Professional Documents
Culture Documents
TO ICT
2
3.INTRODUCTION TO ICT
This year we have a new subject, call ICT. I think that is important to know why this subject exist, so I am
going to do this work to know more about it.
ICT means information and communications technology. ICT are the technologies that link computers with
telecommunication so that we can be able to communicate easily. Thanks to ICT we have facilitated the
issuance and access to different types of information in the internet.
Every year, the computers are improved, so we have many different computers. These are some of them (in
which we can see their external improvements).
4.KNOWLEDGE SOCIETY
4.1.INFORMATION SOCIETY AND DIGITAL LITERACY
The information society is a society where the processing of information has large functions (they are able to
combine the information that they already had with the new information).
The digital literacy means that you are able to understand and use the technology you need daily, because
nowadays internet platforms, social media… are the basis of today’s world, thanks to the influence of ICT.
3
4.2.DIGITAL BREACH
Nowadays in the world, there are developed countries and there are others that are not. And as we know,
having access to the internet nowadays is not very cheap, so countries that are in poverty cannot get these
resources. So, the digital breach is the uneven distribution of ICT among the different social groups. If we
compare Mali (least developed country) and Spain (most developed country), we can see that in Spain we
have better access to ICT than in Mali (this is due to the digital breach).
5.ICT CONCEPTS
5.1. 4G VS 5G
During the history of ICT’s 5 wireless technologies have come out (1G, 2G, 3G, 4G and the most recently
5G). Thanks to these wireless technologies, you can currently connect to the network anywhere. Currently
there is the change from 4G to 5G (because Vodafone launched the project in June 2019, although it began
to be implemented on devices at the end of 2020), so it’s important to know the differences between the two
models.
There are so many differences between both but I will only mention the 3 most important. The first difference
is that 4G has a high consumption battery, while the 5G has the battery with 10% more durable. The second
difference if that the 5G is 10 to 20 times faster that the 4G when we download different files. And the last
difference is that the 5G takes less time to react when the server makes a request to the device used, than the
4G.
4
5.2.INTERNET OF THINGS
Internet of things is the grouping of devices and objects through a network which incorporate sensors,
software and other technologies to connect and exchange data with other devices over the Internet. Anything
can be connected to the Internet, like the fridge, the dishwasher, the shoes, the clothes… For example, you
could connect the fridge of dishwasher to your mobile phone and it would let you know when a product in the
fridge is going to be finished, when the dishwasher has finished cleaning the dishes…
5.3.PASSWORD AUTHENTICATION
To do anything on the Internet it’s usually necessary to identify the user (usually with mail). So that no one
can use your account on the internet and impersonate you, passwords exist (a secret code to confirm your
identity). Having a very weak password can lead to you for future problems because any criminal could
figure out your password and access to your account. People are aware of what it could cause to have a very
weak password, but they still use them so that they never forget their passwords. Currently the most used
passwords are: 123456, the word PASSWORD, 123456789, 111111, the word QWERTY…
There are many tricks to have the most secure passwords, here are some of them:
1. Think in a long phrase and form a password with the first word of each phrase.
2. Put two words together, alternating letters.
3. Chang vowels to numbers, for example E to 3.
4. Remove the vowels in a very long word.
5. Put a sequence of numbers and between each number put the letter that appear below on the
keyboard.
6. Make a long password.
7. Don’t put personal information in your password, as important dates, city where you live…
5
5.5.LICENSES TYPES
Currently, the authors use the licenses to put various conditions on people who want to do anything with their
work. The most restrictive license is: copyright, rights that are given to the author so that no one can copy
anything from this work (such as a literary work, a song, a film...). For example, no one can put Aitana
Ocaña’s music in a video and publish it, because she has the copyright license. On the contrary, there is also
the copyleft license, which gives the permission to use, copy, modify and transmit the work that contains the
copyright. The following license is creative commons: this license allows the author to publish his works
with less restrictions than copyright, as only some rights are reserved.
6.BIBLIOGRAPHY
6.1.INTRODUCTION TO ICT
https://es.wikipedia.org/wiki/Tecnolog%C3%ADas_de_la_informaci%C3%B3n_y_la_comunicaci%C3%B3n
https://searchcio.techtarget.com/definition/ICT-information-and-communications-technology-or-
technologies
https://www.claro.com.co/institucional/que-son-las-tic/
https://www.xataka.com/historia-tecnologica/20-ordenadores-personales-importantes-historia-tecnologia
6
6.2.KNOWLEDGE SOCIETY
6.2.1.INFORMATION SOCIETY AND DIGITAL LITERACY
https://en.wikipedia.org/wiki/Information_society
https://www.westernsydney.edu.au/studysmart/home/study_skills_guides/digital_literacy/
what_is_digital_literacy
https://teachyourkidscode.com/why-is-digital-literacy-important/
6.2.2.DIGITAL BREACH
https://es.wikipedia.org/wiki/Brecha_digital
6.3.ICT CONCEPTS
6.3.1.4G VS 5G
https://www.xataka.com/basics/que-5g-que-diferencias-tiene-4g
https://precio.com/tarifas-movil/articulos/todas-las-diferencias-entre-el-4g-y-el-5g/
6.3.2.INTERNET OF THINGS
https://www2.deloitte.com/es/es/pages/technology/articles/IoT-internet-of-things.html
https://www.google.com/search?client=firefox-b-e&q=Iot
6.3.3.PASSWORD AUTHENTICATION
https://blog.avast.com/es/la-importancia-de-la-autenticaci%C3%B3n-avast
https://fundaciongabo.org/es/blog/convivencias-en-red/7-trucos-para-crear-contrasenas-seguras
https://www.upv.es/contenidos/CD/info/711545normalc.html
https://www.camerfirma.com/mas-de-50-tramites-que-puedo-realizar-con-el-certificado-digital-de-
ciudadano/
6.3.5.LICENSES TYPES
https://artistascc.wordpress.com/2017/01/09/tipos-de-licencias-creative-commons-copyleft-y-copyright/
https://latinwmg.com/copyright-que-es-y-para-que-sirve/
7
https://www.legaltoday.com/practica-juridica/derecho-civil/nuevas-tecnologias-civil/udea-caracteristicas-
de-copyleft-programas-de-software-libre-2012-01-16/
http://biblio.webs.fcm.unc.edu.ar/2017/11/27/que-son-y-para-que-sirven-las-licencias-creative-commons/
https://es.wikipedia.org/wiki/Realidad_aumentada
https://www.xataka.com/aplicaciones/8-apps-realidad-aumentada-para-poder-jugar-ninos-ideas-para-
entretenernos-ellos-nuestro-movil-tablet