Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 12

Digital

magazine
Name:
Maria Jose Perez
Hernandez

Grade: 8B01
CONTENT
TABLE
1. Internet
2. Mobile pone
3. Television
4. Robots and types
5. Cloud computing
6. Artificial intelligence
7. Social networks
8. Virtualization
9. Trading and bitcoin
10.Big data
INTERNET
The Internet, sometimes called simply
"the Net," is a worldwide system of
computer networks -- a network of
networks in which users at any one
computer can, if they have permission,
get information from any other computer
(and sometimes talk directly to users at
other computers). It was conceived by the
Advanced Research Projects Agency
(ARPA) of the U.S. government in 1969
and was first known as the ARPANET.
The original aim was to create a network
that would allow users of a research
computer at one university to "talk to"
research computers at other universities.
A side benefit of Arpanet’s design was
that, because messages could be routed
or rerouted in more than one direction,
the network could continue to function
even if parts of it were destroyed in the
event of a military attack or other
disaster. Today, the Internet is a public,
cooperative and self-sustaining facility
accessible to hundreds of millions of
people worldwide. It is used by many as
the primary source of information
consumption, and fueled the creation
and growth of its own social ecosystem
through social media and content
sharing. Furthermore, e-commerce, or
online shopping, has become one of the
largest uses of the Internet.
Is a portable electronic device,
which can allow calls via a radio
frequency wave, while the user is
moving within a telephone
service area. The radio frequency Mobile
link establishes a connection with
the switching systems of a
telephone operator mobile, which phone
provides access to the public
switched telephone network
(PSTN). Most modern mobile
phone services use a Cellular
Network (cellular network)
architecture and therefore
mobile phones are often called
cellular phones.

During the beginnings of mobile


telephony, these devices had the
function of making and receiving
voice calls, in addition to being
considerably large in size, which
is why these phones were known
as "bricks" at the time. With the
evolution of analogy to digital
cellular technology, other
functions were included such as:
text messages (SMS), MMS,
short-range wireless
communications (infrared,
Bluetooth), video games, digital
camera, Internet access, among
others. Furthermore, over time,
the form factor of mobile phones
changed, going from the old
"bricks", to the "bars" and
"folding" ones of the 1990s and
2000s (with a physical keyboard),
to the current " slates" (touch
screen and virtual keyboard)
Television
The television is the final part
of the television system, which
begins with the capture of
images and sounds at source,
and their emission and
dissemination through
different media. The television
has become a common, every
day and normal household
appliance with a wide
presence in homes around the
world. The first commercial
television was created on
January 26, 1926

The first televisions that can


be considered commercial
were of a mechanical type and
were based on a rotating disk,
the Nipkow disk (patented by
the German engineer Paul
Nipkow in 1884), which
contained a series of holes
arranged in a spiral and that
allowed a “line by line”
scanning of a strongly
illuminated image. The
resolution of the first
mechanical systems was 30
lines to 12 frames but they
were later improved to reach
hundreds of lines of resolution
and even included color.
Robots can be classified according to
their chronology, their function or the
Robots
segment they are focused on. Nowadays,
they can have many areas of action,
such as industry, education, health or
even the domestic unit.
and
First Generation: manipulator robots
types
They are those who can pick up and
move objects, but have very limited
movements.

Second Generation: learning robots


They collect information from the
environment to be able to make more
complex movements.

Third generation: reprogrammable


robots
They are those equipped with sensors
and in which programming languages
are used to vary their functions
according to the needs at all times.

Fourth Generation: mobile robots


In the fourth generation, the first
intelligent robots appear, capable of
interpreting the environment in real
time.

Fifth Generation: robots with artificial


intelligence
It is the stage that is currently in
development. They aim to imitate
human beings and are autonomous.
Cloud
Cloud computing, also
known as cloud services,
cloud computing, cloud
computing or simply "the
cloud", is the use of a
network of remote servers
connected to the Internet
computing
to store, manage and
process data, servers,
databases, networks and
software.

Cloud computing is the


on-demand availability of
computer system
resources, especially data
storage and computing
capacity, without direct
active management by the
user. The term is generally
used to describe data
centers available from
anywhere to many users
over the Internet from any
mobile or fixed device.
Artificial intelligence has long

Artificial
since abandoned the realm of
science fiction and is quietly
sneaking into our lives.
Although still at a very early
stage, is laying the foundation
to lead a revolution comparable
to that generated by the
intelligence
Internet. Its applications in
multiple sectors — such as
health, finance, transport and
education, among others —
have prompted the European
Union to develop its own
Robotics Laws.

The AI is present in the facial


detection function of mobile
phones, in virtual voice
assistants such as Siri from
Apple, Alexa from Amazon or
Cortana from Microsoft, and it
is integrated into our everyday
devices through bots (short for
robots) and mobile apps such
as: a digital personal shopper; ,
conceived to help us with
language learning; designed to
make the arduous task of finding
new flooring a little bit more
bearable; and a virtual assistant
on Facebook that issues medical
"diagnoses". The aim of all of
these is to make people's lives
easier.
It is a social structure
composed of a set of actors
and one or more ties or
Social
relationships defined between
them. Its study dates back to
the 1930s, with the creation of
networks
sociograms by Jacob Levy
Moreno and Helen Hall
Jennings, which gave rise to
sociometry, the precursor of
social network analysis and
much of social psychology.
Since the late 1940s, they
have also been studied in
depth using graph theory.
Social network analysis is an
interdisciplinary study in
which social and behavioral
sciences, as well as
mathematics and statistics,
come together.

Currently, social networks


represent one of the major
paradigms of contemporary
sociology and organizational
behavior. The creation of
online social networks has led
to complex networks, which
are the subject of study of
network science. Due to the
large volumes of data from
this type of networks,
computer science tools and
techniques are also often used
to study them.
Virtualization, used in
computing, is the concept
that describes the ability of
some computers to use a
program or set of programs Virtualization
(software) to imitate the
physical characteristics
(hardware) of another
computer or set of
computers, resulting in to a
virtual computer system.
This allows you to run more
than one virtual system,
each with different
operating systems and
applications, on a single
server. Therefore, the
function of virtualization
software is to simulate the
existence of the
technological resource that
you want to virtualize. In
English-speaking areas, this
term is usually known by the
numeronym v12n.

The IOMMU allows access


to physical devices securely
in virtualized environments
through a process known as
device passthrough. Without
the IOMMU, the existence
of virtualized environments
that had correct access to
the hardware installed in the
system would not be
possible. Currently, it is an
essential piece for those
CPUs that manage
virtualized environments.

This technology is applied in


different areas, such as
servers, storage, networks
and even workplaces.
Bitcoin trading refers to the act of
buying and selling Bitcoin via an
exchange platform. In short, Bitcoin
can be traded in many ways. The first Trading
way is to indulge in buying and selling
of BTC on a cryptocurrency exchange.
Another way of trading in Bitcoin is by
and
bitcoin
means of derivative financial
instruments, such as Contracts for
Difference (CFDs). Trading via CFDs
facilitates traders to trade as per the
direction of market movement over the
very short-term period and allows you
to bet on Bitcoin price changes without
actually owning any underlying coins.

CFDs have become a popular way to


trade in Bitcoin as they offer greater
flexibility and with the optimum use of
leverage one can take short as well as
long positions in Bitcoin.

In order to start trading in Bitcoin, one


first needs to be well-equipped with
adequate information and should have
a familiarity of the subject. It is also
critical to know the associated risks
and the regulatory laws which might
affect one’s jurisdiction and decisions.
Big data primarily refers to data
sets that are too large or complex
to be dealt with by
traditional data-processing applic

Big data
ation software. Data with many
entries (rows) offer
greater statistical power, while
data with higher complexity
(more attributes or columns) may
lead to a higher false discovery
rate. Though used sometimes
loosely partly due to a lack of
formal definition, the best
interpretation is that it is a large
body of information that cannot
be comprehended when used in
small amounts only.
Big data analysis challenges
include capturing data, data
storage, data analysis,
search, sharing, transfer, visualiz
ation, querying,
updating, information privacy,
and data source. Big data was
originally associated with three
key concepts: volume, variety,
and velocity. The analysis of big
data presents challenges in
sampling, and thus previously
allowing for only observations
and sampling. Thus a fourth
concept, veracity, refers to the
quality or insightfulness of the
data. Without sufficient
investment in expertise for big
data veracity, the volume and
variety of data can produce costs
and risks that exceed an
organization's capacity to create
and capture value from big data

You might also like