You are on page 1of 8

• MODULE 1 • - Computer is an electronic device that manipulates

information, or data. It has the ability to store, retrieve,


HISTORY OF ICT
and process data.
ICT, or Information and Communications Technology (or
- Computer is a machine that manipulates data
Technologies), is the infrastructure and components
according to a list of instructions (program).
that enables modern computing.
- Computer is any device which aids humans in
USES OF ICT IN OUR DAILY LIVES
performing various kinds of computations or
- Communication calculations.

- Job Opportunities THREE PRINCIPAL CHARACTERISTICS OF COMPUTER

- Education - It responds to a specific set of instructions in a well-


defined manner.
- Socializing
- It can execute a pre-recorded list of instructions.
IMPACT OF ICT IN THE SOCIETY
- It can quickly store and retrieve large amounts of data.
• POSITIVE IMPACTS OF ICT
APPLICATIONS OF ICT (COMPUTERS) IN OUR DAILY
- Access to information LIVES
- Improved access to education
1. Business 11. Banking and Finance
- New tools, new opportunities
2. Education 12. Transport
- Communication 3. Healthcare 13. Navigation
- Information management 4. Retail and Trade 14. Working from Home

- Security 5. Government 15. Military

- ICT allows people to participate in a wider, even 6. Marketing 16. Social and Romance
worldwide society 7. Science 17. Booking Vacations
- Distance learning 18. Security and
8. Publishing
Surveillance
- ICT facilitates the ability to perform ‘impossible’ 9. Arts and
19. Weather Forecasting
experiments by using simulations Entertainment
10. Communication 20. Robotics
- Creation of new more interesting jobs
HISTORY OF COMPUTER: BASIC COMPUTING PERIODS
• NEGATIVE IMPACTS OF ICT
• Tally Sticks - Was an ancient memory aid device to
- Job loss record and document numbers, quantities, or even
messages.
- Reduced personal interaction
• Abacus – Is a mechanical device used to aid an
- Reduced physical activity
individual in performing mathematical calculations.
- Cost
- Was invented in Babylonia in 2400 B.C.
- Competition
- Was first used in China in around 500 B.C.
• MODULE 2 •
- It used to perform basic arithmetic operations.
DEFINITION OF COMPUTER
• Napier’s Bones – Invented by John Napier in 1614.
- Computer is a programmable machine.
- Allowed the operator to multiply, divide and calculate - The first printing calculator.
square and cube roots by moving the rods around and
• Tabulating Machine – Invented by Herman Hollerith in
placing them in specially constructed boards.
1890.
• Slide Rule – Invented by William Oughtred in 1622.
- To assist in summarizing information and accounting.
- Is based on Napier’s ideas about logarithms.
• Harvard Mark 1 – Also known as IBM Automatic
- Used primarily for multiplication, division, roots, Sequence Controlled Calculator (ASCC).
logarithms, and trigonometry.
- Invented by Howard H. Aiken in 1943.
- Not normally used for addition or subtraction.
- The first electro-mechanical computer.
• Pascaline – Invented by Blaise Pascal in 1642.
• Z1 – The first programmable computer.
- It was its limitation to addition and subtraction.
- Created by Konrad Zuse in Germany from 1936 to
- It is too expensive. 1938.

• Stepped Reckoner – Invented by Gottfried Wilhelm - To program the Z1 required that the user insert punch
Leibniz in 1672. tape into a punch tape reader and all output was also
generated through punch tap.
- The machine that can add, subtract, multiply, and
divide automatically. • Atanasoff-Berry Computer (ABC) – It was the first
electronic digital computing device.
• Jacquard Loom – Is a mechanical loom, invented by
Joseph-Marie Jacquard in 1881. - Invented by Professor John Atanasoff and graduate
student Clifford Berry at Iowa State University between
- It is an automatic loom controlled by punched cards.
1939 and 1942.
• Arithmometer – A mechanical calculator invented by
• ENIAC (Electronic Numerical Integrator and Computer)
Thomas de Colmar in 1820.
– It was the first electronic general-purpose computer.
- The first reliable, useful, and commercially successful
- Completed in 1946 and developed by John Presper
calculating machine.
Eckert and John Mauchly.
- The machine could perform the four basic
• UNIVAC 1 (Universal Automatic Computer 1) – Was the
mathematical functions.
first commercial computer.
- The first mass-produced calculating machine.
- Designed by John Presper Eckert and John Mauchly.
• Difference Engine and Analytical Engine – Is an
• EDVAC (Electronic Discrete Variable Automatic
automatic, mechanical calculator designed to tabulate
Computer) – The first stored program computer,
polynomial functions.
designed by Von Neumann in 1952.
- Invented by Charles Babbage in 1822 and 1834.
- It has a memory to hold both a stored program as well
- It is the first mechanical computer. as data.

• First Computer Programmer – In 1840, Augusta Ada • Osborne 1 - The first portable computer.
Byron suggests to Babbage that he use the binary
- Released in1981 by the Osborne Computer
system.
Corporation.
- She writes programs for the Analytical Engine.
• Electronic Controls Company – The first computer
• Scheutzian Calculation Engine – Invented by Per Georg company, founded in 1949 by John Presper Eckert and
Scheutz in 1843. John Mauchly.

- Based on Charles Babbage’s difference engine. BASIC COMPUTING PERIODS – AGES


• Premechanical • Integrated Circuit (IC) – Third generation (1965 to
1970)
- Earliest age of information technology.
• Microprocessor – Fourth generation (1971 to Today)
- Can be defined as the time between 3000 B.C. and
1450 A.D. • Artificial Intelligence (AI) – Fifth generation (Today to
future)
- Petroglyphs (usually carved in rock).
• MODULE 3 •
- Phoenician alphabet
The Internet or “net” (network of network) is the largest
- Around 100 A.D. was when the numbers 1-9 were
computer network in the world that connects billions of
created by Indian people.
computer user. The word internet comes from
- 875 A.D. (which is 775 years later), the number 0 was combination between “interconnection” and
invented. “network”. Network is a collection of computers and
devices connected via communication channels and
• Mechanical transmission media allow to share resources (hardware,
- Can be defined as the time between 1450 and 1840. software, data, information).

- Slide Rule; Pascaline; Difference Engine BRIEF HISTORY OF INTERNET

• Electromechanical • ARPA – Advanced Research Project Agency

- Can be defined as the time between 1840 and 1940. MAJOR COMPONENTS OF THE INTERNET

- Telegraph was created in the early 1800s. 1. Servers – Is a computer program that provides service
to another computer program and its user.
- Morse code was created by Samuel Morse in 1835.
TYPES OF SERVERS
- Telephone (one of the most popular forms of
communication ever) was created by Alexander Graham • Application Server – a program in computer that
Bell in 1876. provides the business logic for an application program.

- Mark 1 – The first large-scale automatic digital • Web Server – a computer program that serves
computer in the United States, created by Harvard requested HTML pages or files.
University around 1940. 8ft high, 50ft long, 2ft wide, • Proxy Server – is a software that acts as an
and weighed 5 tons. intermediary between an endpoint device, such as
• Electronic computer and another server form which a user is
requesting.
- Can be defined as the time between 1940 and right
now. • Mail Server – is an application that receives incoming
e-mail from local users and remote senders and forward
- ENIAC – Was the first high-speed, digital computer outgoing e-mail for delivery.
capable of being reprogrammed to solve a full range of
computing problems. 680 square feet and weighed 30 • File Server – is a computer responsible for central
tons. storage and management of data files so that another
computer on the same network can access them.
- High-level programming languages were created such
as FORTRAN and COBOL. • Policy Server – is a security component of a policy-
based network that provides authorization services and
- The Graphical User Interface (GUI) was developed. facilities tracking and control of files.
HISTORY OF COMPUTER: GENERATIONS OF COMPUTER 2. IP Address (Internet Protocol) – is a numerical label
• Vacuum Tube – First generation (1946 to 1958) assigned to each device. This provides identity to a
network device.
• Transistor – Second generation (1959 to 1964)
3. Browser – is an application program that provides a • Online gaming – Games that allow people to play with
way to look information on the web. and against each other over the internet.

4. Domain Name System (DNS) – is the phonebook of • Software updates – Operating system and application
internet. We access information online through domain updates can typically be downloaded from the internet.
names.
• HTML (Hypertext Markup Language) – Is a coding
5. Internet Service Provider (ISP) – is an organization that language used to tell a browser how to place pictures,
provides services for accessing, using, or participating in text, multimedia, and links to create a web page. When
the internet. a user clicks on a link within a web page, that link, which
is coded with HTML, links the user to a specific linked
TWO TYPES OF ISP
web page.
• National ISP – provided internet access to a specific
• URL (Uniform Resource Locator) – Is a web address
geographic area.
used to connect to a remote resource in the world wide
• Regional ISP – business that provides internet access web.
in cities and towns nationwide.
• Bit – Is a single digit in the binary numbering system
USES OF INTERNET (base 2). For example: 1 is a bit or 0 is a bit.

- Look for information • Byte – Generally consists of eight bits.

- School works, jobs, and home purposes • Upload – To upload is to transfer data from your
computer to another computer.
- Send and receive electronic mail
• Download – To download is to transfer data from
- Video teleconference (video call, video chat) another computer to your computer.
- Buy and sell product • HTTP (Hypertext Transfer Protocol) – The data
- Social networking communication standard of web pages. When a web
page has this prefix, the links, text, and pictures should
- Watch & post videos work correctly in a web browser.
- Games • HTTPS (Hypertext Transfer Protocol Secure) – This
- Take college courses indicates that the web page has a special layer of
encryption added to hide your personal information and
- Monitor home while away passwords from other.
- Financial transactions • Router or router-modem combination – Is the
hardware device that acts as the traffic cop for network
- Download music and movies
signals arriving at your home or business from your ISP.
INTERNET TERMS AND DEFINITION A router can be wired, wireless, or both.

• Internet – A global network of thousands of computer • Encryption – Is the mathematical scrambling of data so
networks linked by data lines and wireless systems. that it is hidden from eavesdroppers. Encryption uses
complex math formulas to turn private data into
• Web – A collection of billions of webpages that you
meaningless gobbledygook that only trusted readers can
can view with a web browser.
unscramble.
• Email – The most common method of sending and
• Web Bot – A term that applies to programs/applets
receiving messages online.
(macros and intelligent agents) used on the internet.
• Social media – Websites and apps that allow people to Such bots perform a repetitive function, such as posting
share comments, photos, and videos. messages to multiple newsgroups or doing searches for
information.
• Search Engine – Specialized software, such as Google CRIMINAL ACTIVITIES
and Yahoo, that lets www browser users search for
a. Hacking
information on the web by using keywords or phrases.
• Unauthorized access of or interference with computer
• MODULE 4 •
systems, servers, or other information and
WHAT IS CYBER? communication systems.

It is the characteristics of the culture of computer, • Reclusion temporal – 12-20 years imprisonment
information, technology, and virtual reality.
• Prison mayor – 6-12 years imprisonment
• Cybercrime – is defined as a crime in which a
b. Computer-related forgery, fraud, and/or identity theft
computer is the object of the crime and is used as a tool
to commit an offense. • An attempt to obtain sensitive information such as
usernames, passwords, and credit card details and
• Cybercriminals – may use computer technology to
(indirectly money), often for malicious reasons.
access personal information, business trade secrets or
use the internet for exploitative or malicious purposes. c. Electronic theft
• Republic Act No. 10175 Cybercrime Prevention Act of • Obtaining files that you do not have the right to use
2012 – is a law in the Philippines approved on from the internet.
September 12, 2012 which aims to address legal issues
concerning online interactions and internet. • Practice of illegal copying and selling digital music,
video, computer software, etc.
• Republic Act No. 10173 Data Privacy Act of 2012 – is
an act protecting individual personal information. d. Cyberbullying

COMMON FORMS OF CYBERCRIMES: • The use of electronic communication to bully a


person, typically by sending a message of an
a. Copyright – the exclusive legal right, given to an intimidating or threatening nature.
originator or an assignee to print, publish, perform, film,
or record literary, artistic, or musical material, and to • RA No. 10627 The Anti-Bullying Act of 2013
authorize others to do the same. e. Cybersex
• Copyright infringement – is the violation, piracy, or • Willful engagement, maintenance, control, or
theft of a copyright holder’s exclusive rights through the operation, directly or indirectly of any lascivious
unauthorized use of a copyrighted material or work. exhibition of sexual organs or sexual activity with the aid
b. Plagiarism – an act or instance of using or closely of a computer system for favor or consideration.
imitating the language and thoughts of another author f. Child Pornography
without authorization.
• Is a form of child sexual exploitation.
c. Computer Addiction
• Unlawful or prohibited acts defined and punishable by
• Offline – generally used when speaking about Republic Act No. 9775 or the Anti-Child Pornography Act
excessive gaming behavior, which can be practiced both of 2009, committed through a computer system.
offline and online.
g. Cyber Defamation
• Online – also known as “Internet Addiction”, gets more
attention in general from scientific research than offline • Is an unprivileged false statement of fact which tends
computer addiction, mainly most cases of computer to harm the reputation of a person or company.
addiction is related to the excessive use of the Internet. THE INTERNET THREATS
• Virtual Self – the persona you create about yourself • Hacking – is a term used to describe actions taken by
virtually. someone to gain unauthorized access to a computer.
• Malware – is one of the more common ways to - Consists of information organized into Web pages
infiltrate or damage your computer. containing text and graphic images. It is a larger
collection of interconnected documents or content. It
• Pharming – is a common type of online fraud.
also contains hypertext links, or highlighted keywords
• Phishing – is used most often by cyber criminals and images that lead to related information.
because it’s easy to execute and can produce the results
- Sir Timothy John Berners-Lee OM KBE FRS FREng FRSA
they’re looking for with very little effort. This is also
FBCS, also known as TimBL, is an English engineer and
known as “spoofing”.
computer scientist best known as the inventor of the
• Ransomware – is a type of malware that restricts World Wide Web. He is a Professional Fellow of
access to your computer or your files and displays a Computer Science at the University of Oxford and a
message that demands payment in order for the professor at the Massachusetts Institute of Technology.
restriction to be removed.
A. Web 1.0 (Read Only Static Web) – is an old internet
• Spam – is one of the more common methods of both that only allows people to read from the internet. First
sending information out and collecting it from stage worldwide linking web pages and hyperlink. Web
unsuspecting people. is used as “information portal”. It uses table to position
and align elements on the page.
• Spyware (Spyware & Adware) – are often used by third
parties to infiltrate your computer. It collects personal EXAMPLES
information about you without you knowing.
Mp3.com Page Views
• Trojan Horses – a malicious program that is disguised Home Page HTML/Portals
as, or embedded within, legitimate software. It is an
executable file that will install and run automatically Directories
once it’s downloaded.

• Viruses – malicious computer programs that are often B. Web 2.0 (read-write interactive web) – a term used to
sent as an email attachment or a download with the describe a new generation of Web series and
intent of infecting your computer, as well as the applications with an increasing emphasis on human
computers of everyone in your contact list. collaboration.

• Wi-Fi Eavesdropping – virtual “listening in” on - EXAMPLES -


information that’s shared over an unsecure (not
• Social Networking – is the use of Internet-based social
encrypted) Wi-Fi network.
media sites to stay connected with friends, family,
• Worms – goes to work on its own without attaching colleagues, customers, or clients. It can have a social
itself to files or programs. It lives in your computer purpose, a business purpose, or both.
memory, doesn’t damage or alter the hard drive and
• Blogs – is a discussion or informational website
propagates by sending itself to other computers in a
published on the world wide web consisting of discrete,
network – whether within a company or the Internet
often informal diary-style text entries (posts). Post are
itself.
typically displayed in reverse chronological order, so that
• MODULE 5 • the most recent post appears first, at the top of the
web.
OVERVIEW
• Wikis – is a hypertext publication collaboratively
• Internet – is defined as an information superhighway, edited and managed by its own audience directly using
to access information over the web. Internet is a world- a web browser. A typical wiki contains multiple pages for
wide global system of interconnected computer the subjects or scope of the project and may be either
networks. open to the public or limited to use within an
THE WEB organization for maintaining its internal knowledge
base.
• The Web (World Wide Web)
• Video Sharing Sites – a website that lets people upload • Business Website – is any website that’s devoted to
and share their video clips with the public at large or to representing a specific business. It should be branded
invited guests. like the business (the same logo and positioning) and
communicate the types of products and/or services the
- KEY FEATURES –
business offers.
• Folksonomy – allows users to categorize and
• Entertainment Website – if you think about your
classify/arrange information using freely chosen
internet browsing habits, you can probably think of a
keywords.
few websites that you visit purely for entertainment
• Rich User Interface – content is dynamic and is purposes.
responsive to user’s input. An example would be a
• Portfolio Website – are sites devoted to showing
website that shows local content.
examples of past work. Service providers who want to
• User Participation – the owner of the website is not show potential clients the quality of the work they
the only one who is able to put content. Others are able provide can use a portfolio website to collect some of
to place a content on their own by means of comments, the best samples of past work they’ve done. This type of
reviews, and evaluation. website is simpler to build than a business website and
more focused on a particular task: collecting work
• Long Tail – services are offered in demand rather than samples.
on a one-time purchase. This is synonymous to
subscribing to a data plan that charges you for the • Media Website – collect news stories or other
amount of time you spent on Internet or a data plan reporting. Are more likely to include reported pieces in
that charges you for the amount of bandwidth you addition to or instead of content meant purely for
used. entertainment.

C. Web 3.0 (Read-write intelligent web) • Brochure Website – are a simplified form of business
websites.
- Suggested name by John Markoff of the New York
Times. • Nonprofit Website – is the easiest way for many
potential donors to make donations and will be the first
- All the application on web or mobile will be upgraded place many people look to learn more about a nonprofit
with more features. It applies same principles as Web and determine if they want to support it.
2.0: two-way interaction.
• Educational Website – these have the primary goal of
- Will be more connected, open, and intelligent, with either providing educational materials to visitors or
semantic web technologies, distributed databases, providing information in an educational institution to
natural language processing, machine learning, machine them.
reasoning, and autonomous agents.
• Infopreneur Website – overlap a bit with business and
• Semantic Web – provides a framework that allows eCommerce, but they represent a unique type of online
data to be shared and reused to deliver web content business. Infopreneurs create and sell information
specifically targeting the user. products. That could be in the forms of courses,
- TYPES OF WEBSITES - tutorials, videos, or eBooks.

• eCommerce Website – is a website people can directly • Personal Website – not all websites exist to make
but products from you’ve probably used a number of money in some way or another. Many people find value
eCommerce websites before, most big brands and in creating personal websites to put their own thoughts
plenty of smaller ones have one. Any website that out into the world. This category includes personal
includes a shopping cart and a way for you to provide blogs, vlogs, and photo diaries people share with the
credit card information to make a purchase fall into this world.
category. • Web Portal – are often websites designed for internal
purposes at a business, organization, or institution. They
collect information in different formats from different
sources into one place to make all relevant information
accessible to the people who need to see it.

• Wiki or Community Forum Website – is any website


where various users are able to collaborate on content
and all their own tweaks and changes as they see fit.
There are wikis for fan communities, for business
resources, and for collecting valuable information
sources.

WHAT IS NETIQUETTE?

• Network Etiquette – is the etiquette of cyberspace and


“etiquette” means the forms of required good breeding
or prescribed by authority to be required in social or
official life.

You might also like