ICT In Everyday Use PDF
Document Details
Uploaded by Deleted User
Tags
Summary
This document provides a broad overview of information and communication technologies (ICT) in various aspects of daily life, including education, healthcare, economy, and social activities. It covers applications, components, and their impact on modern society.
Full Transcript
ICT IN EVERYDAY USE - Citizen Engagement Information and Communication - Security and Surveillance Technology (ICT) has revolutionized the Social Life and Culture world by transforming how we live, work, communic...
ICT IN EVERYDAY USE - Citizen Engagement Information and Communication - Security and Surveillance Technology (ICT) has revolutionized the Social Life and Culture world by transforming how we live, work, communicate, and interact. - Social Media Influence ICT is generally mean all devices, - Access to Entertainment networking components, applications and systems that combined allow people and - Digital Communities organizations (i.e., businesses, nonprofit - Virtual Reality and Augmented Reality agencies, governments and criminal enterprises) to interact in the digital world. Environment and Sustainability EDUCATION - Smart Cities and IoT - Access to Information - Environmental Monitoring - E-Learning and Remote Education - Green Technology - Personalized Learning - Disaster Management - Administrative Efficiency Science and Research Healthcare - Data Analysis and Simulations - Telemedicine and Remote Monitoring - Collaborative Research Platforms - Electronic Health Records (EHR) - Artificial Intelligence and Machine Learning - Health Information Systems - Open Access to Knowledge - Healthcare Innovation Transportation and Mobility Economy and Business - Smart Transportation Systems - E-Commerce and Digital Marketing - Ride-Sharing and Mobility Services - Remote Work and Collaboration - Autonomous Vehicles - Supply Chain Management - Logistics and Freight Management - Financial Agriculture Communication - Precision Farming - Instant Communication - Market Access - Collaboration Platforms - Agricultural Innovation - Global Connectivity - Sustainability Practices - Social Media Influence Other uses of ICT: Governance and Public Administration - Marketing - E-Government Services - Arts and Entertainment - Data-Driven Policy Making - Publishing - Banking - Navigation 4. Electronic - Weather Forecasting THE PRE- MECHANICAL AGE: 3000 - Military B.C. - 1450 A.D. Writing and Alphabets. The first humans INFORMATION TECHNOLOGY communicated only through speaking and INFORMATION TECHNOLOG Y picture drawings. In 3000 B.C., the DEFINED - describes any technology that Sumerians in Mesopotamia (what is today helps to produce, manipulate, store, southern Iraq) devised a writing system. communicate, and/or disseminate The system, called "cunieform" used information. signs corresponding to spoken sounds, - a contemporary term that describes the instead of pictures, to express words. combination of computer technology From this first information system — (Hardware and software) with writing — came civilization as we know it telecommunications technology (data, today. The Phoenicians around 2000 B.C. image, and voice networks.) further simplified writing by creating symbols that expressed single syllables COMPUTER TECHNOLOGY - A and consonants (the first true alphabet). computer is a programmable, multiuse The Greeks later adopted the Phoenician machine that accepts data—raw facts and alphabet and added vowels; the Romans figures —and processes, or manipulates, gave the letters Latin names to create the it into information we can use, such as alphabet we use today. summaries, totals, or reports. Paper and Pens. For the Sumerians, - Its purpose is to speed up problem input technology consisted of a pen-like solving and increase productivity. device called a stylus that could scratch A History of Information Technology marks in wet clay. About 2600 B.C., the and Systems Egyptians discovered that they could write on the papyrus plant, using hollow reeds Four basic periods, each characterized by or rushes to hold the first "ink" - pulverized a principal technology used to solve the carbon or ash mixed with lamp oil and input, processing, output and gelatin from boiled donkey skin. Other communication problems of the time: societies wrote on bark, leaves, or leather. 1. Pre-mechanical, The Chinese developed techniques for making paper from rags, on which modern 2. Mechanical, day papermaking is based, around 100 3. Electromechanical, and A.D Books and Libraries. Permanent Storage on wires. It continued to be an important Devices. Religious leaders in tool throughout the Middle Ages.. Mesopotamia kept the earliest "books"" a B. THE MECHANICAL AGE: 1450 – 1840 collection of rectangular clay tablets, 1. The First Information Explosion. inscribed with cuneiform and packaged in Johann Gutenberg in Mainz, Germany, labeled containers — in their personal invented the movable metal-type printing "libraries." The Egyptians kept scrolls - process in 1450 and sped up the process sheets of papyrus wrapped around a shaft of composing pages from weeks to a few of wood. Around 600 B.C., the Greeks minutes. The printing press made written began to fold sheets of papyrus vertically information much more accessible to the into leaves and bind them together. The general public by reducing the time and dictionary and encyclopedia made their cost that it took to reproduce written appearance about the same time. The material. The development of book Greeks are also credited with developing indexes (alphabetically sorted lists of the first truly public libraries around 500 topics and names) and the widespread B.C. use of page numbers also made The First Numbering Systems. The information retrieval a much easier task. Egyptians struggled with a system that These new techniques of organizing depicted the numbers 1-9 as vertical lines, information would become valuable later the number 10 as a U or circle, the in the development of files and databases. number 100 as a coiled rope, and the 2. Math by Machine. The first general number 1,000 as a lotus blossom. The first purpose "computers" were actually people numbering systems similar to those in use who held the job title "computer: one who today were invented between 100 and 200 works with numbers." Difficulties in human A.D. by Hindus in India who created a errors were slowing scientists and nine-digit numbering system. Around 875 mathematicians in their pursuit of greater A.D., the concept of zero was developed. knowledge. It was through the Arab traders that 3. Slide Rules, the Pascaline and today's numbering system — 9 digits plus Leibniz’s Machine. a 0 — made its way to Europe sometime in the 12th century. a. Slide Rule. In the early 1600s, William Oughtred, an English clergyman, invented The First Calculators. The existence of a the slide rule, a device that allowed the counting tool called the abacus, one of the user to multiply and divide by sliding two very first information processors, permitted pieces of precisely machines and scribed people to "store" numbers temporarily and wood against each other. The slide rule is to perform calculations using beads strung an early example of an analog computer never able to actually build it because of — an instrument that measures instead of difficulties in obtaining funds, but he did counts. create and leave behind detailed plans.. b. The Analytical Engine. Designed b. Pascaline. Blaise Pascal, later to during the 1830s by Babbage, the become a famous French mathematician, Analytical Engine had parts remarkably built one of the first mechanical computing similar to modern-day computers. For machines as a teenage, around 1642. It instance, the Analytical Engine was to was called a Pascaline, and it used a have a part called the "store," which would series of wheels and cogs to add and hold the numbers that had been inputted subtract numbers. and the quantities that resulted after they c. Leibniz's Machine. Gottfried von had been manipulated. It was also to have Leibniz, an important German a part called the "mill" - an area in which mathematician and philosopher (he the numbers were actually manipulated. independently invented calculus at the Babbage also planned to use punch cards same time as Newton) was able to to direct the operations performed by the improve on Pascal's machine in the 1670s machine — an idea he picked up from by adding additional components that seeing the results that a French weaver made multiplication and division easier. named Joseph Jacquard had achieved 4. Babbage's Engines using punched cards to automatically control the patterns that would be woven a. The Difference Engine. An eccentric into cloth by a loom. English mathematician named Charles Babbage, frustrated by mistakes, set his c. Augusta Ada Byron. She helped mind to creating a machine that could both Babbage design the instructions that calculate numbers and print the results. In would be given to the machine on punch the 1820s, he was able to produce a cards (for which she has been called the working model of his first attempt, which "first programmer") and to describe, he called the Difference Engine (the name analyze, and publicize his ideas. Babbage was based on a method of solving eventually was forced to abandon his mathematical equations called the hopes of building the Analytical Engine, "method of differences"). Made of toothed once again because of a failure to find wheels and shafts turned by a hand crank, funding the machine could do computations and C. THE ELECTRO-MECHANICAL AGE: create charts showing the squares and 1840 – 1940 cubes of numbers. He had plans for a more complex Difference Engine but was 1. The Beginnings of events led to the invention of the radio by Telecommunication. Marconi in 1894. Technologies that form the basis for 2. Electromechanical Computing modern-day telecommunication systems a. Herman Hollerith and IBM. By 1890, include: Herman Hollerith, a young man with a a. Voltaic Battery. The discovery of a degree in mining engineering who worked reliable method of creating and storing in the Census Office in Washington, D.C., electricity (with a voltaic battery) at the end had perfected a machine that could of the 18th century made possible a whole automatically sort census cards into a new method of communicating number of categories using electrical information. sensing devices to "read" the punched holes in each card and thus count the b. Telegraph. The telegraph, the first millions of census cards and categorize major invention to use electricity for the population into relevant groups. The communication purposes, made it possible company that he founded to manufacture to transmit information over great and sell it eventually developed into the distances with great speed. International Business Machines c. Morse Code. The usefulness of the Corporation (IBM) telegraph was further enhanced by the b. Mark 1. Howard Aiken, a Ph.D. student development of Morse Code in 1835 by at Harvard University, decided to try to Samuel Morse, an American from combine Hollerith’s punched card Poughkeepsie, New York. Morse devised technology with Babbage's dreams of a a system that broke down information (in general purpose, "programmable" this case, the alphabet) into bits (dots and computing machine. With funding from dashes) that could then be transformed IBM, he built a machine known as the into electrical impulses and transmitted Mark I, which used paper tape to supply over a wire (just as today’s digital instructions(programs) to the machine for technologies break down information into manipulating data (input on paper punch zeros and ones). cards), counters to store numbers, and d. Telephone and Radio. Alexander electromechanical relays to help register Graham Bell invented the telephone in results. 1876. This was followed by the discovery D. ELECTRONIC AGE 1940 - PRESENT that electrical waves travel through space First Tries. In the early 1940s, scientists and can produce an effect far from the around the world began to realize that point at which they originated. These two electronic vacuum tubes, like the type used to create early radios, could be used The First General-Purpose Computer to replace electromechanical parts. for Commercial Use. Eckert and Mauchly began the development of a computer Eckert and Mauchly. called UNIVAC (Universal Automatic The First High-Speed, General-Purpose Computer), which they hoped would be Computer Using Vacuum Tubes, the the world's first general-purpose computer ENIAC. John Mauchly, a physicist, and J. for commercial use, but they ran out of Prosper Eckert, an electrical engineer, at money and sold their company to the Moore School of Electrical Engineering Remington Rand. A machine called LEO at the University of Pennsylvania, funded (Lyons Electronic Office) went into action by the U.S. Army, developed the a few months before UNIVAC and became Electronic Numerical Integrator and the world's first commercial computer. Computer (ENIAC) in 1946. It could add, The Four Generations of Digital subtract, multiply and divide in Computing. milliseconds and calculate the trajectory of an artillery round in about 20 seconds. 1. The First Generation (1951-1958) The First Stored-Program Computer. A 2. The Second Generation (1959-1963) problem with the ENIAC was that the machine had no means of storing program 3. The Third Generation (1964-1979) instructions in its memory - to change the 4. The Fourth Generation (1979- Present) instructions, the machine would literally 1. The First Generation (1951-1958) The have to be rewired. Mauchly and Eckert first generation of computers used vacuum began to design the EDVAC - the tubes as their main logic elements; Electronic Discreet Variable Computer –to punched cards to input and externally address this problem. John von Neumann store data; and rotating magnetic drums joined the team as a consultant and for internal storage of data in programs produced an influential report in June written in machine language (instructions 1945 synthesizing and expanding on written as a string of 0s and 1s) or Eckert and Mauchly's ideas, which assembly language (a language that resulted in von Neumann being credited allowed the programmer to write as the originator of the stored program instructions in a kind of shorthand that concept. Maurice Wilkes, a British scientist would then be "translated" by another at Cambridge University, completed the program called a compiler into machine EDSAC (Electronic Delay Storage language). Automatic Calculator) two years before EDVAC was finished, thereby taking the 1. The Second Generation (1959-1963) claim of the first stored-program computer. AT&T's Bell Laboratories, in the 1940s, discovered that a class of crystalline 1. The Fourth Generation (1979- mineral materials called semiconductors Present). could be used in the design of a device The fourth generation of computers used called a transistor to replace vacuum large-scale and very large-scale integrated tubes. Magnetic cores (very small donut- circuits (LSIs and VLSICs), containing shaped magnets that could be polarized in hundreds of thousands to over a million one of two directions to represent data) transistors on a single, tiny chip, and strung on wire within the computer microprocessors that contained memory, became the primary internal storage logic, and control circuits (an entire CPU) technology. Magnetic tape and disks on a single chip. Microprocessors and began to replace punched cards as VLSICs helped fuel a continuing trend external storage devices. High-level toward microminiaturization where programming languages (program semiconductor memories increased instructions that could be written with memory size and speed at every simple words and mathematical decreasing price. Personal computers, like expressions), like FORTRAN and COBOL, the Apple and IBM PC, were introduced made computers more accessible to and quickly became popular for both scientists and businesses. business and personal use. Fourth 1. The Third Generation (1964-1979). generation language software products Individual transistors were replaced by such as Access, Lotus 1-2-3, Word for integrated circuits — thousands of tiny Windows, and many others allowed transistors etched on a small silicon chip. persons without any technical background Magnetic core memories began to give to use a computer. The Four Generations way to a new form, metal oxide of Digital Computing. semiconductor memory (MOS), which, like HISTORY OF COMPUTER integrated circuits, used silicon- backed chips. Increased memory capacity and Earliest Computers. Originally processing power made possible the calculations were computed by humans, development of operating systems — whose job title was computers. The special programs that help the various calculations of this period were specialized elements of the computer to work together and expensive, requiring years of training to process information. Programming in mathematics. languages like BASIC were developed, The first use of the word "computer" was making programming easier to do. The recorded in 1613, referring to a person Four Generations of Digital Computing. who carried out calculations, or computations, and the word continued to be used in that sense until the middle of in 1881. It is an automatic loom controlled the 20th century. by punched cards. A tally stick was an ancient memory aid Arithmometer. A mechanical calculator device to record and document numbers, invented by Thomas de Colmar in 1820. quantities, or even messages. The first reliable, useful and commercially successful calculating machine. The An abacus is a mechanical device used machine could perform the four basic to aid an individual in performing mathematic functions. The first mass- mathematical calculations. The abacus produced calculating machine. was invented in Babylonia in 2400 B.C. The abacus in the form we are most Difference Engine and Analytical familiar with was first used in China in Engine. around 500 B.C. It used to perform basic It an automatic, mechanical calculator arithmetic operations designed to tabulate polynomial functions. Napier’s Bones. Invented by John Napier Invented by Charles Babbage in 1822 and in 1614. Allowed the operator to multiply, 1834. It is the first mechanical computer. divide and calculate square and cube First Computer Programmer. roots by moving the rods around and In 1840, Augusta Ada Byron suggests to placing them in specially constructed Babbage that he use the binary system. boards. She writes programs for the Analytical Slide Rule. Invented by William Oughtred Engine. in 1622. Is based on Napier's ideas about Scheutzian Calculation Engine logarithms. Used primarily for – multiplication – division – roots – Invented by Per Georg Scheutz in 1843. logarithms – Trigonometry. Not normally Based on Charles Babbage's difference used for addition or subtraction. engine. Tabulating Machine. Invented by Herman Hollerith in 1890. To assist in Pascaline. Invented by Blaise Pascal in summarizing information and accounting. 1642. It was its limitation to addition and Harvard Mark 1. Also known as IBM subtraction. It is too expensive Automatic Sequence Controlled Calculator Stepped Reckoner invented by Gottfried (ASCC). Invented by Howard H. Aiken in Wilhelm Leibniz in 1672. The machine that 1943. The first electro-mechanical can add, subtract, multiply and divide computer. automatically. Z1. The first programmable computer. The Jacquard loom is a mechanical Created by Konrad Zuse in Germany from loom, invented by Joseph-Marie Jacquard 1936 to 1938. To program the Z1 required that the user insert punch tape into a information. This information can be in punch tape reader and all output was also different formats, including text, images, generated through punch tape. audio and video. Atanasoff-Berry Computer (ABC). It was Who is the brightest mind behind the the first electronic digital computing WWW? device. Invented by Professor John Tim Berners-Lee – A British Physicist of Atanasoff and graduate student Clifford Geneva based CERN – a European Berry at Iowa State University between Organization of Nuclear Research – 1939 and 1942. together with his colleagues. In 1990, Tim ENIAC Berners-Lee made the transport protocol (http) as well as HTML (program language ENIAC stands for Electronic Numerical for website to display correctly using a Integrator and Computer. It was the first browser). He also invented the first electronic general-purpose computer. browser, Mosaic. Completed in 1946. It was developed by John Presper Eckert and John Mauchly. Berners-Lee committed to make the world EDVAC. EDVAC stands for Electronic wide web free as he sent the code to the Discrete Variable Automatic Computer. world free from royalties and fees because The First Stored Program Computer. he believed it's the only way it could thrive. Designed by Von Neumann in 1952. It has However, years have passed, the world a memory to hold both a stored program wide web have been the avenue for as well as data. various malicious acts that disgusted. Tim Osborne 1 – the first portable computer. Berners-Lee and vouched to correct it. Released in 1981 by the Osborne The Web 1.0 (Static Web) Computer Corporation. Earliest version of web to which pages are Frontier Supercomputer. The world’s for reading only with limited interactivity. fastest computer Static Pages The World Wide Web World Wide Web also known as the web, WWW or W3 -- Limited Interactivity refers to all the public websites or pages Content-Driven that users can access on their local Centralized Hosting computers and other devices through the internet. World Wide Web These pages Use of GIFs and Basic Text and documents are interconnected by Advantages means of hyperlinks that users click on for Simplicity Is a vision of the future internet that emphasizes data-driven, decentralized, Stability and intelligent web technologies. Low Bandwidth Requirements Decentralization Disadvantages Semantic Web Limited Interaction: Artificial Intelligence (AI) No User-Generated Content Interoperability Lack of Personalization Tokenized Economy The Web 2.0 (Social Web) Advantages More dynamic and interactive web, allowing users to engage and contribute User Control of Data content. Personalization and Intelligence - Interactivity Security and Privacy - User-Generated Content Trustless Systems Disadvantages - Rich User Experiences Complexity - Social Networking Scalability Issues Advantages Energy Consumption User Participation Regulation and Legal Issues Community Building NETIQUETTE AND THE COMPUTER Dynamic Content ETHICS Improved Collaboration Does social norms and ethical standards in real world applies even in digital world? Disadvantages Privacy Concerns Netiquette Monopolization by Big Tech the forms of required by good breeding Misinformation and Cyberbullying or prescribed by authority to be required in Data Monetization social or official life. The Web 3.0 (Semantic Web) netiquette is a set of rules for behaving properly online. The word comes from Network etiquette. is concerned with the "proper" way to communicate in an online environment. Republic Act No. 10173 Data Privacy Important words to remember Act of 2012 The Golden Rule an act protecting individual personal information. Avoid slang, acronym or text talk COMMON FORMS OF CYBERCRIMES: Avoid "screaming" in text messages a. Copyright Proofread your messages before Copyright Infringement sending them b. Plagiarism Exercise good judgement when sharing information with others c. Computer Addiction Respect diversity in viewpoints Offline/Online: CyberCrimes Virtual Self Criminal Activities What is Cyber? a. Hacking It is anything that is related to computers, Unauthorized access of or interference information technology and virtual reality with computer systems, servers, or other CyberCrime information and communication systems. defined as a crime in which a computer corrupt, alter, steal, or destroy electronic is the object of the crime (hacking, data using computers or other information phishing, spamming and child and communication systems without the pornography) is used as a tool to commit computer or system owner’s knowledge an offense. Cybercriminals may use and consent. computer technology to access personal penalty is between 12-20 years reclusion information, business trade secrets or use temporal 6-12years of imprisonment also the internet for exploitative or malicious known as prison mayor. purposes. b. Computer-related forgery, fraud and/or Republic Act No. 10175 Cybercrime identity theft Prevention Act of 2012 An attempt to obtain sensitive a law in the Philippines approved on information such as usernames, September 12,2012 which aims to passwords, and credit card details and address legal issues concerning online (indirectly money), often for malicious interactions and internet. reasons. Phishing Pharming / Spam Penalty at least Php 200,000 and or prison mayor Maximum of Php 200,000 fine or prison mayor f. Child Pornography - Is a form of child sexual exploitation. - Unlawful or c. Electronic theft prohibited acts defined and punishable by Illegal Downloading Republic Act No. 9775 or the Anti- Child Obtaining files that you do not have the Pornography Act of 2009, committed right to use from the internet. through a computer system. Digital Piracy - Penalty of 12-20 years of imprisonment or reclusion temporal Practice of illegally copying and selling digital music, video, computer software, g. Cyber Defamation - Is an unprivileged etc. false statement of fact which tends to harm the reputation of a person or Copyright Infringement company. Penalty of Php 50,000 – 500, 000 and or - Penalty of 6-12 years of imprisonment or prison mayor prison mayor. d. Cyberbullying INTERNET THREATS The use of electronic communication to Hacking is a term used to describe actions bully a person, typically by sending a taken by someone to gain unauthorized message of an intimidating or threatening access to a computer. nature. What it can do The Anti-Bullying Act of 2013 (RA 10627) - Find weaknesses (or pre-existing bugs) in your security settings and exploit them e. Cybersex in order to access your information. Willful engagement, maintenance, - Install a Trojan horse, providing a back control, or operation, directly or indirectly door for hackers to enter and search for of any lascivious exhibition of sexual your information. organs or sexual activity with the aid of a computer system for favor or Malware is one of the more common ways consideration. to infiltrate or damage your computer. What it can do There is a discussion on this matter if it involves “couples” or “people in - Intimidate you with scareware, which is relationship” who engage in cybersex. usually a pop-up message that tells you your computer has a security problem or intimidating, to encourage you to take other false information. action. - Reformat the hard drive of your computer Ransomware is a type of malware that causing you to lose all your information. restricts access to your computer or your files and displays a message that - Alter or delete files. Steal sensitive demands payment in order for the information. Send emails on your behalf. restriction to be removed. - Take control of your computer and all the What it can do - Ransomware will display software running on it. a notification stating that your computer or Pharming is a common type of online data have been locked and demanding a fraud. A means to point you to a malicious payment be made for you to regain and illegitimate website by redirecting the access. Sometimes the notification states legitimate URL. Even if the URL is entered that authorities have detected illegal correctly, it can still be redirected to a fake activity on your computer, and that the website. payment is a fine to avoid prosecution. What it can do - 2 types: Lockscreen and Encryption - Convince you that the site is real and Spam is one of the more common legitimate by spoofing or looking almost methods of both sending information out identical to the actual site down to the and collecting it from unsuspecting people. smallest details. You may enter your What it can do personal information and unknowingly give - Annoy you with unwanted junk mail. it to someone with malicious intent. - Create a burden for communications Phishing is used most often by cyber service providers and businesses to filter criminals because it's easy to execute and electronic messages. can produce the results they're looking for - Phish for your information by tricking you with very little effort. Fake emails, text into following links or entering details with messages and websites created to look toogood- to-be-true offers and like they're from authentic companies. This promotions. is also known as “spoofing”. - Provide a vehicle for malware, scams, What it can do fraud and threats to your privacy. - Trick you into giving them information by Spyware and adware are Software that asking you to update, validate or confirm collects personal information about you your account. It is often presented in a without you knowing. These are difficult to manner than seems official and remove and can infect your computer with download with the intent of infecting your virus. computer, as well as the computers of everyone in your contact list. What it can do What it can do - Collect information about you without you knowing about it and give it to third - All imaginable harm to your parties. computer/device, files and drives that can even extend to contact lists from your - Send your usernames, passwords, emails. surfing habits, list of applications you've downloaded, settings, and even the How will you know if your computer is version of your operating system to third infected? parties. - It takes longer than usual for your - Change the way your computer runs computer to start up, it restarts on its own without your knowledge. or doesn't start up at all. - Take you to unwanted sites or inundate - It takes a long time to launch a program. you with uncontrollable pop-up ads. - Files and data have disappeared. Trojan Horses. A malicious program that - Your system and programs crash is disguised as, or embedded within, constantly. legitimate software. - The homepage you set on your web What it can do browser is different (note that this could be caused by Adware that has been installed - Delete your files. on your computer). - Use your computer to hack other - Web pages are slow to load. computers. - Your computer screen looks distorted. - Watch you through your web cam. - Programs are running without your - Log your keystrokes (such as a credit control. card number you entered in an online purchase). - If you suspect a problem, make sure your security software is up to date and - Record usernames, passwords and other run it to check for infection. If nothing is personal information. found, or if you are unsure of what to do, Viruses. seek technical help. Malicious computer programs that are Worms are a common threat to often sent as an email attachment or a computers and the Internet as a whole. - goes to work on its own without attaching The microprocessor was designed by a itself to files or programs. team consisting of Italian engineer Federico Faggin, American engineers - It lives in your computer memory, doesn't Marcian Hoff and Stanley Mazor, and damage or alter the hard drive and Japanese engineer Masatoshi Shima. propagates by sending itself to other computers in a network whether within a What is 5G? company or the Internet itself. 5G is the 5th generation mobile network. It What it can do is a new global wireless standard after 1G, 2G, 3G, and 4G networks. 5G enables a - Cause a tremendous amount of damage new kind of network that is designed to by shutting down parts of the Internet, connect virtually everyone and everything wreaking havoc on an internal network together including machines, objects, and and costing companies’ enormous devices. amounts of lost revenue. WiFi 5G wireless technology is meant to deliver eavesdropping is another method used by higher multi-Gbps peak data speeds, ultra cyber criminals to capture personal low latency, more reliability, massive information. Virtual “listening in” on network capacity, increased availability, information that's shared over an and a more uniform user experience to unsecure (not encrypted) WiFi network. more users. Higher performance and What it can do improved efficiency empower new user - Potentially access your computer with experiences and connects new industries. the right equipment. - Steal your personal information including logins and passwords. What is cloud computing? Cloud computing is the on-demand access of computing resources—physical servers or virtual servers, data storage, networking capabilities, application development tools, software, AI-powered analytic tools and more—over the internet with pay-per- use pricing. Intel 4004 (1971)