Professional Documents
Culture Documents
PERIODS
Is based on Napier's ideas about logarithms.
Computer is a machine that manipulates data according to a It was its limitation to addition and subtraction.
list of instructions (program).
Stepped Invented by Gottfried Wilhelm Leibniz in 1672.
Computer is any device which aids humans in performing Reckoner
various kinds of computations or calculations. The machine that can add, subtract, multiply
and divide automatically.
Three principal characteristics of computer:
Jacquard Loom A mechanical loom, invented by Joseph-Marie
1. It responds to a specific set of instructions in a Jacquard in 1881.
well-defined manner.
2. It can execute a pre-recorded list of instructions. It is an automatic loom controlled by punched
3. It can quickly store and retrieve large amounts of cards.
data.
Arithmometer A mechanical calculator invented by Thomas
Applications of ICT (Computers) in Our Daily Lives de Colmar in 1820,
1. Business The first reliable, useful and commercially
2. Education. successful calculating machine.
3. Healthcare
4. Retail and Trade The machine could perform the four basic
5. Government mathematic functions.
6. Marketing.
7. Science The first mass-produced calculating machine.
8. Publishing
9. Arts and Entertainment Difference It an automatic, mechanical calculator
10. Communication Engine and designed to tabulate polynomial functions.
11. Banking and Finance. Analytical
12. Transport Engine Invented by Charles Babbage in 1822 and
13. Navigation 1834
14. Working From Home
15. Military. It is the first mechanical computer.
16. Social and Romance.
17. Booking Vacations. First Computer In 1840, Augusta Ada Byron suggests to
18. Security and Surveillance Programmer Babbage that he use the binary system.
19. Weather Forecasting
20. Robotics She writes programs for the Analytical Engine.
History of Computer: Basic Computing Periods Scheutzian Invented by Per Georg Scheutz in 1843.
Calculation
● Earliest Computers originally calculations were Engine Based on Charles Babbage's difference
computed by humans, whose job title was computers. engine.
● These human computers were typically engaged in
the calculation of a mathematical expression. The first printing calculator.
● The calculations of this period were specialized and
expensive, requiring years of training in mathematics. Tabulating Invented by Herman Hollerith in 1890.
● The first use of the word "computer" was recorded in Machine
1613, referring to a person who carried out To assist in summarizing information and
calculations, or computations, and the word continued accounting.
to be used in that sense until the middle of the 20th
century. Harvard Mark 1 Also known as IBM Automatic Sequence
Controlled Calculator (ASCC).
Tally sticks An ancient memory aid device
Invented by Howard H. Aiken in 1943
Abacus A mechanical device used to aid an individual
in performing mathematical calculations. The first electromechanical computer.
Used to perform basic arithmetic operations. Created by Konrad Zuse in Germany from
1936 to 1938.
Napier’s Bones Invented by John Napier in 1614.
To program the Z1 required that the user
Allowed the operator to multiply, divide and insert punch tape into a punch tape reader
calculate square and cube roots
and all output was also generated through d. Electronic
punch tape.
● The electronic age is what we currently live in. It can
Atanasoff-Berry It was the first electronic digital computing be defined as the time between 1940 and right now.
Computer device. The ENIAC was the first high-speed, digital computer
(ABC) capable of being reprogrammed to solve a full range
Invented by Professor John Atanasoff and of computing problems. This computer was designed
graduate student Clifford Berry at Iowa State to be used by the U.S.
University between 1939 and 1942.
History of Computer: Generations of Computer
ENIAC ENIAC stands for Electronic Numerical
Integrator and Computer. There are five generations of computer:
UNIVAC 1 The UNIVAC I (UNIVersal Automatic The first computers used vacuum tubes for circuitry and
Computer 1) was the first commercial magnetic drums for memory, and were often enormous, taking
computer. up entire rooms.
Designed by John Presper Eckert and John Examples: – ENIAC – EDSAC – UNIVAC I, UNIVAC II,
Mauchly. UNIVAC 1101
EDVAC EDVAC stands for Electronic Discrete Variable Transistors replaced vacuum tubes and ushered in the second
Automatic Computer generation of computers. One transistor replaced the
equivalent of 40 vacuum tubes.
The First Stored Program Computer
Second-generation computers moved from cryptic binary
Designed by Von Neumann in 1952. machine language to symbolic, or assembly, languages, which
allowed programmers to specify instructions in words.
It has a memory to hold both a stored program
as well as data. Examples: UNIVAC III, RCA 501, Philco Transact S-2000,
NCR 300 series, IBM 7030 Stretch, IBM 7070, 7080, 7090
The First Osborne 1 – the first portable computer. series
Portable Released in 1981 by the Osborne Computer
Computer Corporation. c. The Third Generation
It is an old internet that only allows people to read from the Key Features of Web 2.0:
internet. First stage worldwide linking web pages and
hyperlink. Web is use as “information portal”. It uses table to ● Folksonomy – allows users to categorize and
positions and align elements on page. classify/arrange information using freely chosen
keywords (e.g. tagging).
● Most read only web. If focused on company’s home ● Rich User Interface – content is dynamic and is
pages. responsive to user’s input. An example would be a
● Dividing the world wide web into usable directories website that shows local content.
● It means web is use as “Information Portal” ● User Participation – the owner of website is not the
● It started with the simple idea “put content together” only one who is able to put content. Others are able
to place a content on their own by means of
Example of Web 1.0 comments, reviews, and evaluation.
● Long Tail – services are offered on demand rather
➔ Mp3.com than on a one-time purchase. This is synonymous to
➔ Home Page subscribing to a data plan that charges you for the
➔ Directories amount of time you spent on Internet or a data plan
➔ Page Views that charges you for the amount of bandwidth you
➔ HTML/Portals. used.
➔ Read only web ● Suggested name by John Markoff of the New York
➔ Limited user interaction Times for the third generation of the web.
➔ Lack of standards ● In this generation, all the application on web or mobile
will be upgraded with more features. It applies same
B. Web 2.0 (Read-write interactive web) principles as Web 2.0: two-way interaction.
● Web 3.0 will be more connected, open, and
● A term used to describe a new generation of Web intelligent, with semantic web technologies,
services and applications with an increasing distributed databases, natural language processing,
emphasis on human collaboration. machine learning, machine reasoning and
● It is a platform that gives users the possibility (liberty) autonomous agents.
to control their data. ● Semantic Web - provides a framework that allows
● This is about user-generated content and the data to be shared and reuse to deliver web content
read-write web. specifically targeting the user.
● People are consuming as well as contributing ● It is a web of data.
information through blogs or sites. ● Changing the web into a language that can be read
● Allows the user to interact with the page known as and categorized by the system rather than humans.
DYNAMIC PAGE; instead of just reading a page, the
user may be able to comment or create a user Types of websites:
account. Dynamic page refers to the web pages that
are affected by user input or preference. ● eCommerce
● Is focused on the ability for people to collaborate and ● Business Website
share information online via social media, blogging ● Entertainment Website
and Web-based communities. ● Portfolio Website
● Media Website
Example of Web 2.0 are the following: ● Brochure Website
● Nonprofit Website
A. Social Networking - is the use of Internet-based social ● Educational Website
media sites to stay connected with friends, family, colleagues, ● Infopreneur Websites
customers, or clients. ● Personal Website
● Web Portal
Example Facebook Twitter LinkedIn Google+ ● Wiki or Community Forum
Pinterest Tumblr Instagram Page
Lesson 2: The Internet
B. Blogs - is a discussion or informational website published on
the world wide web consisting of discrete, often informal The Internet or “net” (network of network) is the largest
diary-style text entries (posts). computer network in the world that connects billions of
computer user.
Example Wordpress Blogger Tumbler
The word internet comes from combination between
“interconnection” and “network”.
Network is a collection of computers and devices connected ● Regional ISP – business that provides internet access
via communication channels and transmission media allow to in cities and towns nationwide.
share resources (hardware, software, data, information).
Generally, nobody owns the internet. Example of ISP: Sky Broadband, PLDT, Converge
ARPA – Advanced Research Project Agency January 2, 1969 ● Look for information
– started an experimental computer network. Concept – No ● School works, jobs, and home purposes
server, but equal importance/participation to every computer in ● Send and receive electronic mail
the network. Even if, one or two node destroyed that will now ● Video teleconferencing (video call, video chat)
affect the network. In 1982 the word internet started. 1986 – ● Buy and sell product
First “ free net” created in Case Western Reserve University ● Social networking
1991: US government allowed business agencies to connect to ● Watch & post videos
internet. Now all people can connect to the internet and ● Games
improve their life and work quality. The internet support various ● Take college courses
aspects in our life. Vinton Gray Cerf ForMemRS is an ● Monitor home while away
American Internet pioneer and is recognized as one of "the ● Financial transactions
fathers of the Internet", sharing this title with TCP/IP ● Download music and movies
co-developer Bob Kahn.
D. Internet Terms and Definition
B. Major Components of the Internet
● Internet - A global network of thousands of computer
1. Servers – is a computer program that provides service to networks linked by data lines and wireless systems.
another computer program and it’s user. ● Web – a collection of billions of webpages that you
can view with a web browser
● Application Server – a program in computer that ● Email – the most common method of sending and
provides the business logic for an application receiving messages online
program. Web Server – a computer program that ● Social media – websites and apps that allow people
serves requested HTML pages or files. to share comments, photos, and videos
● Proxy Server – is a software that acts as an ● Online gaming – games that allow people to play with
intermediary between an endpoint device, such as and against each other over the Internet
computer and another server from which a user is ● Software updates – operating system and application
requesting. updates can typically downloaded from the Internet
● Mail Server – is an application that receives incoming ● HTML - Hypertext Markup Language is a coding
e-mail from local users and remote senders and language used to tell a browser how to place pictures,
forward outgoing e-mail for delivery text, multimedia and links to create a web page.
● File Server – is a computer responsible for central When a user clicks on a link within a web page, that
storage and management of data files so that other link, which is coded with HTML, links the user to a
computer on the same network can access them. specific linked web page.
● Policy Server – is a security component of a policy – ● URL - Uniform Resource Locator is a web address
based network that provides authorization services used to connect to a remote resource on the world
and facilities tracking and control of files. wide web.
● Bit - is a single digit in the binary numbering system
2. IP Address (Internet Protocol) – is a numerical label (base 2). For example: 1 is a bit or 0 is a bit.
assigned to each device. This provides identity to a network ● Byte - generally consists of eight bits.
device. ● Upload - To upload is to transfer data from your
computer to another computer.
3. Browser – is an application program that provides a way to ● Download - To download is to transfer data from
look information on the web. another computer to your computer.
● HTTP - is the acronym for Hypertext Transfer
Example of browsers: Google chrome, safari, internet Protocol, the data communication standard of web
explorer, opera, Mozilla pages. When a web page has this prefix, the links,
text, and pictures should work correctly in a web
4. Domain Name System (DNS) – is the phonebook of internet. browser.
We access information online through domain names. ● HTTPS - is the acronym for Hypertext Transfer
Protocol Secure. This indicates that the web page has
Example of DNS: www.facebook.com, a special layer of encryption added to hide your
www.pup.edu.ph,www.academia.edu personal information and passwords from others.
● Router or router-modem combination is the hardware
device that acts as the traffic cop for network signals
arriving at your home or business from your ISP. A
router can be wired or wireless or both.
● Encryption - is the mathematical scrambling of data
so that it is hidden from eavesdroppers. Encryption
uses complex math formulas to turn private data into
meaningless gobbledygook that only trusted readers
can unscramble.
5. Internet Service Provide (ISP) – is an organization that ● Web Bot - A term that applies to programs/applets
provides services for accessing, using or participating in the (macros and intelligent agents) used on the Internet.
internet. Such bots perform a repetitive function, such as
posting messages to multiple newsgroups or doing
Two types of ISP: searches for information.
● Search Engine - specialized software, such as
● National ISP – provided internet access to a specific Google and Yahoo, that lets www browser users
geographic area.
search for information on the web by using keywords, b. Plagiarism - An act or instance of using or closely imitating
phrases. the language and thoughts of another author without
authorization.
c. Computer Addiction
M4: THE NETIQUETTE AND THE COMPUTER ETHICS
● Offline: generally used when speaking about
Lesson 1: Netiquette excessive gaming behavior, which can be practiced
both offline and online.
What is Netiquette? ● Online: Also known as “Internet Addiction”, gets more
attention in general from scientific research than
What is Netiquette? Simple stated, it’s network etiquette – that offline computer addiction, mainly because most
is the etiquette of cyberspace and “etiquette” means the forms cases of computer addiction are related to the
of required by good breeding or prescribed by authority to be excessive use of the Internet. *Virtual Self -The
required in social or official life. In other words, netiquette is a persona you create about yourself virtually.
set of rules for behaving properly online.
CRIMINAL ACTIVITIES
Netiquette, or network etiquette, is concerned with the "proper"
way to communicate in an online environment. Consider the a. Hacking
following "rules," adapted from Virginia Shea's the Core Rules
of Netiquette, whenever you communicate in the virtual world. ● Unauthorized access of or interference with computer
systems, servers, or other information and
1. Remember The Golden Rule communication systems
2. Avoid Slang, Acronyms, And Text Talk ● Unauthorized access to corrupt, alter, steal, or
3. Avoid “Screaming” In Typed Messages destroy electronic data using computers or other
4. Proofread Your Messages Before Sending Them information and communication systems without the
5. Exercise Good Judgment When Sharing Information computer or system owner’s knowledge and consent
With Others Online ● The introduction of computer viruses resulting in the
6. Respect Diversity In Viewpoints corruption, alteration, theft, or loss of such data
● Illegal Access
Ten Commandments of Computer Ethics ● Illegal Interception
● Data Interference
Rule 1: Remember the Human ● System Interference
Rule 2: Adhere to the same standards of behavior online that ● Misuse of Devices
you follow in real life ● Infection of IT Systems with Malware – if the act is
Rule 3: Know where you are in cyberspace committed against critical infrastructure of the
Rule 4: Respect other people's time and bandwidth Philippines the, penalty is between 12-20 years
Rule 5: Make yourself look good online writing reclusion temporal
Rule 6: Share expert knowledge ● Six years up to twelve years of imprisonment also
Rule 7: Help keep flame wars under control known as prison mayor.
Rule 8: Respect other people's privacy
Rule 9: Don't abuse your power b. Computer-related forgery, fraud and/or identity theft
Rule 10: Be forgiving of other people's mistakes
● An attempt to obtain sensitive information such as
Lesson 2: Cybercrimes usernames, passwords, and credit card details and
(indirectly money), often for malicious reasons.
What is Cyber? ● Phishing
● Pharming
It is the characteristics of the culture of computers, information, ● Spam
technology and virtual reality. ● Maximum of Php 200,000 fine or prison mayor
● One of the more common ways to infiltrate or damage - Do not pay the ransom.
your computer. Malicious software that infects your - If your computer has been infected (i.e. you are unable to
computer, such as computer viruses, worms, Trojan access your computer or your files have been encrypted),
horses, spyware, and adware. contact a reputable computer technician or specialist to find
out whether your computer can be repaired and your data
What it can do: retrieved.
- In order to lessen the impact of a ransomware infection, be
- Intimidate you with scareware, which is usually a pop-up sure to regularly back-up your data with a removable external
message that tells you your computer has a security problem storage drive.
or other false information.
- Reformat the hard drive of your computer causing you to lose Spam
all your information.
- Alter or delete files. ● One of the more common methods of both sending
- Steal sensitive information. information out and collecting it from unsuspecting
- Send emails on your behalf. people.
- Take control of your computer and all the software running on ● The mass distribution of unsolicited messages,
it. advertising or pornography to addresses which can
be easily found on the Internet through things like
Pharming social networking sites, company websites and
personal blogs.
● A common type of online fraud. A means to point you
to a malicious and illegitimate website by redirecting What it can do:
the legitimate URL. Even if the URL is entered
correctly, it can still be redirected to a fake website. - Annoy you with unwanted junk mail.
- Create a burden for communications service providers and -
What it can do: businesses to filter electronic messages.
- Phish for your information by tricking you into following links
- Convince you that the site is real and legitimate by spoofing or entering details with toogoodto-be-true offers and
or looking almost identical to the actual site down to the promotions.
smallest details. You may enter your personal information and - Provide a vehicle for malware, scams, fraud and threats to
unknowingly give it to someone with malicious intent. your privacy.
● Used most often by cyber criminals because it's easy ● Often used by third parties to infiltrate your computer.
to execute and can produce the results they're What it is: Software that collects personal information
looking for with very little effort. about you without you knowing. They often come in
the form of a ‘free' download and are installed Wi-Fi Eavesdropping
automatically with or without your consent. These are
difficult to remove and can infect your computer with ● Another method used by cyber criminals to capture
viruses. personal information. Virtual “listening in” on
information that's shared over an unsecure (not
What it can do: encrypted) WiFi network.
- Collect information about you without you knowing about it What it can do:
and give it to third parties.
- Send your usernames, passwords, surfing habits, list of - Potentially access your computer with the right equipment.
applications you've downloaded, settings, and even the - Steal your personal information including logins and
version of your operating system to third parties. passwords.
- Change the way your computer runs without your knowledge.
- Take you to unwanted sites or inundate you with Worms
uncontrollable pop-up ads.
Worms are a common threat to computers and the Internet as
Trojan Horses a whole. A worm, unlike a virus, goes to work on its own
without attaching itself to files or programs. It lives in your
● A malicious program that is disguised as, or computer memory, doesn't damage or alter the hard drive and
embedded within, legitimate software. It is an propagates by sending itself to other computers in a network –
executable file that will install itself and run whether within a company or the Internet itself.
automatically once it's downloaded.
What they can do:
What it can do:
• Spread to everyone in your contact list.
• Delete your files. • Cause a tremendous amount of damage by shutting
• Use your computer to hack other computers. down parts of the Internet, wreaking havoc on an
• Watch you through your web cam. internal network and costing companies’ enormous
• Log your keystrokes (such as a credit card number amounts of lost revenue.
you entered in an online purchase).
• Record usernames, passwords and other personal
information.
M5: DIGITAL TEACHNOLOGY AND SOCIAL CHANGE
Viruses
● Malicious computer programs that are often sent as Lesson 1: Introduction to the Digital Age
an email attachment or a download with the intent of
infecting your computer, as well as the computers of Digital age, also known as Information age, is a period when
everyone in your contact list. Just visiting a site can the computer and internet were introduced. It is caused by
start an automatic download of a virus. rapid shift from traditional industry to computerization all the
way to artificial intelligence which brought by Industrial
What they can do: Revolution.
In a smart city, IoT sensors and deployments, such as smart What is Artificial Intelligence?
streetlights and smart meters, can help alleviate traffic,
conserve energy, monitor and address environmental According to Encyclopedia, Artificial intelligence (AI), is the
concerns, and improve sanitation. ability of a digital computer or computercontrolled robot to
perform tasks commonly associated with intelligent beings.
IoT security and privacy issues
b. Virtual Reality
Hackers aren't the only threat to the internet of things; privacy
is another major concern for IoT users. For instance, Virtual reality (VR), the use of computer modeling and
companies that make and distribute consumer IoT devices simulation that enables a person to interact with an artificial
could use those devices to obtain and sell users' personal three-dimensional (3-D) visual or other sensory environment.
data.
c. Augmented Reality
Beyond leaking personal data, IoT poses a risk to critical
infrastructure, including electricity, transportation and financial Augmented reality is a more versatile and practical version of
services. virtual reality, as it does not fully immerse individuals in an
experience. Augmented reality features interactive scenarios
The Future of the Internet of Things that enhance the real world with images and sounds that
create an altered experience. The most common current
One day, the internet of things will become the internet of applications of this overlay of digital images on the surrounding
everything. The objects in our world might sense and react to environment include the recent Pokémon Go fad.
us individually all the time, so that a smart thermostat
automatically adjusts based on your body temperature or the d. Blockchain Data
house automatically locks itself when you get into bed. Your
clothes might come with connected sensors, too, so that the Blockchain data, like the new cryptocurrency Bitcoin, is a
things around you can respond to your movements in real secure method that will continue to grow in popularity and use
time. That’s already starting to happen: In 2017, Google in 2019. This system allows you to input additional data without
announced Project Jacquard, an effort to create the connected changing, replacing, or deleting anything. In the influx of
wardrobe of the future. shared data systems like cloud storage and resources,
protecting original data without losing important information is
Lesson 2: Current Trends and Emerging Technologies crucial.
Current Trends in Information Technology Blockchain in simple terms is a system of recording information
in a way that makes it difficult or impossible to change, hack,
a. Cloud Computing or cheat the system. A blockchain is essentially a digital ledger
of transactions that is duplicated and distributed across the
Cloud computing is a network of resources a company can entire network of computer systems on the blockchain.
access, and this method of using a digital drive increases the
efficiency of organizations. Instead of local storage on e. Internet of Things
computer hard drives, companies will be freeing their space
and conserving funds. The Internet of Things (IoT) is an emerging movement of
products with integrated Wi-Fi and network connectivity
b. Mobile Computing and Applications abilities. Cars, homes, appliances, and other products can now
connect to the Internet, making activities around the home and
Mobile phones, tablets, and other devices have taken both the on the road an enhanced experience. Use of IoT allows people
business world and the personal realm by storm. Mobile usage to turn on music hands-free with a simple command, or lock
and the number of applications generated have both and unlock their doors even from a distance.
skyrocketed in recent years..
f. 5G
c. Big Data Analytics
5G is the 5th generation mobile network. It is a new global
Big data is a trend that allows businesses to analyze extensive wireless standard after 1G, 2G, 3G, and 4G networks. 5G
sets of information to achieve variety in increasing volumes enables a new kind of network that is designed to connect
and growth of velocity. Big data has a high return on virtually everyone and everything together including machines,
investment that boosts the productivity of marketing objects, and devices.
campaigns, due to its ability to enable high-functioning
processing. Data mining is a way companies can predict IoT
growth opportunities and achieve future success. Examination
of data to understand markets and strategies is becoming 5G is meant to seamlessly connect a massive number of
more manageable with advances in data analytic programs. embedded sensors in virtually everything through the ability to
scale down in data rates, power, and mobility—providing
extremely lean and low-cost connectivity solutions.