Ite 0001-1 - Lecture

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 50

ITE 0001-1

ITE 0001-1
LIVING IN THE IT ERA
Resource: Ms. Jamillah S. Guialil

UNIT I:
INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY

Outline:
● Overview Information and Communication Technology
● Define the difference between IT and ICT
● Components of Computer
● Functions of Computer (Input and Output)
● Discover the power of Computers
● Explore:
○ Digital Age/
○ Information Age/
○ Computer Age

INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

➔ It often deals with the use of different technological inventions like mobile phones,
telephones, computers, internet, and other devices, as well as software and
applications to locate, save, send, and manipulate information.
➔ It has greatly contributed to how easy our lives have been today where our gadgets
have become part of our necessity that we check on them after we wake up. It made
communication easier.
➔ Technologies that provide access to information through telecommunications.
➔ Modern information and communication technologies have created a “global village”, in
which people can communicate with others across the world as if they were living next
door.

BENEFITS

● It has also assisted us in our work since there are Internet-based jobs.
● It has revolutionized our education.
● It modernized our economy, online transactions/ecommerce

INFORMATION TECHNOLOGY (IT)

➔ It refers to anything related to computing technology, such as networking, hardware,


software, the internet, or the work with these technologies.

INFORMATION PROCESSING SYSTEM

● DATA
- A collection of independent and unorganized facts.

● INFORMATION
- Is the processed and organized data presented in a meaningful form.

● DATA PROCESSING
- Is the course of doing things in a sequence of steps.

● COMPUTER
- An electronic machine that follows a set of instructions in order that it may be
able to accept and gather data and transform these into information.

INFORMATION PROCESSING SYSTEM

1
ITE 0001-1

● INPUT
- Accepts and gathers data.

● PROCESSING
- Processes data to become information.

● STORE
- Stores data and information (database).

● OUTPUT
- Presents the gathered and stored information.

BASIC COMPONENTS OF COMPUTER

There are five basic components which include:


● Input Unit
● Output Unit
● Memory Unit(CPU/System Unit)
● Control Unit(CPU/System Unit)
● Arithmetical and Logical Unit(CPU/System Unit)

3 MAJOR COMPONENTS OF INFORMATION SYSTEM

● HARDWARE
- Tangible part of computer system.

● SOFTWARE
- Non-tangible part that tells the computer how to do its job.

● USER
- Refer to people who use and operate the computer system, write computer
programs, and analyze and design the information system.

BASIC COMPONENTS OF COMPUTER: DATA PATH

➔ It is a set of functional units that carry out data processing operations.


➔ Datapaths, with a control until, make up the CPU (central processing unit) of a
computer system. A larger data path can also be created by joining more than one
together using multiplexers.

● PROGRAMMABLE REGISTERS
- Small units of data storage that are directly visible to assembly.

● THE PROGRAM COUNTER (PC)


- Holds the address for fetching instructions.

● MULTIPLEXERS
- Have control inputs coming from control. They are used for routing data
through the datapath.

2
ITE 0001-1

● PROCESSING ELEMENTS
- Compute new data values from old data values. In simple processors the
major processing elements are grouped into an Arithmetic-Logic Unit (ALU).
● SPECIAL–PURPOSE REGISTERS
- Hold data that is needed for processor operation but is not directly visible to
assembly language programmers.

BASIC COMPONENTS OF COMPUTER: CONTROL

➔ Control generates control signals that direct the operation of memory and the datapath.

The control signals do the following:


● Tell memory to send or receive data
● Tell the ALU what operation to perform
● Route data between different parts of the datapath

BASIC COMPONENTS OF COMPUTER: MEMORY

➔ A memory is just like a human brain. It is used to store data and instructions.
➔ Computer Memory is the storage space in the computer, where data is to be
processed and instructions required for processing are stored.

Two Types of Memory


1.) VOLATILE MEMORY
- Is computer memory that requires power to maintain the stored information.
Most modern semiconductor volatile memory is either static RAM (SRAM) or
dynamic RAM (DRAM).

2.) NON-VOLATILE MEMORY


- Can retain the stored information even when not powered.
- Examples: non-volatile memory include read-only memory (ROM), flash
memory, most types of magnetic computer storage devices (e.g. hard disk
drives, floppy disks and magnetic tape), optical discs, and early computer
storage methods such as paper tape and punched cards.

BASIC COMPONENTS OF COMPUTER: INPUT DEVICES

➔ External devices such as keyboards, mice, disks, and networks that provide input to the
processor.
➔ In modern processors, this data is placed in memory before entering the processor.
Input handling is largely under the control of operating system software.

Examples:
● Camera
● Touch screen
● Mouse
● Scanner
● Keyboard
● Joystick
● Web cam
● Microphone
● Track ball

BASIC COMPONENTS OF COMPUTER: OUTPUT DEVICES

➔ It is data going from the processor to external output devices such as displays, printers,

3
ITE 0001-1

disks, and networks.


➔ In modern processors, this data is placed in memory before leaving the processor.
Output handling is largely under the control of operating system software.

Examples:
● Webcam
● Microphone
● Printer
● Monitor
● Printer
● Headphone
● Speakers

Why computers are powerful?

➔ Computers can perform the information processing cycle operations (input, process,
output, and storage) with amazing speed, reliability, and accuracy. It can store huge
amounts of data and information; and communicate with other computers.

A BRIEF HISTORY OF COMPUTER

● ANCIENT TIMES
○ Fingers and toes for counting with the basis for the base of 10 in the
numbering system
○ Using sticks and stones as markers ortallying
○ Notched sticks and knotted cords were also used for counting
○ Symbols are written on hides, parchment, and later on paper
○ Concept of numbers was also invented during this time

● ROMAN EMPIRE
○ Abacus was developed, “the first machine”for calculation.

1600-1673
● 1600
○ John Napier invented logarithms and inscribed its measurement on a set of
10 wooden rods to do multiplication and division, also known as Napier’s
Bones

● 1621 - The Slide Rule


○ William Oughtred
■ invented the slide rule, and
■ using the Napier’s Bones concept, he invented a calculating
“machine” which was used up until the mid-1970s
○ First hand-held calculators and microcomputers emerged.

● 1642 - Blaise Pascal


○ He invented the Pascaline that could do addition and subtraction
○ Pascal’s machine has a series of gears with 10 teeth each:the numbers 0 – 9.
It became the foundation of all mechanical adding machines for years
○ Pascal programming language was named after him

● 1673 - Gottfried Wilhelm von Leibniz


○ He invented the Leibniz’s Wheel or the Step Reckoner, a calculating
machine that can perform the four mathematical operations
○ He also invented the binary arithmetic

4
ITE 0001-1

1725-1745
● 1725 - The Bouchon Loom
○ He was inspired by how his father programmed the player organs and adapted
the idea as a way of “programming.” It is a set of papers that went over a
piece of the loom and lifted specific threads where holes created
○ Made the first punched paper, stored program but it was unsuccessful.
● 1728 - Falcon Loom
○ Jean-Batist Falcon used a punched cardboard card instead of papers
Although it was more durable than the paper, it also became unsuccessful

● 1745 - Joseph Marie Jacquard


○ Brought together the idea of Bouchon and Falcon to create a programmable
loom using weaving operations. Set of punched cards tied together to form a
long loop and can add as many cards as possible
○ The concept of punched data storage was adapted for computer data input

1822-1880
● 1822 - Charles Babbage
○ He is the Father of modern computer
○ He first designed plans to build what he termed the Automatic Difference
Engine to aid the creation of navigational mathematical tables
○ He also proposed the construction of the Analytic Engine consisting of a
punched card input, a memory unit (called the store), an arithmetic unit(called
the mill), automatic printout, sequential program control, and 20-place decimal
accuracy. Both of his propositions were never built due to limitations

● 1842-1843 - Ada Lovelace


○ She was the First Programmer
○ Translated the narrative of Italian mathematician Luigi Menabrea on Charles
Babbage's Analytic Engine
○ Created a complete detail set of notes for calculating Bernoulli numbers
with the Engine.This was recognized as the first computer program

● 1880s - Herman Hoollerith


○ Developed the punched card tabulating system. He also contributed the use of
punched card data storage in computers and was the same size as those
Hollerith’s machine, which is the size of a one-dollar bill.

———

● 1939 - 1942 - Dr. John Vincent Atanasoff and Clifford Beery


○ They built the Atanasoff-Berry Computer or ABC, which is the first electronic
computer.
○ The computer used a circuit with 45 vacuum tubes for calculations and
capacitors for storage.
○ Also, the first computer to use binary math

● 1944 - Mark 1 (Automatic Sequence Controlled)


○ Completed in 1944 by Harvard's Dr. Howard Aiken
○ The first electro-mechanical computer that can make logical decisions
○ It was programmed using punched paper tape, and the instructions can be
changed It was the realization of Babbage’s dream Grace Hopper, one of the
primary programmers of Mark I, was credited for the term debugging to
describe the process of eliminating program errors
○ The Mark I malfunctioned due to a dead moth, and Grace Hopper removed
the moth (debugged the program) and recorded it as Relay #70 Panel F
(moth) in relay. The first actual case of a bug found in the program.

5
ITE 0001-1

● 1948 - The Transister


○ John Bordeen, Waltar Brattain, and William Shockly invented the transistor
at Bell Labs
○ Transisters are used in the second generation of computers. The transition
from vacuum tube to transistor circuitry

● 1954 - IBM 650


○ First electronic computer for business was installed at General Electric
Appliance Park in Louisville, Kentucky
○ The start of IBM 650 operations in Boston

● 1958 - 1962 - Programming Languages


○ During those years, programming languages were developed
■ FORTRAN (FORmula TRANslator)
■ COBOL (COmmon Business Oriented Language)
■ LISP (LISt Processor)
■ ALGOL (ALGOrithmic Language)
■ BASIC (Beginners All-purpose Symbolic Instruction Code)

● 1943 - Colossus I
○ It is the first successful electronic computer built in Bletchley Park, England
○ Capable of performing codebreaking during World War II
○ Could not be re-programmed

● 1946 - ENIAC (Electrical Numerical Integrator and Calculator)


○ Developed by John Presper Eckert and John Mauchly
○ The First multipurpose electronic computer
○ During World War II, it was used to calculate aircraft courses, shell
trajectories, and break codes
○ Occupied a 20x40 ft. room and used 18,000 vacuum tubes
○ It can never be turned off as it blew too many tubes when turned back on Has
a minimal storage capacity
○ Was programmed by jumper wires plugged into a large board

● 1951 - UNIVAC (UNIVersal Automatic Computer)


○ The First practical electronic computer was built by Eckert and Mauchly (also
the one who built ENIAC)
○ The Bureau of Census used the first UNIVAC
○ It was mass-produced

● 1957 - 1959 - IBM 704


○ As the IBM 704 computer emerged, the Fortran language was developed
○ It only allows individual transistors, which is 1 component per chip

● 1964 - IBM System/360


○ The introduction of IBM System/360 started during the third generation of
computers
○ New hybrid circuits allowed for 10 components per chip

● 1970 Integrated Circuits


○ Computer technology allowed for 1000 components per chip
○ In comparison to the previous 20 years, the size of electronic components
became smaller

● 1975 - Altair 8800


○ First low-cost microprocessor computer that is commercially available
○ Developed by Micro Instrumentation and Telemetry Systems
○ Microcomputer designed based on Intel 8080 CPU

6
ITE 0001-1

Late 1970s to early 1980s

● 1977 - The Apple II


○ First and most highly successful mass-produced microcomputer products
○ Primarily designed and built by Steve Wozniak with the help from his friend
Steve Jobs
○ They started the Apple Computer in 1977 in Woz’s garage

● 1984 - 1989 (Personal Computer)


○ IBM produced their first microcomputer
○ IBM Personal Computer is the first computer released in the IBM PC model
line
○ Their first PC is the IBM Model 5150
○ After this, imitations started to appear

● 1984 - 1989
○ First successful mass-market all-in-one desktop personal computer
■ It has a featured graphical userinterface, built-in screen, keyboard,
and mouse
■ Designed, manufactured, and sold by Apple Inc.
■ The owners sarcastically refer to it as AGAM-84 Almost as Good As
Macintosh 84
■ Windows 1.0 was introduced for the PC

● 1990s
○ In comparison to ENIAC, the microcomputers of the 1990s were faster, had a
bigger memory capacity, 1990s were smaller, and were less expensive.
○ Microcomputers in the early 2000s were two to three times more capable than
those in the 1990s
○ Data storage has also grown in capacity and shrunk in size along with the
development ofthe computer. From the Bouchon’s loom punched papertape
in1725 through the early 2000s’flash drive with 256MB to 16GB.

DIGITAL AGE/ INFORMATION AGE/ COMPUTER AGE

➔ Historic period in the 21st century characterized by the rapid shift from traditional
industry that the Industrial Revolution brought through industrialization, to an economy
based on information technology.
➔ The modern age is regarded as a time in which information has become a commodity
that is quickly and widely disseminated and easily available especially through the use
of computer technology.

INFORMATION AGE

➔ A historical period that began in the mid-20th century, characterized by a rapid epochal
shift from the traditional industry established by the Industrial Revolution to an economy
primarily based upon information technology.
➔ Very fast growth in communication and information technology

● 1946s - 1970s (Mainframe Computing)


● 1980s and 1990s (Home computing)
● 2000s (Wireless computing)
● Present (Data Science)

1946 ENIAC ERA

7
ITE 0001-1

➔ The first programmable general-purpose electronic digital computer, built during World
War II by the United States and completed in 1946.

LADY ADA LOVELACE


- Is the first programmer

HOME COMPUTING

➔ Were a class of microcomputers that entered the market in 1977 and became common
during the 1980ss. They were marketed to consumers as affordable and accessible
computers that, for the first time, were intended for the use of a single nontechnical
user.

● 1990’s THE INTERNET ERA


- An electronic communications network that connects computer networks and
organizational computer facilities around the world.

● 2000’s WIRELESS COMPUTING


- Transferring the data or information between computers or devices that are
not physically connected to each other and having a “wireless network
connection”.

UNIT II:
CURRENT TRENDS OF ICT

Outline:
● Introduction
● Hyper Automation
● Democratization
● Human Augmentation
● Data Policing
● Machine Learning
● Robotic Process
● Block Chain
● Voice Search
● Analytics

INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

➔ ICT is the infrastructure and components that enable modern computing. It is also
defined as a diverse set of technological tools and resources used to transmit, store,
create, share or exchange information. These technological tools and resources include
computers, the internet, live broadcasting technologies, record broadcasting
technologies and telephony.

CURRENT TRENDS IN ICT

➔ IT would never stand still. It is a rapid, ever changing industry that is full of new
technologies, tools, software frameworks and innovative ideas. Here are a few of the
current trends of ICT that are likely to define the future years.

● 5G PROLIFERATION
- The practical usage of 5G brings broadband download speeds over mobile
networks and provides 10x faster internet services than 4G. Consequently, it
provides the impetus for further development of disruptive technologies,

8
ITE 0001-1

including the Internet of Things, self-driving cars, virtual and augmented


reality, robotic surgery, drone delivery and more

● CYBER SECURITY
- Spending on cybersecurity continues to grow for several reasons
- More and more companies are undergoing digital transformation, so
they need protection for their digital business environments.
- More businesses have been assessing the risks of data breaches
and realizing the amount of financial and other losses they can avoid
by developing a comprehensive cybersecurity strategy.
- Cybercriminals continuously invent increasingly sophisticated
malicious activities, so companies need to hire skilled professionals
and introduce advanced counteractions to resist their attacks.

● BLOCKCHAIN
- Though most people still associate blockchain with cryptocurrencies only, the
technology has been successfully incorporated into many other fields that
require decentralized data storage and transparency of transactions. For
example, blockchain is currently used for supply chain management, making
falsifications practically impossible at all its stages (financial transactions,
warehousing, inventory records, delivery schedule, etc.). The security of
medical data management is also enhanced using blockchain technology

● ARTIFICIAL INTELLIGENCE
- Artificial intelligence and machine learning have been the headliners among
emerging information technologies. Many large businesses have begun to
introduce AI and ML solutions into their operations, gaining tangible benefits
such as improved customer experience, streamlined processes, reduced
production issues and higher revenues.

● QUANTUM COMPUTING
- Quantum computing technology is a completely new way of transmitting and
processing information based on the phenomena of quantum mechanics.
Traditional computers use binary code (bits) to handle information. The bit has
two basic states, zero and one, and can only be in one of them at a time. The
quantum computer uses qubits, which are based on the principle of
superposition. The qubit also has two basic states: zero and one. However,
due to superposition, it can combine values and be in both states at the same
time

● ROBOTIC PROCESS AUTOMATION


- This type of automation, bots are trained to completely take over human tasks.
They don’t need APIs but run on top of systems using a screen-scraping
method. Bots record actions that humans perform in the interface (typing in
data, moving a mouse) and then mimic them, thus performing the same tasks.
Leveraging AI and ML technologies, bots can categorize unstructured
information, interpret it and make decisions independently.

1. HYPER-AUTOMATION

➔ It is a streamlined approach to automating business and IT processes


organization-wide for more accurate, accelerated workflows by harnessing the power of
multiple technologies.

KEY COMPONENTS:
● ROBOTIC PROCESS AUTOMATION (RPA)
- A software technology that makes it easy to build, deploy, and manage
software robots that emulate human actions interacting with digital systems
and software

9
ITE 0001-1

● BUSINESS PROCESS MANAGEMENT (BPM)


- It is one of the most important components of hyper automation. It is the
practice of modeling, analyzing, and optimizing end-to-end business
processes to help meet your strategic business goals

● ARTIFICIAL INTELLIGENCE (AI) & MACHINE LEARNING (ML)


○ Artificial Intelligence
- a bigger concept to create intelligent machines that can simulate
human thinking capability and behavior.
○ Machine Learning
- an application or subset of AI that allows machines to learn from data
without being programmed explicitly

● ADVANCE ANALYTICS
- A data analysis methodology that uses predictive modelling, statistical
methods, automation techniques, and machine learning used to help
organizations get more insight and value from the data collected

ADVANTAGES:
● Increased Efficiency
● Improved Accuracy
● Increased Productivity
● Improved Agility
● Cost Savings

DISADVANTAGES:
● Job Loss
● Dependence on Technology

2. MULTI-EXPERIENCE

➔ Involves developing fluent customer experiences across websites, apps, and modalities
of voice, touch, and text, irrespective of the channel.

Technologies of Multi-Experience:
● AUGMENTED REALITY
- The real-time use of information in the form of text, graphics, audio and other
virtual enhancements integrated with real-world objects.

● VIRTUAL REALITY
- A computer-generated environment with scenes and objects that appear to be
real, making the user feel they are immersed in their surroundings.

● MIXED REALITY
- A combination of physical and virtual realities, in which both digital and
material objects can coexist and interact with each other.

● CHATBOTS
- A computer program that simulates human conversation through voice
commands or text chats or both

● WEARABLES
- These are hands-free gadgets with practical uses, powered by
microprocessors and enhanced with the ability to send and receive data via
the Internet.

ADVANTAGES:

10
ITE 0001-1

● Improved Operational Efficiency


● Minimize the Time to Market Apps
● Enable Controlled Deployment
● Remove Security Risk

3. DEMOCRATIZATION

➔ Gartner (2019), “Democratization of technology means providing people with easy


access to technical or business expertise without extensive (and costly) training.
➔ It’s often called “citizen access”
➔ It focuses on four key areas which are app development, data analysis, design and
knowledge

EXAMPLES:
● Printing Press
● Online Platform
● Computers
ADVANTAGES:
● Enhanced Employee Productivity
● Innovation
● Increased Customer Satisfaction
● Increased Citizen Participation and Government Transparency
● Growth of Business and Entrepreneurship
● Flexible Working and Smaller Expenses
● Faster Development Times and Cost Savings

DISADVANTAGES
● Inequality
● Negative Impact on Society
● No Privacy
● Negative Impact on Employment

4. HUMAN AUGMENTATION

➔ It is the use of technology to enhance a person’s cognitive and physical experiences.


➔ This can come in the form of many things, be it through medical or technological
advancements.

● PHYSICAL AUGMENTATION
- Physical augmentation changes an inherent physical capability by implanting
or hosting a technology within or on the body.
- Four Main Categories
- Sensory augmentation
- Appendage and biological function augmentation
- Brain Augmentation
- Genetic Augmentation

● COGNITIVE AUGMENTATION
- It includes some technology in the brain augmentation category as they are
physical implants that deal with cognitive reasoning.

TYPES OF HUMAN AUGMENTATION:


● REPLICATION
- Human augmentation sometimes aims to replicate simple human abilities.

● SUPPLEMENTATION
- Supplementation aims to improve the abilities humans already have.

● EXTENSION

11
ITE 0001-1

- Human augmentation can come in the form of extending, exceeding, or going


beyond normal human abilities.

APPLICATION OF HUMAN AUGMENTATION


● BIONICS
- One of the most prominent human augmentation tools takes the form of
bionics or prosthetics. These man-made limbs are beneficial to amputees and
disabled people.

● NEUROTECHNOLOGY
- Another application of human augmentation is neuroprosthetics, it aims to
connect the human brain to computers. This will allow you to control the robot
and other prosthetic tools with just your mind

● ALTERATION
- Another prominent form of human augmentation is nootropics, they usually
come in the form of drugs that enhance human cognition in some way.

● WEARABLE HUMAN AUGMENTATION


- It is the most viable, and potentially most accessible, form of human
augmentation

OBSTACLES AND HINDRANCES:


● Technical Obstacles
● Ethical Issues
● Stunning Growth

5. DATA POLICING

➔ It is the current use of a wide variety of digitized data sources to inform decision
making, improve processes, and increase actionable intelligence for all personnel
within a police service, whether they be operating at the frontline or in positions of
strategic leadership.
➔ Sometimes known as "predictive policing"

Example:
A sample of an incident report, from the Bakersfield, California police department. The
officer who responds to an incident will record the details on a form like the one shown.
Each cell on the form will eventually be transferred into a database with other incident
reports.

ADVANTAGES:
● Improves Crime Prevention
● Informed Decision Making
● Advances The Justice System

DISADVANTAGES
● Privacy and Security Concerns
● Issues about accuracy
● Leaning towards discrimination

6. MACHINE LEARNING

➔ It is the science of making computers learn and behave like humans, and enhance their
learning with the course of time without the intervention of human beings.

METHODS OF MACHINE LEARNING:

12
ITE 0001-1

● Supervised Learning
● Unsupervised Learning
● Semi-supervised Learning
● Reinforcement Learning

EXAMPLES:
1. Image Recognition
a. Real-world examples of image recognition:
i. Label an x-ray as cancerous or not
ii. Assign a name to a photographed face (aka “tagging” on social
media)
iii. Recognise handwriting by segmenting a single letter into smaller
images
2. Speech Recognition
a. Real-world examples of speech recognition:’
i. Voice search
ii. Voice dialling
iii. Appliance control
3. Medical Diagnosis
a. Real-world examples of medical diagnosis:
i. Assisting in formulating a diagnosis or recommends a treatment
option
ii. Oncology and pathology use machine learning to recognise
cancerous tissue
iii. Analyse bodily fluids
4. Statical Arbitrage
a. Real-world examples of statistical arbitrage:
i. Algorithmic trading which analyses a market microstructure
ii. Analyse large data sets
iii. Identify real-time arbitrage opportunities

ADVANTAGES:
● It identifies trends and patterns very easily
● It improves itself over time
● It is self-sufficient and assorted
● Saves time and is energy-efficient

DISADVANTAGES:
● It identifies trends and patterns very easily
● It improves itself over time
● It is self-sufficient and assorted
● Saves time and is energy-efficient

7. ROBOTIC PROCESS

➔ Robotic Process Automation (RPA) is software technology that’s easy for anyone to
use to automate digital tasks.
➔ With RPA, software users create software robots, or “bots”, that can learn, mimic, and
then execute rules-based business processes.
➔ Uses: With RPA, software users create software robots, or “bots”, that can learn,
mimic, and then execute rules-based business processes

SECTORS THAT USES RPA


● Insurance
● Banking
● Health care
● Manufacturing

13
ITE 0001-1

● Public Sectors
● Life Sciences

BENEFITS:
● Fast Transactions
- Improve productivity by automating repetitive processes.
● Workflow Efficiency
- Automate document processing and claims workflow to improve timeliness
and accuracy. Ensures business operations comply with regulation and
standards
● Easy access on data
- Improve access to internal and external data sources to enrich risk analysis
and product development.
● Improve customer service
- Provide real-time access to customer data and accelerate completion of
customer requests.
● Security and production
- Identify retention risks and proactively offer products/services to meet
customer needs

8. BLOCKCHAIN

➔ It is a method of recording information that makes it impossible or difficult for the


system to be changed, hacked, or manipulated.
➔ It is a distributed ledger that duplicates and distributes transactions across the network
of computers participating in the blockchain
➔ It is a structure that stores transactional records, also known as the block, of the public
in several databases, known as the “chain,” in a network connected through
peer-to-peer nodes. Typically, this storage is referred to as a ‘digital ledger.’
➔ Most people assume Blockchain and Bitcoin can be used interchangeably, but in
reality, that’s not the case. Blockchain is the technology capable of supporting various
applications related to multiple industries like finance, supply chain, manufacturing, etc.,
but Bitcoin is a currency that relies on Blockchain technology to be secure.

TYPES OF BLOCKCHAIN
1. PRIVATE BLOCKCHAIN NETWORKS
- Private blockchains operate on closed networks, and tend to work well for
private businesses and organizations.
2. PUBLIC BLOCKCHAIN NETWORKS
- Bitcoin and other cryptocurrencies originated from public blockchains, which
also played a role in popularizing distributed ledger technology (DLT).
3. PERMISSIONED BLOCKCHAIN NETWORKS
- Also sometimes known as hybrid blockchains, permissioned blockchain
networks are private blockchains that allow special access for authorized
individuals.
4. CONSORTIUM BLOCKCHAINS
- Similar to permissioned blockchains, consortium blockchains have both public
and private components, except multiple organizations will manage a single
consortium blockchain network.

BENEFITS:
● Fast Process
- Blackchain avoids passing thru a third party.
● Highly Secure
- It uses a digital signature feature to conduct fraud-free transactions.
● Decentralized System
- Users won't need the approval of regulatory authorities like a government or
bank.
● Automation Capability

14
ITE 0001-1

- Blockchain is programmable and can generate systematic actions, events,


and payments automatically when the criteria of the trigger are met.

9. VOICE SEARCH

➔ A voice command can be used with voice search technology to conduct an Internet,
website, or application search. This function, which was made possible by
improvements in speech recognition, originally emerged on smartphones and allowed
the search bar to be removed.

ADVANTAGES:
● It is quicker.
● It is usually true.
● It enables hands-free operation.

DISADVANTAGES:
● Precision is never flawless.
● The software is unable to comprehend complicated vocabulary or phrase
● Some voices are difficult to understand
Examples:
Voice search is currently becoming a more popular way to conduct Internet searches.
As evidenced by the introduction of new products like voice assistants:
● Alexa with Amazon Echo
● Google Voice Search
● SirI
● Cortana

10. ANALYTICS

➔ It is a field of computer science that uses math, statistics, and machine learning to find
meaningful patterns in data. Analytics – or data analytics – involves sifting through
massive data sets to discover, interpret, and share new insights and knowledge.
➔ Data analytics is significant since it aids in the performance optimization of enterprises.
By finding more cost-effective ways to do business and retaining a lot of data, firms can
help cut expenses by incorporating it into their business strategy. Also, a corporation
can use data analytics to improve business decisions and track consumer preferences
and trends to develop fresh, improved goods and services.

ANALYTICS
● DIAGNOSTIC ANALYTICS
- This gives more attention to the causes of events. This calls for more varied
data inputs and some speculation.
● DESCRIPTIVE ANALYTICS
- This gives more attention to the causes of events. This calls for more varied
data inputs and some speculation.
● PREDICTIVE ANALYTICS
- This gives more attention to the causes of events. This calls for more varied
data inputs and some speculation.
● PRESCRIPTIVE ANALYTICS
- This gives more attention to the causes of events. This calls for more varied
data inputs and some speculation.

DATA ANALYTICS TECHNIQUES


To process data and extract information, data analysts might employ a variety of analytical
approaches and procedures. The following is a list of some of the most used techniques.
● Regression Analysis

15
ITE 0001-1

- involves examining the connections between the dependent variables to see


how a change in one can impact a change in the other.
● Factors Analysis
- comprises taking a large data set and shrinking it to a smaller data set. By
using this technique, it is hoped to uncover tendencies that might have been
harder to spot otherwise.
● Monte Carlo Simulation
- simulate the likelihood of various scenarios. These simulations, which
frequently include many values and variables and frequently have better
predicting abilities than other data analytics techniques, are frequently utilized
for risk reduction and loss prevention.
● Time Series Analysis
- collects data through time and establishes a link between the importance of a
data point and its occurrence. This method of data analysis is frequently
employed to identify cyclical patterns or to forecast financial outcomes.

UNIT III:
IMPACT OF ICT

ICT IN EDUCATION

➔ ICT or Information and Communications Technology broadly refers to tools


and services that handle and communicate information. Some of the most
common examples of ICT are mobile phones and televisions.
➔ ICT is widely used in our everyday life, and its need is ever-growing in the
education sector. Images, audios, videos, presentations, or a combination of
these used for teaching constitute ICT in education. So, ICT in education meaning
would be using information and communication to improve the delivery of
education in every way

WHAT IS THE NEED AND IMPORTANCE OF ICT IN EDUCATION

➔ By using a combination of audio-visual learning resources alongside the


traditional blackboard, institutes can facilitate better learning opportunities for
students.
➔ By using ICT in classrooms, children can be eased into education using tools they
are already familiar with

EXAMPLES OF TECHNOLOGY IN THE CLASSROOM

● Tablet
- Tablets allow students to work at their own pace, complete independent
activities and learn self-reliance.
● Smartboards
- These devices allow teachers to project slides, textbook examples,
webpages and more, offering students a more engaging visual than
words on a page
● Multimedia Lessons
- Teachers can utilize many different types of technology in the classroom
and craft it into a comprehensive lesson that applies to many different
learning styles.

16
ITE 0001-1

- Podcast: great way to help students learn about a subject in a fun,


innovative way. There are plenty of educational podcasts out there
covering history, science and more.
- Recorded Lectures: students can work at their own pace and listen to
the lecture, rewinding and going slowly through parts they don’t
understand.
- Digital Take-Home: great ways for students to work their way through a
lesson with their own strategies
● Digital Classroom Calendar
- offer endless advantages in the classroom. Google Calendar is one of
the most popular. Digital calendars provide a convenient, effective place
where teachers can store important information that the entire class can
access.
- Include important dates regarding guest speakers, field trips and
presentation days. That way, you can cut down on questions about what
projects are due and when.
● Build Digital Content
- Teaching students how to build their own websites and work with
multimedia presentations can help them understand a topic and prepare
them for the workforce. This will let students exercise creativity in the
classroom in a fun and productive way.

POSITIVE IMPACT OF ICT IN EDUCATION

● Education for everyone


- ICT provides the flexibility and availability of learning materials to all
students. While all resources are available in classrooms, students can
also access them outside schools. Such students can go over the
lessons as many times as they need and understand their subjects
thoroughly.

● Higher knowledge retention


- Visual learning is more effective for students than regular chalk and talk.
This is because our brain processes and retains images and videos
faster than text. ICT equips audio-visual teaching methods.
- ICT in the education system is not limited to resource-based teaching.
Educators can also create interactive on-screen and off-screen tasks
using ICT

● Improves transparency
- One of the importance of ICT in education is to maintain a transparent
attendance and grading process. The data can be shared with the
school authorities, students, other teachers, and also parents.
- Data stored using ICT can also serve as proof for any action the institute
takes. This eliminates uncomfortable questions and accusations, as all
actions are based on proof

● Personalization and content up-to-date


- Digital environments allow real-time updating of all information and
resources.

● Efficient teachers training


● New teaching methods

NEGATIVE IMPACTS OF TECHNOLOGY ON EDUCATION

● Technology kills social skills

17
ITE 0001-1

- it is slowly and gradually killing their social skills and prefers to stay
isolated. They easily get addicted to technology which in return causes
them to use it more and more.

● Technology and students distraction


- Technology is a major source of distraction too. Instead of learning
things, they try to access the invalid things that are available on the
internet. The ease to access invalid and inappropriate things not only
distract them but also affects their learning capabilities

● Technology affects health


- Excessive use of technology affects the health of students badly.
Technology not only affects physical health but also mental health

● Technology makes the student waste their time


- Students not only access information for learning purposes but also for
entertainment purposes. when their access to inappropriate information
for entertainment is increased than their access to information for
learning, then it is time wastage.
- The Internet is really useful if and only if it is used properly. When
students do excessive use of irrelevant information, it not only wastes
their time but also reduces their learning capabilities

ICT IN EMPLOYMENT

Individuals rely on work to shape their personal and social identities, family and
social bonds, and access to a variety of essential and non-essential goods,
among other things.

Work-from-home (WFH) arrangements have been made available by private and


public organizations as an alternative way of working for their employees.

ICT (Information and Communication Technology) plays an important part in the


workfrom-home setup. Working remotely has become more popular as the
availability of broadband internet has increased.

The use of ICT in everyday life offers access to databases and technical
information, monitors and automates, plans and calculates, enhances difficult
graphic presentations, and efficiently shares information with partners and
colleagues.

According to Chris Vein, World Bank Chief Innovation Officer for Global ICT
Development. "ICTs have an impact on employment both as an industry that
creates jobs and as a tool that enables employees to access new forms of work in
new and more flexible ways, "

PROS AND CONS OF ICT IN EMPLOYMENT

Effects of ICT on employment include:


● Fewer workers
● Automation
● Increased 'teleworking’
● Increased need for highly trained ICT specialists
● Decreased need for 'labor intensive' workers
● Need for workers to be trained more frequently
● Fewer 'face-to-face' meetings
● De-skilling
● Re-skilling

18
ITE 0001-1

AREAS WHERE ICT HAS DECREASED / INCREASED EMPLOYMENT

DECREASED EMPLOYMENT
1. Manual Repetitive Jobs
2. Shop Work
3. Bank Cashiers
4. Office Work
5. Telephone Exchange
6. Library Work

INCREASED EMPLOYMENT
1. Network Managers / Technicians
2. Web Design
3. Computer Imagery
4. Systems Analyst
5. Computer Programmers
6. Computer Engineers

ICT IN BUSINESS

The role of ICT in business is to provide tools and systems that enable efficient
communication, data management, analysis, and decision-making processes, as
well as to enhance productivity, customer engagement, and competitive
advantage.

TYPES OF ICT USED IN BUSINESS

● INTRANET
- A network used by employees of a business to communicate privately is
called an intranet.

● EXTRANET
- Also a private network. Along with employees, other stakeholders like
suppliers and wholesalers can also access the extranet of the company.

● WEBSITE
- Websites are now the ‘storefronts’ of a business

● E-COMMERCE WEBSITE
- Along with using a website for communication, businesses use their
websites to sell their products

● SOFTWARE ROBOTS
- Chatbots are the most widely used software robots.

● CLOUD TECHNOLOGIES
- Cloud servers let businesses store their data on the server of another
company

● DIGITAL COMMUNICATION APPS


- Many businesses use mobile applications to communicate internally.

● TECHNOLOGIES TO FACILITATE HOME WORKING


- Nowadays many businesses have adopted a work-from-home policy

POSITIVE IMPACT OF ICT IN BUSINESS

● Improved business process

19
ITE 0001-1

- Technology allows companies to automate repetitive tasks, streamline


processes, and reduce time and effort required to complete a task.

● Cost -effective
- Efficient technologies reduce the time required to complete the task. By
eliminating redundant tasks, businesses can save money on labor and
supplies

● Improved communication
- E-mail, texting, and other digital platforms for communication allows to
easily communicate with customers or other business partners

● Information Security
- Private data can be better protected by ICT in comparison to paper files.
ICT can also identify fraud businesses, saving the customers

● Collecting, storing, and analyzing information


- Proper data analysis can identify trends and customer behavior that in
turn can help businesses decide on their strategies

● E-commerce
- E-commerce provides efficient and convenient ways for customers to
avail goods and/or services.

NEGATIVE IMPACT OF ICT IN BUSINESS

● High cost
- Businesses need to invest in the necessary hardware, software, and
other resources for all technology applications.

● Security risks
- With every technological advancement comes corresponding security
threats.

● System outages
- Technology can be unpredictable and malfunctions can lead to system
outages, which can mean lost time and money for businesses

● Unemployment
- Many information and communication technologies are replacing human
employees.

● Employee training
- Employees need to be trained on how to use the technology that a
business uses.

● No human touch
- Working from home has increased mental health concerns within
individuals.

Information and CommunicationTechnology Examples in Business

● Shopee/Lazada
- Online platform providing customers with an easy shopping experience

● Amazon

20
ITE 0001-1

- Uses Amazon Chime, a communication tool that allows for online


meetings, video conferencing, and chat messaging between employees,
as well as email and phone communication.

ICT IN HEALTH CARE

One of the most important, and highly debated, elements of our society is the quality
of healthcare available to patients.

Over the past 20 years, technology ' s impact on healthcare has grown significantly.
This trend is expected to continue as our society becomes more technologically
advanced. Improved technology has a direct impact on our capacity to store,
exchange, and analyze health information

BENEFITS OF ICT IN HEALTHCARE

Information technology has several advantages in the healthcare industry.


Technology makes it possible for medical professionals to save and access
information about a patient's medical records. it improves the dissemination of patient
data in a clear and accessible style. It facilitates the retrieval of patient data from a
database without the need for fresh health tests

ADVANTAGES OF TECHNOLOGY IN HEALTHCARE

● Electronic health records of patients in hospitals


- The patient's medical history is now kept on computers. The full health
records of individuals are often kept on computers at hospitals or with
experts.

● Communication systems in healthcare hospital


- There are several tools available for patients to contact their doctors or
nurses. These digital gadgets are created for patients and installed in
hospital patient wards or rooms.

● Reduction in medical errors


- Inaccuracies in medical reports and treatments have decreased as a
result of technological improvements in medicine.

● Wearable technology
- Wearable medical technology devices entered the market thanks to
modern technologies. These gadgets are a class of wearable, electronic
sensible devices that allow users to monitor their physical conditions

● Shows an inaccurate result of the patient’s condition


- A potential disadvantage of medical technology is that occasionally,
technical equipment or instruments produce inaccurate results.

● Increased cost of the treatment for the patients


- The increased cost of treatment is also one of the disadvantages of
medical technology. The majority of technologically assisted treatments
and procedures, such as robotic surgery and other types of technological
equipment operations, are quite expensive

ICT IN ONLINE SHOPPING

Online Shopping is the process of buying goods and services from merchants over the
Internet. Since the emergence of the World Wide Web, merchants have sought to sell
their products to people who spend time online. Many people choose to shop online
because of the convenience.

21
ITE 0001-1

In 2021, the Philippines eCommerce market sales reached $17 billion, largely
contributed by 73 million online active users.

ONLINE SHOPPING IN THE PHILIPPINES

The Top Philippine E-Commerce Platforms:


1. Shopee
2. Lazada
3. Zalora
4. Amazon
5. Carousell

Products from Asia-Pacific markets with free trade agreements with the Philippines are
sold on these platforms. The COVID-19 pandemic increased the eCommerce demand,
with Filipinos working and studying from home.

WHY IS ONLINE SHOPPING IN THE PHILIPPINES NOW IN-DEMAND?

● It saves money, time, and energy


- Shopping is easier to do when you shop online. You can browse around
and find what you need without going to the store physically.

● More convenient than before


- The usability and accessibility of online shopping are the keys to its
popularity in the Philippines

● Checking in the availability of the product is easier


- Products are linked to a database and you can only buy what is there.
You may not actually see the products in physical stores, the internet will
assist you in finding the best bargain.

● Easy to start online business site


- There are platforms for websites that have functions designed especially
for businesses

● Access millions of customers anytime and anywhere for a day


- E-commerce allows even small businesses to offer their products and
services to a larger market

DISADVANTAGE OF ONLINE SHOPPING

● You might be uncomfortable entering your credit card details online


● You cannot physically inspect goods before you buy
● Goods might get damaged during transport
● Goods might not arrive on time, or at all
● You might not be happy with retailers storing information about you
● Goods might get damaged during transport
● You might be subjected to fraud. The website you buy from may be fake, meaning
you may lose the money you have paid

ICT IN COMMUNICATION

Communication is the exchange of information between two or more things, such as


people, devices, governments, organizations, or businesses. In digital communication,
data is exchanged between two or more computing devices. This data communication

22
ITE 0001-1

(datacom) occurs over a communication medium, such as a telephone line, fiber optic
cable, or wireless radio signal.

Information communication technology provides society with new communication


capabilities. ICT has had mainly a positive effect on the way we communicate, as it
has made it easier and cheaper

COMMUNICATION PROCESS

Example of Digital Communication

● Transferring data from one computer to another over a network.


● Sending text messages between mobile devices.
● Sending and receiving an email.
● Collaborating on shared documents and spreadsheets.
● Voice chat or calls with other people over the Internet, using VoIP software.
● Video call or conferencing with other people over the Internet, using VoIP
software.

DATA COMMUNICATION VS. TELECOMMUNICATION

● DATA COMMUNICATION
- data is only transmitted; exchange of data between two devices via a
transmission medium such as a wire cable or air/water (wireless)

● TELECOMMUNICATION
- Mix of both data (digital) and voice (analog)

Example:
When using a dial-up modem to connect to another computer (e.g., BBS) and share data,
the modem uses a landline to communicate digital data using an analog signal.

WAYS OF COMMUNICATION IN ICT

1. PHONE
- one of the core communication technologies that most professionals
have readily available.
- Landline & Smartphone
2. EMAIL
- One of the most popular forms of communication technology; use email
throughout the day to communicate with colleagues or clients, send and
receive invoices and share text or photo files quickly and easily.

3. BLOGS

23
ITE 0001-1

- websites where people can share content, or posts, for other people to
read. Blogs can be publicly available to anyone with the website link or
only accessible behind with a membership

4. SOCIAL MEDIA
- allow users to share their experiences and opinions with a worldwide
audience. They also make it easy for people to communicate with other
users on each platform.

5. VLOGS
- Vlogs are " video logs " that are basically visual versions of blogs. Rather
than posting text, vloggers upload simple videos of themselves sharing
their ideas or explaining how to do something.

6. PODCAST
- audio-based forms of communication,Creators can record themselves
discussing a topic or telling a story, then upload and store the audio
online.

7. LIVE STREAM
- You can use livestreaming to engage with your audience, explain how to
use a product or broadcast presentations and events live

8. ONLINE CHAT
- Web chat offers users a form of instant communication. People use chat
software on social media and business communication platforms to talk
to friends, family and colleagues.

9. WEB CONFERENCING
- Conferencing technology makes it easier for employees to communicate
with each other regardless of where they ' re located. Most live
conference technology involves both audio and video feeds of the
attendees

10. TEXTING
- Short Message Services (SMS), or texting, allows individuals to send
brief messages or images through their smartphones

11. FORUMS
- A group forum is an online platform where people can post and respond
to questions. Forums are often organized by topic, allowing users to
communicate about their shared interests or to troubleshoot common
issues

12. WIKIS
- A wiki is a website for crowdsourcing information, where any member
can view, add or edit content.

13. COLLABORATION DOCUMENTS


- Collaborative documents, such as virtual whiteboards and online word
processors, allow multiple people to work on the same document.

14. WEARABLE TECHNOLOGY


- You can carry various types of wearable technology on your body to
make communication quick, easy and hands-free.

15. SMART SPEAKERS

24
ITE 0001-1

- You can place smart speakers in your home or office to act as


voice-activated personal assistants

ICT IN BANKING SECTOR

Information and communications technology has played a big role in banking for many
years now. ICT also made the banking industry more competitive than ever. ICT
enables banks to offer better customer service through the spread and use of ATMs,
Internet banking, phone banking, 24/7 services.

USE OF ICT IN BANKING SECTOR

● ATMs
- Typically an ATM can be used to withdraw cash and check an account
balance. ATMs were one of the most significant developments in
technology as they gave banking customers greater access to their
cash.

● Internet and Mobile Banking


- Customers can now check their account balance and pay bills online
without having to leave the comfort of their own home by using the
mobile banking.

ICT IN E-COMMERCE

E-commerce or Electronic Commerce consists of the distribution, sale, purchase,


marketing and supply of information about products or services through the Internet.

● The Rise of E-commerce Sites


- Increase in e-commerce websites allow consumers to purchase
conveniently.

● Customers get Better Shopping Experience. The E-commerce industry has


changed the process of business and cash transactions

● Convenient Payment Process. The most popular thing about the E-commerce
industry is its mode of payments. Emerging websites for payment allow easy
transactions for customers.

● Give Personalized Information in B2B Sector. As companies change to


Business to business ecommerce, increasing real-time procurement data will be
gathered.
● Decision Making During the Procurement Process. Technological advantage
allows executives to comprehend the requirements of business and provide them
fair insights to do more up to date complicated decisions

ICT IN MULTIMEDIA

Multimedia is a blend of many sorts of media such as sound, graphics, animation,


video, and text.

Using a range of artistic or communication media, such as this, keeps an idea or


presentation new and engaging while also providing more understanding.

25
ITE 0001-1

TYPES OF MULTIMEDIA

● LINEAR
- often progresses from one screen to the next and are commonly utilized
as supplemental teaching aids by educators.

● NON-LINEAR
- provide viewers with engagement, control over progress, and choice in
their knowledge production.

BENEFITS OF ICT IN MULTIMEDIA

1. Access to a vast variety of information


- In the twenty-first century, information is just a tap away. Sorting through
millions of records will show the records that are most relevant to you.

2. Deeper understanding
- Humans can relate words and pictures, audiovisual learning helps
students understand a topic better, which helps them fix problems.

3. World exploration
- Information and communications technology helped international travel
most when VR was first created. VR showed users what was previously
impossible with technology.

4. Increase positive emotions


- Today ' s animated and live-action media uses multimedia tools to create
immersive, convincing worlds that increase communications among
various media forms.

5. Improved problem solving


- Visuals can affect perception because people are mostly visual.
Sensation activates and processes the brain.

ICT IN ENTERTAINMENT

ICT is used at home to interact, play video games, consume media, and relax. Leisure
and entertainment have evolved. Technological advancements have significantly
expanded our entertainment choices.

People are spending less time on leisure activities as a result of the abundance of
media-based amusement. As a result, the variety of entertainment devices has
reduced leisure activities.

MAKING MEDIA SUCH AS MOVIES AND TELEVISION SHOWS IS NOT A QUICK


OR SIMPLE PROCESS. THE APPLICATION OF INFORMATION TECHNOLOGY IN
THE ENTERTAINMENT INDUSTRY NOT ONLY SIMPLIFIES THINGS, BUT ALSO
PROVIDES A TOUCH OF MAGIC.

AREAS WHERE ICT IS EVIDENT IN MULTIMEDIA

● Home, leisure, and communication


- ICT has changed amusement and leisure in two ways. First, the Internet
provides instant access to movies and songs for entertainment. Second,
information sharing has increased awareness of leisure pursuits.

● Gaming

26
ITE 0001-1

- Many people play video games on PCs and gaming consoles. A great
number of individuals take pleasure in playing video games on a variety
of platforms, including personal computers and gaming machines.
- The advent of online gaming has also made it possible to engage in
conversation with one's contemporaries while one is having fun. They
went so far as to develop gameplay peripherals like keyboards and Wii
controls specifically for our use.

● Media Streaming
- Other than games, ICT has provided us with additional entertainment in
the form of music, photos, and movies. ICT technologies let you stream
or download media that you can use to have fun

UNIT IV: Why we use computers?

Computers are used by people for a variety of purposes. People use computers to access and
manage information as well as to produce and edit papers, photos, and videos.

● Efficiency
- Computers save time, labour and resources
● Accuracy
- Computers will be precise as long as they are running quality software and
using quality data.

Advantages of using computer

1. Computers are capable of storing and accessing vast amounts of information


2. Sort, organize, and search through information
3. Keeps you connected
4. Can make you money
5. Save time
6. Keep you entertained

Disadvantages of using computer

1. Health Risks
- Social Isolation
- Addiction
2. Dependence
3. Distraction
4. Security risks
5. Environmental Impact

The significance of using computers responsibly and the need for users to be aware of
any risks

● Responsible computer use is important to ensure that users are not exposed to potential
dangers such as viruses, malware, and other malicious software.
● It is also important to ensure that users are aware of the potential risks associated with
using the internet, such as identity theft and cyber bullying.
● Using strong passwords, avoiding clicking on suspicious links, and using secure
websites and should be aware of their online activities and be careful not to share too
much personal information.

27
ITE 0001-1

Why we use computer?

● Reliability
- The ability with which the computers remain functional to serve the user.
Computers systems are well- adapted to performing repetitive operations. They
are immune to tiredness, boredom or fatigue. Therefore, they are more reliable
than human beings.
- Ability to function correctly and consistently over time, without unexpected
downtime, errors or crashes. The reliability of a computer system is crucial
because it affects the availability and usability of the system, and ultimately the
productivity and success of the users who depend on it.
● Communication
- Computers are widely used in communication because they offer several
advantages over traditional methods of communication.

SOME REASONS WHY COMPUTERS ARE considered as good COMMUNICATION TOOL:

1. Speed
- Computers are capable of processing and transmitting large amounts of data at
incredibly high speeds. This means that messages can be sent and received
almost instantaneously, allowing for real-time communication.
2. Efficiency
- Computers automate many tasks that used to be done manually, such as
sorting and prioritizing messages, managing contacts, and scheduling
meetings. This can save a lot of time and effort in the communication process.
3. Accessibility
- Computers and the internet have made communication more accessible than
ever before. People can communicate with each other from anywhere in the
world, as long as they have an internet connection.
4. Versatility
- Computers can handle a wide variety of communication formats, including text,
voice, video, and images. This makes it possible to communicate in many
different ways, depending on the situation and the preferences of the parties
involved.
5. Record-keeping
- Computers can easily store and organize messages, making it easy to retrieve
and review past communications. This can be useful for tracking agreements,
resolving disputes, and maintaining a record of business transactions.

Types of Computer System

● Non-Portable Computer
- Non-portable drives require external power and use 3.5” drive mechanisms.
Portables use 2.5” mechanisms and can be powered by the USB, Firewire or
Thunderbolt bus (draining a laptop's battery). Non-portable drives can be had
in larger capacities.
● Personal Computer
- It is also known as Desktop computer. The personal computer systems are
designed to be used by an individual at a single location.
● Work Station Computer
- Workstations are expensive, powerful machines used by engineers, scientist
and other professionals who process lots of data. A person who needs to run
complex programs and display both work in progress and result graphically,
also used workstations
● Portable Computer
- A portable computer is a computer capable of being readily moved. While most
desktop computers today can be moved with a bit of effort, this term describes
a laptop or palmtop computers.

28
ITE 0001-1

● Laptop
- Laptop is a portable computer. Because the size of the laptop is small and light,
which can be easily carried by any laptop computer from one place to another
● Netbook
- Netbooks have less processing power than laptop computers, yet netbooks are
capable of performing many tasks such as - netbooks can be used to do word
processing, netbooks can also be used to run web browsers.
● Notebook
- Notebook is also a types of portable computer. Notebook computers are small
in size and lightweight which is easily fits in your briefcase so that you can
carry it from one place to another.
● Table PC
- In seeing the tablet pc, it looks like a mobile, but the tablet is bigger in size than
the mobile. Tablet pc has a bigger touch screen as compared to mobile.
- Tablet computers are not running and a stylus is also used to write in it,
handwriting is digitized and can be converted into standard text through
handwriting recognition or it is written in text form is.
● Smartphone
- Smartphone connect a mobile phone and a computer in one hand to the same
device. Smartphone allows users to access and store information (such as
e-mails) and installs the program (apps) while being able to use a mobile
phone in one device.
● Mobile Computing Device
- Mobile computing devices are known as “Mobile Computer Devices” because
they allow users to make connection to internet with all parts of your mobile
devices. These devices are designed to be portable that means they are
comfortable on your lap, pocket or palm of your hand. So users can carry those
devices from one location to other location without any headache.

TYPES OF MOBILE COMPUTING


● Portable Computing
- Portable computing has to need wired communication.
● Mobility Computing
- It is also called of “Mobile Computing“, so it is refers to wireless
communication system.
● Personal Digital Assistant
- The name of PDA is Pocket computer; this device is capable to transmit data
from one terminal to other terminal with synchronization.
● Smartphone
- Smartphone connect a mobile phone and a computer in one hand to the same
device.

CATEGORIES OF USERS

● User
- Alternatively called an end user, a user is any individual who is not involved
with supporting or developing a computer or service.
● Casual Users
- A user who has some computer experience and can navigate and use the
computer without much assistance.
● Unware Users
- Unaware users, are those that use their phone just for the sake of making calls
and sending text messages.
- They have switched to smartphone just to keep up with the modern technology.
● Minimalist Users
- These kind of users are also not much into the technology.
- They usually do not dump their old smartphone for the new model available on
the market. They like to keep things simple.

29
ITE 0001-1

● Enthusiast Users
- Enthusiast users are those that are fond of trying new applications on their
phone, they do not possess much expertise in phones, but, they love
discovering new functions.
- They socialize through mobiles, play games and perform other activities.
● Obsessive Users
- Obsessive users do not leave their phones abandoned, their smartphone is
always in their reach. In fact, their smartphone becomes somewhat the
extension of their hand.
- They use it in every possible work and make the most of its intelligence. They
find it hard to breath without their dear smartphone.
● Pro Users
- Pro user s are crazy behind this gadget, they just love it.
- The pro users know every bit about their smartphone, they are expert in its
technicalities.

UNIT V :
INTERNET AND THE WORLD WIDE WEB

Outline:
● What is Internet
● Components of Internet
● What is CHat Messaging?
● Major Protocol Accessible on the Web
● Anatomy of URL
● Types of Browser
● HOw to Use Web Browser
● Netiquette

WHAT IS INTERNET

The Internet or “net” (network of network) is the largest computer network in the world that
connects billions of computer users. The word internet comes from the combination between
“interconnection” and “network”.

Network is a collection of computers and devices connected via communication channels and
transmission media allow to share resources (hardware, software, data, information)

BRIEF HISTORY OF INTERNET

● The Internet was created by the Advanced Research Projects Agency (ARPA) of the
United States government in 1969 and was initially known as the ARPANET. The
original intent was to devise a network that let researchers and their computers at one
university “talk” to the research computers at other universities.

● ARPANet was designed so that the network would keep functioning if parts of it were
lost due to a natural disaster or military attack.

● In 1983, ARPANet adopted the TCP/IP open networking protocol suite. Then, in 1985,
the National Science Foundation Network (NSFN) improved the network so it could
connect university computer science departments nationwide.

● Internet in 1989 when communications over the Internet drastically improved with the
advent of the hypertext transfer protocol (HTTP).

30
ITE 0001-1

● ARPANet was gone by 1990. By 1993, the Internet revolution was in full swing.

USES OF INTERNET

● Look for information, school works, jobs, and home purposes


● Send and receive electronic mail, Video teleconferencing (video call, video chat)
● Buy and sell product, Social networking
● Take college courses, Monitor home while away
● Financial transactions, Download music and movies
● Watch & post videos, Games

COMPONENTS OF INTERNET

● Server
● IP ADDRESS (Internet Protocol)
● Web Browser
● DNS (Domain Name System)
● ISP (Internet Service Provider

● SERVER

A server is a computer program or device that provides a service to another computer program
and its user, also known as the client. In a data center, the physical computer that a server
program runs on is also frequently referred to as a server.

HOW SERVER WORKS?


- The term server can refer to a physical machine, a virtual machine or to software that is
performing server services. The way that a server works varies considerably depending
on how the word server is being used.

● PHYSICAL SERVER
A physical server is simply a computer that is used to run server software.

● VIRTUAL SERVER
A virtual server is a virtual representation of a physical server.

SERVER SOFTWARE

An operating system and an application.

● The operating system acts as a platform for running the server application. It provides
access to the underlying hardware resources and provides the dependency services
that the application depends on.

● The operating system also provides the means for clients to communicate with the
server application. The server's IP address and fully qualified domain name, for
example, are assigned at the operating system level.

DESKTOP COMPUTER VS SERVER

● There are both similarities and differences between desktop computers and servers.
● Most servers are based on X86/X64 CPUs and can run the same code as an X86/X64
desktop computer.

31
ITE 0001-1

● Unlike most desktop computers, however, physical servers often include multiple CPU
sockets and error correcting memory. Servers also generally support a far greater
quantity of memory than most desktop computers.

TYPES OF SERVER

Servers are often categorized in terms of their purpose. A few examples of the types of servers
available are as follows:
● Web Server
- A computer program that serves requested HTML pages or files. In this case, a
web browser acts as the client.
● Application Server
- A program in a computer in a distributed network that provides the business
logic for an application program.
● Proxy Server
- Software that acts as an intermediary between an endpoint device, such as a
computer, and another server from which a user or client is requesting a
service.
● Mail Server
- An application that receives incoming emails from local users -- people within
the same domain -- and remote senders and forwards outgoing emails for
delivery.
● Virtual Server
- A program running on a shared server that is configured in such a way that it
seems to each user that they have complete control of a server.
● Blade Server
- A server chassis housing multiple thin, modular electronic circuit boards,
known as server blades. Each blade is a server in its own right, often dedicated
to a single application
● File Server
- A computer responsible for the central storage and management of data files
so that other computers on the same network can access them.
● Policy Server
- A security component of a policy-based network that provides authorization
services and facilitates tracking and control of files.
● Database Server
- This server is responsible for hosting one or more databases. Client
applications perform database queries that retrieve data from or write data to
the database that is hosted on the server.
● Print Server
- This server provides users with access to one or more network-attached
printers -- or print devices as some server vendors call them. The print server
acts as a queue for the print jobs that users submit. Some print servers can
prioritize the jobs in the print queue based on the job type or on who submitted
the print job.

SERVER COMPONENT

● HARDWARE
- At the hardware level, servers are typically made up of a rack mount chassis
containing a power supply, a system board, one or more CPUs, memory,
storage, a network interface and a power supply.

● OPERATING SYSTEM
- A server operating system, such as Windows Server or Linux, acts as the
platform that enables applications to run. The operating system provides
applications access to the hardware resources that they need and enables
network connectivity.

32
ITE 0001-1

● IP ADDRESS

● IP ADDRESS
- is a unique address that identifies a device on the internet or a local network.
- means "Internet Protocol," which is the set of rules governing the format of data
sent via the internet or local network.
- are the identifier that allows information to be sent between devices on a network.
- They contain location information and make devices accessible for
communication.
- The internet needs a way to differentiate between different computers, routers,
and websites. IP addresses provide a way of doing so and form an essential part
of how the internet works.

HOW IP ADDRESS WORKS?

1. Your device indirectly connects to the internet by connecting at first to a network


connected to the internet, which then grants your device access to the internet.

2. When you are at home, that network will probably be your Internet Service Provider
(ISP). At work, it will be your company network.

3. Your IP address is assigned to your device by your ISP.

4. Your internet activity goes through the ISP, and they route it back to you, using your IP
address. Since they are giving you access to the internet, it is their role to assign an IP
address to your device.

5. However, your IP address can change. For example, turning your modem or router on or
off can change it. Or you can contact your ISP, and they can change it for you.

6. When you are out and about – for example, traveling – and you take your device with
you, your home IP address does not come with you. This is because you will be using
another network (Wi-Fi at a hotel, airport, or coffee shop, etc.) to access the internet and
will be using a different (and temporary) IP address, assigned to you by the ISP of the
hotel, airport or coffee shop.

TYPES OF IP ADDRESS

Every individual or business with an internet service plan will have two types of IP addresses:
their private IP addresses and their public IP address. The terms public and private relate to
the network location — that is, a private IP address is used inside a network, while a public one is
used outside a network.

● PRIVATE IP ADDRESSES
- Every device that connects to your internet network has a private IP address. This
includes computers, smartphones, and tablets but also any Bluetooth-enabled
devices like speakers, printers, or smart TVs. With the growing internet of things,
the number of private IP addresses you have at home is probably growing. Your
router needs a way to identify these items separately, and many items need a way
to recognize each other. Therefore, your router generates private IP addresses that
are unique identifiers for each device that differentiate them on the network.

33
ITE 0001-1

● PUBLIC IP ADDRESSES
- A public IP address is the primary address associated with your whole network.
While each connected device has its own IP address, they are also included within
the main IP address for your network. As described above, your public IP address
is provided to your router by your ISP. Typically, ISPs have a large pool of IP
addresses that they distribute to their customers. Your public IP address is the
address that all the devices outside your internet network will use to recognize your
network.

TWO FORM OF PUBLIC IP ADDRESSES

1. Dynamic IP Addresses
- Dynamic IP addresses change automatically and regularly. ISPs buy a large pool of IP
addresses and assign them automatically to their customers. Periodically, they re-assign
them and put the older IP addresses back into the pool to be used for other customers.
The rationale for this approach is to generate cost savings for the ISP. Automating the
regular movement of IP addresses means they don’t have to carry out specific actions to
re-establish a customer's IP address if they move home, for example. There are security
benefits, too, because a changing IP address makes it harder for criminals to hack into
your network interface.

2. Static IP ​Addresses

- In contrast to dynamic IP addresses, static addresses remain consistent. Once the


network assigns an IP address, it remains the same. Most individuals and businesses
do not need a static IP address, but for businesses that plan to host their own server, it
is crucial to have one. This is because a static IP address ensures that websites and
email addresses tied to it will have a consistent IP address — vital if you want other
devices to be able to find them consistently on the web.

TWO TYPES OF WEBSITE IP ADDRESSES

● Shared IP Addresses
- Websites that rely on shared hosting plans from web hosting providers will
typically be one of many websites hosted on the same server. This tends to be
the case for individual websites or SME websites, where traffic volumes are
manageable, and the sites themselves are limited in terms of the number of
pages, etc. Websites hosted in this way will have shared IP addresses.

● Dedicated IP Addresses
- Some web hosting plans have the option to purchase a dedicated IP address
(or addresses). This can make obtaining an SSL certificate easier and allows
you to run your own File Transfer Protocol (FTP) server. This makes it easier to
share and transfer files with multiple people within an organization and allow
anonymous FTP sharing options. A dedicated IP address also allows you to
access your website using the IP address alone rather than the domain name
— useful if you want to build and test it before registering your domain.

● WEB BROWSER

A web browser is an application for accessing websites. When a user requests a web page from
a particular website, the browser retrieves its files from a web server and then displays the page

34
ITE 0001-1

on the user's screen. Browsers are used on a range of devices, including desktops, laptops,
tablets, and smartphones.

HOW DOES A WEB BROWSER WORK?

● A web browser takes you anywhere on the internet. It retrieves information from other
parts of the web and displays it on your desktop or mobile device. The information is
transferred using the Hypertext Transfer Protocol, which defines how text, images and
video are transmitted on the web. This information needs to be shared and displayed in
a consistent format so that people using any browser, anywhere in the world can see the
information.
● But, not all browser makers choose to interpret the format in the same way. For users,
this means that a website can look and function differently. Creating consistency
between browsers, so that any user can enjoy the internet, regardless of the browser
they choose, is called web standards.
● When the web browser fetches data from an internet connected server, it uses a piece
of software called a rendering engine to translate that data into text and images. This
data is written in Hypertext Markup Language (HTML) and web browsers read this code
to create what we see, hear and experience on the internet.
● Hyperlinks allow users to follow a path to other pages or sites on the web. Every
webpage, image and video has its own unique Uniform Resource Locator (URL), which
is also known as a web address. When a browser visits a server for data, the web
address tells the browser where to look for each item that is described in the html, which
then tells the browser where it goes on the web page.

COOKIES

Cookies are information that websites save about you in files

- They are saved on your computer for the next time you visit that site. Upon your return, the
website code will read that file to see that it’s you.

DOMAIN NAME SYSTEM (DNS)

The Domain Name System, or DNS, is what makes it possible for users to connect to websites
using Internet domain names and searchable URLs rather than numerical Internet protocol
addresses. Rather than having to remember an IP address like 93.184.216.34, users can instead
search for www.example.com.

4 DNS servers

● DNS Recursor
- The recursor can be thought of as a librarian who is asked to go find a
particular book somewhere in a library. The DNS recursor is a server designed
to receive queries from client machines through applications such as web
browsers. Typically the recursor is then responsible for making additional
requests in order to satisfy the client’s DNS query.
● Root Nameserver
- The root server is the first step in translating (resolving) human readable host
names into IP addresses. It can be thought of like an index in a library that

35
ITE 0001-1

points to different racks of books - typically it serves as a reference to other


more specific locations.
● TLD Nameserver
- The top level domain server (TLD) can be thought of as a specific rack of
books in a library. This nameserver is the next step in the search for a specific
IP address, and it hosts the last portion of a hostname (In example.com, the
TLD server is “com”).

● Authoritative Nameserver
- This final nameserver can be thought of as a dictionary on a rack of books, in
which a specific name can be translated into its definition. The authoritative
nameserver is the last stop in the nameserver query. If the authoritative name
server has access to the requested record, it will return the IP address for the
requested hostname back to the DNS Recursor (the librarian) that made the
initial request.

DIFFERENCE BETWEEN AN AUTHORITATIVE DNS SERVER AND A RECURSIVE DNS


RESOLVER

● Both concepts refer to servers (groups of servers) that are integral to the DNS
infrastructure, but each performs a different role and lives in different locations inside the
pipeline of a DNS query. One way to think about the difference is the recursive resolver
is at the beginning of the DNS query and the authoritative nameserver is at the end.

● Recursive DNS Resolver


- is the computer that responds to a recursive request from a client and takes the
time to track down the DNS record.
- It does this by making a series of requests until it reaches the authoritative
DNS nameserver for the requested record (or times out or returns an error if no
record is found). Luckily, recursive DNS resolvers do not always need to make
multiple requests in order to track down the records needed to respond to a
client; caching is a data persistence process that helps short-circuit the
necessary requests by serving the requested resource record earlier in the
DNS lookup.

● Authoritative DNS Resolver


- is a server that actually holds, and is responsible for, DNS resource records.
- This is the server at the bottom of the DNS lookup chain that will respond with
the queried resource record, ultimately allowing the web browser making the
request to reach the IP address needed to access a website or other web
resources. An authoritative nameserver can satisfy queries from its own data
without needing to query another source, as it is the final source of truth for
certain DNS records.

Internet Service Provider (ISP)

● An internet service provider (ISP) is a company that provides access to the internet.
ISPs can provide this access through multiple means, including dial-up, DSL, cable,
wireless and fiber-optic connections.
● A variety of companies serve as ISPs, including cable providers, mobile carriers, and
telephone companies.

Typical services offered by ISPs

Internet access is the primary service offered by ISPs, but there are a variety of other
services they may provide. These can include:
● Equipment Rental

36
ITE 0001-1

- Many ISPs will rent equipment like modems and routers to their customers.
This can be a convenient option for those who do not want to purchase their
own equipment or do not need the latest and greatest technology.
● Tech Support
- Many ISPs offer tech support to their customers. This can be a valuable
service for those unfamiliar with setting up or troubleshooting internet
connections.
● Email Access
- Some ISPs offer email services to their customers. This can be a convenient
way to have an email address linked to your ISP account.
● Tiered Connection Plans
- ISPs typically offer different tiers of service, with different speeds and data
allowances. This is a good option for those who want to pay for a higher-speed
connection or who need more data than what is included in the basic package.

EVOLUTION OF INTERNET SERVICE PROVIDERS

● Internet service providers have come a long way since their early days of offering
dial-up internet service. In the past, dial-up was the only option for those who wanted to
access the internet. This meant that users had to connect their computer to a phone line
and use a modem to connect to the internet. The speeds were slow (usually around 56
kbps), and the connection was often unreliable.
● As technology progressed, ISPs began offering higher-speed connections using DSL or
cable. These connections were much faster than dial-up (usually around 1 Mbps), but
they were still slower than what is available today.
● Now, ISPs are offering high-speed fiber-optic connections and unlimited data plans. As
technology progresses, we are beginning to see new services like high-speed 5G home
internet becoming much more widely available.

WHY DO WE NEED AN ISP?

● An ISP is required in order to connect to the internet via a modem in your home or
business. Without an ISP, you would not be able to access the wealth of information
available online. An ISP can provide you with a fast and reliable connection.

CHAT MESSAGING

Chat refers to the process of communicating, interacting and exchanging messages over the
Internet.

- Chat messaging was developed and launched during the 1970’s. The main goal for its
design and conception was to give people the ability to chat with groups of people
instantaneously.

FEATURES OF CHAT MESSAGING

Online chat services have purpose-built chat interfaces and added features that manage the
entire communication processes:
● Group Messaging
● Customizable
● Message Visibility
● Invitation-only option
● Pre-chat rooms
● Option to use usernames

37
ITE 0001-1

ADVANTAGES OF CHAT MESSAGING

● Affordable communication resource


● Boosts customer convenience
● Multiple chat rooms is allowed
● Embedded in websites
● Helps collate valuable end-user data and feedback

DISADVANTAGES OF CHAT MESSAGING

● Privacy invasion risks


● Lack of content filtering
● Incompatibility with some of the mobile or other technological devices
● Not suitable for users who are always traveling or on-the-go

INSTANT MESSAGING

● Instant messaging is usually more suited for a one-on-one conversation between two
individuals.
● Instant messaging was released in 1960, when Massachusetts Institute of Technology
(MIT) developed the platform.
● It enables users to keep a list of people or contacts to communicate with.

EXAMPLES OF IM AND CHAT APPS

Some examples of popular IM and chat apps include:

● Whatsapp
● Facebook Messenger
● Skype
● Kik
● Viber
● Facetime

CHALLENGES OF IM AND CHATTING

An open online environment such as a public chatroom means that anyone can take part in a
conversation. Hence, there are always risks around talking to people online.
● Online grooming, cyberbullying and stalking can happen when using IM and chat apps.
● People might ask you to do things that make you feel unsafe or uncomfortable.
● Recorded conversations or interaction through video cameras.

CONCLUSION

● Chat and instant messaging (IM) are short messages sent and read in real time,
allowing you to converse more quickly and easily.
● Chat and instant messaging are both designed to support and augment existing
communication resources and channels.

38
ITE 0001-1

MAJOR PROTOCOLS

NETWORK PROTOCOL

● Network Communication Protocols are an organized set of formats and rules that
describes how data is passed over from one device to another network. It is also the
one that is responsible for the authentication and error detection as well as the syntax,
synchronization and semantics of both analog and digital communications on what
format they must follow in order to function.
● Network Communication Protocols are also the reason why communicating over the
computer to different people around the world is easy.

FUNCTIONS OF PROTOCOLS

1. Flow Control
2. Error Control
3. Addressing
4. Connection Management

TYPES OF MAJOR NETWORK PROTOCOLS

● INTERNET PROTOCOL
● HYPER TEXT TRANSFER PROTOCOL
● SIMPLE MAIL TRANSFER PROTOCOL
● FILE TRANSFER PROTOCOL
● VOICE INTERNET PROTOCOL

INTERNET PROTOCOL

● The Internet Protocol, mostly known as the IP, is a type of Network Protocol that is
responsible for directing and addressing packets of data so that they can travel across
networks and arrive at their correct destination.

HOW DOES IP WORKS?

TYPES OF IP

● File Retrieval Protocols - it is included in one of the earlier ways of retrieving


information from computers that are connected to the Internet.
● File Transfer Protocol - one of the first Internet services that were develop which
allows user to transfer or move files from one computer to another.
● Gopher - this protocol is not used or is rarely used today, but gopher offers a content
description of a downloadable file which helps you to easily find your file.

39
ITE 0001-1

HYPER TEXT TRANSFER PROTOCOL

● Hyper Text Transfer Protocol or also known as only HTTP is an application protocol
distributed, collaborative, hypermedia information systems that allows users to
communicate data on the World Wide Web.
● A typical flow over HTTP involves a client machine making a request to a server, which
then sends a response message.

COMMON HTTP REQUEST HEADER

HTTP REQUEST HEADER

HTTP RESPONSE

1. HTTP STATUS CODE


- HTTP status codes are 3-digit codes most often used to indicate if an HTTP request has
been completed. Status codes are broken into the following 5 blocks:
● 1xx Informational
● 2xx Success
● 3xx Redirection
● 4xx Client Error
● 5xx Server Error

2. HTTP Response Headers


- It comes with headers that convey information which is substantial for sending
in the response body such as the language and format.

40
ITE 0001-1

3. Optional HTTP Body


- Successful HTTP responses to ‘GET’ requests generally have a body which
contains the requested information.

COMMON HTTP RESPONSE HEADERS

HTTP RESPONSE HEADER

SIMPLE MAIL TRANSFER PROTOCOL

● SMTP or Simple Mail Transfer Protocol is a set of communication guidelines that


allow software to transmit an electronic mail over the internet.
● The main purpose of SMTP is used to set up communication rules between servers.
● SMTP is a mail delivery protocol, not a mail retrieval protocol.

HOW DOES SIMPLE MAIL TRANSFER PROTOCOL WORKS?

1. SMTP Connection Opened


2. Email Data Transferred
3. Mail Transfer Agent (MTA)
4. Connection Closed

SMTP COMMANDS

41
ITE 0001-1

SMTP SERVER

● Mail Submission Agent (MSA)


● Mail Transfer Agent (MTA)
● Mail Delivery Agent (MDA)

EMAIL DELIVERY PROCESS

FILE TRANSFER PROTOCOL

● File transfer protocol or FTP is a standard internet protocol provided by TCP/IP used
for transmitting the files from one host to another.
● It is also used for downloading the files to the computer from other servers.

MECHANISMS OF FTP

- FTP uses Client - Server Model.

TWO TYPES OF CONNECTIONS IN FTP

FTP CONNECTIONS
● Control Connections
● Data Connections

VOICE OVER INTERNET PROTOCOL

VoIP is a technology which allows you to make phone calls through the use of broadband
connections.

42
ITE 0001-1

HOW DOES VOIP WORKS?

KEY VOIP FEATURES

Here are some of the Voice IP features:


1. Call Forwarding
- is a call distribution strategy that automatically sends (forwards) incoming calls
to different telephone numbers associated with the same agent or department
in a pre-set order.
2. Call recording
- is a form of call monitoring that either automatically records calls between
agents and callers or records them on an on-demand basis.

ANATOMY OF URL

What is a URL?

● Uniform Resource Locator - a unique identifier used to locate a resource on the


Internet
● also referred to as a web address

What is the difference between a URL, a URI, and a URN?

● URL and URN are both subsets of URI


● Both URLs and URIs follow the same specification: RFC 3986
● However, while URLs allow you to locate a resource, a URI simply identifies a resource

1. URI (Uniform Resource Identifier) - Identifies a resource and differentiates it from


others by using a name, location, or both.
2. URL (Uniform Resource Locator) - Identifies a resource by locating it on the internet.
3. URN (Uniform Resource Name) - Identifies a resource in a permanent way, even after
that resource does not exist.

The Anatomy of a URL (6 Different Moving Parts)

● Protocol or Scheme
● Domain Name or DNS
● Path
● Query Strings and Variables
● UTM Parameters
● Anchors

43
ITE 0001-1

PROTOCOL OR SCHEME

● Tell your browser how to communicate with a website’s server, in order to send and
retrieve information
● Separated by a colon and two forward slashes

HTTP vs HTTPS

● HTTP stands for Hypertext Transfer Protocol and is the basic, unencrypted way of
transferring data over the internet

● HTTPS stands for Hypertext Transfer Protocol Secure and is a more secure,
encrypted protocol for transferring data

Less common protocols are:

1. mailto://, which can open your computer’s default email service provider to help you
draft an email to the email address you entered in the URL
2. ftp://, which is a standard protocol for transferring computer files between a client and
server on a computer network

DOMAIN NAME OR DNS

● What helps the browser find your web server, using the

● DNS (Domain Name System) which helps a browser translate a domain name into
the actual IP address of the web server connected with it.
● Without the DNS, you would have to surf the web by sharing chains of numbers like
241.102.129.209

44
ITE 0001-1

1. Subdomain
- indicates which particular page of your website the web browser should serve up

2. Second-level Domain (SLD)


- The name of the website

3. Top-level Domain (TLD)


- Specifies what type of entity your organization registers as on the internet

PATH

- is any part of the URL that comes after the domain name, before a question mark or #
that adds extra information to a URL

QUERY STRINGS AND VARIABLES

- is the part that follows the question mark, and it can include variables that communicate
with the PHP on that page to impact the visitor’s experience.

UTM PARAMETERS

- Instead of directly affecting the visitor’s experience, they communicate with your
analytics software
- These UTM tags track where visitors came from to analyze campaign performance. You
can use them to indicate which platform, campaign, and even specific ad sent a visitor.

What are URL Shorteners?

● URL shortening is a technique in which an URL is made shorter in length yet still direct
to the required page. A shortener achieves this using a redirect on a domain name that
is short.
● Rebrandly, Bitly, Ow.ly, clicky.me and Budurl.com.

45
ITE 0001-1

● Some Website hosts also offer URL shorteners.


● Other service providers, including search engines, have begun turning away from URL
shorteners because they are often subject to abuse by spammers, who hide malware
inside shortened URLs.

Is the WWW still necessary?

● Including a www in a URL used to be a standard for all websites on the internet, but
that’s not the case anymore.
● The three Ws are an optional part of a URL that identifies a site as a part of the World
Wide Web. It mostly boils down to personal preference.
● By default, Google Chrome and many other browsers don’t even show it anymore. The
redirects render it irrelevant to the user experience.

TYPES OF BROWSER

WEB BROWSER

- Software program that allows a user to locate, access, and display web pages
- Software application that is used to access the world wide web (www) or as known by
everyone on the Internet

7 ELEMENTS OF A WEB BROWSER

1. User Interface
2. Browser Engine
3. Rendering Engine
4. Networking
5. UI Backend
6. JavaScript Interpreter
7. Data Persistence

Features of a Web Browser

TYPES OF BROWSERS

A few decades back, IE (Internet Explorer) was the only option people had. But as time passes,
different browsers started to emerge:
1. Google Chrome
2. Mozilla Firefox
3. Apple Safari
4. Opera
5. Microsoft Edge
6. Kingpin
7. Brave

46
ITE 0001-1

Earliest Types of Browsers


1. Nexus
2. Mosaic
3. Netscape Navigator

Google Chrome

At present, the most popular and widely used browser.


Features:
● Speed
● Simplicity
● Synchronization
● 50 Language support
● Theme support

Mozilla Firefox

The new Firefox is faster and smoother. Favored for consuming less RAM compared to
Chrome.
Features:
● High security and performance
● Fast page loading
● Inbuilt download manager
● 75 Language support

Apple Safari

Default web browser present on all Apple devices that supports latest technologies.
Features:
● Smart address bar
● Extended support for HTML5
● Tabbed browsing
● Cross-platform compatibility
● iCloud keychain

Opera

A popular choice due to its attractive features including a built-in adblocker.


Fatures:
● Multiple device synchronization
● News reader
● User-friendly and fast
● Built-in extensions

Microsoft Edge

Pre-installed Window browser that replaced Internet Explorer.


Features:
● Easy-to-use UI
● Rendering feature
● Doodle on a webpage
● Integrated share panel
● Newsfeed on the startup page

47
ITE 0001-1

Kingpin

A relatively new name which is gaining popularity for its data-stored approach.
Features:
● Always works incognito
● Adblocker
● Security

Brave

The Brave internet browser blocks ads and other online trackers by default, while other
browsers don't.
Features:
● Brave Talk
● Free VPN and Firewall
● Brave Rewards

EARLIER TYPES OF BROWSERS

Nexus
- Launched in 1990. The first browser. Was named WorldWideWeb, but renamed to
Nexus to avoid confusion. Had very basic features and was less interactive in terms of
graphical interface.

Mosaic
- Launched in 1993. The second web browser that was launched. Had better graphical
interfaces and was named "the world's first popular browser."

Netscape Navigator
- Released in 1994 by Netscape. In the 90s, it was the dominant browser. It had an
advanced licensing scheme and allowed free usage for non-commercial purposes.
Replaced by Internet Explorer.

HOW TO USE WEB BROWSER

Ways of Accessing Web Browser

● URLs
● Hyperlinks
● Navigational tools
● Search engines
● Favorite Folders
● Downloading webpages
● Printing web pages

Using URLs

Unified Resource Locator is referred to as a URL. A "Uniform Resource Locator," or URL, is a


special address that identifies each and every website.

● When you enter the URL of a certain page in the address bar, the web browser will look
up the relevant page and show the user the results.

48
ITE 0001-1

Using Hyperlinks

A web page's "hyperlink" is a section that is connected to a URL. Links can be in the form of
text, images, buttons, arrows, etc.
● You can leave the current URL and go to a different one by clicking on a hyperlink. The
hand symbol is used to denote hyperlinked text, which is blue text that is
highlighted.

Using Browsers Navigation Tools

There are several tools available in web browsers to aid with navigating the internet. You can
navigate online sites more rapidly with the aid of these tools.
● Back Button - Helps to move back to the previous page from current page.
● Forward Button - Helps to move to the next page from current page.
● Refresh Button - Helps to refresh a current page.
● Close Button - Helps to close a web page.

Using Bookmark

You can bookmark the pages on the web that you visit most frequently using web browsers.
Instead of repeatedly typing the URL, you can choose from a list of bookmarks to get directly to a
website using this method.
● At the upper right corner of the page, this is shown as an icon with a star.

Using History

The browser automatically records whatever URL you enter in the address field, building a history
list for the current session.
● Instead of inputting the URL again, you can select it from the history list.

Using Search Engine

A search engine is a program that enables you to look for stuff on the internet. It shows a variety
of web pages depending on the text or a word you input.
The most well-known search engines include Google, Yahoo, Ask, and others. The procedures
for using a search engine are listed below:
● Step 1 − Launch your web browser.
● Step 2 − In "Address bar/Location", type the search engine you want to use and press
enter.
● Step 3 − Type the content you want to search in the "search text box" and press enter.
● Step 4 − It displays a list of web pages from which you can select the content/web page
you want.

Using Favorite Folder

You can save the pages you visit the most frequently in web browsers. The Bookmarks subfolder
is the Favorites folder.By choosing from the list of bookmarks instead of repeatedly typing the
URL, you can access the website directly.

The steps below are used to add and remove pages from the favorites folder:

● Step 1 - Click star icon present at the top right corner of the page.
● Step 2 - Enter the URL of the web page you wish to add as a favorite, then click
"Done." Alternatively, you can bookmark the current page by clicking the three

49
ITE 0001-1

vertical dots (⋮) icon in the upper right corner of the screen and choosing "Bookmark
this page" from the menu that appears.
● Step 3 - The web page can be deleted by selecting it and using the "Remove" button,
or it can be deleted by selecting it, using the three vertical dots (⋮) icon in the upper right
corner of the screen, and then selecting "Delete" from the context menu. deleted by
selecting it and using the "Remove" button, or it can be deleted by selecting it, using the
three vertical dots (⋮) icon in the upper right corner of the screen, and then selecting
"Delete" from the context menu.

Downloading Web Pages

A file, document, or web page is downloaded when you save it to your hard drive. The steps are
as follows:

● Step 1 - Go to the webpage you wish to download by opening a web browser.


● Step 2 − Right-click on the file and choose Save as.
● Step 3 − Choose where you want to save the file, then click Save.
● Step 4 − When the file is downloaded, you'll see it at the bottom of your Chrome
window. Click the file name to open it.

Printing Web Pages

Printing is creating hard copy of a document which can be a web page or any other content. It
includes the following steps:

● Step 1 − After launching web browser, open the page, image, or file you want to print.
● Step 2 − Click on three vertical dots icon (⋮) on the top right corner of the screen or use
a keyboard shortcut: Ctrl + P.
● Step 3 − In the window that appears, select destination and change any print settings
you want; when ready, click Print.

Netiquette

Netiquette

● it’s network etiquette – that is the etiquette of cyberspace and “etiquette” means the
forms of required by good breeding or prescribed by authority to be required in social or
official life. In other words, netiquette is a set of rules for behaving properly online.

Core Rules of Netiqutte

● Remember the Human


● Adhere to the same standards of behavior online that you follow in real life
● Know where you are in cyberspace
● Respect other people's time and bandwidth
● Make yourself look good online
● Share expert knowledge
● Help keep flame wars under control
● Respect other people's privacy
● Don't abuse your power
● Be forgiving of other people's mistakes

50

You might also like