 111111111

9 512 0 to 511 000000000 ...


111111111
10 1024 0 to 1023 0000000000 ...
1111111111
2.3.4.3 Versions of the IP Protocol

IPv4 IPv6
• Since 1981 • 128-bit addresses
• Implemented in most connected • 2 ^ 128 addresses (devices)
devices
• Addresses made up of 8 number
• 32-bit addresses groups of 4 digits in hexadecimal
• 2 ^ 32 addresses (devices) separated by a colon (:)
• Addresses made up of 4 numbers • Equipment autoconfiguration
from 0 to 255 separated by
points. • Security and encryption
• Ex. 84.123.133.45 mechanisms
• XXX0 network address • Better performance
• XXX1 router (usually) • Offers mobility between different
• XXX255 Broadcast networks without losing
• 127.0.0.1 Loopback connection
2.3.4.4 Addresses Public and private IP
• All connected equipment directly to the
Internet have a public IP address.
• Public addresses are unique (no other
computer on the Internet can have the same
public IP although there is an exception)
• Private addresses are used in private networks
(not accessible from the Internet)
• The computers in a private network share the
public address of the router
Private addresses
Class Address range
A 10.0.0.0 - 10.255.255.255
B 172.16.0.0 - 172.31.255.255
C 192.168.0.0 - 192.168.255.255
TCP / IP
protocol in
Windows
Training
1. Find out the IP address of your computer and
/ or your mobile phone, what steps have you
followed? Are they v6 type? (www.test-
ipv6.com)
2. Why do IPv4 addresses occupy 32 bits?
How information travels over the
Internet
3. Work collaborative on web 2.0
• Evolution of the web
• Collaborative work
• Web applications
3.1 Evolution from the web
• Web 1.0 or static web. Pages show
information posted by 'webmasters'and users
view them passively.
• Web 2.0 or social web. Dynamic, participatory
and collaborative pages. Users actively
participate: they create content, share it, give
their opinion, interact. Examples: blogs, wikis,
forums, social networks.
• Web 3.0 or semantic web. Users interact with
the Internet through a machine that is capable
of interpreting the contents as a human
would.
• Examples: Siri, is it going to rain tomorrow?
• Cortana
• Google Now
• Web 4.0 or total web. It combines different
technologies such as artificial intelligence, 3D
images and natural language. Connected
things are capable of connecting with each
other and are no longer limited to providing
information.Pe. 'I want to fly Seville this
afternoon' and our virtual assistant would
order a taxi and book the flight.
3.2 Work collaborative
• Web 2.0 applications allow users to work
collaboratively to achieve goals.
• Examples: blogs, Wikipedia, Office Online,
GitHub (for software creation), Stack Overflow
(resolution of doubts related to ICT)
3.3 Applications Web
• Tools that can be used through a web browser.
• It does not require an installation, although in
some cases it is necessary to install some type
of add-on or plugin (Flash, Java, etc).
Exercise
3. Create an infographic with the most used web
applications today. You can useCanva.com
(templates) (Infographics)
4. Selection of information
Why the selection is necessary:
• Excessive volume of information
• Low-quality information
• From unreliable or unqualified sources
4.1 Trustworthy information sources
Criteria:
• Type of publication: official website, university ...
• Author of the text: specialist, expert, professional
• Origin of the information: book, scientific publication
• The content: precision, well argued, includes bibliographic
or other sources
• Update: if it is a subject that may vary over time, it is
updated to avoid becoming obsolete
• Purpose: that is not objective, tries to manipulate, tries to
sell ...
• The audience: Who is it for? Determines the accuracy of
the information
4.2 Tools to search and filter
information
• Search engine or search engine: Google,
Yahoo!, Bing
• Metasearch (tool able to search several
search engines at once)
• Directories: The information or links are
organized in categories
4.3 Content curation
• Gathering (collect)
• Filter the content
• Add value
• Organize: categories, use of labels
• Publish: share
4.4 Big Data
• Management and analysis of a large volume of
data
• It is carried out in infrastructures prepared to
manage a huge volume of data
5. Organization of the information: web
positioning of the publications
• SEO or Search Engine Optimization
• Recommendations to improve positions:
– Choose keywords well
– Original texts
– Quality content
– Post new content periodically
– Tag content
– Combine multiple Google services
– Responsive contents: they adapt to the size of the screen
– Register the website on other websites, wikis, content
platforms, etc
– Using them standards correctly: HTML, CSS
5.1 Social Labeling
• Use of labels (tags) for the identification and location
of the information:
– Images
– Texts
– Links (edit)
– Videos
– Markers
– Etc
• They are usually organized in menus and in clouds
• Eg Labeling for this presentation: ICT, Unit 1, The digital
age
5.2 Classification
• Taxonomy: hierarchical classification with
nested categories.
• Folksonomy: Contents are tagged with one or
more tags. No hierarchies
5.3 Content Syndication
• Content subscription. When subscribing, a
user automatically receives the content
updates to which he has subscribed.
• New content can be received through
notifications (eg. Youtube) or content
aggregators (app that receives all the content
to which the user has subscribed, pe. Feedly).
5.4 Social Bookmarks
• Websites to save personal links or bookmarks
organized.
• Users can share their bookmarks with other
users.
• Example: Reddit.com or Pocket (app)
5.5 Codes Qr
Evolution of the barcode, it is a matrix of
points that when scanned, the user it
is redirected to an Internet address.
Exercise
• Generate a QR code using an online QR code
generator. http://www.codigos-qr.com
Exercise
• Sign up for Pocket and install it in your
browser: https://getpocket.com
• Find four links that contain information about
ENIAC and save them in Pocket.
6. Production of contents
• Blogs, forums, social networks
• Participation in wikis: Wikipedia, Wikispaces
• Creation of web forms: Google forms, Excel
Online forms
• Collaborative editing of online documents:
Word, Excel, Powerpoint Online, Google Docs
Exercise: Online form
• Create an online form using Excel Online
forms (platform) with five questions
• Share the form using a QR code with at least
two colleagues to fill it out and send it
• Check the answers
Exercise: Online documents
• Create a document online and share it with a
colleague so they can edit it
• Check that your partner can access the
document and create a short biography of
Alan Turing and describe his 'Turing Machine'.
7. Media Communication
• Email
• Instant messaging
• Videoconference
• Voip calls (Voice over internet Protocol)
• Newsgroups (messages are received and sent
by email, or through an application) and
web forums
8. Social Networks
• Spaces created to put users in contact
• Types of social networks:
– Personal
– Professionals
– Thematic
8.1 Managers social networks
• Specific applications to manage social
networks
• They are capable of managing several profiles
and offer advanced functionalities such as
scheduling publications at a specific time.
8.2 Strengths and weaknesses of social
networks
• Strengths
• Connecting and communicating with other people easily
• Bring cultures together
• Eliminate geographic barriers
• Knowledge acquisition
• Carrer development advantages
• Weaknesses
– Public exposure of users, loss of privacy and security risks
– Waste of time
– Unreal virtual identities
– Fake news
8.3 Privacy on social media
• Once a content is sent on a social network, it
is susceptible to being published by other
users. Once published we cannot 'unpublish
it'. Even if we delete it, another user could
save a copy previously and republish it.
• Configure privacy options in social networks to
limit access to our content
• Users lose the intellectual property rights of
the published content on social media.
8.4 Security on social media
• Configure security and privacy options
• Do not reveal private information: Full name, ID,
address, educational center, workplace, current
location or places to which we will go.
• Choose a username other than the real one
• Do not post personal photos or videos
• Don't share contacts
• Preferably not use social networks to register or
log in.
9. Accommodation and cloud file
distribution
• File hosting services: Dropbox, Google Drive, OneDrive,
iCloud
• Platforms for sharing large files. Email usually has a
limit of less than 100MB for attachments. Example:
Mega
• Backups. Backup should be versioned: different
backups at different times. Example: Dropbox is not a
true tool for backup, but it can be useful if we do not
have another mechanism, it is a synchronization and
file hosting tool. Operating systems incorporate backup
mechanisms, on Mac: TimeMachine and in Windows,
backup scheduler.
Training
• Back up a file to OneDrive (platform)
• Exchange a large file (more than 100MB) with
a partner using WeTransfer
10. E-Commerce
• Agents:
– Public administrations: regulate commerce and
manage consumer and business procedures
– Business (B): sell and buy products and services
• B2B: Business to business (Companies to companies)
• B2C: Business to consumers (Companies to consumers)
– Consumers: they buy products and services from
companies
10.1 Purchasing online: security
measures
• Check and secure you connection
• Buy in well-known online stores and preferably
that have a physical store.
• Consult comments, opinions, questions about the
products to be purchased
• Be wary of bargains or exaggerated offers
• Use secure payment services such as PayPal to
avoid revealing bank details on multiple web
pages
10.2 Methods payment
• Credit or debit card
• Secure payment service (Paypal)
• Cash on delivery
• Bank account transfer
• Mobile payment
10.3 Banking electronics
• Banking procedures through the Internet
• Should be done with caution
• Do not reveal passwords to third parties
Consumer rights
• "Article 71. Term for the exercise of the right
of withdrawal.
• 1. The consumer and user will have a
minimum period of fourteen calendar days to
exercise the right of withdrawal. "
• General Law for the Defense of Consumers
and Users
• https://www.boe.es/buscar/act.php?id=BOE-
A-2007-20555
11. Factors risk in the digital age
• Digital divide: bad areas connected, skill to use
ICT
• Digital literacy
• Technoaddictions
• Crimes against intellectual property: piracy and
plagiarism
• Dangers and threats in the network
– Cyberbullying
– Grooming: adult gains the trust of a minor
– Sexting
Activities
1. Create a presentation using Powerpoint
Online or Microsoft Sway on the history of
Fairchild Semiconductor.
2. Create a 1 minute video using PowToon.
3. Seeks some MOOC (Massive Online Open
Course) what tea it turns out interesting Y
check out as tea you may to register.
4. Create a Wiki about 2.0 applications in
Wikispaces. The wiki should contain the
following pages:
– Home page: presentation and QR code with the
URL of the wiki to be able to access with the
mobile
– 5 pages for as many applications, each page will
show basic features and your logo. In addition,
each page should be labeled with the name of the
application and its functionality.
5. Create a shared calendar for the whole class in which you
share your birthdays and special events.
6. Investigate your privacy on the Internet and make a report
with the results obtained. Consultation:
• Search for your name or ID in a search engine
• Perform a face check. Use Google by putting your photo in
the search window. Remember to delete your photo from
the computer once the exercise is finished.
• Browse a social network and search your name to find out
if someone is using a fake profile.
• Check the privacy of your social networks and messaging
applications. (Who can read your content).
7. Create a PLE (Personal Learning Environment)
in which you include your social networks and
sources of reliable content. You can
usehttps://www.symbalooedu.com

You might also like