KEMBAR78
Reviewer Living in The Information Technology Era 1 | PDF | World Wide Web | Internet & Web
0% found this document useful (0 votes)
43 views25 pages

Reviewer Living in The Information Technology Era 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views25 pages

Reviewer Living in The Information Technology Era 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

Reviewer: Living in the Information Technology Era

Module 1: Uses of ICT in Our Daily Lives

Communication
● We all know that ICT takes a major role for us by means of communicating, way back in the past
our parents used to make letters and send it via post mail. But now with the help of ICT it is
easier to communicate with our loved ones. We can use cellular phones that are designed for
communicating with other people even if they are miles away from you. Nowadays people are in
touch with the help of ICT. Through chatting, E-mail, voice mail and social networking people
communicate with each other. It is the cheapest means of communication.
● ICT allows students to monitor and manage their own learning, think critically and creatively,
solve simulated real-world problems, work collaboratively, engage in ethical decision-making,
and adopt a global perspective towards issues and ideas. It also provides students from remote
areas access to expert teachers and learning resources, and gives 14 administrators and policy
makers the data and expertise they need to work more efficiently.

Job Opportunities
● In the employment sector, ICT enables organizations to operate more efficiently, so employing
staff with ICT skills is vital to the smooth running of any business. Being able to use ICT systems
effectively allows employees more time to concentrate on areas of their job role that require soft
skills.
● For example, many pharmacies use robot technology to assist with picking prescribed drugs. This
allows highly trained pharmaceutical staff to focus on jobs requiring human intelligence and
interaction, such as dispensing and checking medication.
● Nowadays, employers expect their staff to have basic ICT skills. This expectation even applies to
job roles where ICT skills may not have been an essential requirement in the past and finding a
job is different, you can just use your smartphone, laptop, desktop or any gadgets that are
available in the comfort of your home.

Education
● Social media has changed the world. The rapid and vast adoption of these technologies 15 is
changing how we find partners, how we access information from the news, and how we organize
to demand political change.
● The internet and social media provide young people with a range of benefits, and opportunities
to empower themselves in a variety of ways. Young people can maintain social connections and
support networks that otherwise wouldn't be possible and can access more information than ever
before. The communities and social interactions young people form online can be invaluable for
bolstering and developing young people's self-confidence and social skills.
● As the ICT has become ubiquitous, faster and increasingly accessible to non-technical
communities, social networking and collaborative services have grown rapidly enabling people
to communicate and share interest in many more ways, sites like Facebook, Twitter LinkedIn You
tube, Flicker, second life delicious blogs wikis and many more let people of all ages rapidly share
their interest of the movement without others everywhere. But Facebook seems to be the leading
area where people communicate and share their opinions. What a change! “Nothing is
permanent, but change” (As Herodotus in the 4th century BC). The Internet can be seen as the
international networks of interconnection of computer networks. The main purpose for the
institution of the internet are quest for information i.e. browsing, electronic mail, new groups fill
transfer and access and use of other computers. Socialization can be seen as a process by which a
child adapts a behavior to be an effective member of the society, which can only be achieved
through learning or education.
Socializing
● Social media has changed the world. The rapid and vast adoption of these technologies 15 is
changing how we find partners, how we access information from the news, and how we organize
to demand political change. The internet and social media provide young people with a range of
benefits, and opportunities to empower themselves in a variety of ways. Young people can
maintain social connections and support networks that otherwise wouldn't be possible and can
access more information than ever before.
● The communities and social interactions young people form online can be invaluable for
bolstering and developing young people's self-confidence and social skills. As the ICT has
become ubiquitous, faster and increasingly accessible to non-technical communities, social
networking and collaborative services have grown rapidly enabling people to communicate and
share interest in many more ways, sites like Facebook, Twitter LinkedIn You tube, Flicker, second
life delicious blogs wikis and many more let people of all ages rapidly share their interest of the
movement without others everywhere. But Facebook seems to be the leading area where people
communicate and share their opinions. What a change! “Nothing is permanent, but change” (As
Herodotus in the 4th century BC).
● The Internet can be seen as the international network of interconnection of computer networks,
the main purpose for the institution of the internet is the quest for information i.e. browsing,
electronic mail, new groups, fill transfer and access and use of other computers. Socialization can
be seen as a process by which a child adapts a behavior to be an effective member of the society,
which can only be achieved through learning or education.

Impact of ICT in The Society

Positive Impact of ICT


● Access to Information: Increase in access to information and services that has accompanied the
growth of the Internet. Some of the positive aspects of this increased access are better, and often
cheaper, communications, such as VoIP phone and Instant Messaging.
● Improved Access to Education, e.g. distance learning and online tutorials. New ways of learning,
e.g. interactive multimedia and virtual reality
● New Tools, New Opportunities: ICT gives access to new tools that did not previously exist:
digital cameras, photo-editing software and high quality printers, screen magnification or 16
screen reading software enables partially sighted or blind people to work with ordinary text
rather than Braille.
● Communication: Cost savings by using e.g. VoIP instead of normal telephone, email / messaging
instead of post, video conferencing instead of traveling to meetings, e-commerce web sites
instead of sales catalogs. Access to larger, even worldwide, markets.
● Information Management: Data mining of customer information to produce lists for targeted
advertising. Improved stock control, resulting in less wastage, better cash flow, etc.
● Security: ICT solves or reduces some security problems, e.g. Encryption methods can keep data
safe from unauthorized people, both while it is being stored or while it is being sent
electronically.
● ICT allows people to participate in a wider, even worldwide, society.
● Distance learning: students can access teaching materials from all over the world.
● ICT facilitates the ability to perform ‘impossible’ experiments’ by using simulations.
● Creation of new more interesting jobs. Examples would be systems analysts, programmers and
software engineers, as well as help desk operators and trainers.

Negative Impacts
● Job Loss: Manual operations being replaced by automation. e.g. robots replacing people on an
assembly line. Job export. e.g. Data processing work being sent to other countries where
operating costs are lower. Multiple workers being replaced by a smaller number who are able to
do the same amount of work. e.g. A worker on a supermarket checkout can serve more customers
per hour if a bar-code scanner linked to a computerized till is used to detect goods instead of the
worker having to enter the item and price manually.
● Reduced Personal Interaction: Most people need some form of social interaction in their daily
lives and if they do not get the chance to meet and talk with other people they may feel isolated
and unhappy.
● Reduced Physical Activity: This can lead to health problems such as obesity, heart disease, and
diabetes.
● Cost: A lot of ICT hardware and software is expensive, both to purchase and to maintain. An ICT
system usually requires specialist staff to run it and there is also the challenge of keeping up with
ever-changing technology.
● Competition: this is usually thought of as being a good thing, but for some organizations being
exposed to greater competition can be a problem. If the organization is competing for customers,
donations, or other means of funding nationally or even internationally, they may lose out to
other organizations that can offer the same service for less money.

Module 2: Application of ICT in Our Daily Lives

1. Business: They can be employed to store and maintain accounts, personnel records, manage
projects, track inventory, create presentations and reports. They enable communication with
people both within and outside the business, using various technologies, including e-mail. They
can be used to promote the business and enable direct interaction with customers.

2. Education: Computers can be used to give learners audio-visual packages, interactive exercises
and remote learning, including tutoring over the internet. They can be used to access educational
information from intranet and internet sources, or via e-books. They can be used to maintain and
monitor student performance, including through the use of online examinations, as well as to
create projects and assignments.

3. Healthcare: It is digitized medical information making it easier to access patient data, complex
information can also be analyzed by software to aid discovery of diagnoses, as well as search for
risks of diseases. Computers control lab equipment, heart rate monitors, and blood pressure
monitors. They enable doctors to have greater access to information on the latest drugs, as well as
the ability to share information on diseases with other medical specialists.

4. Retail and Trade: This enables sellers to reach a wider market with low overheads, and buyers to
compare prices, read reviews, and choose delivery preferences. They can be used for direct
trading and advertising too, using sites such as eBay, Craigslist, or local listings on social media
or independent websites.

5. Government: Various government departments use computers to improve the quality and
efficiency of their services. Examples include city planning, law enforcement, traffic, and tourism.
Computers can be used to store information, promote services, communicate internally and
externally, as well as for routine administrative purposes.

6. Marketing: Computers enable marketing campaigns to be more precise through the analysis and
manipulation of data. They facilitate the creation of websites and promotional materials. They
can be used to generate social media campaigns. They enable direct communication with
customers through email and online chat.

7. Science: Scientists were one of the first groups to adopt computers as a work tool. In science,
computers can be used for research, sharing information with other specialists both locally and
internationally, as well as collecting, categorizing, analyzing, and storing data. Computers also
play a vital role in launching, controlling, and maintaining space craft, as well as operating other
advanced technology.

8. Publishing: Computers can be used to design pretty much any type of publication. These might
include newsletters, marketing materials, fashion magazines, novels, or newspapers. Computers
are used in the publishing of both hard-copy and e-books. They are also used to market
publications and track sales.

9. Arts and Entertainment: Computers are now used in virtually every branch of the arts, as well as
in the wider entertainment industry. Computers can be used to create drawings, graphic designs,
and paintings. They can be used to edit, copy, send, and print photographs. They can be used by
writers to create and edit. They can be used to make, record, edit, play, and listen to music. They
can be used to capture, edit and watch videos. They can be used for playing games.

10. Communication: Computers have made real-time communication over the internet easy, thanks
to software and video conferencing services such as Skype. Families can connect with audio and
video, businesses can hold meetings between remote participants, and news organizations can
interview people without the need for a film crew. Modern computers usually have microphones
and webcams built-in nowadays to facilitate software like Skype. Older communications
technologies such as email are also still used widely.

11. Banking and Finance: Most banking in advanced countries now takes place online. You can use
computers to check your account balance, transfer money, or pay off credit cards. You can also
use computer technology to access information on stock markets, trade stocks, and manage
investments. Banks store customer account data, as well as detailed information on customer
behavior which is used to streamline marketing.

12. Transport: Road vehicles, trains, planes, and boats are increasingly automated with computers
being used to maintain safety and navigation systems, and increasingly to drive, fly, or steer.
They can also highlight problems that require attention, such as low fuel levels, oil changes, or a
failing mechanical part. Computers can be used to customize settings for individuals, for
example, seat setup, air-conditioning temperatures.

13. Navigation: Navigation has become increasingly computerized, especially since computer
technology has been combined with GPS technology. Computers combined with satellites mean
that it's now easy to pinpoint your exact location, know which way that you are moving on a
map, and have a good idea of amenities and places of interest around you.

14. Working from Home: Computers have made working from home and other forms of remote
working increasingly common. Workers can access necessary data, communicate, and share
information without commuting to a traditional office. Managers are able to monitor workers'
productivity remotely.

15. Military: Computers are used extensively by the military. They are used for training purposes.
They are used for analyzing intelligence data. They are used to control smart technology, such as
guided missiles and drones, as well as for tracking incoming missiles and destroying them. They
work with other technologies such as satellites to provide geospatial information and analysis.
They aid communications. They help tanks and planes to target enemy forces.

16. Social and Romance: Computers have opened up many ways of socializing that didn't
previously exist. Social media enables people to chat in text or audio in real time across large
distances, as well as exchange photographs, videos, and memes. Dating sites and apps help
people to find romance. Online groups help people to connect with others who have similar
interests. Blogs enable people to post a variety of views, updates, and experiences. Online forums
enable discussions between people on specialist or general topics.

17. Booking Vacations: Computers can be used by travelers to study timetables, examine route
options, and buy plane, train, or bus tickets. They can be used to explore and book
accommodation, whether traditional hotels, or through newer services, such as AirBnB. Guided
tours, excursions, events, and trips can also be explored and booked online using computers.

18. Security and Surveillance: Computers are increasingly being combined with other technologies
to monitor people and goods. Computers combined with biometric passports make it harder for
people to fraudulently enter a country or gain access to a passenger airplane. Face-recognition
technology makes it easier to identify terrorists or criminals in public places. Driver plates can be
auto scanned by speed cameras or police cars. Private security systems have also become much
more sophisticated with the introduction of computer technology and internet technology.

19. Weather Forecasting: The world's weather is complex and depends upon a multitude of factors
that are constantly changing. It's impossible for human beings to monitor and process all the
information coming in from satellites and other technologies, never mind perform the complex
calculations that are needed to predict what is likely to happen in the future. Computers can
process large amounts of meteorological information.

20. Robotics: Robotics is an expanding area of technology which combines computers with science
and engineering to produce machines that can either replace humans, or do specific jobs that
humans are unable to do. One of the first uses of robotics was in manufacturing to build cars.
Since then, robots have been developed to explore areas where conditions are too harsh for
humans, to help law enforcement, to help the military, and to assist healthcare professionals.

History of Computer: Basic Computing Periods


● Earliest Computers originally calculations were computed by humans, whose job title was
computers. These human computers were typically engaged in the calculation of a mathematical
expression. The calculations of this period were specialized and expensive, requiring years of
training in mathematics. The first use of the word "computer" was recorded in 1613, referring to a
person who carried out calculations, or computations, and the word continued to be used in that
sense until the middle of the 20th century.

A. Tally Sticks
● A tally stick was an ancient memory aid device to record and document numbers,
quantities, or even messages.

B. Abacus
● An abacus is a mechanical device used to aid an individual in performing mathematical
calculations. The abacus was invented in Babylonia in 2400 B.C. Invented by
Mesopotaians. The abacus in the form we are most familiar with was first used in China
in around 500 B.C. It used to perform basic arithmetic operations.

C. Napier’s Bone
● Napier's bones is a manually operated calculating device created by John Napier of
Merchiston, Scotland for the calculation of products and quotients of numbers. The
method was based on lattice multiplication, and also called radiology. Invented by John
Napier in 1614. Allowed the operator to multiply, divide and calculate square and cube
roots by moving the rods around and placing them in specially constructed boards.
D. Slide Rule
● Invented by William Oughtred in 1622. Is based on Napier's ideas about logarithms. Used
primarily for – multiplication – division – roots – logarithms –Trigonometry Not
normally used for addition or subtraction.

E. Pascaline
● Invented by Blaise Pascal in 1642. It could only do addition and subtraction, with
numbers being entered by manipulating its dials. Pascal invented the machine for his
father, a tax collector, so it was the first business machine too (if one does not count the
abacus).

F. Stepped Reckoner
● Invented by Gottfried Wilhelm von Leibniz in 1672. The machine that can add, subtract,
multiply and divide automatically.

G. Jacquard Loom
● The Jacquard loom is a mechanical loom, invented by Joseph-Marie Jacquard in 1881. It is
used in the production of textiles with complex patterns It is an automatic loom
controlled by punched cards.

H. Arithmometer
● A mechanical calculator invented by Thomas de Colmar in 1820, The first reliable, useful
and commercially successful calculating machine. The machine could perform the four
basic mathematical functions. The first mass-produced calculating machine.

I. Difference Engine and Analytical Engine


● It is an automatic, mechanical calculator designed to tabulate polynomial functions.
Invented by Charles Babbage in 1822 and 1834. It is the first mechanical computer.

J. First Computer Programmer


● In 1840, Augusta Ada Byron suggested to Babbage that he use the binary system. She
writes programs for the Analytical Engine.

K. Scheutzian Calculation Engine


● Invented by Per Georg Scheutz in 1843. Based on Charles Babbage's difference engine
The first printing calculator.

L. Tabulating Machine
● Invented by Herman Hollerith in 1890. To assist in summarizing information and
accounting.

M. Harvard Mark 1
● Also known as IBM Automatic Sequence Controlled Calculator (ASCC). Invented by
Howard H. Aiken in 1943. The first electro-mechanical computer.

N. Z1
● The first programmable computer. Created by Konrad Zuse in Germany from 1936 to
1938. To program the Z1 required that the user insert punch tape into a punch tape reader
and all output was also generated through punch tape.

O. Atanasoff-Berry Computer (ABC)


● It was the first electronic digital computing device. Invented by Professor John Atanasoff
and graduate student Clifford Berry at Iowa State University between 1939 and 1942.

P. ENIAC
● ENIAC stands for Electronic Numerical Integrator and Computer. It was the first
electronic general-purpose computer. Completed in 1946. Developed by John Presper
Eckert and John Mauchly.

Q. UNIVAC 1
● The UNIVAC I (UNIVersal Automatic Computer 1) was the first commercial computer.
Designed by John Presper Eckert and John Mauchly

R. EDVAC
● EDVAC stands for Electronic Discrete Variable Automatic Computer The First Stored
Program Computer Designed by Von Neumann in 1952. It has a memory to hold both a
stored program as well as data.

S. The First Portable Computer


● Osborne 1 – the first portable computer. Released in 1981 by the Osborne Computer
Corporation.

T. The First Computer Company


● The first computer company was the Electronic Controls Company. Founded in 1949 by
John Presper Eckert and John Mauchly.

Basic Computing Periods - Ages

Premechanical
● The pre mechanical age is the earliest age of information technology. It can be defined as the time
between 3000B.C. and 1450A.D. We are talking about a long time ago. When humans first started
communicating they would try to use language or simple picture drawings known as
petroglyphs which were usually carved in rock. Early alphabets were developed such as the
Phoenician alphabet.
● As alphabets became more popular and more people were writing information down, pens and
paper began to be developed. It started off as just marks in wet clay, but later paper was created
out of a papyrus plant. The most popular kind of paper made was probably by the Chinese who
made paper from rags. Now that people were writing a lot of information down, they needed
ways to keep it all in permanent storage. This is where the first books and libraries are developed.
You’ve probably heard of Egyptian scrolls which were popular ways of writing down
information to save. Some groups of people were actually binding paper together into a book-like
form. Also, during this period were the first numbering systems. Around 100A.D. was when the
first 1-9 system was created by people from India. However, it wasn’t until 875A.D. (775 years
later) that the number 0 was invented. And yes, now that numbers were created, people wanted
stuff to do with them, so they created calculators. A calculator was the very first sign of an
information processor. The popular model of that time was the abacus.

Mechanical
● The mechanical age is when we first start to see connections between our current technology and
its ancestors. The mechanical age can be defined as the time between 1450 and 1840. A lot of new
technologies are developed in this era as there is a large explosion of interest in this area.
Technologies like the slide rule (an analog computer used for multiplying and dividing) were
invented. Blaise Pascal invented the Pascaline which was a very popular mechanical computer.
Charles Babbage developed the difference engine which tabulated polynomial equations using
the method of finite differences.
● There were lots of different machines created during this era and while we have not yet gotten to
a machine that can do more than one type of calculation in one, like our modern-day calculators,
we are still learning about how all of our all-in-one machines started. Also, if you look at the size
of the machines invented in this time compared to the power behind them it seems (to us)
absolutely ridiculous to understand why anybody would want to use them, but to the people
living in that time ALL of these inventions were HUGE.

Electromechanical
● Now we are finally getting close to some technologies that resemble our modern-day technology.
The electromechanical age can be defined as the time between 1840 and 1940. These are the
beginnings of telecommunication. The telegraph was created in the early 1800s. Morse code was
created by Samuel Morse in 1835. The telephone (one of the most popular forms of
communication ever) was created by Alexander Graham Bell in 1876. The first radio developed
by Guglielmo Marconi in 1894. All of these were extremely crucial emerging technologies that led
to big advances in the information technology field.
● The first large-scale automatic digital computer in the United States was the Mark 1 created by
Harvard University around 1940. This computer was 8ft high, 50ft long, 2ft wide, and weighed 5
tons - HUGE. It was programmed using punch cards. How does your PC match up to this hunk
of metal? It was from huge machines like this that people began to look at downsizing all the
parts to first make them usable by businesses and eventually in your own home.

Electronic
● The electronic age is what we currently live in. It can be defined as the time between 36 1940 and
right now. The ENIAC was the first high-speed, digital computer capable of being reprogrammed
to solve a full range of computing problems. This computer was designed to be used by the U.S.
Army for artillery firing tables. This machine was even bigger than the Mark 1 taking up 680
square feet and weighing 30 tons - HUGE. It mainly used vacuum tubes to do its calculations.
● There are 4 main sections of digital computing. The first was the era of vacuum tubes and punch
cards like the ENIAC and Mark 1. Rotating magnetic drums were used for internal storage. The
second generation replaced vacuum tubes with transistors, punch cards were replaced with
magnetic tape, and rotating magnetic drums were replaced by magnetic cores for internal
storage. Also during this time high-level programming languages were created such as
FORTRAN and COBOL. The third generation replaced transistors with integrated circuits,
magnetic tape was used throughout all computers, and magnetic cores turned into metal oxide
semiconductors. An actual operating system showed up around this time along with the
advanced programming language BASIC. The fourth and latest generation brought in CPUs
(central processing units) which contained memory, logic, and control circuits all on a single chip.
The personal computer was developed (Apple II). The graphical user interface (GUI) was
developed.

History of Computer: Generations of Computer

First generation (1946 - 1958)


● The first computers used vacuum tubes for circuitry and magnetic drums for memory, and were
often enormous, taking up entire rooms. They were very expensive to operate and in addition to
using a great deal of electricity, generated a lot of heat, which was often the cause of
malfunctions. First generation computers relied on machine language, the lowest- level
programming language understood by computers, to perform operations, and they could only
solve one problem at a time. Input was based on punched cards and paper tape, and output was
displayed on printouts.
Second generation (1959 - 1964)
● Transistors replaced vacuum tubes and ushered in the second generation of computers. One
transistor replaced the equivalent of 40 vacuum tubes. Allowing computers to become smaller,
faster, cheaper, more energy-efficient and more reliable. Still generated a great deal of heat that
can damage the computer. Second-generation computers moved from cryptic binary machine
language to symbolic, or assembly, languages, which allowed programmers to specify
instructions in words. Second- generation computers still relied on punched cards for input and
printouts for output. These were also the first computers that stored their instructions in their
memory, which moved from a magnetic drum to magnetic core technology.

Example: UNIVAC III, RCA 501, Philco Transac S-2000, NCR 300 series, IBM 7030 Stretch, IBM
7070, 7080, 7090 series

Third generation (1965 - 1970)


● The development of the integrated circuit was the hallmark of the third generation of computers.
Transistors were miniaturized and placed on silicon chips, called semiconductors, which
drastically increased the speed and efficiency of computers. It could carry out instructions in
billionths of a second. Much smaller and cheaper compared to the second generation computers.

Fourth generation (1971 - Today)


● The microprocessor brought the fourth generation of computers, as thousands of integrated
circuits were built onto a single silicon chip. As these small computers became more powerful,
they could be linked together to form networks, which eventually led to the development of the
Internet. Fourth generation computers also saw the development of GUIs, the mouse and
handheld devices.

Fifth generation (Today - Future)


● Based on Artificial Intelligence (AI). Still in development. The use of parallel processing and
superconductors is helping to make artificial intelligence a reality. The goal is to develop devices
that respond to natural language input and are capable of learning and self organization. There
are some applications, such as voice recognition, that are being used today.

Module 3: The Web


● The Web (World Wide Web) consists of information organized into Web pages containing text and
graphic images. The world wide web is a larger collection of interconnected documents or
content. It contains hypertext links, or highlighted keywords and images that lead to related
information. A collection of linked Web pages that has a common theme or focus is called a Web
site. The main page that all of the pages on a particular Website are organized around and link
back to is called the site’s home page. Sir Timothy John Berners-Lee OM KBE FRS FREng FRSA
FBCS, also known as TimBL, is an English engineer and computer scientist best known as the
inventor of the World Wide Web. He is a Professorial Fellow of Computer Science at the
University of Oxford and a professor at the Massachusetts Institute of Technology.

Web 1.0 (Read Only Static Web)


● It is an old internet that only allows people to read from the internet. First stage worldwide
linking web pages and hyperlink. The Web is used as an “information portal”. It uses tables to
position and align elements on the page.

Example of Web 1.0: Mp3.com, Home Page, Directories, Page Views, HTML/Portals.
Advantage Disadvantage

Most read only on the web. If focused on the company's Read only web
home pages.

Dividing the world wide web into usable directories Limited user interaction

It means web is use as “Information Portal” Lack of standards

It started with the simple idea “put content together”

Web 2.0 (Read-Write Interactive Web)


● A term used to describe a new generation of Web services and applications with an increasing
emphasis on human collaboration. It is a platform that gives users the possibility (liberty) to
control their data. This is about user-generated content and the read-write web. People are
consuming as well as contributing information through blogs or sites. Allows the user to interact
with the page known as DYNAMIC PAGE; instead of just reading a page, the user may be able to
comment or create a user account. Dynamic page refers to the web pages that are affected by user
input or preference. Is focused on the ability for people to collaborate and share information
online via social media, blogging and Web-based communities.

Example of Web 2.0:


A. Social Networking
● This is the use of Internet-based social media sites to stay connected with friends, family,
colleagues, customers, or clients. Social networking can have a social purpose, a business
purpose, or both, through sites such as:
Example: Facebook, Twitter, Linkedin, Google +, Pinterest, Tumblr, Instagram, and Page.

B. Blogs
● This is a discussion or informational website published on the world wide web consisting
of discrete, often informal diary-style text entries (posts). Posts are typically displayed in
reverse chronological order, so that the most recent post appears first, at the top of the
web page.
Example : Wordpress, Blogger, and Tumbler.

C. Wikis
● This is a hypertext publication collaboratively edited and managed by its own audience
directly using a web browser. A typical wiki contains multiple pages for the subjects or
scope of the project and may be either open to the public or limited to use within an
organization for maintaining its internal knowledge base.
Example: Wikipedia, Wikibooks, Wikiversity, Coombs, Wiktionary, Wikivoyage,
Wikidata, Wikinews, Wikispecies, and Media Wiki.

D. Video Sharing Files


● This is a website that lets people upload and share video clips with the public at large to
invited guests.
Example: Youtube, Facebook, LinkedIn, Flickr, Photobucket, Twitter, Veoh, Dailymotion,
VimeoPRO, Myspace, and Metacafe.

Key Features of Web 2.0


● Folksonomy - It allows users to categorize and classify/arrange information using freely chosen
keywords (e.g. tagging).
● Rich User Interface - The content is dynamic and is responsive to the user's input. An example
would be a website that shows local content.
● User Participation - The owner of a website is not the only one who is able to put content. Others
are able to place a content on their own by means of comments, reviews, and evaluation.
● Long Tail - The services are offered on demand rather than on a one-time purchase. This is
synonymous to subscribing to a data plan that charges you for the amount of time you spend on
the Internet or a data plan that charges you for the amount of bandwidth you use.

Web 3.0 (Read-Write Intelligence Web)


● Suggested name by John Markoff of the New York Times for the third generation of the web. In
this generation, all the applications on web or mobile will be upgraded with more features. It
applies the same principles as Web 2.0: two-way interaction. Web 3.0 will be more connected,
open, and intelligent, with semantic web technologies, distributed databases, natural language
processing, machine learning, machine reasoning and autonomous agents.
● Semantic Web - provides a framework that allows data to be shared and reuse to deliver web
content specifically targeting the user.
● It is a web of data.
● Changing the web into a language that can be read and categorized by the system rather than
humans.

Types of Websites:

● eCommerce Website
○ It is a website people can directly buy products from you’re probably used a number of
eCommerce websites before, most big brands and plenty of smaller ones have one. Any
website that includes a shopping cart and a way for you to provide credit card
information to make a purchase falls into this category.

● Business Website
○ It is any website that’s devoted to representing a specific business. It should be branded
like the business(the same logo and positioning) and communicate the types of products
and/or services the business offers.

● Entertainment Website
○ If you think about your internet browsing habits, you can probably think of a few
websites that you visit purely for entertainment purposes.

● Portfolio Website
○ These are sites devoted to showing examples of past work. Service providers who want
to show potential clients the quality of the work they provide can use a portfolio website
to collect some of the best samples of past work they’ve done. This type of website is
simpler to build than a business website and more focused on a particular task: collecting
work samples.

● Media Website
○ It collects news stories or other reporting. There’s some overlap here with entertainment
websites, but media websites are more likely to include reported pieces in addition to or
instead of content meant purely for entertainment.

● Brochure Website
○ These are a simplified form of business websites. For businesses that know they need an
online presence, but don’t want to invest a lot into it (maybe you’re confident you’ll
continue to get most of your business from other sources), a simple brochure site that
includes just a few pages that lay out the basics of what you do and provide contact
information may be enough for you.

● Nonprofit Website
○ In the same way that businesses need websites to be their online presence, nonprofits do
as well. A nonprofit website is the easiest way for many potential donors to make
donations and will be the first place many people look to learn more about a nonprofit
and determine if they want to support it.

● Educational Website
○ The websites of educational institutions and those offering online courses fall into the
category of educational websites. These websites have the primary goal of either
providing educational materials to visitors or providing information on an educational
institution to them.

● Infopreneur Website
○ These websites overlap a bit with business and eCommerce websites, but they represent a
unique type of online business. Infopreneurs create and sell information products. That
could be in the form of courses, tutorials, videos or eBooks.

● Personal Website
○ Not all websites exist to make money in some way or another. Many people find value in
creating personal websites to put their own thoughts out into the world. This category
includes personal blogs, vlogs, and photo diaries people share with the world.

● Web Portal
○ These are often websites designed for internal purposes at a business, organization, or
institution. They collect information in different formats from different sources into one
place to make all relevant information accessible to the people who need to see it. They
often involve a login and personalized views for different users that ensure the
information that’s accessible is most useful to their particular needs.

● Wiki or Community Forum Website


○ Most people are familiar with wikis through the most famous example of one out there:
Wikipedia. But wikis can be created on pretty much any subject you can imagine. A wiki
is any website where various users are able to collaborate on content and all make their
own tweaks and changes as they see fit. There are wikis for fan communities, for business
resources, and for collecting valuable information sources.

The Internet
● The Internet or “net” (network of network)is the largest computer network in the world that
connects billions of computer users. The word internet comes from the combination between
“interconnection” and “network”. Network is a collection of computers and devices connected
via communication channels and transmission media that allow sharing resources (hardware,
software, data, information). Generally, nobody owns the internet.

A. Brief History of Internet


ARPA – Advanced Research Project Agency January 2, 1969 – started an experimental computer
network. Concept – No server, but equal importance/participation to every computer in the
network. Even if one or two nodes are destroyed that will now affect the network. In 1982 the
word internet started. 1986 – First “ free net” created in Case Western Reserve University 1991: US
government allowed business agencies to connect to the internet. Now all people can connect to
the internet and improve their life and work quality. The internet supports various aspects in our
life. Vinton Gray Cerf ForMemRS is an American Internet pioneer and is recognized as one of
"the fathers of the Internet", sharing this title with TCP/IP co-developer Bob Kahn.

B. Major Components of Internet

1. Servers - This is a computer program that provides service to another computer program
and its user.

Types of Servers:
➢ Application Server - a program in computer that provides the business logic for
an application program.

➢ Web Server - a computer program that serves requested HTML pages or files.

➢ Proxy Server - is a software that acts as an intermediary between an endpoint


device, such as a computer and another server from which a user is requesting.

➢ Mail Server - is an application that receives incoming e- mail from local users
and remote senders and forward outgoing email for delivery
➢ File Server - is a computer responsible for central storage and management of
data files so that other computers on the same network can access them.

➢ Policy Server - is a security component of a policy–based network that provides


authorization services and facilities tracking and control of files.

2. IP Address (Internet Protocol) - is a numerical label assigned to each device. This


provides identity to a network device.
Example: 192.158.1.38.

3. Browser - This is an application program that provides a way to look at information on


the web.
Example of Browsers: Google chrome, safari, internet explorer, opera, Mozilla

4. Domain Name System (DNS) - This is the phonebook of the internet. We access
information online through the domain names.
Example of DNS: www.facebook.com, www.pup.edu.ph,www.academia.edu
Name Entity

.com commercial

.org organization

.net network

.edu education

.gov National and State Government Agencies

.ph Philippines

.au Australia
5. Internet Service Provide (ISP) - This is an organization that provides services for
accessing, using or participating in the internet.
Example: Sky Broadband, PLDT, Converge

Two Types of ISP


National ISP Regional ISP

provided internet access to a specific business that provides internet access in


geographic area. cities and towns
nationwide.

C. Uses of Internet
Look for Information Watch & post videos

School works, jobs, and home purposes Games

Send and receive electronic mail Take college courses

Video teleconferencing (video call, video chat) Monitor home while away

Buy and sell product Financial transactions

Social networking Download music and movies

D. Internet Terms and Definitions


● Internet - A global network of thousands of computer networks linked by data lines and
wireless systems.
● Web – a collection of billions of web pages that you can view with a web browser.
● Email – the most common method of sending and receiving messages online
● Social media – websites and apps that allow people to share comments, photos, and
videos
● Online gaming – games that allow people to play with and against each other over the
Internet
● Software updates – operating system and application updates can typically downloaded
from the Internet
● HTML - Hypertext Markup Language is a coding language used to tell a browser how to
place pictures, text, multimedia and links to create a web page. When a user clicks on a
link within a web page, that link, which is coded with HTML, links the user to a specific
linked web page.
● URL - Uniform Resource Locator is a web address used to connect to a remote resource
on the world wide web.
● Bit - is a single digit in the binary numbering system (base 2). For example: 1 is a bit or 0
is a bit.
● Byte - generally consists of eight bits.
● Upload - To upload is to transfer data from your computer to another computer.
● Download - To download is to transfer data from another computer to your computer.
● HTTP - is the acronym for Hypertext Transfer Protocol, the data communication
standard of web pages. When a web page has this prefix, the links, text, and pictures
should work correctly in a web browser.
● HTTPS - is the acronym for Hypertext Transfer Protocol Secure. This indicates that the
web page has a special layer of encryption added to hide your personal information and
passwords from others.
● Router or router-modem combination is the hardware device that acts as the traffic cop
for network signals arriving at your home or business from your ISP. A router can be
wired or wireless or both.
● Encryption - is the mathematical scrambling of data so that it is hidden from
eavesdroppers. Encryption uses complex math formulas to turn private data into
meaningless gobbledygook that only trusted readers can unscramble.
● Web Bot - A term that applies to programs/applets (macros and intelligent agents) used
on the Internet. Such bots perform a repetitive function, such as posting messages to
multiple newsgroups or doing searches for information.
● Search Engine - specialized software, such as Google and Yahoo, that lets www browser
users search for information on the web by using keywords, phrases.

Module 4
Lesson 1: Netiquette

What is Netiquette?
➢ Simply stated, it’s network etiquette – that is the etiquette of cyberspace and “etiquette” means
the forms required by good breeding or prescribed by authority to be required in social or official
life. In other words, netiquette is a set of rules for behaving properly online. Netiquette, or
network etiquette, is concerned with the "proper" way to communicate in an online environment.
Consider the following "rules," adapted from Virginia Shea's The Core Rules of Netiquette,
whenever you communicate in the virtual world. When you use e-mail, instant messenger, video
calls, or discussion boards to communicate with others online, please be sure to follow the rules
of professional online communications known as netiquette. These rules will help you
communicate with instructors, classmates, and potential employers more effectively and will help
prevent misunderstandings.

● Remember the Golden Rule


● Avoid Acronyms and Text talk
● Avoid “Screaming ” in Typed Messages
● Proofread Your Message Before You Send Them
● Exercise Good Judgment When Sharing Information to Others Online
● Respect Diversity in ViewPoints

Ten Commandments of Computer Ethics


1. Remember The Human When Communicating
2. Adhere To The Same Standards of Behavior Online That You Follow in Real Life
3. Know Where You are in Cyberspace.
● "Netiquette varies from domain to domain." (Shea, 1994).
4. Respect Other People Times
5. Make Yourself Look Good Online Writing.Colostate.Edu
6. Share Expert Knowledge
7. Help Keep Flame Wars Under Control
● What is meant by "flaming" and "flame wars?" "Flaming is what people do when they
express a strongly held opinion without holding back any emotion." (Shea, 1994).
8. Respect Other People’s Privacy
9. Don’t Abuse Your Power
10. Be Forgiving of Other People’s Mistakes
Lesson 2: Cybercrimes
What is Cyber?
● It is the Characteristics of the culture of computers, information, technology and virtual reality.
What is Cybercrime?
● It is defined as a crime in which a computer that is the object of the crime (hacking, phishing,
spamming and child pornography) is used as a tool to commit an offense.
What are Cyber Criminals?
● They may use computer technology to access personal information, business trade secrets or use
the internet for exploitative or malicious purposes.

Republic Act No. 10175 Cybercrime Prevention Republic Act No. 10173 Data Privacy Act of 2012
Act of 2012

This is a law in the Philippines approved on is an act protecting individual personal


September 12,2012 which aims to address legal information.
issues concerning online interactions and the
internet.

Common Forms of Cybercrime

A. Copyright - The exclusive legal right, given to an originator or an assignee to print, publish,
perform, film, or record literary, artistic, or musical material, and to authorize others to do the
same.
● Copyright Infringement - This is the violation, piracy or theft of a copyright holder's
exclusive rights through the unauthorized use of a copyrighted material or work.

B. Plagiarism - An act or instance of using or closely imitating the language and thoughts of another
author without authorization.

C. Computer Addiction
● Offline - generally used when speaking about excessive gaming behavior, which can be
practiced both offline and online.
● Online - Also known as “Internet Addiction”, gets more attention in general from
scientific research than offline computer addiction, mainly because most cases of
computer addiction are related to the excessive use of the Internet.
● Virtual Self - The persona you create about yourself virtually.

Criminal Activities
a. Hacking
● Unauthorized access of or interference with computer systems, servers, or other
information and communication systems. Unauthorized access to corrupt, alter, steal, or
destroy electronic data using computers or other information and communication
systems without the computer or system owner’s knowledge and consent The
introduction of computer viruses resulting in the corruption, alteration, theft, or loss of
such data
● Illegal Access
● Illegal Interception
● Data Interference
● System Interference
● Misuse of Devices
● Infection of IT Systems with Malware – if the act is committed against critical
infrastructure of the Philippines the penalty is between 12-20 years reclusion temporal.
Six years up to twelve years of imprisonment also known as prison mayor.

b. Computer-Related Forgery, Fraud and Identity Theft


● An attempt to obtain sensitive information such as usernames, passwords, and credit
card details and (indirectly money), often for malicious reasons.
● Phishing
● Pharming
● Spam
● Maximum of Php 200,000 fine or prison mayor.

c. Electronic Theft
● Illegal Downloading, Obtaining files that you do not have the right to use from the
internet. Digital Piracy, Practice of illegally copying and selling digital music, video,
computer software, etc. Copyright Infringement
● Penalty of Php 50,000 – 500, 000 and or prison mayor

d. Cyberbullying
● The use of electronic communication to bully a person, typically by sending a message of
an intimidating or threatening nature. The Anti-Bullying Act of 2013 (RA 10627).
e. Cybersex
● Willful engagement, maintenance, control, or operation, directly or indirectly of any
lascivious exhibition of sexual organs or sexual activity with the aid of a computer
system for favor or consideration. There is a discussion on this matter if it involves
“couples” or “people in relationship” who engage in cybersex.
● Penalty at least Php 200,000 and or prison mayor

f. Child Pornography
● Is a form of child sexual exploitation. Unlawful or prohibited acts defined and punishable
by Republic Act No. 9775 or the anti- Child Pornography Act of 2009, committed through
a computer system.
● Penalty of 12-20 years of imprisonment or reclusion temporal.

g. Cyber Defamation
● Is an unprivileged false statement of fact which tends to harm the reputation of a person
or company.
● Penalty of 6-12 years of imprisonment or prison mayor.

Lesson 3: Internet Threats

Hacking
● Hacking is a term used to describe actions taken by someone to gain unauthorized access to a
computer. The availability of information online on the tools, techniques, and malware makes it
easier for even non-technical people to undertake malicious activities. The process by which
cyber criminals gain access to your computer.

What can it do?


➢ Find weaknesses (or pre-existing bugs) in your security settings and exploit them in
order to access your information. Install a Trojan horse, providing a backdoor for hackers
to enter and search for your information.
Malware
● Malware is one of the more common ways to infiltrate or damage your computer. Malicious
software that infects your computer, such as computer viruses, worms, Trojan horses, spyware,
and adware.

What can it do?


➢ Intimidate you with scareware, which is usually a pop-up message that tells you your
computer has a security problem or other false information. Reformat the hard drive of
your computer causing you to lose all your information.
➢ Alter or delete files.
➢ Steal sensitive information.
➢ Send emails on your behalf.
➢ Take control of your computer and all the software running on it.

Pharming
● Pharming is a common type of online fraud. A means to point you to a malicious and illegitimate
website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be
redirected to a fake website.

What can it do?


➢ Convince you that the site is real and legitimate by spoofing or looking almost identical
to the actual site down to the smallest details. You may enter your personal information
and unknowingly give it to someone with malicious intent.

Phishing
● Phishing is used most often by cyber criminals because it's easy to execute and can produce the
results they're looking for with very little effort. Fake emails, text messages and websites created
to look like they're from authentic companies. They're sent by criminals to steal personal and
financial information from you. This is also known as “spoofing”.

What can it do?


➢ Trick you into giving them information by asking you to update, validate or confirm your
account. It is often presented in a manner that seems official and intimidating, to
encourage you to take action.
➢ Provides cyber criminals with your username and passwords so that they can access your
accounts (your online bank account, shopping accounts, etc.) and steal your credit card
numbers.

Ransomware
● Ransomware is a type of malware that restricts access to your computer or your files and displays
a message that demands payment in order for the restriction to be removed. The two most
common means of infection appear to be phishing emails that contain malicious attachments and
website pop-up advertisements.

What can it do?


➢ There are two common types of ransomware:
○ Lock Screen ransomware: displays an image that prevents you from accessing
your computer
○ Encryption ransomware: encrypts files on your system's hard drive and
sometimes on shared network drives, USB drives, external hard drives, and even
some cloud storage drives, preventing you from opening them
➢ Ransomware will display a notification stating that your computer or data have been
locked and demanding a payment be made for you to regain access. Sometimes the
notification states that authorities have detected illegal activity on your computer, and
that the payment is a fine to avoid prosecution.

What can you do?


➢ Do not pay the ransom. These threats are meant to scare and intimidate you, and they do
not come from a law enforcement agency. Even if you submit payment, there is no
guarantee that you will regain access to your system.
➢ If your computer has been infected (i.e. you are unable to access your computer or your
files have been encrypted), contact a reputable computer technician or specialist to find
out whether your computer can be repaired and your data retrieved.
➢ In order to lessen the impact of a ransomware infection, be sure to regularly back-up your
data with a removable external storage drive. It's possible that your files might be
irretrievable; having an up-to-date backup could be invaluable.

Spam
● Spam is one of the more common methods of both sending information out and collecting it from
unsuspecting people. The mass distribution of unsolicited messages, advertising or pornography
to addresses which can be easily found on the Internet through things like social networking
sites, company websites and personal blogs.

What can it do?


➢ Annoy you with unwanted junk mail. Create a burden for communications service
providers and businesses to filter electronic messages.
➢ Phish for your information by tricking you into following links or entering details with
too-good- to-be-true offers and promotions.
➢ Provide a vehicle for malware, scams, fraud and threats to your privacy.

Spyware (Spyware and Adware)


● Spyware and adware are often used by third parties to infiltrate your computer.

What is it?
➢ Software that collects personal information about you without you knowing. They often
come in the form of a ‘free' download and are installed automatically with or without
your consent. These are difficult to remove and can infect your computer with viruses.

What can it do?


➢ Collect information about you without you knowing about it and give it to third parties.
➢ Send your usernames, passwords, surfing habits, list of applications you've downloaded,
settings, and even the version of your operating system to third parties.
➢ Change the way your computer runs without your knowledge and take you to unwanted
sites or inundate you with uncontrollable pop-up ads.

Trojan Horses
● A Trojan horse may not be a term you're familiar with, but there's a good chance you or someone
you know has been affected by one. A malicious program that is disguised as, or embedded
within, legitimate software. It is an executable file that will install itself and run automatically
once it's downloaded.

What can it do?


➢ Delete your files.
➢ Use your computer to hack other computers.
➢ Watch you through your webcam.
➢ Log your keystrokes (such as a credit card number you entered in an online purchase).
➢ Record usernames, passwords and other personal information.

Viruses
● Most people have heard of computer viruses, but not many know exactly what they are or what
they do. Malicious computer programs that are often sent as an email attachment or a download
with the intent of infecting your computer, as well as the computers of everyone in your contact
list. Just visiting a site can start an automatic download of a virus .

What can they do?


➢ Send spam.
➢ Provide criminals with access to your computer and contact lists.
➢ Scan and find personal information like passwords on your computer.
➢ Hijack your web browser.
➢ Disable your security settings.
➢ Display unwanted ads.
➢ When a program is running, the virus attached to it could infiltrate your hard drive and
also spread to USB keys and external hard drives. Any attachment you create using this
program and send to someone else could also infect them with the virus.

How will you know if your computer is infected?


➢ It takes longer than usual for your computer to start up, it restarts on its own or doesn't
start up at all.
➢ It takes a long time to launch a program.
➢ Files and data have disappeared.
➢ Your system and programs crash constantly.
➢ The homepage you set on your web browser is different (note that this could be caused
by Adware that has been installed on your computer).
➢ Web pages are slow to load.
➢ Your computer screen looks distorted.
➢ Programs are running without your control.
➢ If you suspect a problem, make sure your security software is up to date and run it to
check for infection. If nothing is found, or if you are unsure of what to do, seek technical
help.

Wi-Fi Eavesdropping
● WiFi eavesdropping is another method used by cyber criminals to capture personal information.

What can it do?


➢ Virtual “listening in” on information that's shared over an unsecure (not encrypted) WiFi
network.What it can do:
➢ Potentially access your computer with the right equipment.
➢ Steal your personal information including logins and passwords.
Worms
● Worms are a common threat to computers and the Internet as a whole. A worm, unlike a virus,
goes to work on its own without attaching itself to files or programs. It lives in your computer
memory, doesn't damage or alter the hard drive, worms are a common computer and the internet
as a whole a company of the internet itself.

What can it do?


➢ Spread to everyone in your contact list.
➢ Cause a tremendous amount of damage by shutting down parts of the Internet, wreaking
havoc on an internal network and costing companies’ enormous amounts of lost revenue.

M5: Digital Technology and Social Change

Lesson 1: Introduction to the Digital Age


● Digital age, also known as Information age, is a period when the computer and the internet were
introduced. It is caused by the rapid shift from traditional industry to computerization all the
way to artificial intelligence which was brought by the Industrial Revolution. These technologies
enabled people to communicate information easily and rapidly. Digital Technology became
prevalent and widely used around the world. Information can be accessed easily especially with
the use of the internet. House chores and jobs are getting automated with the help of machines
and equipment. Mobile phones became very useful in every area of life --- in education,
entertainment, jobs, etc. Digital technologies have radically changed the way people work,
consume, and communicate over a short period of time.

The ICT and its Role to Social Change


● Social change refers to a transformation of culture and social organizations/structures over time.
We are aware that in a modern world, a society is never static and that social, political, economic,
and cultural changes occur constantly. The social transformations that could result from the
increasing use of ICTs depend strangely on verdicts made by organizations and individuals
outside our household, many of whom have great economic leverage, political power or technical
expertise. To increase the consent potential of ICTs, it is important to understand some of their
basic features, which make them a unique kind of technology.

The Advantage and Disadvantages

Entertainment
● Digital broadcasting has completely changed the way we experience television and radio.
Cinema can now be found at the comfort of your home through applications such as Netflix,
iFlix, etc. We get entertained by the content that we see on Facebook, YouTube, and Instagram.
Computer gaming has also been an important influence in the development of graphical
interfaces. Technology has been at the forefront of changes in production and distribution of
music. We can now listen to music and podcasts using Spotify. These are some of the many
technologies we use for entertainment that arise in the Digital Age.

Business
● Businesses in today’s life have promoted a lot with the coming of ICT. Its impact cannot be over
emphasized. For example, ICT helps to increase productivity in business with the use of social
Media platforms for marketing and promotion. The use of websites now allowed companies to
develop new and cheaper ways of offering customers with opportunities of buying goods and
services at their convenient time and enhance the level of customer service. Online platform has
been the marketplace where people can transact and communicate.

Education
● ICT can play varied roles in developing an effective learning environment. It assists teachers and
helps explain core content concepts and addresses misconceptions. It acts as a stimulant and
fosters analytical thinking and interdisciplinary studies. It networks a learner with peers and
experts and develops a collaborative atmosphere.It plays the role of a guide and mentor by
providing tailor made instructions to meet individual needs. Online learning facilitates learning
through digital mode. With the help of multimedia, it enhances effectiveness of teaching-learning
and hence proves crucial for early learners, slow learners and differently abled learners. Modern
ICT tools not only deliver the content but also replicate formal learning experience via virtual
learning. The intention of virtual classrooms is to extend the structure and services that
accompany formal education programs from the physical environment to learners.

Jobs and Earnings


● Beyond income security, employment fulfills a number of important roles for human wellbeing,
such as time structure, social contact, a sense of purpose, a valued social position as well as an
opportunity for skill use. For this reason, the labor market effects of digital transformation are
among the most significant for people’s well-being. The digital transformation has the potential
to generate substantial changes in the composition of the labor market as jobs that require certain
skill sets are replaced by a combination of technology and higher skilled labor, or even
completely automated. At the same time, digitalization yields opportunities by creating
employment in new and existing industries, with greater job-to-job mobility facilitated by online
job search tools. The digital economy also fundamentally changes the nature of work for many
people, with fewer jobs exerting physical demands on workers but more jobs placing an
emotional strain on desk-workers.New jobs in ICT and in other sectors become available.

Health
● Digitalization can affect people’s health status through the emergence of new physical and
mental health risks and through its impact on the health-care delivery system. Health risks
associated with the digital transformations include mental health problems associated with the
extreme use of digital technologies, especially among children and teenagers and the crowding
out of other activities such as physical exercise. Health-care delivery is also affected by new
digital technologies, such as electronic records, new treatment options, tele- care, and
teleconsultation. An important aspect of digitalization concerns the production and use of
medical data to improve the effectiveness and efficiency of health systems. As a caveat, the
exchange and use of medical and health data must meet high data protection and data security
standards, considering its sensitivity. How and where care is delivered is also affected by digital
innovations, which challenges the traditional role of care providers, with implications for
interactions among care providers and between providers and patients. The effects of these
changes in healthcare delivery of health inequalities are potentially large, but also less well
documented.

Theories in Technology
● It is the theory which strongly believes that technology shapes the culture, values, and social
structures of a society. The main reason why society progresses is because of the kind technology
the society has. Technological innovation is the cause of social progress. Technology has the
control over society --- over human actions, culture and values. Technology greatly influences
human thought and action. In other words, society is changing because of technology.
● According to Winner, technology is not the slave of the human being but rather humans are
slaves to technology as they are forced to adapt to the technological environment that surrounds
them.

Example:
● The Medium is the Message by Marshall McLuhan. The technology which is used as a channel of
communication matters more than the content.
● The invention of the stirrup. It is the foot support for horse-riders. Before its invention, riders
were not able to use swords while riding in a horse because they may lose balance. When the
stirrup was invented, it enabled armored knights to fight on horseback. Because of this, it brought
the development of feudal societies --- a military rule by nobles or lords .
● The invention of guns. Before, the weapons used were swords and archery soldiers had to be
skilled and trained in using these weapons. But a new invention in technology changed it all. A
gun was invented which requires less effort and can be used even from far distances. This
technology changed the way soldiers are trained. It also changed how soldiers fight in a war.

Social Constructivism
● Social Constructivism is the opposite of Technological Determinism. Social Constructivism
believes that humans play a main role in shaping technology rather than technology shaping
society. It believes that technology does not determine human action, but rather, human action
shapes the technology.

Technological Change
● Technological change means the technical knowledge used in the production of capital and
machinery. The various changes in technology leads to an increase in the productivity of
labor,capital and other production factors. Technological progress consists of creation of skill, new
means of production, new uses of raw materials and the widespread use of machinery.
● Technology is the most powerful means of wrestling power from nature in all possible ways. It
strengthens the facilities of man. Prof. Frankel assumes that the, “Technological change is not a
mere improvement in the technical know-how. It means much more than this. It should be
preceded by sociological change also, a willingness and desire on the part of the community to
modify their social, political and administrative institutions so as to make them fit with new
techniques of production and faster tempo of economic activity.” Technology, according to J. P.
Dewhurts, in fact, can be thought of as the change in the production process of material and
human skills.

Process of Technological Change


● Technological changes devise new goods and techniques of production. The development of new
technical knowledge can be defined as the growth of the new technique that can produce goods
and services at lesser cost of production.

The process of growth of technical knowledge can be divided into following stages:
a. Formulation of scientific principles
b. Application of these principles to give technical problems
c. Development of technical inventions to the point of commercial exploitation.

● The first stage is the advancement in scientific knowledge, the second is that of the application of
this knowledge to some useful purposes and third is the commercialization of invention which is
called innovation. This has a great significance in the process of development. Schumpeter has
distinguished between invention and innovation. Invention implies the discovery of new
technique while innovation is practical application of invention in production for market.
● It may be called commercialization that originates from scientific advancement. Invention is
scientific fact while innovation is economic fact. Inventions are carried on by the inventors' large
capital investments at every stage as it needs not only a scientific attitude but an attitude of the
community and an entrepreneurial skill of high order with the ability to understand the
possibilities of employing scientific incentives for commercial purposes.

W5-6: The Internet

The Internet
● Net - “Network of Network.”
● The word Internet is from the combination of the word interconnection and network. It is a
collection of computers and devices connected via communication channels and transmission
media that allows the sharing of resources (hardware, software, data, and information).

Internet in the 1950’s


● The Internet has no single inventor. Instead, it has evolved over time.
● The Internet got its start in the United States more than 50 years ago as a government weapon in
the Cold War.
● In 1962, a scientist from M.I.T and DARPA named J.C.R Licklider proposed: a “galactic network”
of computers that could talk to one another. Such a network would enable government leaders to
communicate even if the Soviet Unions destroyed the telephone system.
● In 1965, another M.I.T scientist developed a way of sending information from one computer to
one another that he called “packet switching.” Packet switching breaks data down into blocks, or
packets, before sending it to its destination.
● Vinton Gray Cerf ForMemRS is an American Internet Pioneer and is recognized as one of “the
fathers of the internet”’ sharing this title with TCP/IP co-developer Bob Khan.
● However, in 1991 the internet changed again. Tim Berners-Lee introduces the World Wide Web:
an Internet that was not simply a way to send files from one place to another but was itself a
“web” of information that anyone on the Internet could retrieve.
● Berners-Lee created the first browser and the Internet that we know today.

Contd.
● Scientists and researchers used it to communicate and share data with another through what was
known as Defense’s Advanced Research Projects Agency Network (DARPNET).
● This was in response to the Soviet Union bombings and a need to create a communication
network which was free from interference and disruption.
● Without packet switching, the government's computer network - now known as the ARPANET -
would have been just as vulnerable to enemy attacks as the phone system.
● By the end of 1970s, a computer scientist named Vinton Cerf had begun to solve this problem by
developing a way for all of the computers on all of the world’s mini-networks to communicate
with one another.
● He called his invention the “Transmission Control Protocol,” or TCP (Later, he added an
additional protocol, known as the “Internet Protocol.” The acronym we use to refer to these today
is TCP/IP.)
● In 1992, a group of student researchers at the University of Illinois developed a sophisticated
browser that they called Mosaic, (It later became Netscape.)
● Mosaic offered a user-friendly- way to search a Web: It allowed users to see words and pictures
on the same page for the first time and to navigate using scrollbars and clickable links.

You might also like