KEMBAR78
Week 2 - Lecture 1 | PDF | Application Software | Malware
0% found this document useful (0 votes)
4 views36 pages

Week 2 - Lecture 1

This document provides an overview of various information and communication technologies, including types of devices, software applications, and digital security measures. It highlights the importance of safeguarding personal information, health concerns related to technology use, and environmental issues associated with electronic waste. Additionally, it discusses communication networks and their applications across different sectors such as education, finance, and retail.

Uploaded by

shazainmax
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views36 pages

Week 2 - Lecture 1

This document provides an overview of various information and communication technologies, including types of devices, software applications, and digital security measures. It highlights the importance of safeguarding personal information, health concerns related to technology use, and environmental issues associated with electronic waste. Additionally, it discusses communication networks and their applications across different sectors such as education, finance, and retail.

Uploaded by

shazainmax
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 36

Application of Information and

Communication Technologies (ICT)


Course Code : CS 1009
Semester : Fall 2025
Chapter 1

INTRODUCING TODAY’S TECHNOLOGIES


COMPUTERS, DEVICES AND THE WEB

2
Pervious class
➢ Differentiate among laptops, tablets, desktops, and
servers
➢ Describe the purpose and uses of smartphones, digital
cameras and digital media players, e-book readers,
wearable devices, and game devices
➢ Describe the relationship between data and
information
➢ Briefly explain various input options (keyboards,
pointing devices, voice and video input, and scanners),
output options (printers, displays, and speakers), and
storage options (USB flash drives, optical discs, and
cloud storage)

3
Digital Security and Privacy
• Users should safeguard information stored in
computers and mobile devices.
• A malware, short for malicious software, is
software that typically acts without a user’s
knowledge and deliberately alters the
computer’s or mobile device’s operations.
• Examples include viruses, worms, spyware,
and zombies.

4
Digital Security and Privacy
• Some are harmless while others destroy or
corrupt data, instructions, and information stored
on the infected computer or mobile device.
• Protect from viruses and other malware by
following use virus protection software, use a
firewall, be suspicious of all unsolicited email and
text messages, download software with caution,
before using any removable media, scan it for
malware and backup regularly.

5
Digital Security and Privacy
• Protect yourself and your dependents.
• A username is a unique combination of
characters, such as letters of the alphabet or
numbers, that identifies one specific user.
• A password is a private combination of
characters associated with a user name.
• Create strong passwords by avoiding using any
personal information, use at least 8 characters,
modify it regularly, and avoid common
sequences.
6
Health Concerns
• Prolonged or improper computer and mobile
device use can lead to injuries or disorders of
the wrist, elbows, eyes, neck and back.
• Excessive use of ear buds and headphones
cause some users hearing loss.
• Two behavioral health risks are technology
addiction and technology overload.

7
Health Concerns
• Technology addiction occurs when someone
becomes obsessed with using technology.
• Technology overloaded person feels distressed
when deprived of computers and mobile
devices.

8
Environmental Issues
• When computers and mobile devices are
stored in basements or other locations,
disposed of in landfills, or burned in
incinerators, they can release toxic materials
and potentially dangerous levels of lead,
mercury, and flame retardants.

9
Environmental Issues
• Green computing involves reducing the
electricity consumed and environmental
waste generates when using a computer.
• Strategies include recycling, using energy
efficient hardware and energy-saving features.

10
Programs
• Software also called a program, consists of a
series of related instructions, organized for a
common purpose, that tells the computer
what tasks to perform and how to perform
them.
• Two categories of software are system
software and applications software (apps).

11
Programs
• System software consists of the programs that
control or maintain the operations of the
computer and its devices.
• Example is operating systems.
• An operating system is a set of programs that
coordinates all the activities among computer or
mobile devices hardware. It provides a means for
users to communicate with the computer or
mobile device and other software.
12
Programs
• Examples of operating systems are Windows,
Apples macOS.

13
Applications
An application consists of programs
designed to make users more productive
and/or assist them with personal tasks.

14
Apps

15
Applications
• Applications include programs stored on a
computer, as well as on the mobile device or
delivered to your device over the Internet.
• A desktop app is an application stored on a
computer.
• A web app is an application stored on a web
server that you access through a browser.
• A mobile app is an application you download
from a mobile’s device app store or other location
on the Internet to a smartphone or other mobile
device.
16
Applications
• Some applications are available as both a web
app and mobile app. In this case, you typically
can sync (or match) the data and activity
between the web app and mobile app.

17
Installing Programs
• Installing a program is the process of setting
up the program to work with a computer or
mobile device, printer, and/or other hardware.
• Installed apps in OS include browser, media
player, and calculator.
• We interact with a program through its
interface.

18
Running Programs
• When you instruct a computer or mobile
device to run a program, the computer or
mobile loads it, means copy the instructions
from storage to main memory.
• Once in memory, the computer or mobile
device can carry out, or execute the
instructions in the program.

19
Programs and Apps
• The user interface controls how you enter
data and instructions and how information is
displayed on the screen.

20
Activity
How do you know if a program will run on your
computer?
• When you buy a computer, you can find a list of the
computer's specifications on the box, the manufacturer's
website, or the order summary. Similarly, when you buy
software, the box or the product's website will list
specifications and minimum requirements for memory,
speed, and more. Your computer's specifications should be
the same as or greater than the software specifications.
Ensure the software will run on your computer before
making a purchase, because many retailers will not allow
you to return software.

21
Developing Programs and
Apps
• A software developer, sometimes called a
developer or programmer, is someone who
develops programs and apps or writes the
instructions that direct the computer or
mobile device to process data into
information.

22
Developing Programs and
Apps

23
Communication and
Networks
• Communications technologies are
everywhere.
• Many require you to subscribe to an Internet
Service Provider.
• With others, an organization such as a
business or school provides communication
services to employees, students, or
customers.

24
Wired and Wireless
Communications
• Computer communications describes a
process in which two or more computers or
devices transfer (send and receive) data,
instructions, and information over
transmission media via a communication
device.
• A communication device is hardware capable
of transferring items from computers and
devices to transmission media and vice-versa.

25
Wired and Wireless
Communications

26
Wired and Wireless
Communications
• Wired communications often use some form
of telephone wiring, coaxial cable, or fiber-
optic cables to send communications signals.
• Wireless communication sends signals
through air or space.

27
Wired and Wireless
Communications
• Wi-Fi uses radio signals to provide high-speed
Internet and network connections to
computers and devices capable of
communicating via Wi-Fi.
• Bluetooth uses short-range radio signals to
enable Bluetooth-enabled computers and
devices to communicate with each other.
• For example Bluetooth headsets

28
Wired and Wireless
Communications
• Cellular radio uses the cellular network to
enable high-speed Internet connections to
devices with built-in compatible technology,
such as smartphones.
• A hot spot is a wireless network that provides
Internet connections to mobile computers and
devices.

29
Networks
• A network is a collection of computers and
devices connected together, often wirelessly
via communications devices and transmission
media.

30
Networks
• Home Networks are usually small, existing
within a single structure, and use wireless
technologies.
• Business Networks can be small, such as in a
room or building, or widespread, connecting
computers and devices across a city, country
or the globe.

31
Technology Uses
• Education sector (Virtual University,
IllmkiDuniya, universities with latest
computers in labs, Slate.)
• Government websites (Driving License online
facility, PPSC, FESCO Web Bill.)
• Finance (HBL,NBP,UBL mobile apps)
• Retail (All clothing brands websites, Daraz.)
• Science (Pacemakers implant)
32
Technology Uses
• Travel (TripAdvisor, GPS)
• Publishing (Blogs, podcasts)

33
Technology Users

34
Technology Users

35
Summary
• This chapter introduced all types of inputs,
outputs, computer and media devices. The
security and privacy related to systems is also
discussed along with the use of technology.

36

You might also like