You are on page 1of 13

Our Lady of Fatima paper proposing that information can be

University (OLFU). quantitatively encoded as a series of ones


Sumulong Highway, Antipolo, and zeros.
Rizal ✓ Shannon showed how all information
School Year 2023-2024 media, from telephone signals to radio
waves to television, could be transmitted
without error using this single framework.
ELEC111

Name: MARIA JULITA B. BAYO-ANG

Grade and Section: 1-Y1-3

MIDTERMS

IT ERA

THE MILESTONE OF INFORMATION AGE


WEEK 5
--------------------------------------------------------------
By the 1970s, with the development of the Internet
by the United States Department of Defense and the
INFORMATION AGE
subsequent adoption of personal computers a
decade later, the Information, or Digital, Revolution
What is the information age?
was underway.
✓ The Information Age is the idea that
The World Wide Web, used initially by companies as
access to and control of information is
an electronic billboard for their products and
the defining characteristic of this
services, morphed into an interactive consumer
current era in human civilization.
exchange for goods and information.
Electronic mail (email), which permitted near-instant
The Information Age
exchange of information, was widely adopted as the
✓ Computer Age
primary platform for workplace and personal
✓ Digital Age
communications.
✓ New Media Age

The digitization of information has had a profound


Is coupled tightly with the advent of personal
impact on traditional media businesses, such as
computers. However, many computer
book publishing, the music industry, and -- more
historians trace its beginnings to the work of
recently -- the major television and cable networks.
the American mathematician Claude E.
Shannon, known as the "father of Information
----------------------------------------------------------------------
Theory."
DIGITAL AGE
CLAUDE E. SHANNON
The Digital Age refers to a historical era and
FATHER OF THE INFORMATION THEORY
information technology-based economy originating
in the twentieth century.
✓ The origin of information age in 1948
✓ Shannon at the age of 42 yrs. old, he
The Digital Age intersects with the Internet Age,
was a researcher at Nokia Bell
which describes the time since the public first had
Laboratories, he published a landmark
access to the Internet, as well as the fundamental
changes it brought about in terms of ✓ 2010s to the present: both smartphone use,
information availability and worldwide and console ownership increased in
communication. popularity. The number of individuals using
the Internet expanded dramatically over
time, reaching 63.5% of the global
Digital Age Timeline
population today. The use of cloud
computing became widespread.
✓ 1940s: This was the beginning of the
discipline of information science. ✓ 2010s to the present: both smartphone use,
✓ Late 1940s: universities, the military, and console ownership increased in
and companies created computer popularity. The number of individuals using
systems to digitally copy and the Internet expanded dramatically over
automate previously done time, reaching 63.5% of the global
mathematical operations by hand. population today. The use of cloud
computing became widespread.
✓ 1970s: The Altair Microcomputer Kit,
the first home computer, was Features of the Digital Age
released. The video game console,
the first coin-operated video games, 1. New Technology and Society
and the heyday of arcade video
games all came into existence. - One of the central features of the
digital age is referred to as new
technology.
✓ The 1980s: Computers entered semi- - Every day, people create new,
ubiquity (almost everywhere) as small-scale technology.
people brought them into homes, - The phrase "new technology" mostly
businesses, and industries. refers to these advances.
- The printing press was a novel
✓ Late 1980s - 1990s: Tim Berners-Lee invention in the year 500.
invented the World Wide Web, which - Computers, satellites, and the
became publicly accessible. (The Internet are the three main
Internet quickly spread and entered components of modern technology
popular culture, and many companies for us.
mentioned websites in their
advertisements. Despite their 2. New Technological Networks
invention, phones were not widely
used). - The Internet and other networks
enable communication and
interaction between numerous
✓ 2000s: Cell phones outpaced phones machines and people, all over the
of the 90s in terms of technological world.
advancement and became as - Face-to-face speaking or written
commonplace as computers. Text notes passed from person to person
messaging exploded in popularity. used to be some of the only means
The developing world became heavily of communication.
involved in the digital revolution. - Today, we can message, call, learn
about world events in real-time, and
access all forms of media in a
matter of moments.
-------------------------------------------------------------------
3. Mobility Due to New Technology
THE NEW MEDIA AGE
Digital tools and the internet have allowed us
to carry out activities such as employment or The “new media age” refers to the
social engagement from any location while development of interactive technologies that
remaining mobile, e.g., remote working.
began during the late 20th century and has
4. Consumerization Due to New continued into the 21st century.
Technology
NEW MEDIA AGE:
In the past, businesses typically purchased
equipment that was unreachable for the ✓ Various forms of new media have emerged
average customer. For instance, the first from the Internet since it first became widely
computers were extremely expensive available in homes during the mid to late
mainframes and supercomputers. 1990s, including blogs, Internet videos, and
other social networking tools.
5. Misinformation and Disinformation ✓ The new media age has especially changed
Due to New Technology the way people look at such issues as
privacy, social interaction, and access to
The internet enables everyone to take part in information.
the global exchange of information and
✓ Also encompasses cellular technologies and
opinions.
applications that are compatible with the
Internet and its various platforms of
6. New Technology and Globalization
interactivity.

The internet significantly speeds up this ✓ For better or worse, the new media age has
lengthy process. The result of this is not only changed the way people look at such issues
cultural diffusion but cultural leveling, which is as privacy, social interaction, and access to
the process by which cultures become
information. Communicate, most noticeably
increasingly like each other.
by minimizing face-to-face communication.
7. Security Concerns Due to New ✓ The new media age has also made
Technology
information more easily and quickly
Information security is becoming almost as accessible for both individuals and major
crucial as physical security as economies, organizations.
society, companies, and people grow more
and more reliant on technology.
EVOLUTION OF NEW MEDIA New Media: NEW JOBS

New Media: FUTURE

New Media: NEW PROBLEMS

- Multi Identity
- Cyber Crime Collapse of Traditional
Economic Models
- Privacy Issues
- Hate Speech
WEEK 7
-----------------------------------------------------------------------
New Media: NEW HORIZONS
INTERNET AND WORLD WIDE WEB
- Virtual Socialization
- Cyber Entrepreneurship INTERNET
- New Business Models
It defines as a worldwide network connecting to a
- Global Political Organizations and million computers via dedicated routes and servers.
Movements
When computers are connected to the internet, end-
New Media: NEW FORMS & CONTEN users can start sending and receiving deferent types of
information.

Types of Information via:

- e-mails
- text
- videos
- conferencing
- computer program
- among others
TELECOMMUNICATION

communication over a distance by cable,


telegraph, telephone, or broadcasting. World Wide Web (WWW) / Web

Telephone companies that function as ✓ Hypertext-based technology


internet service providers:
✓ It has provided the channels for displaying
PLDT INC. text, graphics, animations, etc.

- Philippine Long Distance Telephone ✓ Enabling easy search and offering


Company navigation tools

- The largest network company.


-----------------------------------------------------------------
Smart Communication Inc. and Digital Mobile INTERNET2
Philippines, Inc.
It is a non-profit networking consortium founded
- (Known as Sun Cellular) in 1996 by 34 universities research institution in
the U.S.
- Collaborating with PLDT. It provides a collaborative environment where
U.S. research and education organization work
Globe Telecom together and develop advance technologies and
innovative solution.
- Acquired Bayan Telecommunication
- (Bayan Tel or Bayan). Manages the Internet2 Network

- Companies use high-speed fiber-optic Internet2 Network


cables to transmit data.
a next-generation optical and internet protocol
network that can deliver enhanced network services
and is better, faster, and more efficient than the
------------------------------------------------------ typical internet or broadband connections.
1960
Maintains a secure network testing and research
environment.
✓ The internet was started from the:

Began operating the Internet2 DCN


✓ Advanced Research Projects
Agency’s Wide Area Network
Internet2 DCN (dynamic circuit network)
(ARPANET).

Advanced technology that allows user-based


✓ Established by the U.S. Department of
allocation of data circuits over the fiber-optic network
Defense so that the military’s research
unit could collaborate or partner with
PREGINET
business and government laboratory.

(Philippine Research, Education and Government


✓ ARPANET attained the name of
Information Network)
“Internet.”
TEIN TWO (2) Modes of Data Transmission

(Trans-Eurasia Information) CIRCUIT SWITCHING


A method of linking telephones together, allowing
the circuit to remain open as long as the two friends
DOST-ASTI are over the telephone is a common communication
network scheme used for telephone calls.
(Department of Science and Technology-
Advanced Science and Technology Institute) ✓ PROS
It offers a dedicated transmission channel
that Is reserved until is disconnected.
-------------------------------------------------------------
INTERNET TODAY: STILL GROWING ✓ CONS
Dedicated channels can cause delays
✓ Nowadays the internet connects because a channel is unavailable until one
thousands of networks and billions of side disconnects.
users and subscribers around the It uses a dedicated physical link between the
world. sending and receiving devices.

✓ The number of users as of January ✓ KEY FEATURES


2018 is 4.021 billion. It offers the capability of storing messages
temporarily to reduce network congestion.
INTERNET: JOBS
PACKETS SWITCHING
✓ to move, transfer, or assign Most data move over the internet in an entirely
computerized information from one different way.
place to another.
A mode of transmission in which the message is
Data - information can be in the form broken into smaller parts which are sent
of text documents, images, audio, independently, and then resemble the ultimate
video, and software programs. destination.

More efficient
--------------------------------------------------------------
HOW THE DATA TRAVELS THE INTERNET ✓ PROS
Packets can be routed around network
✓ Data and information are transferred congestion.
around the world through wired or Packet switching makes efficient use of
wireless transmission media. network bandwidth.

✓ Data is transferred from one network ✓ CONS


to another until it reaches its Packets can get lost while taking alternative
destination. routes to the destination.
Messages are divided into packets that
✓ Much of the internet runs on the contain source and destination information.
ordinary public telephone.
✓ KEY FEATURES
The two types of packet switching are
datagram and virtual circuit.
Datagram packets – independently
sent and can take different paths PRINT SERVER
throughout the network. ✓ a device that connects printers to client
computers through the internet
Virtual circuit – uses a logical
connection between the source and ✓ it accepts print jobs from the computers,
the destination device. queues these jobs, and sends them to the
-------------------------------------------------------------- appropriate printers.
COMPUTERS DO ON THE INTERNET
ROUTER
SERVERS
✓ The internet is made up of a hardware
✓ Computers work like electronic filing device designed to receive, analyze, and
cabinets that store information and send incoming packets to another network.
send it when clients request.
✓ It can be compared to a simple mailbox
✓ a computer that is designed to placed at the corner of a street which
process any requests for data and represents a single point of entry to the
delivers data to other client computers worldwide network.
over a local network.
WEB SERVER II
✓ computer with a special software
✓ machine that holds users’ mail services and
CLIENTS Web services.

✓ computer that gets information from a --------------------------------------------------------------


server WORLD WIDE WEB

AD DS (Active Directory Domain Services) The collection of public websites that are connected
to the internet worldwide, together with client
✓ a computer that holds the user computers.
accounts, computer accounts,
organizational units, application Considered to be one of the applications in
services the internet and computer networks

DNS (Domain Name System) THREE (3) FUNDAMENTAL TECHNOLOGIES

✓ machine that helps Dynamic Host HTML


Configuration Protocol (DHCP) server Hypertext Markup Language
✓ a standard markup language used for
✓ a server that configures IPv4 and creating web pages.
IPv6 addresses ✓ classified as the set of markup symbols or
codes appended in a file intended for
FILE SERVER presentation on a WWW browser page
✓ machine that holds and manages
documents.
HTTP
Hypertext Transfer Protocol TWO (2) MAINLY MANAGED SEARCH TOOLS
✓ classified as the set of standards
allowing users of the WWW to SUBJECT DIRECTORIES
interchange information seen on the
web pages. developed and maintained by human editors and not
by electronic spiders or robots that are used to fetch
✓ PORT 80 – standard port for HTTP web pages automatically.

✓ Connections directs to hypertext SEARCH ENGINES


document accessible through the
internet. o spiders or bots - uses small programs that polish
the internet, follow links, and return information to
WEB SERVERS and WEB BROWSERS the search engine’s indicator

✓ a software application for recovering, Googlebot


presenting, and navigating information Yahoo Slurp
resources on the WWW. MSNbot

-------------------------------------------------------------- GOOGLE- most used and famous search engines


UNIFORM RESOURCE LOCATOR
Google Search Tricks
✓ sorted as the internet address refers
to the address and to the electronic - Use an asterisk within quotes to specify
locality of a specific website. unknown or variable words.
✓ standard used to identify web
resources. - Use the minus sign to eliminate results
containing certain words.
http://www.yahoo.com/help/shop/shop-01.html
- Search websites for keywords
Protocol- identifies the means of access.
- Compare using “vs.”
Server- contains the domain name of the Web
server. - Use “DEFINE:” to search for the meaning of
words – slang included.
Path- identifies the location of the document.
- Search images using images.
Resource- specifies the filename of the
resource.

--------------------------------------------------------------
SEARCH ENGINE

WEB ADMINISTRATOR
✓ website maintenance

✓ modify the website content as well as


add new information.
WEEK 8 Conceptual resources
--------------------------------------------------------------
INFORMATION, CONTROL AND PRIVACY ✓ Are non-tangible and are considered
valuable for what they represent rather than
their physical make- up.
INTRODUCTION TO RESOURCES
✓ Money is considered a conceptual resource
- Organizations treat company assets, as each paper bill represents a specific
such as buildings, equipment, and monetary value as opposed to the paper
their manpower as important where it is printed.
resources.
✓ Managers use conceptual resources to
- Resources are the total means manage physical resources or vice versa.
available to a company for increasing
production or profit, including land, ✓ One such example is the use of computers
labor, capital, and raw materials. in organizations.

- Without resources, organizations ✓ A computer unit, by itself, may cost


would cease to exist. Imagine a bank thousands of pesos.
without money, a manufacturing plant
without forklifts, or a school without ✓ However, once used, the content saved in
teachers. those computer units becomes even more
valuable resources, making the computer
TWO TYPES OF RESOURCES unit irreplaceable.

Physical resources
INTEGRITY
✓ Usually start from acquisition and are The saved files may be compromised, so security
then assembled to be available for checks are often identified on the computer units.
use when needed.
EXAMPLE: firewalls, anti-virus, biometric access
✓ Very often, the assembly process
entails converting an essential raw --------------------------------------------------------------
material into a refined form, such as INFORMATION AS A RESOURCE
wood, cement, and steel for building
construction. INFORMATION ARE FACTS
Can be simply defined as "facts about something or
✓ Once these resources have been someone that are provided or learned," Facts are
assembled, the manager strives to considered relevant truths which have been
maximize their use; this includes validated and identified.
allocating space for office use and
identifying key areas in the building DATA ARE CONSIDERED FACTS
plans. Therefore, processed data are considered as
information as they are organized in such a way that
✓ Finally, the manager asks for they have additional value beyond the value of the
replacement or repairs and facts themselves.
maintenance of these resources at a
critical time before they are inefficient
or obsolete.
Unlike other organizational resources,
information is considered. Sharable

Expandable ✓ Since information can be easily spread, it is


considered sharable as well.
✓ Information can be expanded without ✓ Information can be kept, calling it a secret.
compromising its integrity. In fact, by However, once a person decides to tell it to
having additional information, much someone, then he or she will no longer
more can be understood from it. have control over it. In some cases, certain
✓ An example is a person's personal parts of the secret can be kept.
information. While knowing his or her ✓ One such example is the secret recipe of
name, contact details and current KFC. It is known that there are 11 secret
work may be useful, having the herbs and spices, but as to what these
person's full curriculum vitae becomes herbs and spices are, people can only
more useful for those in, for example, guess.
the HR Department.
--------------------------------------------------------------
Compressible VALUABLE INFORMATION

✓ Although expanded information can Accurate


give a more detailed explanation, it
may not always be needed. An ✓ Accurate information is error-free. In some
example of this is in news sites. cases, inaccurate information is generated
✓ Instead of a barrage of details, news because inaccurate data was processed.
sites would often give one-liner Analysts call this as "garbage-in-garbage-
headlines that provide enough out.
information about the news. ✓ " By typing "parts of a computer" in the
✓ Another example is research search bar, Google gives you a list of
abstracts. An abstract is normally a several websites which contain the
half- or a one-page summary of the information you are looking for.
entire research.
However, how do you determine which are accurate
Transportable and which are inaccurate? Usually, it is better to
trust sites that are formal in nature rather than
✓ Information, especially digital informal ones such as blogs or forums.
information, is easily transportable.
With the use of the internet and Complete
various technologies, information can
be sent though any of the following: ✓ Complete information contains all the
important facts.
- send via email. ✓ This is especially important in the field of
- share via Facebook. medicine. Missing information could spell
- copy onto a flash drive. disaster, or worse, lead to death.
- upload on YouTube ✓ If the information regarding allergies has
been left out, doctors might inadvertently
give wrong medication that could cause
Diffusive severe allergic reactions to the patient.
✓ Gossip or rumors tend to spread
easily. Unfortunately, the same
applies to any kind of information-be
it true or not.
Reliable Timely

✓ Reliable information can be depended ✓ Timely information is delivered when it is


on. needed.
✓ In many cases, the reliability of ✓ This is true in the case of weather
information depends on the validity of predictions, stock market forecasts, and
the data collection method. traffic management.
✓ In other cases, reliability depends on
the source of information, which
brings us back to valuable information Verifiable
being economical.
✓ This means that information can be checked
Torrent sites offer pirated software, music, and for correctness and authenticity.
movies for free. However, the resolution of the ✓ Most authors include references,
movie downloaded, for example, might not be bibliography, or citations in their works to
clear and might even contain malware and enable readers to verify the content.
virus that could infect the computer system. ✓

Flexible Accessible
✓ Information should be easily accessible by
✓ Flexible information can be used for authorized users to be obtained in the right
different purposes. Depending on the format at the right time to meet their needs.
situation, personal information can be ✓ In Korea, the U.S., the U.K., and China, a
used for a variety of ways. mobile phone can be used to pay for day-to-
✓ A school ID can be used to enter the day transactions.
school premises. The same ID can be ✓ A mobile pay app can be downloaded on the
used to transact business with the smartphone in which the user's credit card
registrar's office during enrolment. or debit card is enrolled.
✓ It can be used to open a bank account
or to apply for a student driver's Secure
permit.
✓ Information should be secure from access
by unauthorized users.
Relevant ✓ Mobile pay systems such as Samsung Pay
and Apple Pay use biometric authentication,
✓ Relevant information is important to typically a fingerprint scan, before a
the decision-maker. transaction is made.
✓ For example, your assignment calls ✓ This ensures that only the owner of the
for searching "parts of a computer" phone can use the app for payments.
online.
✓ You do not visit sites that tackle "parts
of the human body" because they are
irrelevant to your research topic.

Simple

✓ Information should also be simple, not


overly complex.
✓ Sophisticated and detailed information
may not be needed.
✓ Complex information may sometimes
lead to confusion which could result in
inaccuracy of details.
-------------------------------------------------------------- Non-exclusive
VALUE OF INFORMATION Exclusion is not a natural property of information
goods, though it is possible to construct exclusion
artificially. However, the nature of information is that
• Information is considered valuable if it is known, it is difficult to exclude others from its
mainly for business purposes as use. Through emails and SMS, one can identify only
businesses depend on it to produce intended recipients of the message through a
quality products and services. This specific email address or a phone number. However,
helps organizations become globally emails and SMS have the capability of forwarding
competitive and be up to date with the the exact information to other recipients, without the
latest trends and technology. original sender knowing it. This is much more
evident in social media such as Facebook, in which
• With businesses gearing towards IT a "share" automatically means sending to everyone
automation, the strategy now is to else.
come up with business activities that
shorten time frames while increasing No transparency
productivity. All of this is possible if To evaluate the information, the information must be
companies have access to valuable known, so one has to invest in learning how to
information. evaluate it. A programmer undergoing boot camp
training to learn a new programming language
• Information, as a resource, has four needs to invest time, money, and effort. The more
characteristics, namely it: complicated the training, the more expensive the
cost and the longer the time needed to learn it.
(1) has zero marginal cost
(2) is non-rivalrous --------------------------------------------------------------
(3) is non-exclusive INFORMATION ECONOMICS
(4) does not exhibit high degrees of
transparency - Since people have widely different values for
a particular piece of information, value-
based pricing leads naturally to differential
Zero-marginal cost
pricing.
The cost of producing the first copy of an
information good may be substantial, but the - In economics, a good is an experience good
cost of producing (or reproducing) additional if consumers must experience it to value it.
copies is negligible. Avengers: Age of Ultron
released in 2015 is one of the most expensive - Virtually any new product is an experience
Hollywood movies ever made with an
good, and marketers have developed
estimated budget of US$250,000,000.
However, buying a DVD copy of the said strategies such as free samples,
movie today would cost about $20 on promotional pricing, and testimonials to help
Amazon.com. consumers learn about new goods.

Non-rivalrous - The tension between giving away your


Simultaneous consumption of information by
consumers is possible. Movies nowadays are
information to let people know what you
sold not only as DVD copies. have to offer-and charging them for it to
There are also digital formats which anyone recover your costs, is a fundamental
can watch online or download on their mobile problem in the information economy.
devices, either as a rental or paid subscription.

- These strategies include browsing


previews, branding, and reputation.
Browsing previews

An example of this strategy is movie trailers.


Movie trailers that normally run from 1 to 3
minutes give viewers a glimpse of what the
film is all about. Trailers normally include
highlights from the film which can leave the
audience excited to watch the entire film later.
Another example is music downloaded from
iTunes. A 5- to 15-second preview of the song
can be listened to prior to buying it. This gives
the user an idea of the song he or she wants
to download if it is worth the amount to be
paid.

Branding

Big names such as Microsoft and Apple have


no issues when it comes to launching new
products as people have already established
their trust on these brands. According to
American telecommunications (telco)
company, Sprint, when Apple introduced
iPhone 7 in September 2016, pre-order sales
shot up by 375% compared to the launch of
iPhone 6.

Reputation

When a movie is announced, people would


often be skeptical if it would be good enough.
However, the reputation of directors and the
cast of actors and actresses normally remove
this skepticism. For example, Michael Bay is
known for successfully directing the
Transformers movie franchise. This reputation
has made his movies blockbuster hits as
people have made a connection that if it is a
Michael Bay film, it must be good.

You might also like