GEC ELEC 1: Living in the IT Era - Lesson 1 - PDF

Summary

This document details the history of information and communication technology (ICT). It covers the impact of ICT on society, including communication, job opportunities, education, and socializing. It touches on the positive and negative aspects of ICT.

Full Transcript

GEC ELEC 1: LIVING IN THE opportunities to empower healthcare experts easier. IT ERA themselves in a variety of 4. Government ways. Computers help our Lesson 1: Introductio...

GEC ELEC 1: LIVING IN THE opportunities to empower healthcare experts easier. IT ERA themselves in a variety of 4. Government ways. Computers help our Lesson 1: Introduction to government in improving Information and Impact of ICT in the their services for the Communication Technology Society people. It can aid in planning, law enforcement, History of ICT Positive impacts traffic, and tourism. - ICT, or information and Increased access to 5. Arts, Entertainment communications information and Leisure technology (or Improved access to Computers can be used to technologies), is the education (ex. Distance create drawings, graphic organization and Learning and online designs, and paintings. mechanisms that tutorials) They can be used to edit, enable modern New Tools, New copy, send, and print computing. Opportunities photographs. They can be - Although there is no Cost saving used by writers to create single, universal Communication and edit. definition of ICT, the Improved Information 6. Communication term is generally Management Computers have made accepted to mean all Solved and Reduced real-time communication devices, networking Security Problems over the internet easy. It components, Wider People Participation became faster and more applications and Creation of New Job convenient to interact with systems that Opportunities each other despite the combined allow people distance. and organizations. Negative impacts 7. Banking and Finance Job Loss Most banking in advanced Uses of ICT In our Daily Reduced Personal countries now takes place Lives Interaction online. You can use Reduced Physical Activity computers to check your 1. Communication Cost is very expensive account balance, transfer - Information money, or pay off credit communication technology Lesson 2: History of cards. provides the society with Computer: Basic 8. Transport and new communication Computing Periods Navigation capabilities. ICT has had With the help of computers, mainly a positive effect on Applications of we had our GPS the way we communicate, Computers in our Daily Technology to help us in as it has made it easier. Lives our transportation. In 2. Job Opportunities addition, Grab services are - ICT enables organizations 1. Business very famous today to help to operate more efficiently, Business today usually our commuters every day. so employing staff with ICT uses and runs with the help 9. Working from Home skills is vital to the smooth of computers to store Workers can access running of any business. specific kinds of records, necessary data, Nowadays, finding a job is manage stocks and communicate, and share different, you can just use inventories, create information without your smart phone, laptop, presentations and a lot commuting to a traditional desktop or any gadgets more tasks. office. Managers are able that is available in the 2. Education to monitor workers' comfort of your home. Computers are very much productivity remotely. 3. Education needed in today's 10. Robotics - Information and education. Knowing how Robotics is an expanding Communications we are in the middle of the area of technology which Technology (ICT) can pandemic, computers combines computers with impact student learning aided our education very science and engineering to when teachers are digitally much by the use of different produce machines that can literate and understand platforms available. either replace humans, or how to integrate it into 3. Healthcare do specific jobs that curriculum. Computers help healthcare humans are unable to do. 4. Socializing professionals to store - Social media has important data as well as to History of Computer: changed the world. The aid in the diagnoses of Basic Computing Periods internet and social media patients. It also can control provide young people with different equipment to The first use of the a range of benefits, and make the job of our word "computer" was recorded in 1613, invented by Thomas de P. ENIAC referring to a person Colmar in 1820, ENIAC stands for who carried out The first reliable, useful Electronic Numerical calculations, or and commercially Integrator and Computer. computations, and the successful calculating It was the first electronic word continued to be machine. general-purpose computer used in that sense until I. Difference Engine and Q. UNIVAC 1 the middle of the 20th Analytical Engine The UNIVAC I (UNIVersal century. It an automatic, Automatic Computer 1) mechanical calculator was the first commercial A. Tally sticks designed to tabulate computer. A tally stick was an ancient polynomial functions. Designed by John memory aid device to Invented by Charles Presper Eckert and John record and document Babbage in 1822 and 1834 Mauchly. numbers, quantities, It is the first mechanical R. EDVAC or even messages. computer. EDVAC stands for B. Abacus J. First Computer Electronic Discrete An abacus is a mechanical Programmer Variable Automatic device used to aid an In 1840, Augusta Ada Computer individual in performing Byron suggests to The First Stored Program mathematical calculations. Babbage that he use the Computer It used to perform basic binary system. Designed by Von arithmetic operations. She writes programs for Neumann in 1952. C. Napier’s Bones the Analytical Engine. It has a memory to hold Invented by John Napier K. Scheutzian both a stored program as in 1614. Calculation Engine well as data Allowed the operator to Invented by Per Georg S. The First Portable multiply, divide and Scheutz in 1843. Computer calculate square and cube Based on Charles Osborne 1 – the first roots by moving the rods Babbage's difference portable computer. around and placing them in engine Released in 1981 by the specially constructed The first printing calculator. Osborne Computer boards. L. Tabulating Machine Corporation. D. Slide Rule Invented by Herman T. The First Computer Invented by William Hollerith in 1890. Company Oughtred in 1622. To assist in summarizing The first computer Is based on Napier's ideas information and company was the about logarithms. accounting. Electronic Controls Used primarily for – M. Harvard Mark 1 Company. multiplication – division – Also known as IBM Founded in 1949 by John roots – logarithms – Automatic Sequence Presper Eckert and John Trigonometry Controlled Calculator Mauchly. Not normally used for (ASCC). addition or subtraction. Invented by Howard H. Lesson 3: The Web and E. Pascaline Aiken in 1943 the Internet Invented by Blaise Pascal The first electro- in 1642. mechanical computer Web or World Wide Web It was its limitation to N. Z1 The Web or World addition and subtraction. The first programmable Wide Web is an It is too expensive. computer information system F. Stepped Reckoner To program the Z1 where documents and Invented by Gottfried required that the user insert other resources are Wilhelm Leibniz in 1672. punch tape into a punch present. The world The machine that can tape reader wide web is larger add, subtract, multiply and and all output was also collection of divide automatically. generated through punch interconnected G. Jacquard Loom tape. documents or content. The Jacquard loom is a O. Atanasoff-Berry It contains hypertext mechanical loom, invented Computer (ABC) links, or highlighted by Joseph-Marie Jacquard It was the first electronic keywords and images in digital computing device. that lead to related 1881. Invented by Professor information. A It is an automatic loom John Atanasoff and collection of linked controlled by punched graduate student Clifford Web pages that has a cards. Berry at Iowa common theme or H. Arithmometer State University between focus is called a Web A mechanical calculator 1939 and 1942. site. A. Web 1.0 (Read Only Mail Server– is an application The Netiquette and the Static Web) 1989 that receives incoming e-mail Computer Ethics It is an old internet that from local users and only allows people to remote senders and What is Netiquette? read from the internet. forward outgoing e-mail for Netiquette, or network etiquette, It is mostly composed delivery is concerned with the "proper" of web pages joined by File Server– is a computer way to communicate in an hyperlinks, without responsible for central storage online environment. Consider visuals, controls and and management of data files the following "rules," adapted forms. It is called as so that other computer on the from Virginia Shea's the Core "read-only" web since same network can access them. Rules of Netiquette, whenever it is not interactive in Policy Server– is a security you communicate in the virtual any sense. component of a policy – based world. network that provides B. Web 2 (Read-write authorization services and REMEMBER THE GOLDEN interactive web) 2004 facilities tracking and control of RULE- Make a good impression A term used to files. - treat others with the same describe a new respect that you would like to generation of Web 2. IP Address (Internet receive and avoid services and Protocol) – is a numerical label confrontational or offensive applications with an assigned to each device. This language. increasing emphasis provides identity to a network on human device. AVOID SLANG, ACRONYMS, collaboration. It has AND TEXT TALK – much potential. It 3. Browser – is an application Communicating effectively in focused to collaborate program that provides a way to college and business and share information look information on the web. environments requires the use online via social Examples: google chrome, of correct terminology, spelling, media, blogging and safari, internet explorer, opera, and grammar that can easily be web-based mozilla understood. For example, use communities. “your” instead of “ur”. 4. Domain Name System C. Web 3.0: (Read-write (DNS) – is the phonebook of AVOID “SCREAMING” IN intelligent web) 2014 internet. We access information TYPED MESSAGES – Typing Web 3.0 will be more online through domain names. an entire message using all connected, open, and capital letters is known as intelligent, with 5. Internet Service Provide “screaming”. It is distracting and semantic web (ISP) – is an organization that generally frowned upon in technologies, provides services for accessing, professional environments. distributed databases, using or participating in the natural language internet. PROOFREAD YOUR processing, machine MESSAGES BEFORE learning, machine - Hence, we can say SENDING THEM – reasoning and that the web are pages Proofreading your messages autonomous agents. you explore on your before you send them is a best computers and practice for effective and Major Components of the devices. On the other efficient communication. Internet hand, the internet is the network of EXERCISE GOOD 1. Servers - is a computer computer that are JUDGMENT WHEN SHARING program that provides service to connected to each INFORMATION WITH another computer program and other to share and link OTHERS it’s user. information. ONLINE – E-mail and chat Types of Servers messages that you send or Application Server– a receive are considered private program in computer that and should not be forwarded or provides the business logic for copied to others without gaining an application program. the consent of all involved Web Server– a computer participants. program that serves requested HTML pages or files. To protect your privacy and Proxy Server– is a software safety, do not share online any that acts as an intermediary sensitive personal information between an endpoint device, such as: such as computer - Your home address or phone and another server from which a number user is requesting. - Personal conversations - Social plans, such as text or superfluous graphics or - Republic Act No. 10175 vacations attachments that may take Cybercrime Prevention Act of - Financial information forever to download. 2012 is a law in the Philippines - Usernames, passwords, or Rule 5: Make yourself look approved on September hints good online writing. One of 12,2012 which aims to address - Anything personal that you the best things about the virtual legal issues concerning online would not want shared by world is the lack of judgment interactions and internet. others over the Internet. associated with your physical - Republic Act No. 10173 Data appearance, sound of your Privacy Act of 2012 is an act If the material you share with voice, or the clothes you wear. protecting individual personal others online came from Always check for spelling and information. another source, make every grammar errors Know what effort to gain permission from you're talking about and state it COMMON FORMS OF the original author or copyright clearly Be pleasant and polite CYBERCRIMES: holder. Copying someone else's Rule 6: Share expert work and passing it off as your knowledge. The Internet offers a. Copyright. The exclusive own is plagiarism. It damages its users many benefits; one is legal right, given to an originator your reputation and could the ease in which information or an assignee to print, publish, subject you to serious academic can be shared or accessed and perform, film, or record literary, and legal consequences. in fact, this "information sharing" artistic, or musical material, and capability is one of the reasons to authorize others to do the RESPECT DIVERSITY IN the Internet was founded. same. VIEWPOINTS - Be constructive Rule 7: Help keep flame wars b. Plagiarism. An act or and respectful when sharing under control. What is meant instance of using or closely opinions, beliefs, and criticisms, by "flaming" and "flame wars?" imitating the language and or responding to those of others "Flaming is what people do thoughts of another author in the conversation. when they express a strongly without authorization. held opinion without holding c. Computer Addiction Ten Commandments of back any emotion." (Shea, Offline: generally used when Computer Ethics 1994). speaking about excessive Rule 8: Respect other gaming behavior, which can be Rule 1: Remember the Human people's privacy. Depending practiced both offline and When communicating on what you are reading in the online. electronically, whether virtual world, be it an online Online: Also known as through email, instant class discussion forum, “Internet Addiction”, gets more message, discussion post, Facebook page, or an email, attention in general from text, or some other method, you may be exposed to some scientific research than offline practice the Golden Rule: Do private or personal information computer addiction, mainly unto others as you would that needs to be handled with because most cases of have others do unto you. care. computer addiction are related Remember, your written words Rule 9: Don't abuse your to the excessive use of the are read by real people, all power. Just like in face-to-face Internet. deserving of respectful situations, there are people in communication. cyberspace who have more CRIMINAL ACTIVITIES Rule 2: Adhere to the same "power" than others. standards of behavior online Rule 10: Be forgiving of other that you follow in real life. people's mistakes. Not a. Hacking- Unauthorized While it can be argued that everyone has the same amount access to corrupt, alter, steal, or standards of behavior may be of experience working in the destroy electronic data using different in the virtual world, virtual world. And not everyone computers or other information they certainly should not be knows the rules of netiquette. j) and communication systems lower. Rule 10: Be forgiving of other without the computer or system Rule 3: Know where you are people's mistakes. Not owner’s knowledge and in cyberspace. "Netiquette everyone has the same amount consent. varies from domain to domain." of experience working in the - Six years up to twelve years of (Shea, 1994) Depending on virtual world. And not everyone imprisonment also known as where you are in the virtual knows the rules of netiquette. prison mayor. world, the same written b. Computer-related forgery, communication can be Cybercrimes fraud and/or identity theft- An acceptable in one area, where it attempt to obtain sensitive might be considered Cybercrime is defined as a information such as usernames, inappropriate in another. crime in which a computer is the passwords, and credit card Rule 4: Respect other object of the crime (hacking, details and (indirectly money), people's time and bandwidth. phishing, spamming and child often for malicious reasons. Make your written pornography) is used as a tool - Maximum of Php 200,000 fine communication meaningful and to commit an offense. or prison mayor to the point, without extraneous c. Electronic theft sent by criminals to steal Information age, is a period - Illegal Downloading personal and financial when the computer and internet - Obtaining files that you do not information from you. This is were introduced. have the right to use from the also known as “spoofing”. These technologies enabled internet. Ransomware is a type of people to communicate - Penalty of Php 50,000 – 500, malware that restricts access to information easily and rapidly. 000 and or prison mayor your computer or your files and Digital Technology became d. Cyberbullying- The use of displays a message that prevalent and widely used electronic communication to demands payment in order for around the world. Information bully a person, typically by the restriction to be removed. can be accessed easily sending a message of an Spam- is one of the more specially with the use of the intimidating or threatening common methods of both internet. nature. sending information out and e. Cybersex- Willful collecting it from unsuspecting The ICT and its role in Social engagement, maintenance, people. Change control, or operation, directly or Spyware and adware- are indirectly of any lascivious often used by third parties to Information and exhibition of sexual organs or infiltrate your computer. Communications Technology sexual activity with the aid of a Trojan horse- may not be a (ICT) has the power to computer system for favor or term you're familiar with, but transform society. ICT is consideration. there's a good chance you or defined as a group of - Penalty at least Php 200,000 someone you know has been interrelated technologies and or prison mayor affected by one. (electronic devices) for f. Child Pornography Viruses- Most people have accessing, processing, and - Is a form of child sexual heard of computer viruses, but disseminating information. exploitation. not many know exactly what - Unlawful or prohibited acts they are or what they do. The rapid development of these defined and punishable by WiFi eavesdropping- is technologies has fainted the Republic Act No. 9775 or the another method used by cyber boundaries between Anti-Child Pornography Act of criminals to capture personal information, communication, 2009, committed through a information. and various types of media. computer system. Worms- are a common threat to - Penalty of 6-12 years of computers and the Internet as a Social change refers to a imprisonment or prison mayor. whole. A worm, unlike a virus, transformation of culture and goes to work on its own without social organizations/structures Internet Threats attaching itself to files or over time. We are aware that in programs. a modern world, a society is never static and that of social, Hacking- is a term used to Digital Technology and Social political, economic, and cultural describe actions taken by Change changes occurs constantly. To someone to gain unauthorized increase the consent potential access to a computer. The The internet and of ICTs, it is important to availability of information online telecommunication industry in understand some of their basic on the tools, techniques, and the 1990s changed the way we features, which make them a malware makes it easier for connect and exchange unique kind of technologies. even non-technical people to information. Digital technology undertake malicious activities. impacted people in many ways. Entertainment Malware- is one of the more By the way people live, work, - With the advent of new common ways to infiltrate or learn, and socialize. It enables technologies, the world of damage your computer. us to experience the benefits of entertainment is constantly Malicious software that infects advanced information evolving. Digital broadcasting your computer, such as technology systems. Such as has completely changed the computer viruses, worms, efficiency and productivity, way we experience television Trojan horses, spyware, and improved communication and and radio. Cinema can now be adware. collaboration and faster found at the comfort of your Pharming- is a common type of acquisition of information. In this home through application such online fraud. A means to point lesson, we will discuss the as Netflix, etc. We get you to a malicious and digital age and its effect in entertained by the content that illegitimate website by society, the two-essential theory we see in Facebook, YouTube, redirecting the legitimate URL. in technology, and how and Instagram. Even if the URL is entered technological change takes correctly, it can still be place. Business redirected to a fake website. - The impact of ICT on business Phishing- Fake emails, text Introduction to the Digital is particularly significant. It messages and websites Age empowers people to share created to look like they're from knowledge and advice authentic companies. They're Digital age, also known as instantaneously and set up an online shop or website at a low curiosity, the hunger to expand, cost, dramatically lowering the and the need to do things barriers to starting a business. efficiently drive us to create As such, ICT maturity is closely these technologies. linked to economic growth. Technological Change Education Technological change means - The impact of ICT on teachers, the technical knowledge used in trainers, learners, researchers the production of capital and and the entire education society machinery. The various is tremendous. It is changing changes in technology leads to the way of the education an increase in the productivity of delivery system in the world by labor, capital and other enhancing access to production factors. information for all. It also Technological progress ensures effective and inclusive comprises of creation of skill, education. new means of production, new uses of raw materials and the Jobs and earnings widespread use of machinery. - The digital economy also fundamentally changes the nature of work for many people, with fewer jobs exerting physical demands on workers but more jobs placing an emotional strain on desk- workers. Health - Health-care delivery is also affected by new digital technologies, such as electronic records, new treatment options, tele-care, and teleconsultation. An important aspect of digitalization concerns the production and use of medical data to improve the effectiveness and efficiency of health systems. Theories in Technology Technological Determinism It is the theory which strongly believe that technology shapes the culture, values, social structures of a society. The main reason why society progresses is because of the kind technology the society has. Technological innovation is the cause of the social progress. Social Constructivism Social Constructivism is the opposite of the Technological Determinism. Social Constructivism believes that humans play a main role in shaping technology rather than technology shaping society. It believes that technology does not determine human action, but rather, human action shapes the technology. Our

Use Quizgecko on...
Browser
Browser