You are on page 1of 6

COMPUTER

COMPUTER - “Electronic wallets” (e.g., PayPal, GCASH,


- programmable, multiuse machine that accepts data— PayMaya), Electronic payroll deposit
raw facts and figures—and processes, or manipulates - Online bill paying via debit and credit cards
it into information we can use. - Micropayments for online products and
- to help charities Virtual money includes cash-
COMMUNICATIONS TECHNOLOGY value cards, automatic transfers, and digital
- also called telecommunications technology, consists money
of electromagnetic devices and systems for - Smartphones are used for “showrooming” and
communicating over any distance. shopping.
- Technology can also be used to telecommute (e-work)
Effects of Information Technology and to start businesses and earn money
EDUCATION:
Information technology can be used for GOVERNMENT:
- Personalizing students’ education - Information technology is helping governments to
- Automating tedious and rote tasks and managing deliver services and is affecting political activism.
classes - IT can help governments to improve services,
- Reducing instructors’ workload (course-management including police services, which use databases,
software) computer systems with a collection of interrelated
- Graphical presentations (e.g., PowerPoint) files.
- Online voting is becoming common.
What is misuse? - Information is easier to disseminate.
- Text messaging or emailing friends during class - Watchdog websites are growing
- Surfing the Internet for entertainment - Easier fund raising from small donors
- Doing assignments for other classes, Sharing answers
JOBS AND CAREERS:
Online Learning, or distance learning, is becoming - People now use computers to post résumés (CVs) and
common find jobs.
- Not all online schools/courses are accredited; - IT is used in starting new business ventures.
students should check. - Prepare résumés and find jobs on many websites.
- Online courses are less expensive than traditional - To help find jobs, participate in social media and write
courses. comments on blogs, frequently updated sites on the
- Distance learning is useful to students in rural areas web intended for public consumption that contain a
writer’s observations, opinions, images, and links to
HEALTH other websites.
- Computers are playing important roles in our personal - Basic computer skills are needed for most jobs:
lives. - Know how to use a keyboard.
- Telemedicine: Medical care via telecommunications - Use email
lets doctors treat patients from far away. - Be able to use a word processor (usually
- 3D Computer models allow accurate cancer location Microsoft Word).
inside a brain; - Know basic spreadsheet and database
- X-rays, MRIs, CT scans can be done remotely software skills.
- Robots—automatic devices that perform functions - Understand the basics of file sizes, computer
ordinarily performed by human beings—permit precise memory limitations, and network
microsurgery. arrangements.
- Health websites provide medical information - Know what the basic computer system
- Many health records are stored electronically components are

MONEY AND BUSINESS CYBERSPACE


- Information technology is reducing the use of - Term coined by William Gibson in Neuromancer
traditional money. - “novel” (1984) to describe a futuristic computer
- Virtual means something that is created, simulated, network people “plugged” into directly with their
or carried on by means of a computer or a computer brains
network - Now the term cyberspace encompasses not only the
- Virtual money includes cash-value cards, automatic online world and the Internet in particular but also the
transfers, and digital money whole wired and wireless world of communications in
general.
COMPUTER
INTERNET (NET) - Personal computers that cost $500 to over $5,000
- worldwide computer network that connects - Used either stand-alone or in a network
hundreds of thousands of smaller networks. These - Types include: desktop, tower, notebooks (laptops),
networks link educational, commercial, nonprofit, and netbooks, tablets, mobile devices, personal digital
military entities, as well as individuals. - assistants (PDAs), and e-readers

WORLD WIDE WEB (WEB)


MICROCONTROLLERS
- interconnected system of Internet computers (called
- Also called embedded computers, tiny, specialized
servers) that support specially formatted documents in
multimedia form. microprocessors inside appliances and automobile
- They are in microwaves, programmable ovens, blood-
MULTIMEDIA pressure monitors, air bag sensors, vibration sensors,
- refers to technology that presents information in MP3 players, digital cameras, keyboards, car systems
more than one medium, such as text, still images,
moving images, and sound.) SERVERS
- describes the way a computer—whether mainframe,
FIVE SIZES OF COMPUTERS workstation, or PC—is used.
SUPERCOMPUTERS - A server, or network server, is a central computer
- most expensive and fastest computers available. that holds collections of data (databases) and programs
“Supers,” as they are called, have been used for tasks
for connecting or supplying services to PCs,
requiring the processing of enormous volumes of data,
workstations, and other devices, which are called
such as doing the U.S. census count, forecasting
clients. These clients are linked by a wired or wireless.
weather, designing aircraft, modelling molecules, and
breaking encryption codes The entire network is called client-server network.
- Purpose: Hold data and programs for clients to access
MAINFRAMES and to supply services for clients.
- are water- or air-cooled computers that cost $5,000–
$5 million and vary in size from small, to medium, to How Computers Work: Three Key Concepts
large, depending on their use. Small mainframes are 1. Purpose of a computer: Turning data into
often called midsize computers; they used to be called information
minicomputers, although today it is seldom used. Data: the raw facts and figures
- Mainframes are used by large organizations—such as Information: data that has been summarized or
banks, airlines, insurance companies, and colleges—for otherwise transformed for use in decision making
processing millions of transactions. Often users access
a mainframe by means of a terminal, which has a
2. Hardware vs. software
display screen and a keyboard and can input and
output data but cannot by itself process data. Hardware: the machinery and equipment in a
- Mainframes process billions of instructions per computer system
second. Software (programs): the electronic instructions that
tell the computer how to perform a task
WORKSTATIONS
- are expensive, powerful personal computers usually 3. The basic operations of a computer: All computers
used for complex scientific, mathematical, and use 4 basic operations + communications:
engineering calculations and for computer-aided Input: What goes into the computer system
design and computer-aided manufacturing. Providing Processing: The manipulation a computer does to
many capabilities comparable to those of midsize transform data into information
mainframes, workstations are used for such tasks as Storage:
designing airplane fuselages, developing prescription
Primary storage, or memory, is temporary storage for
drugs, and creating movie special effects.
data waiting to be processed
Secondary storage is permanent storage: media such
MICROCOMPUTERS as hard disk, DVDs, and CDs
- used by individuals as well as businesses, and they Output: What comes out—the results of processing,
can be connected to networks of larger computers. such as on the screen, printouts, sound
There are many types of microcomputers. Communications: Sending and receiving data
COMPUTER
When Computers & Communications Converge: Five - Gbps connections send 1 billion bits per second (GIGA
Results BITS)
- Computers
- Communications INTERNET CONNECTION TYPES
- Consumer electronics MODEMS
- Entertainment - Can be either internal or external to your PC
- Mass media - Most ISPs offer local access numbers
- Need call waiting turned off; either manually or in
CONVERGENCE Windows
- combination of several industries - 28.8 Kbps takes 4 3/4 hours to download 6 minute vid.

1. Portability HIGH-SPEED PHONE LINES / T1 LINE


2. Personalization ISDN Line - 1 hour to download 6 minute video
3. Collaboration DSL Line - 11 minutes to download 6 minute video
4. Cloud computing - basically means that instead of Cable Modems - Connects the PC to a cable-TV system
storing your software and/or data on your own PC or - 2 minutes to download a 2 minute video
your own company’s computers, you store it on servers
on the Internet. SATELLITE
5. Artificial intelligence - refers to a group of related - Always-on connection using satellite dish to satellite
technologies used for developing machines to emulate orbiting earth
human qualities, such as learning, reasoning, - Send data at 56 – 500 Kbps; receive at 1.5 Mbps
communicating, seeing, and hearing. Much of AI is
based on the use of algorithms, formulas or sets of WI-FI & 3G, 4G/LTE, 5G
steps for solving particular problems. AI deals with Big - Name for a set of wireless standards set by IEEE
Data, data that is so large and complex that it cannot - Typically used with laptops that have Wi-Fi hardware
be processed using conventional methods - Wi-Fi (Wireless Fidelity/WLAN)
- 3G, 4G, 5G , Uses cellphones
INTERNET HISTORY - High-speed wireless that does not need access points
- Began with 1969’s ARPANET for US Dept. of Defense
- 62 computers in 1974 INTERNET ACCESS PROVIDERS
- 500 computers in 1983 Internet Service Providers (ISP)
- 28,000 computers in 1987 - Local, regional, or national organization that provides
- Early 1990s, multimedia became available on internet internet access
- Examples: AT&T Worldnet, EarthLink ( PLDT, Globe,
BANDWIDTH BayanTel, Converge)
- expression of how much data – text, voice, video and Commercial Online Service
so on – can be sent through a communications channel - A members-only company that provides specialized
in a given amount of time. content and internet access
- Examples: AOL, MSN
BASEBAND
- slow type of connection that allows only one signal to WIRELESS INTERNET SERVICE PROVIDERS
be transmitted at a time. - Internet Access for laptops, notebooks, smartphones,
PDA users
BROADBAND - These devices contain wireless modems
- high speed connection that allows several signals to - Examples: AT&T Wireless, Verizon Wireless, Earthlink
be transmitted at once Net Zero
How Does the Internet Work?
DATA TRANSMISSION SPEED - The internet consists of thousands of smaller
- Originally measured in bits per second (bps) networks
- 8 bits are needed to send one character, such as A - These link educational, commercial, nonprofit, and
- Currently measured in kilobits per second (Kbps) military organizations
- Kilo- stands for a thousand - Most are Client/Server networks
- A 28.8 Kbps modem sends 28,800 bits per second - Client: a computer requesting data or services
- Mbps connections send 1 million bits per second - Server or Host: a central computer supplying data or
(MEGA BITS) services requested of it
COMPUTER
POINT OF PRESENCE (POP) - Since addresses are limited, and most PCs are not
- A local access point to the internet connected a lot of the time, dynamic addresses are
- A local gateway to the ISP’s network common

NETWORK ACCESS POINT (NAP) BROWSERS


- A routing computer at a point on the internet where - Software for web-surfing
several connections come together - Examples: Internet Explorer, Netscape Navigator,
- Owned by Network Service Providers (NAP) Mozilla FireFox, Opera, Apple Macintosh browser
- Four major NAPs established in 1993 when the
internet was privatized WEBSITE
- Source of much internet congestion →→ PNAPS - The location on a particular computer that has a
- P= Private, S=System unique address
- Example: www.barnesandnoble.com, www.mcgraw-
PRIVATE/PEER NAPS (PNAP) hill.com
- Established in late 1990s - The website could be anywhere – not necessarily at
- Provide more backbone access locations than the company headquarters
original 4 NAPs in Chicago, Washington D.C., New
Jersey and San Francisco WEB PAGES
- >100 in U.S.A. at present - The documents and files on a company’s website
- Facilitate more efficient routing since there are more - Can include text, pictures, sound, and video
backbone access locations
HOME PAGE
Internet Backbone - The main entry point for the website
- High-capacity, high-speed data transmission lines - Contains links to other pages on the website
- Use the newest technology
- Providers include AT&T, Cable & Wireless, Sprint, UNIFORM RESOURCE LOCATOR (URL)
Teleglobe, UUNET - A character string that points to a specific piece of
information anywhere on the web
INTERNET 2 - A website’s unique address
- Cooperative university/business research project It consists of:
- New standards for large-scale higher-speed data - The web protocol, http
transmission - The domain name of the web server
- Requires state-of-the-art infrastructure - The directory or folder on that server
- The file within the directory, including optional
PROTOCOLS extension
- The set of rules a computer follows to electronically
transmit data. DOMAIN NAMES
- TCP/IP is the internet protocol - It must be unique
- Developed in 1978 - Identify the website, and the type of site it is
- Used for all internet transactions - www.whitehouse.gov is NOT the same as
PACKETS www.whitehouse.org
- Fixed-length blocks of data for transmission - .gov means government
- Data transmissions are broken up into packets - .org means professional or nonprofit organization

IP Addresses HTTP
- Every device connected to the internet has an address - The internet protocol used to access the World Wide
- Each IP address uniquely identifies that device Web
- The address is four sets of 3-digit numbers separated HTTPS
by periods The secure version of HTTP
- Example: 95.160.10.240 Hypertext Markup Language (HTML)
- Each number is between 0 and 255 ○ Static IP - The language used in writing and publishing web
addresses don’t change pages
- Dynamic IP addresses changes each time you connect - The set of tags used to specify document structure,
to the internet formatting, and links to other documents on the web
- Hypertext links connect one web document to
another
COMPUTER
NAVIGATION INSTANT MESSAGING
History Lists - Any user on a given email system can send a message
- A list of websites you visited since you opened up your and have it pop up instantly on the screen of anyone
browser for this session logged into that system
- Allows you to easily return to a particular site - Examples: AOL Instant Messenger, MSN Messenger,
Bookmarks ICQ, AT&T IM Anywhere, Yahoo Messenger
- Allows you to store the URL from a site on your PC so - Not all IM systems interoperate
you can find it again in another browser session - To get it, you:
- To save the URL for a site, click on “Bookmark” in - download the software
Internet Explorer or Mozilla Firefox - connect to the internet
- Or just type in the URL of the page you want to visit - register with the service

WEB PORTALS FTP – FILE TRANSFER PROTOCOL


- A gateway website that offers a broad array of - A software standard for transferring files between
resources and services, online shopping malls, email computers with different Operating Systems
support, community forums, stock quotes, travel info, - Microsoft Windows → Linux
and links to other categories. - Unix → Macintosh OS, and so forth
- Examples: Yahoo, AOL, Microsoft Network (MSN), - You can transfer files from an FTP site on the internet
Lycos, or Google to your PC
Most require you to log in, so you can - Know your FTP site!
- Check the home page for general information - If the FTP site is offering copyrighted material
- Use the subject guide to find a topic you want such as music and movies for free, you are
- Use a keyword to search for a breaking US law if you download files!
- You may also get a virus or spyware on your
SEARCH SERVICES PC from them
- Organizations that maintain databases accessible
through websites to help you find information on the INTERNET TELEPHONY
internet - Uses the internet to make phone calls
- Examples: Yahoo Search and MSN, and Google - Long-distance calls are either very inexpensive or free
- Databases are compiled using software programs - With no PC, dial a special phone number to
called spiders packetize your call
- Spiders crawl through the World Wide Web - With a PC that has a sound card, microphone,
- Follow links from one page to another Internet connection, and internet telephone
- Index the words on that site software such as Netscape Conference or
Microsoft NetMeeting
Email & Other Ways of Communicating over the Net - Currently inferior in quality to normal phone
EMAIL PROGRAM connections
- Enables you to send email by running email software - Also allows videoconferencing
on your computer that interacts with an email server
at your ISP MULTIMEDIA ON WEB
- Incoming mail is stored on the server in an electronic - Allows you to get images, sound, video, and animation
mailbox - May require a plug-in, player, or viewer
- Upon access, mail is sent to your client’s inbox - A program that adds a specific feature to a
- Examples: Netscape’s Mail, Apple Computer’s Apple browser so it can view certain files
Mail, QualComm’s Eudora - Example: Adobe Acrobat Reader, RealPlayer,
QuickTime
USING EMAIL MULTIMEDIA APPLETS
1. Get an email address, following the format - Small programs that can be quickly downloaded and
Joe_Black@earthlink.net.us run by most browsers
2. Type addresses carefully, including capitalization, - Java is the most common Applet language
underscores, and periods - Microsoft’s Visual Studio creates ActiveX and com
3. Use the reply command to avoid addressing mistakes objects
4. Use the address-book feature to store email
addresses
5. Sort your email into folders or use filters
COMPUTER
ANIMATION - When you sign up for something, don’t give your
- The rapid sequencing of still images to create the email address
appearance of motion - Use spam filters
- Used in video games and web images that seem to
move SPOOFING
-Using fake email sender names so the message
VIDEO appears to be from a different source, you will trust it.
- Streaming video is process of transferring data in a - If you don’t know the sender, don’t open it. Spoofing
continuous flow so you can begin viewing a file before
it is all completely sent PHISHING
Audio may be transmitted either: - Using trusted institutional names to elicit confidential
-Downloaded completely before the file can be played, information
- Downloaded as streaming audio - Some common schemes look like they are from your
bank or from eBay and ask you to “update” your
RSS NEWSREADERS account.
- Programs that scour the web and pull together - Don’t do it – the legitimate company already knows
“feeds” from several websites to one place your account information!
- If you want to update your information, CALL the
BLOG number in the phone book, not the number in the
- Short for web log, a diary-style web page email!
- Have become popular, both privately and in politics
PHARMING
PODCASTING - Redirecting you to an imposter web page.
- Recording internet radio or similar internet audio - Thieves implant malicious software on your PC
programs - Redirects you to an imposter web page even when
- Some radio stations webcast their audio programs you type the correct URL!
over the internet - To foil it, type the URL with https first (for http secure)

E-COMMERCE COOKIES
- Conducting business activities online - Little text files left on your hard disk by some websites
- B2B Commerce is business-to-business e-commerce you visit
- Online Finance now involves online banking, stock - Can include your log-in name, password, and browser
trading online, and e-money such as PayPal preferences
- Online auctions link buyers with sellers - Can be convenient
- eBay is the most well-known example of - But they can be used to gather information about you
person-to-person auctions and your browsing habits
- OnSale is a vendor-based auction that buys
merchandise and sells it at a discount SPYWARE
- Priceline is an auction site for airline tickets - Applications that download without your knowledge
and other items - They hide on your PC and capture information about
what is on the PC and what you are doing
SNOOPING - That information is then transmitted to the spyware
- Email is not private master’s website on the internet
- Corporate management has the right to view - Information may be used against you to steal your
employees’ email identity, get credit cards in your name, or for other
- Email that travels over the internet may be crimes
captured and monitored and read by someone - To prevent spyware, you must install and use
else “Antispyware software” at all times
- Not all ISPs protect their customers’ privacy - Examples: Ad Aware, AntiSpyware, Spybot Search &
Destroy, Pest Patrol, SpyCatcher, Yahoo toolbar with
SPAM: ELECTRONIC JUNK MAIL AntiSpy
- Unsolicited email that takes up your time and may - Be careful about free and illegal downloads since they
carry viruses or spyware are a source of spyware
- Delete it without opening the message - Don’t say “I agree” when you are downloading
- Never reply to a spam message something – read the fine print
- Beware of unsolicited downloads

You might also like