Concepts of ICT PDF
Document Details
Stevegaisan
Tags
Related
- Intro to ICT and Web Evolution.pdf
- SLG 1.0 - Introduction to ICT and ICT Systems.pdf
- SLG 1.0 - Introduction to ICT and ICT Systems.pdf
- SLG 3.1 - Social and Ethical Issues in Computing (ICT) - Cybersecurity.pdf
- Information and Communication Technology (ICT) PDF
- 5 Applications of Information and Communication Technology PDF
Summary
This presentation provides an introduction to Information and Communication Technology (ICT). It discusses the evolution of communication, what ICT is, and various computer components. The presentation also covers topics such as computer types, networks, and internet data transfer. It also covers information security and precautions.
Full Transcript
Concepts of ICT Technology is best w hen it brings people together. -Matt Mullenweg, Social Media Entrepreneur ICT Evolution of Communication Communication has improved and evolved to facilitate our daily activities. In the 21st century, everything related to communication utilizes techn...
Concepts of ICT Technology is best w hen it brings people together. -Matt Mullenweg, Social Media Entrepreneur ICT Evolution of Communication Communication has improved and evolved to facilitate our daily activities. In the 21st century, everything related to communication utilizes technology to ‘send out’ or disseminate information to a wider audience. Information can be ‘sent out’ in many ways. The inventions of cellular phones, television and other electronic devise are important in enhancing communication. 3 What is ICT? ICT is the technology required for information processing, in particular, the use of electronic computers, communication devices and software applications to convert, store, protect, transmit and retrieve information from anywhere, anytime. 4 Inform ation Information refers to the knowledge obtained from reading, investigation, study or research. We need information to make decision and to predict the future. For example, scientists can detect the formation of a tsunami using the latest technology and warn the public to avoid disasters in the affected areas. Information is knowledge and helps us fulfill our daily tasks. For example, forecasting the stock exchange market. 6 Com m unication Communication is an act of transmitting messages. It is a process whereby information is exchanged between individuals using symbols, signs or verbal interactions. Previously, people communicated through sign or symbols, performing drama and poetry. With the advent of technology, theses ‘older’ forms of communication are less utilized as compared to the use of the Internet, e-mail or video conferencing. Communication is important in order to gain knowledge. With knowledge, we are more confident in expressing our thoughts and ideas. 7 Technology Technology is the use of scientific knowledge, experience, and resources to create processes and products that fulfill human needs. Technology is vital in communication. Aiding communication Telephone and fac machines are the devices used in extending communication. Spreading Information To broadcast information such as news or weather reports effectively. Radio, television, satellites and the World Wide Web (www) are powerful tools that can be used. 8 9 Com puter A computer is a machine that can store and process information. Most computers rely on a binary system, which uses two variables, 0 and 1, to complete tasks such as storing data, calculating algorithms, and displaying information. 10 The Com puter consists of : hardware – physical computer parts, palpable and visible software – set of commands that are "understandable" to the computer; instructions to its palpable parts, giving orders what to do. 11 The System Unit 12 System Units Consists of the follow ing com ponents: Motherboard - MBO/MOBO - a computer "backbone" responsible for communication between components and transmission of information 13 Motherboard 14 System Units Consists of the follow ing com ponents: 15 Central Processing Unit - CPU functions: command execution, data transmission, computer function control basic characteristics: speed (in Mega Hertz (MHz), Giga Hertz (GHz)) amount of memory (Cache in Bytes) 16 Random Access Memory- RAM a memory container for programs that are currently running and data that is being processed to basic characteristics: speed (in MHz, GHz) capacity (in Bytes) data rate class (DDR SDRAM, SDR SDRAM) 17 Permanent memory Hard Disk Drive - HDD - device (memory) used for permanent data storage data is stored on magnetic platters; electromagnetic heads are used for reading and recording data with the exception of the newest disk types called Solid State Drive (SSD) Basic characteristics: disk platters rotation speed (in RPM) capacity (in GB) connection interface (IDE, SATA) 18 Graphics processing units (GPU) function: processing and displaying image on the monitor it consists of a graphics processor and its own working RAM memory Basic characteristics: type of graphics processing units (ATI Radeon, Nvidia GeForce, or other) RAM size connection interface/slot type (16x 8x 4x) 19 Ports Parallel Port Serial Port Universal Serial Bus (USB) 20 Input and Output Devices Input devices Output devices keyboard monitor scanner projector touchpad printer mouse plotter trackball speakers joystick earphones microphone stylus camera (web, digital) 21 Softw are Software - a computer program which, as opposed to hardware, is an intangible part of the computer, written to perform a single or multiple tasks on computer using the built-in hardware. 22 Types of Software Operating Systems (OS) - the basic program on your computer that is automatically loaded when computer is started up: Linux (Debian, Ubuntu, Fedora, Knoppix...) Microsoft Windows (XP, Vista, 7, 8, 8.1, 10) Mac OS X (macOS Big Sur, Cheetah, Panther, Snow Leopard...) 23 Application Software Application Software – some types of software that can be used on an installed operating system: office programs - OpenOffice.org, LibreOffice, Microsoft Office antivirus program – Avira, Sophos, Kaspersky etc. Web browser: Mozilla Firefox, Microsoft Internet Explorer (Edge), Opera, Safari, Google Chrome 24 E-accessibility options: voice recognition software screen reader, magnifying tool, on-screen keyboard 25 26 Com puter Types M ainfram e Com puter Mainframe Computer large, powerful and expensive computers, often used within large systems and organizations, can be used by more then one user simultaneously. 28 Personal Com puter first PC was made by IBM in 1981,it was originally made for executing a single task by a single user at the time. today: a single person can execute many tasks simultaneously (multitasking). 29 Apple M acintosh (M ac) Personal computer made by Apple company 30 Laptop com puter (notebook ) relatively small computers, easily carried around, consists of LCD display and a small keyboard, do not fall behind PCs by their functions 31 Personal Digital Assistant - PDA (Palm ) -small computers that can fit into a pocket or user's palm -meant for performing basic personal/business functions: managing personal or business tasks and assignments, maintaining the address book, accessing and browsing the Internet, sending/receiving e-mails, etc. PDAs have now been replaced by modern smart phones that combine the features of a PDA with a mobile phone and camera. 32 Netw ork Connected Com puter -every computer (PC, notebook, PDA) connected to the network is considered a network computer; can be connected either through network cable or through a phone line (at least to one more computer) 33 Beside notebooks and palms, there are other portable digital devices: mobile phone smartphone – mobile phone with advanced functions such as e-mail, Internet browser, e-book reader multimedia player: iPod, iRiver, Zune 34 35 Netw ork Netw ork s: LAN (Local Area Network) - a small network that physically connects nearby computers (computers within the firm, organization, or a household) WAN (Wide Area Network) - a larger network that covers a city or a region, Internet – a world network of connected computers, connected through WAN and LAN Intranet - a smaller network, closed version of internet to which only certain (authorized) people are granted access (members of an organization) Extranet – an intranet version, to which only certain people are granted access (not exclusively members of an organization, but also outsourced experts for performing common tasks). 37 Netw ork s: World Wide Web (WWW) - one of the services that can be used on Internet which enables us to view and search contents in a form of web-pages other services on Internet that can be used: Instant Messaging - Messenger, Facebook, Twitter, Instagram Voice over Internet Protocol (VoIP) - protocol used for voice transfer over IP network; it basically enables us to use internet in order to make phone- calls 38 Netw ork s: Really Simple Syndication (RSS) – used for dissemination of information or articles etc. published on web page using RSS channel (RSS news usually consists of title, few sentences and link to a web page where users can read the whole article). Users have to subscribe to RSS channel in order to receive news in their RSS reader. This eliminates a need for visiting a web page in order to find out latest news (e.g. https://feedreader.com) web log -> blog podcast - digital file that contains audio or video record 39 40 Netw ork Com m unication PSTN (Public Switched Telephone Network) – a technical expression for public telephone system (analog) ISDN (Integrated Services Digital Network) (digital) ADSL (Asymmetric Digital Subscriber Line) – most common communication standard in the consumer market 41 Internet Data Transfer Download - data storing from internet onto personal computer Upload - data storing from personal computer to internet server data rate units: bit per second (bps), kilobit per second (kbps), and megabit per second (mbps). 42 Internet access: dial-up – use of phone line in order to connect to the internet. The bill for the internet usage is directly proportional to the time spent on the Internet and/or the amount of data transferred. broadband – the bill is formed according to speed of data transfer. Additionally, in areas where informational infrastructure for broadband is not developed enough (or for other reason), amount of data transfer is also charged. Unlike dial-up, time spent on the internet is not charged and as a consequence there is a greater risk from hacker intrusion in computers or networks that are connected to internet 24/7. Internet can also be accessed through phone, mobile, and cable line, as well as through wireless access or via satellite connection. 43 Virtual (online) com m unities social networking websites: Facebook, WhatsApp, QQ, WeChat, Instagram, Twitter etc. Internet forums – Forum.hr, Download.hr, etc. chat rooms, e.g. Chat Rooms multiplayer games: Rocket League, Fortnite, GTA, Halo 3, CSGO etc. Ways to publish and share contents on the internet: blog, podcast, photos, video and audio contents. 44 Advice on how to protect oneself while using virtual communities: protect privacy of your profile, limit publishing and use of your personal data, be aware that published information can be publicly accessible, be cautious while communicating with strangers. 45 Computer in the workplace: tasks more suited to a computer than a human: repetitive tasks, easy automated tasks , mathematical operations, tasks that require high precision and speed. tasks more suited to a human than a computer: logical reasoning and shape interpretation, consulting and social interaction, new product presentation, developing business plan and strategies 46 Telecommuting (telework) - Advantages: increasing the employment of vulnerable groups: parents with small children, people with mobility problems and people living in the remote areas, commuting time reduced or not necessary at all; cost and time of transportation to the workplace decreased or nonexistent greater possibility to concentrate on the job flexible working hours reduced maintenance costs for the workspace -Disadvantages: lack of business human contact lack of direct teamwork requires great self-discipline 47 ICT in everyday life: e-mail e-commerce online banking e-government online shopping 48 Ergonomics Ergonomics - is the process of designing or arranging workplaces, products and systems so that they fit the people who use them. The most common health problems associated with the computer usage: repetitive, excessive or improper use of keyboard and mouse RSI (Repetitive Strain Injury) flickering screen or working from an improper distance from the monitor vision impairment, headache artificial light from monitors insufficient light, improper contract or glare can cause eyestrain, headache and decreased productivity improper seating and the use of inappropriate chairs spinal problems (position of the computer, desk and chair affect posture and can therefore create problems) well-being while using computers will improve through regular exercise, regular minibreaks (5 - 10 minutes per hour) and rest frequent eye rest. 49 Precautions cables - always use electric cables obtained with the computer power supply - overloading the power source may result in fire using monitors with lower energy consumption disposing damaged or old computer components at the recycling center 50 Information security Information security is defined as: preservation of information confidentiality, integrity and availability information security measures are the rules of data protection on physical, technical and organizational level 51 Increased level of the data security can be reached through the use of the following procedures: username and password properly shut down computer the use of continuous power supply (UPS - Un-interruptible Power Supply) - in a case of power failure, without UPS your desktop computer will shut down and all data that are not saved on hard disk will be lost. Documents should be often saved in order to narrow down the possibility for losing data but only UPS will enable saving your work as well as shutting down the computer properly without losing anything. professional maintenance of computer is recommended creating backups of all important data on portable memory devices, network disk etc. (i.e. copy them from your computer to another location) 52 Malware - computer code - program that can infect computer, spread on other computer independently or with a help from a user thus stealing or damaging data, and enabling crackers to take over control of your computer. most commonly spread via attachments in e-mail, symptoms of infection: slow performance, computer not responding to commands or crashes and restarts; in extreme situations malware damages files responsible for proper functioning of the operating system which can totally disable computer. removing malware: use one of the antimalware programs malware protection: never use pirated software which is usually infected with malicious software, install antimalware software which detects computer malware, open e-mails and web pages from recognized senders and authors (the safest way is not to connect to the Internet or any other computer network) 53 Important Terms Copyright - the right of an author of text, images, music, film, etc. to protect their intellectual property. Product identification number (PID) is a number that comes with legally purchased software as an authenticity validation. Licensed software identification: serial number check-up, registration, software license inspection. Software License Agreement- EULA (end-user license agreement). Freeware - software free for personal use; for example: Adobe Reader. Open source - software whose source code is publicly available for inspection, use, modification and redistribution; for example, OpenOffice.org - office suite software, Mozilla Firefox, Mozilla Thunderbird, MediaWiki, Joomla. Shareware - programs that are free for temporary use at home. 54 -End 55 Credits https://www.slideshare.net/stevegaisan/la1-introduction-to-information- communication-technology?next_slideshow=31074920 56