You are on page 1of 9

EMTECH REVIEWER

EMPOWERMENT TECHNOLOGY

- the process of becoming stronger and more confident, especially in controlling one's life and claiming one's
rights
- deals with the use of different technologies such as mobile phones, telephone, computer and other devices to
locate, save, communicate and to inform.
- to provide students with the foundation of knowledge and skills needed to succeed in environments that require
the use of computer and the Internet.

Computer - A computer is an electronic machine which can take instruction and perform computations based on those
instruction. It can be programmed and performs high speed mathematical or logical operations or that assembles,
stores, retrieves and process data.

Data processing - is a process that involves transformation of data into information through classifying, sorting, merging,
recording, retrieving, transmitting or reporting. Data processing can be manual or computer based.

 History of Computer

WHO INVENTED COMPUTER?

- The real answer is that many inventors contributed to the history of computers and that a computer is a
complex piece of machinery made up of many parts, each of which can be consider a separate invention.
-
 MANUAL MECHANICAL - Is a tool or a device with simple mechanism powered by the hand. Devices of this type
required some sort of physical effort from the user when used.

Abacus - A counting device making calculation consisting of a frame mounted with rods along which beads or balls are
moved. It is the first manual mechanical data processing device which was developed in China in 3000 B.C.

Napier’s Bone - Also called “napier’s rod” are numbered rods which can be used to perform multiplication of any
number by a number 2-9. By placing “bones” corresponding to the multiplier on the left side and the corresponding to
the digits of the multiplicand next to it to the right, and product can be read off simply by adding pairs of numbers (with
appropriate carries as needed) in the row determined by the multiplier.

Oughtred’s Slide Rule - A device consisting of two logarithmically scaled rules mounted to slide along each other so that
multiplication, division and other more complex computations are reduced to the mechanical equivalent of addition and
subtraction. The first slide rule was joint effort of two englishmen Edmund Gunter and William Oughtred. This was
based on napiers logarithms and has become the first analog computer(of the modern ages).

Pascaline - Invented by the famous french mathematician, Blaise Pascal in 1942. Although limited to addition and
subtraction, the toothed counting wheel is still used in adding machines. Several wheels with teeth numbered from 0 to
9 are arranged in a row representing ones, tens, hundreds, thousands and so on.

Leibniz’s Calculator - Was invented by Barron Gottfried Wilhelm Von Leibeniz in 1874. It utilizes the same techniques
for addition and subtraction as the Pascaline but could also perform multiplication, division and square roots.

Babbage’s Analytical Engine - Was invented by Charles Babbage in 1822. He is known as the “Father of Modern
Computers” as a result of his contribution to the basic design of the computer.

 Electromechanical - An electromechanical device is usually powered by an electric motor and uses switches and
relays. Households electrical appliances, desk calculation and punched – card data processing equipment all fall
under this category.
Hollerith’s Punched Card Machines - It was invented by Herman Hollerith in 1880. He used punched cards, read
electronically to keep and transfer data. The cards were transported between brass rods, and when there were holes in
the cards, the rods made contact and an electric current could how. This was a machine to tabulate census data in 1890
more efficiently than the manual method.

Jacquard Loom - Used punch cards to create pattern on fabric woven on a loom. It was the forerunner of the keypunch
machine. It was invented by Joseph Marie Jacquard in 1804.

Harvard Mark 1 - Was a 51 x 8 x 2 feet machine. It could perform the four basic arithmetic operations and could locate
information stored in tabular form. It was invented by Howard Aiken in 1943 but was put into use in 1944 up to 1959 at
Harvard. It was fully automatic and could complete long computation without human intervention. Its official name was
Automatic Sequence Controlled Calculator.

 Electronic Devices - Are devices which use electrical switches and circuitry.

Atanasoff-Berry Computer - Invented by John Atanasoff in 1942 and was the first digital computer that used binary
logic circuitry and had regenerative memory.

Electronic Numerical Integrator Calculator(ENIAC) - Was invented by Presper Eckert and John Mauchly in 1943 to 1946.
It was the first large –scale general purpose digital electronic computer. It consisted of over 18,000 vacuum tubes and
required the manual setting of switches to achieve desired results. It could perform 300 multiplication problem per
second.

Electronic Discrete Variable Automatic Computer(EDVAC) - Was invented by John Von Neumann in 1945. This was
designed as a stored-program computer.

 GENERATION OF COMPUTERS

The history of computer development is often referred to in reference to the different generation of computing devices.

First Generation (1940-1956) VACUUM TUBES - The first computer used vacuum tubes for circuitry and magnetic drums
for memory, and were often enormous , taking up entire rooms. They were very expensive to operate and in addition to
using a great deal of electricity, generated a lot of heat, which was often the cause of malfunction.

Second Generation (1956-1963) Transistors - Transistors replace the vacuum tubes and ushered in the second
generation of computers. The transistor was far superior to the vacuum tube allowing computers to become smaller,
faster, cheaper, more energy efficient and more reliable than their first generation predecessors. Though the transistor
still generated a great deal of heat that subjected to the computer damage, it was a vast improvement over the vacuum
tubes. Second generation computers still relied on punched card for input and printouts for output.

Third Generation (1964-1971) Integrated Circuits - The development of the integrated circuit was the hallmark of the
third generation of computers. Transistor were miniaturized and placed on silicon chips, called semiconductors, which
drastically increased the speed and efficiency of computers.

Fourth Generation (1971-present) Microprocessors - The microprocessor brought the fourth generation of computers,
as thousand of integrated circuit were built onto a single silicon chip. What in the first generation filled an entire room
could now et in the palm of the hand. The intel 4004 chip, develop in 1971, located all the components of the computer
from the central processing unit and memory to input/output controls on a single chip.

Fifth Generation (Present and Beyond) Artificial Intelligence - Fifth generation computing devices, based on Artificial
intelligence, are still in development, through there are some applications, such as voice recognition, that are being use
today. The use of parallel processing and superconductors is helping to make artificial intelligence a reality.
Spacewar – first game

Alan Turing - is considered by many to be the father of modern computer science as the world knows it. He formed the
concept of the algorithms and computations with one of his inventions, the Turing machine.

Turing Machine - a mathematical model of a hypothetical computing machine which can use a predefined set of rules to
determine a result from a set of input variables.

Charles Babbage - Father of modern digital computer

Augusta Ada King-Noel

- has been called the world's first computer programmer.

- she did was write the world’s first machine algorithm for an early computing machine that existed only on paper.

- The First Computer Programmer.

- Mother of modern software.

Information and Communication Technology (ICT) - deals with the use of different communication technologies such as
mobile phones, telephone, Internet, etc. to locate, save, send and edit information.

THE INTERNET - The information highway, as they called it. It represents one of the most successful examples of the
benefits of sustained investment and commitment to research and information infrastructure development.

Inter-Network - The Internet comprises millions of small computer networks, and all are brought together to form the
vast Inter-Network.

World Wide Web (WWW) - This is made up of websites

that have one or more web pages.

 USES OF THE INTERNET

The Internet is a fantastic source of information and a go-to tool for a wide array of services.

COMMUNICATION - The Internet opens up many different possible ways to communicate with others. Some of theseare
e-mail, blogs, and social networking sites (eg. Facebook, Instagram), chatrooms, and forums.

SHOPPING - Nowadays, whatever you want to buy, you can pretty much guarantee that you can end it for sale
somewhere over the internet.

LEISURE AND ENTERTAINMENT - There are many different ways that you can choose to spend your time online and
amuse yourself. Here are a few:

• Playing online games

• Listening to music (mp3 downloading or live streaming)

• Reading online books and e-books

• Watching online movies or videos

Age of Internet - opened up doors and windows to the world getting to places as easy as a click of a button through
online booking. Going to and learning about many places at the convenience of the computer screen, the Internet offers
many services and features that help you to explore places and experience things. One can opt to be a digital traveler.

 BENEFITS OF THE INTERNET


1. THE INTERNET IS ALWAYS AVAILABLE

People can always access internet. It is unlike any business establishment that operates on a limited time where the
customer has to wait for the official business hours to get what they want or need.

2. THE INTERNET OFFERS A VAST RANGE OF INFORMATION

All sorts of information can be found on the Internet. A keyword related to any topic will almost always yield results.

3. THE INTERNET SERVES AS A MEANS TO COMMUNICATE WITH PEOPLE

This feature has given individuals and businesses the ability to communicate cost-efficiently compared to the only
available means many years back, the telephone.

4. INTERNET OFFERS A WIDE ACCESS TO LEARN ABOUT OTHER CULTURES

Many say that one can learn anything about anybody on the web. The potential to learn about many cultures is
unlimited.

5. ON THE INTERNET IS READILY UPDATED

The information highway, as they called it. It represents one of the most successful examples of the benefits of sustained
investment and commitment to research and information infrastructure development.

INTERNET -BASED COLLABORATION AND WEB EVOLUTION

“TWO HEADS IS BETTER THAN ONE” – THIS PHRASE ALWAYS PROVES THAT WORKING ALONE IS NOT BAD BUT
ACCEPTING OTHERS IDEAS IS MUCH BETTER.

COLLABORATION – is an act of working with someone to produce something. Traditional collaboration requires face to
face instruction, but you are already in the era where the internet makes distance brainstorming possible.

INTERNET-BASED COLLABORATION - or web collaboration refers to web, social, and software tools used by an
organization to facilitate communication and collaboration with customers for increased sales and satisfaction via the
internet in real-time.

Collaboration tool - is used to assist workgroups. It gets things done better in a more straightforward manner by
providing an avenue for several individuals to communicate simultaneously using one platform. Group support systems
help involve different individuals working on a common project performing different tasks using computers, making
tasks easier and much faster to do. Before computers and the Internet existed, we have been using the simplest
collaborative tool available--paper.

 DIFFERENT TYPES OF INTERNET-BASED COLLABORATION TOOLS

INSTANT MESSAGING - is a type of online chat which offers real-time text transmission over the Internet. It’s the
exchange of near real-time messages through a standalone application or embedded software.

SCREEN SHARING – generally understood the technologically empowered ability to transmit the contents of your
computer screen to one or more remotely connected internet users.

VIDEO CONFERENCING – a technology that allows users in different locations to hold face to face meetings without
having to move to a single location.

CO-BROWSING – in the context of web browsing, it is the joint navigation through the World Wide Web by two or more
people accessing the same web pages at the same time.
WEB CONFERENCING – is a form of real-time communications (RTC) in which multiple computer users, all connected to
the internet, see the same screen at all times in their web browsers. Some web conferencing systems include features
such as texting, VoIP (voice over IP) and full motion video.

DOCUMENT SHARING – or file sharing is the practice of distributing or providing access to digital media, such as
computer programs, multimedia (audio, images, and videos), documents, or electronic books.

 THE GENERATION OF WEB

WEB 1.0 - When the World Wide Web was invented, most web pages were static. Static (also known as flat page or
stationary page) in the sense that the page is “as is” and cannot be manipulated by the user. The content is also the
same for all users. This is referred to as Web 1.0.

WEB 2.0 DYNAMIC WEB PAGES – is the evolution of web 1.0 by adding dynamic web pages—the user is able to see a
website differently than the others. Examples of this is social networking sites, blogs, wikis, video sharing sites, hosted
services, and a web applications.

FEATURES OF WEB 2.0

FOLKSONOMY - It allows users to categorize and classify/arrange information using freely chosen keywords (e.g.,
tagging). Popular social networking sites such as Twitter, Instagram, Facebook, etc. use tags that start with the pound
sign (#). This is also referred to as hashtag.

RICH USER EXPERIENCE - Content is dynamic and is responsive to user’s input. An example would be a website that
shows local content. In the case of social networking sites, when logged on, your account is used to modify what you see
in their website.

USER PARTICIPATION - The owner of the website is not the only one who is able to put content. Others are able to place
a content of their own by means of comment, reviews, and evaluation. Some websites allow readers to comment on an
article, participate in a poll, or review a specific product (e.g., Amazon.com, online stores).

LONG TAIL - Services are offered on demand rather than on a one-time purchase. In certain cases, time-based pricing is
better than file-size-based pricing or vice versa. This is synonymous to subscribing to a data plan that charges you for the
amount of time you spent in the Internet, or a data plan that charges you for the amount of bandwidth you used.

Software as a Service - Users will subscribe to a software only when needed rather than purchasing them. This is a
cheaper option if you do not always need to use a software. For instance, Google Docs is a free web-based application
that allows the user to create and edit word processing and spreadsheet documents online. When you need a software,
like a Word Processor, you can purchase it for a one-time huge amount and install it in your computer and it is yours
forever. Software as a service allows you to “rent” a software for a minimal fee.

Mass Participation - it is a diverse information sharing through universal web access. Since most users can use the
Internet, Web 2.0’s content is based on people from various cultures.

WEB 3.0 AND THE SEMANTIC W - It refers to a supposed third generation of Internet-based services that collectively
comprise what might be called ‘the intelligent web.

WORLD WIDE WEB CONSORTIUM (W3C) – standard encourages web developers to include semantic content in their
web pages.

SEMANTIC WEB – A movement led by the World Wide Web Consortium.

According to the W3C, “The Semantic Web provides a common framework that allows data to be shared and reused
across application, enterprise, and community boundaries.”
The aim of Web 3.0 is to have machines (or servers) understand the user’s preferences to be able to deliver web content
specifically targeting the user.

 CHARACTERISTICS OF WEB 3.0

INTELLIGENCE - applications on Web 3.0 are incorporated with different artificial intelligence tools and techniques,
which means that it can directly do intelligent analysis with possible finest output even without much human
intervention.

PERSONALIZATION - personal and individual preferences of the user are considered during information processing,
search, and formation of the personalized portal on the web.

INTEROPERABILITY - applications on Web 3.0 are easy to customize and can independently work on different kinds of
devices.

VIRTUALIZATION - uses high-end three-dimensional graphics to create a 3D environment for 3D web applications.

 WEB SERVICES

PODCASTING - A podcast is a digital medium that consists of an episodic series of audio, digital radio, PDF, or ePub
files. Podcasting originally was derived from the word pod (a mobile playback device with an MP3 player and casting
(derived from the word broadcasting).

BLOGGING - These are described as personal diaries or journals on the web. It may cover different topics and
express many opinions, a commentary on current events, a collection of memories or thoughts and a place to post
photos and comments. Blogs can be highly influential and have a huge readership.

TAGGING - In information systems, a tag is a non-hierarchical keyword or term assigned to a piece of information.
This kind of metadata helps describe an item and allows it to be found again by browsing or searching.

CURATING - Content curation is the process of collecting, organizing, and displaying information relevant to a
particular topic or area of interest. Services or people that implement content curation are called curators.

WIKIS - The word "wiki" is derived from Hawaiian, means fast. Wiki is a page or collection of web pages designed to
enable any user to collaboratively build up a body of content on particular topics interest and modify them easily.
Users can be considered private (restricted to a particular group) or public (open to everyone) who accesses them.

SOCIAL NETWORKING - Provides a virtual community that connects people who share personal or professional
interests, go to the same school or organization, or simply want to join and hang out with friendship groups
worldwide.

 TRENDS IN ICT

CONVERGENCE – technological convergence is the synergy of technological advancements of work on a similar goal or
task.

SOCIAL MEDIA - Social media is a website, application, or online channels that enable web users to create, co-create,
discuss, modify, and exchange user-generated content.

 TYPE OF SOCIAL MEDIA

Social Networks – these are the sites that allow you to connect with other people with the same interests or
background. Once a user creates his or her account, he or she can set up a profile, add people, create groups, and share
content. Example: Facebook & Google+.
Bookmarking Sites – these are sites that allow you to store and manage links to various websites and resources. Most of
these sites allow you to create a ta that allow you and others to easily search or share them. Example: Stumble Upon
and Pinterest

Social News – these are sites that allow users to post their own news items or links to other news sources. The users can
also comment on the post and comments may also be ranked. They are also capable of voting on these news articles of
the websites. Those who get the most amount of votes are shown most prominently. Example: Reddit and Digg

Media Sharing – these are sites that allow you to upload and share media content like images, music and video. Most of
these sites have additional social features like liking, commenting, and having user profiles. Example: Flicker, Youtube,
and Instagram.

Microblogging – there are sites that focus on short updates from the user. Those subscribed to the user will be able to
receive these updates. Example: Twitter and Plurk

Blogs and Forums – these websites allow users to post their content. Other users are able to comment to the said topic.
There are several free blogging platforms like Bloggers, WordPress, and Tumblr. On the other hand, forums are typically
part of a certain websites or web service.

Mobile Technologies - The popularity of smartphones and tablets has taken a major rise over the years. This is largely
because of the devices’ capability to do tasks that were originally found in personal computers.

KINDS OF OPERATING SYSTEMS: IOS, ANDROID, BLACKBERRY OS, WINDOWS PHONE OS, SYMBIAN, WEB OS, WINDOWS
MOBILE

KINDS OF COMPUTER:

HARDWARE – INPUT-PROCESS-OUTPUT

SOFTWARE – OS AND APS

PEOPLEWARE

Assistive Media - Assistive media is a non-profit service designed to help people who have visual and reading
impairments. A database of audio recordings is used to read to the user.

NETIQUETTE - is a combination of the words network and etiquette, and is defined as a set of rules for acceptable online
behavior.

ONLINE SAFETY AND SECURITY - The Internet, truly, is a powerful tool. It can be used to promote your business, gain
new friends, and stay in touch with the old ones. It is also a source of entertainment. But like most things in this world,
there is always “another side of the coin.” The Internet is one of the most dangerous places, especially if you do not
know what you are doing.

TIPS TO STAY SAFE ONLINE

1. Be mindful of what you share online and what site you share it to.

2. Do not just accept terms and conditions; read it.

3. Check out the privacy policy page of a website to learn how to website handles the information you share.

4. Know the security features of the social networking site you use. By keeping your profile private, search engines will
not be able to scan your profile.

5. Do not share your password with anyone.


6. Avoid logging in to public networks / WiFi. Browsing in “incognito (or private) mode” a feature of the browser, will not
protect you from hackers.

7. Do not talk to strangers whether online or face to face.

8. Never post anything about a future vacation. It is similar to posting, “Rob my house at this date”.

9. Add friends you know in real life.

10. Avoid visiting untrusted websites.

11. Install and update an antivirus software on your computer. Use only one anti virus software to avoid conflict.

12. If you have a WiFi at home, make it a private network by adding a password.

13. Avoid downloading anything from untrusted websites. You are most vulnerable in peer to peer downloads (torrents)
as the download is most likely not monitored by the site owner.

14. Buy the software; do not use pirated ones.

15. Do not reply or click links from suspicious emails.

INTERNET THREATS:

1. Malware – stands for malicious software. It is a software that is intended to damage or disable computers and
computer systems. Types: Virus, Worm, Trojan, Spyware, Adware

Virus – it replicate itself and transfer from one computer to another either through the Internet and local networks or
data storage like hash drives and CDs.

Worm - a standalone malware computer program that replicates itself in order to spread to other computers. For
Example, the ILOVEYOU worm (Love Bug Worm)created by a Filipino.

Trojan - a type of malware that is often disguised as a useful program but once downloaded or installed, leaves your PC
unprotected and allows hackers to get your information.

Adware – a program designed to send you advertisements, mostly as pop-ups.

2. SPAM - unwanted email mostly from bots or


advertisers. Spamming is when a cyber criminal sends emails designed to make a victim spend money on
counterfeit or fake goods.

3. Phishing – Its goal is to acquire sensitive personal information like passwords and credit card details.

 Think Before You Click

1. Before you post something on the web, ask these questions to yourself: Would you want your parents or
grandparents to see it? Would you want your future boss to see it? Once you post something on the web, you have
no control of who sees your posts.

2. Your friends depend on you to protect their reputation online. Talk to your friends about this serious
responsibility.

3. Set your post to “private.” In this way, search engines will not be able to scan that post.

4. Avoid using names. Names are easy for search engines to scan.

5. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it down or report it as
inappropriate.
COPYRIGHT INFRINGEMENT - If you create something—an idea, an invention, a form of literary work, or a research,
you have the right of how it should be used by others. This is called intellectual property.

CENSORSHIP - the suppression or prohibition of any parts of books, elms, news, etc. that are considered obscene,
politically unacceptable, or a threat to security.

DATA PRIVACY ACT - is a law that seeks to protect all forms of information, be it private, personal, or sensitive. is
meant to cover both natural and juridical persons involved in the processing of personal information.

You might also like