Ge Elec Finals Reviewer

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 33

MODULE 5: Safeguarding personal and professional information

I. Significance of internet safety


Why is internet privacy and safety important?
● It protects personal information
● Preserve freedom of speech and expression
● Promote equal treatment
● Maintain trust in online services
It protects personal information
According to the Federal Trade Commission (Vedova, 2023), Personal Data is crucial and
can be exploited for identity theft, misrepresentation, and other malicious activities.
Some main dangers on the internet include:
1. Identity theft
2. Stolen information
3. Online scams
4. Unsafe communication
5. Mental/Physical harm
6. Phishing/Scams
7. Viruses and malware
Personal Data
Personal information is unique to each person and helps to identify them
TYPES OF PERSONAL DATA
1. Identifiable information
- Pertain to all information that can somehow identify you like, Name, Address,,
Phone Number or Email address
2. Sensitive information
- Sensitive information is the most important type of information. The examples
of sensitive information are medical records, financial information, or personal
opinions
3. Non-identifiable information
- The data that cannot identify a specific individual or that is applicable to many
people. The best examples are gender, race, age or zip code
Preserve freedom of speech and expression
The electronic frontier foundation states that freedom of speech is fundamental to
democracy
Promote equal treatment
The united nations human rights office of the high commissioner emphasizes the
significance of privacy in the computerized age, especially with regards to human rights
Maintain trust in online services
Securing personal information online is crucial for maintaining trust in online services,
especially in the context of eCommerce.

PROTECTING PERSONAL AND PROFESSIONAL INFORMATION


In a nutshell, it has become a critical imperative in the digital age. By adopting best practices
for data privacy, individuals and organizations can proactively safeguard information and
mitigate the risks associated with data breaches and privacy violations.

II. Most common issues on the internet


1. Hacking/Unauthorized access
- Is an attempt to exploit a computer system or a private network within a
computer
● Two types of hackers
- White hats: professionals hack to test their own security and
make them more resilient to attacks
- Black hats: hackers hack to take control of the system for
personal gains
2. Scams
- A dishonest scheme to make money or gain an advantage, especially one
that involves deceiving people
3. Sexual abuse and pornography
- Takes photo and videos that are posted on other areas of the internet and
reports them on porn sites without the person’s consent
4. Cyberterrorism
- It refers to deliberate, politically motivated attacks by anti-national groups,
agents, or individuals on computers, information systems, programs, and data
that result in violence against civilians or noncombatant targets.
● Forms of cyberterrorism
- Computer hacking:
● Accumulates data illegally
● Allows them to view data without consent
● Allows for computer abuse
- Privacy violations
● Breach person important data
● Allows them to disclose someone’s personal
information without consent
- Data interference or theft
● Changes or steal important data
● Data can be used to exploit weakness
- Network damage or disruptions
● Done through viruses or trojan hacking
● Harms the company’s network to keep them busy
rebuilding whilst more attacks are sent

III. Strategies in safeguarding personal information


If personal information slips into the wrong hands, people could be harmed. Depending on
the circumstances, they could become victims of identity theft, prejudice or even physical
harm
● USE STRONG AND UNIQUE PASSWORDS WITH 2FA
Strong passwords are the most important and sometimes the only protection we have
against identity theft and hackers
- Store passwords in a secure password manager
- Enable two-factor authentications (2FA)
- Set devices to automatically lock when not using them
● SHARE LESS INFORMATION WITH APPS AND SERVICES
All social networking platforms and applications collect information about identity, hobbies,
and online activities. Hence, you should be aware of the data collection policies for any app
or service you use
● SECURE WEBSITE BEFORE ENTERING PERSONAL DATA
Whenever you sign up for a new account or membership online or make an online purchase,
make sure the site is legitimate and read the terms and conditions.
- Websites usually have padlock image in the search bar or have the “https://” prefix if
they’re secure
● STOP SEARCH ENGINES FROM TRACKING YOU
Your search engine collects a huge amount of personal data about you. The owners of the
two largest search engines- Google and Bing- also operate the popular browsers Chrome
and Edge, respectively.
- For google: go the my activity dashboard and delete everything
- For microsoft: you’ll need to clear data separately from microsoft edge and bing
● MAKE SMART WIFI DECISIONS
Public wifi networks aren’t always secure; if you are using one, avoid putting personal
information. And for your at-home wifi, make sure you protect your network by using a strong
password and remember to change it frequently
● CHECK YOUR MOBILE APP PERMISSIONS
Mobile apps often require various permissions for personal data sometimes unrelated to
their function. Review and disable permissions you’re uncomfortable with in the app settings
after download.
● TIGHTEN PRIVACY SETTINGS ON YOUR SOCIAL MEDIA ACCOUNTS
Social media platforms all have privacy and security policies. Before using them, understand
what information they collect and share. For facebook users, its crucial to review and
comprehend privacy settings to ensure comfort
● USE ANTIVIRUS SOFTWARE
Antivirus software is essential for protecting against malware, offering real-time threat
monitoring and web protection. Investing in strong antivirus software is crucial for online
security
IV. Strategies in safeguarding professional information
● ENSURE EMPLOYEES PROPERLY SECURE THEIR DEVICES
By adopting a holistic and proactive approach to securing employee devies, organizations
can significantly reduce the risk of security breaches, data loss and reputational damage
- Develop comprehensive security policies
- Multi-layered authentication mechanisms
- Continuous monitoring and compliance checks
● STAY UP-TO-DATE WITH SOFTWARE UPDATES
Staying up-to-date- most security company patches are released as soon as they are
available to enable users to keep their assets secure
● USE VPNS
Virtual personal networks area secure way to access the internet; it encrypts traffic snd
protects the data the employees are using:
- Securing sensitive data
- Protecting privacy and anonymity
- Circumventing geo-restrictions
- Enhancing remorse work capabilities
● Different types of VPN
○ Remote access vpns
■ Allows individual users to securely connect to a private network over
the internet. It enables professionals to access resources, files, and
applications on their company’s network when working remotely.
○ Site-to-Site VPNS
■ Also known as network to network VPS, connect entire networks
together over the internet. Commonly used by organizations with
multiple locations, allowing them to securely share resources and
communicate internally.
○ Mobile VPNS
■ Designed for professionals who primarily work from their smartphones
or tablets. It enables to secure access to company resources and
applications, regardless of the user’s physical location

● TRAIN YOUR STAFF


Reasons why cybersecurity awareness is important:
1. Attacks are on the rise
2. To upgrade information security standards
3. To combat issues with regard to human error
4. To reduce the anxiety and stress levels at work
5. To prevent monetary damages to your ogranization
● MANAGING THE CYBERSECURITY RISKS OF REMOTE WORK
Best Practices for remote working cybersecurity
● PHYSICAL SECURITY
○ Location of work: locking doors and ensuring you don’t leave your work
devices unattended in public places is essential
○ Only use your company laptop or computer for work: 30-40% of
employees’ internet activity is non-work related, affecting not only their
productivity but cybersecurity.
○ Be wary of the people around your: there should be more awareness when
working in public or on a remote server
● DIGITAL SECURITY
○ Phishing emails
○ Insecure passwords
○ Logout of your accounts
MODULE 6: Safeguarding personal and professional information
THE IMPORTANCE OF DATA IN THE IT ERA
- Data is crucial in the digital era, serving as the foundation for informed decisions
across various sectors. Effective data collection, analysis, and utilization offer a
competitive advantage in today ' s hyperconnected world
- Data plays a vital role in the Digital or Information Technology (IT) Era as it not only
fuels the digital economy but also powers the technologies and devices that humans
use in their everyday life.
- Studying its importance in the IT Era will help us - students in understanding how it
aids decision making, create new products and services, improve operational
efficiency, personalize the customer experience, and monetize data that may help in
our studies and in our future career as architects
I. DEFINITION OF DATA
NOUN -facts and statistics collected together for reference or analysis. See also datum.
"there is very little data available "
● the quantities, characters, or symbols on which operations are performed by a
computer, being stored and transmitted in the form of electrical signals and recorded
on magnetic, optical, or mechanical recording media.
● PHILOSOPHY
● things known or assumed as facts, making the basis of reasoning or calculation.
[The information above is an example of DATA, retrieved from Oxford Languages.]

Data is many forms of information that are often formatted in a specific way. Programs and
data are the two main categories into which all software falls. Programs are collections of
instructions used to manipulate data, as we already know.

An organized data is called “information”. It is defined as classified data that has some
meaningful value for the user. Information is also the processed data used to make decisions
and take action. Processed data must meet the following criteria for it to be of any significant
use in decision-making:
Accuracy: The information must be accurate.
Completeness: The information must be complete.
Timeliness: The information must be available when it’s needed.

Data is typically divided into two types


- QUALITATIVE
It describes the quality of something or someone. It is descriptive information. For example,
the skin colour, eye colour, hair texture, etc. gives us qualitative information about a person.
- QUANTITATIVE
It provides numerical information. Example, the height and weight of a person
II. DATA IN DECISION MAKING
Why is data-driven decision making important?
- Data-driven decision making is important because it helps you make decisions based
on facts instead of biases. If you’re in a leadership position, making objective
decisions is the best way to remain fair and balanced.
- The most informed decisions stem from data that measure your business goals and
populates in real time. You can aggregate the data you need to see patterns and
make predictions with reporting software.
Some decisions you can make with support from data include:
● How to drive profits and sales
● How to establish good management behavior
● How to optimize operations
● How to improve team performance
III. INFLUENCE OF DATA_DRIVEN DECISION MAKING ON ARCHITECTS
GATHERING DATA
- As future architects, data plays a critical role in our decision-making process. By
gathering and analyzing data, we can better understand the needs and preferences
of our clients, the market, and the community. This information can inform our design
decisions, help us make more informed choices about materials and techniques, and
ultimately create better outcomes for our clients.
- One of the key areas where data is particularly useful is in understanding the needs
and preferences of our clients, including information about their lifestyle, budget, and
demographics. This data can help us design spaces that are customized to their
specific needs and goals, and that will be more likely to meet their expectations and
preferences.
KEEPING UP WITH THE MARKET
- Another area where data is relevant is in understanding the market and the
community we are designing for. By analyzing data on population growth , economic
trends, a n d o t h e r f a c t o rs, w e c a n b e t t e r u n d e r s t a n d t h e c o n t e x
t in which we are designing , a n d identify opportunities for creating spaces that will
be well-suited to the needs of the community over time.
DESIGN PROCESS
- Finally, data can also be useful in the design process itself, helping us to make more
informed choices about materials and techniques, and to optimize our designs for
efficiency and sustainability. By gathering and analyzing data on energy
consumption, resource usage, and other factors, we can optimize our designs to
reduce wasted resources and energy, and to achieve more sustainable outcomes.
IV. INFLUENCE OF DATA QUALITY ON ANALYTICS

1. ACCURACY - when it comes to data analysis, the accuracy in data is non negotiable.
Statistical outcomes and predictive models rely heavily on the precision of input data to
produce results that drive strategic business moves.
2. CONSISTENCY - ensures repeated measurements or observations yield the same result,
further cementing trust in the analytics
3. COMPLETENESS - another critical aspect; missing values can change analysis and
result in misleading conclusions
4. UNIFORMITY - across data points allow for effortless comparison and synthesis, enabling
analysts to extract meaning patterns and insight effectively.
5. TIMELINESS - timely data updates enable real-time or near-real-time analytics, allowing
organizations to respond swiftly to changing conditions and trends.
6. RELEVANCE - relevant data aligned with the objectives of the analysis ensures that
insights generated are meaningful and actionable, contributing to strategic decision-making.
7. VALIDITY - valid data accurately represents the intended concepts or phenomena,
preventing misleading conclusions and ensuring the credibility of analytics outcomes.
8. RELIABILITY - reliable data sources and collection methods produce consistent results
over time, instilling confidence in the accuracy and effectiveness of analytics processes.
9. PRECISION - precise data granularity and measurement enable detailed analysis and
identification of subtle patterns or trends, supporting more nuanced decision-making.
10. ACCESSIBILITY - accessible data facilitates widespread usage and collaboration
among stakeholders, promoting transparency and accountability in analytics initiatives.
V. ROLE OF DATA MACHINE LEARNING
Data is crucial for machine learning and without data, machine learning is not possible as it
requires data in one form or the other. Machine learning algorithms depend heavily on
high-quality data to learn and make accurate predictions.
DEFINITION OF MACHINE LEARNING
“Machine Learning is the use and development of computer systems that are able to learn
and adapt without following explicit instructions, by using algorithms and statistical models to
analyze and draw inferences patterns in data.”

Data is typically divided into two types: Labeled and Unlabeled:


LABELED DATA
- A Labeled data is carefully annotated with meaningful tags, or labels, that classify the
data ' s elements or outcomes
UNLABELED DATA
- Unlabeled data is a designation for pieces of data that have not been tagged with
labels identifying characteristics, properties or classifications.
STEPS TO PREPARE DATA FOR MACHINE LEARNING
1.DATA CLEANING
2.DATA TRANSFORMATION
3.FEATURE SELECTION
4.FEATURE SCALING
5.DATA SPLITTING
ADVANTAGES OF USING DATA IN MACHINE LEARNING
1. Improved accuracy
2. Automation
3. Personalization
4. Cost savings
DISADVANTAGES OF USING DATA IN MACHINE LEARNING
1. Bias
2. Privacy
3. Quality of data
4. Lack of interpretability
VI. IMPOTANCE OF DATA LITERACY
INFORMED DECISION-MAKING
- Data literacy enables individuals and organizations to make informed decisions
based on evidence rather than relying on intuition or guesswork. Data-driven
decision-making leads to better outcomes, more efficient processes, and increased
competitiveness
INCREASED EFFICIENCY AND PRODUCTIVITY
- Data literacy helps employees identify patterns, trends, and anomalies in data, which
can lead to process improvements, cost reductions, and increased operational
efficiency
INNOVATION AND GROWTH
- By harnessing the power of data, organizations can identify new opportunities,
develop innovative products and services, and drive business growth. Data literacy is
essential to effectively leverage data for innovation
COMPETITIVE ADVANTAGE
- As data becomes increasingly important in virtually every industry, businesses with a
data-literate workforce are better positioned to compete and succeed in the market.
Data literacy can provide a significant competitive advantage by enabling
organizations to capitalize on the wealth of data available
RISK MANAGEMENT
- Data literacy helps organizations identify potential risks and vulnerabilities, allowing
them to proactively address issues and implement effective risk management
strategies
COMPLIANCE AND REGULATION
- Many industries are subject to strict data regulations, and organizations must be able
to manage and understand their data to maintain compliance. Data literacy plays a
critical role in ensuring that businesses can meet these requirements
EMPLOYEE EMPOWERMENT AND JOB SATISFACTION
- Employees who are data literate feel more confident in their roles and are better
equipped to contribute to their organization’s success. This can lead to increased job
satisfaction, engagement, and retention
ENHANCED COLLABORATION
- Data literacy fosters a culture of data-driven decision-making across the organization,
promoting cross-functional collaboration and a shared understanding of business
objectives and challenges
MODULE 7: DATA PRIVACY LAWS AND REGULATIONS
The Republic Act 10173, officially known as the Data Privacy Act of 2012 (DPA), is
Philippines data privacy law, aiming to
- “to protect the fundamental human right to privacy of communication while ensuring
free flow of information to promote innovation and growth [and] the [State ’ s] inherent
obligation to ensure that personal information in information and communications
systems in government and in the private sector are secured and protected”
● It helps in taking reasonable security measures to protect personal information from
unauthorized access, use, disclosure, or destruction.
● It gives individuals the right to access, correct, and erase their personal information.
● It also gives the individuals the right to file a complaint with the NPC if their personal
information is mishandled
The law became enforceable as of September 8, 2012 and the regulating authority, the
NPC, was established 4 years later, in 2016. As of September 9, 2016 the NPC published
‘Implementing Rules and Regulations of Republic Act No. 10173, known as the Data Privacy
Act of 2012, ’ The IRR, is to help with the understanding of the requirements imposed on
covered entities

What acts are covered by the DPA?


The DPA and its Implementing Rules and Regulations (IRR) apply to all acts done or
practices engaged in and outside of the Philippines if:
● If the person, either an individual or an institution, involved in the processing of
personal data is located in the Philippines;
● The act or practice involves personal data of a Philippine citizen or Philippine
● The processing of personal data is done in the Philippines; or
● The act, practice or processing of personal data is done by an entity with links to the
Philippines, subject to international law and comity
ADVANTAGES OF Data privacy act
1. It helps to protect individuals from identity theft, fraud, and other privacy violations
2. It promotes trust and confidence in the use of information and communications
technology
3. It encourages innovation and economic growth by creating a more secure
environment for the collection, processing and use of personal information
disADVANTAGES OF Data privacy act
1. Lack of awareness of the law among individuals and organizations
2. Limited resources of the NPC to enforce the law
3. Inadequate penalties for violations of the law
Who implements the DPA?
The National Privacy Commission (NPC) is in charge of administering and implementing the
DPA. It is also tasked to monitor and ensure compliance of the Philippines with international
standards for personal data protection. The major functions of the NPC are as follows:
1. Rule making
2. Advisory
3. Public Education
4. Compliance and monitoring
5. Complaints and investigations
6. Enforcement
Personal information controller - is an individual or institution, or any other body who
controls the processing of personal data, or instructs another to process personal data on its
behalf
- This act applies “to the processing of all types of personal information and to any
natural and juridical person involved in personal information processing including
those personal information controllers and processors who, although not found or
established in the Philippines, use equipment that are located in the Philippines, or
those who maintain an office, branch or agency in the Philippines.
This act applies to:
● All types of processes involving personal information to any natural and juridical
person in the Philippines; Including the use of equipment that is located in the
Philippines, or those who maintain an office, branch or agency in the Philippines.
● Filipino citizens or residents practicing personal information processes within or
outside the country.
● Incorporations that are unincorporated in the Philippines but have central
management and control in the country.
● Entity that has a branch, agency, office or subsidiary in the Philippines and the parent
or affiliate of the Philippine entity has access to personal information
This act exempts certain types of data which are:
● Information about any individual who is or was an officer or employee of a
government institution.
● Information about an individual who is or was performing service under contract for a
government institution that relates to the services performed.
● Information relating to any discretionary benefit of a financial nature.
● Personal information processed for journalistic, artistic, literary or research purposes.
● Information necessary in order to carry out the functions of public authority
● Information necessary for banks and other financial institutions under the jurisdiction
of the independent, central monetary authority or Bangko Sentral ng Pilipinas
● Personal information originally collected from residents of foreign jurisdictions in
accordance with the laws of those foreign jurisdictions
How can I keep my organization Republic Act 10173 compliant?
Five pillars of compliance for RA 10173
1. Appoint a Data Protection Officer
● A Compliance Officer for Privacy (COP) is an individual or individuals who perform
some of the functions of a DPO
● Appointing a Data ProA DPO increases your chance to remain competitive in the
dynamic global landscape of data protection.
● Your DPO should have expertise in relevant privacy or data protection policies and
practices. He or she should have sufficient understanding of the processing
operations being carried out by the PIC or PIP
What are the duties of a dpo?
1.collect information to identify the processing operations
2.analyze and check the compliance of processing activities
3.inform, advise, and issue recommendations to the PIC or PIP
4. ascertain renewal of accreditations or certifications necessary
5. advice the PIP or PIP as regards the necessity of executing a Data Sharing Agreement
with third parties
2. Conduct a Privacy Risk or Impact Assessment
- A Privacy Impact Assessment (PIA) is an instrument for assessing the potential
impacts on privacy of a process, information system, program, software module,
device or other initiative which processes personal information and in consultation
with stakeholders, for taking actions as necessary to treat privacy risk
3. Create a privacy management program
● Republic Act No. 10173, also known as the Data Privacy Act of 2012 (DPA), aims to
protect personal data in information and communications systems both in the
government and the private sector.
● It ensures that entities or organizations processing personal data establish policies,
and implement measures and procedures that guarantee the safety and security of
personal data under their control or custody, thereby upholding an individual’s data
privacy rights
4. Implement your Privacy and Data Protection Measures
- As a personal information controller or processor, it is a diligent responsibility to take
great efforts and be accountable in protecting the personal data that you process by
managing the areas, distribution, and life-cycle of authentication and authorization of
your organization’s processes. Access to any confidential, personal, and sensitive
data must always be protected, controlled, and managed with sufficient security
policies. Preventing unauthorized access and data breach is the primary objective of
a controller and processor. Physical and systematic approach in creating and
managing access control should also be established by the management
5. Implement your Privacy and Data Protection Measures
- A security incident is any event or occurrence that affects or tends to affect data
protection, or may compromise the availability, integrity, and confidentiality of
personal data. It includes incidents that would result in a personal data breach, if not
for safeguards that have been put in place.
- A data breach happens when there is a breach of security leading to the accidental
or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to,
personal data transmitted, stored, or otherwise processed. There are three kinds of
data breaches:
- 1.Availability breach. – from the loss accidental or unlawful destruction of
personal data;
- 2.Integrity breach. – from the unauthorized alteration of personal data; and
- 3.Confidentiality breach. – from the unauthorized disclosure of or access to
personal data. Assessment
What data access rights does republic act 10173 grant?
● Right to be informed
● Right to object to the processing of his or her personal data, including processing for
direct marketing, automated processing or profiling
● Right to Access
● Right to Rectification (Right to Correct)
● Right to Erasure or Blocking (Right to Delete)
● Right to Data Portability
● Right to damages
● Right to transmit data subject rights
Enforcement and penalties
- The enforcing authority is the National Privacy Commission (NPC). It’ s duties are to
ensure compliance, handlng complaints, recommending penalties to the Department
of Justice. Regarding penalties, Sections 25 through 36 list the various types of
violations and the associated penalties which consist of both criminal and financial
sanctions. Imprisonment can be between 6 months and 7 years, coupled with a
financial sanction ranging between Php100,000.00 and Php4,000,000.00. Any
combination of violations listed in Sections 25 through 36 can result in a sanction
consisting of imprisonment for a period between 3 and 6 years and a fine between
Php100,000.00 and Php5,000,000.00
MODULE 9- THE EVOLUTION
what is communication technology
- Communication technology, also known as information technology, refers to all
equipment and programs that are used to process and communicate information.
- Professionals in the communication technology field specialize in the development,
installation, and service of these hardware and software systems.
- Communication is very important. It is a key to understanding between people.
Through the years, communication has evolved. The way people communicate with
each other today is entirely different from the prehistoric era.
- Before, communication was limited to interpersonal interaction- person to person.
Until it evolved to alphabets, signs, and symbols, letters and telephone. Today, the
internet era has paved the way to innumerable means of communication.
EARLY COMMUNICATION TECHNOLOGIES
PREHISTORIC COMMUNICATION METHOD
ORAL COMMUNICATION
- The primary mode of communication in prehistoric times was likely oral.
GESTURES AND BODY LANGUAGE
- Facial expressions, posture, hand gestures, and the use of objects would have
conveyed emotions, intentions, and basic information.
ART AND CAVING ARTS
- early humans used cave paintings, rock art, and other forms of symbolic expression
as a means of communication
DRUMS AND PERCUSSION
- The use of drums and other percussion instruments for signaling purposes is
common in various cultures.
FIRE SIGNALS
- The controlled use of fire may have been employed for signaling.
SYMBOLIC OBJECTS
- The use of symbolic objects, such as specific arrangements of stones or other items,
might have been a way to communicate simple messages or mark important
locations.
Ancient writing systems (cuneiform, hieroglyphics, etc.)
CUNEIFORM
Origin: Developed in ancient Sumer (Mesopotamia) around 3500 BCE.
Materials Used: Initially impressed on clay tablets with a wedge-shaped stylus. Later
versions were also written on other materials like stone and wax.
Usage: Primarily used for administrative, economic, religious, and literary purposes in
Mesopotamian civilizations such as Sumerians, Akkadians, Babylonians, and Assyrians
HIEROGLYPHICS
Origin: Ancient Egypt, with roots dating back to around 3300 BCE.
Materials Used: Initially carved or painted on stone surfaces, later used on papyrus.
Usage: Primarily employed for monumental inscriptions, religious texts, and administrative
records.
INDUSCRIPT
Usage: The script remains undeciphered, and its meaning and purpose are not fully
understood.
MAYA GLYPHS
Primarily for recording historical events, religious rituals, and astronomical information
INVENTION OF PAPER AND ITS IMPACT ON COMMUNICATION
- The invention of paper had a profound impact on communication, contributing
significantly to the spread of knowledge, the accessibility of written information, and
the development of various civilizations.

INVENTION OF PAPER
- Chinese Origins: Paper is traditionally credited to the Chinese inventor Cai Lun,
IMPACT ON COMMUNICATION
● Accessibility and Availability: Paper was more affordable and easier to
produce than traditional writing materials like parchment or silk. This
increased the availability of writing materials, making it more
accessible to a broader population. The affordability of paper allowed
for the creation of books, scrolls, and other written documents on a
larger scale
● Spread of Knowledge The widespread use of paper facilitated the
reproduction and dissemination of written knowledge.
● Cultural and Scientific Advancements The Renaissance was a period
of renewed interest in classical learning and the exploration of new
ideas
THE PRINTING PRESS REVOLUTION
- Printing press, machine by which text and images are transferred from movable type
to paper or other media by means of ink. Movable type and paper were invented in
China, and the oldest known extant book printed from movable type was created in
Korea in the 14th century. Printing first became mechanized in Europe during the
15th century
Early wooden printing press
WOODBLOCK PRINTING
- Woodblock printing is a relief print technique in which images, designs, or words are
carved in reverse onto a block of wood using wood carving tools
Johannes Gutenberg- GERMAN INVENTOR AND CRAFTSMAN
- Around 1440, the German Johannes Gutenberg developed the printing press in the
Holy Roman Empire by modifying an already-existing screw press. As a goldsmith by
trade, Gutenberg created a comprehensive printing system that optimized the
printing process at every level by combining his own revolutionary innovations with
pre-existing technologies.
Spread of printed materials and the rise of literacy
- The dissemination of information, discoveries, and literacy in Renaissance Europe
was accelerated by Johann Gutenberg's invention of movable-type printing. The
Protestant Reformation, which caused the Catholic Church to split apart, was greatly
aided by the printing revolution as well.
Movable-Type Printing
- An innovation fundamentally altered people's lives and altered the process of making
books. The process of reproducing text, generally on paper, is known as
"movable-type printing." It begins with the formation of raised letters or other symbols
on tiny blocks known as types. After arranging the type on a press to create words, a
printer produces a page of text.
THE PRINTING PRESS Revolution’s impact on society, politics, and religion
SOCIETY -
Spread of Knowledge -
Standardization of Language -
Cultural Exchange
POLITICS -
Dissemination of Political Ideas -
Formation of Public Opinion -
Centralization of Power
RELIGION -
Protestant Reformation -
Religious Diversity -
Translation of Scriptures
TELEPHONES AND TELEGRAPH ERA
INVENTION OF THE TELEGRAPH AND MORSE CODE
Telegraph
- allowing for near-instantaneous transmission of information over great distances
morse code
- an integral part of telegraphy, providing a standardized and efficient means of
encoding and decoding messages.
SAMUEL MORSE
- THE DEVELOPER OF MORSE CODE, A METHOD OF EXPRESSING LETTERS
AND NUMBERS USING COMBINATIONS OF DOTS AND DASHES, WAS THE
MAJOR INNOVATION
ALEXANDER GRAHAM BELL
- SCOTTISH-BORN SCIENTIST, EDUCATOR, AND INVENTOR WHO IS
COMMONLY RECOGNIZED FOR HAVING INVENTED THE TELEPHONE. BELL,
WHO WAS BORN IN 1847, DEVOTED MUCH OF HIS LIFE TO THE STUDY OF
VOICE AND SOUND.
TELEPHONE
- HIS INNOVATIVE METHOD ENTAILED TRANSLATING SPOKEN WORDS INTO
ELECTRICAL IMPULSES, WHICH WERE SUBSEQUENTLY TRANSLATED INTO
AUDIBLE SOUND AT THE OTHER END OF THE CABLE.
role of communication
1. Instant communication
2. Global connectivity
3. Business operations
4. Education and research collaboration
5. Emergency communication
6. Cultural exchange and information sharing
7. Healthcare service
8. Infrastructure development
RADIO AND TELEVISION BROADCASTING
MARCONI AND THE DEVELOPMENT OF RADIO TECHNOLOGY
- Guglielmo Marconi, an Italian inventor and electrical engineer, is widely credited with
the development and popularization of radio technology.
1.EARLY EXPERIMENTS Marconi started conducting his own experiments in the
transmission of telegraph signals without wires.
2. FIRST WIRELESS TELEGRAPHY SYSTEMS He received a patent for his wireless
telegraphy system in 1896
3. TRANSATLANTIC TRANSMISSION he sent the letter "S" in Morse code from Poldhu in
Cornwall, England, to St. John's, Newfoundland, a distance of over 2,000 miles.
4. DEVELOPMENT OF RADIO STATIONS AND NETWORKS Marconi's company
established a series of wireless stations, and by 1902
5. INNOVATIONS working on improvements to equipment and the development of radio
technology for military and civilian use.
6. EVOLUTION INTO RADIO BROADCASTING audio signals could be transmitted to a
broad audience, became a major application of radio technology in the following decades
EVOLUTION OF TELEVISION BROADCASTING
1. MECHANICAL TELEVISION (LATE 19TH TO EARLY 20TH CENTURY)
Inventors like Paul Nipkow, John Logie Baird, and others created early devices that used
spinning disks and lenses to capture and display images
2. INTRODUCTION OF ELECTRONIC TELEVISION (1930S)
He received a patent for his wireless telegraphy system in 1896
3. WORLD WAR II IMPACT AND POST-WAR GROWTH (1940S1950S)
television sets became more affordable, and networks expanded their programming to
include dramas, comedies, and live events.
4. TRANSITION TO COLOR TELEVISION (1950S-1960S)
The adoption of the NTSC (National Television System Committee) standard in the United
States helped standardize color television broadcasting
5. SATELLITE TECHNOLOGY AND GLOBAL COMMUNICATION (1960S-1970S)
Satellites enabled live broadcasts across vast distances and facilitated the creation of global
networks.
6. CABLE TELEVISION AND SPECIALIZED CHANNELS (1970S1980S)
Cable television gained popularity, offering viewers access to a broader range of channels
beyond the traditional over-the-air broadcasts
7. DIGITAL TELEVISION (1990S2000S)
Digital broadcasting offered improved picture and sound quality, as well as the ability to
transmit multiple channels in the same frequency spectrum.
8. HIGH DEFINITION (HD) AND ULTRA HIGH DEFINITION (UHD) BROADCASTING
(2000S2010S)
High-definition television (HDTV) became widely adopted, offering viewers sharper and
clearer images. Subsequently, Ultra High Definition (UHD) or 4K resolution gained
prominence.
9. INTERNET STREAMING AND ON-DEMAND CONTENT (2010SPRESENT)
Next-generation broadcasting standards, such as ATSC 3.0 (NextGen TV), aim to enhance
the viewing experience with features like 4K broadcasting, interactive content, and improved
reception
IMPACT OF RADIO AND TELEVISION ON MASS COMMUNICATION AND CULTURE
1.Widespread Dissemination of Information
2. Formation of Mass Audiences
3. Formation of Public Opinion
4. Political Influence and Propaganda
5. Advertising and Consumer Culture
6. Instantaneous Communication
7. Shared Cultural Experiences
8. Influence on Language and Dialects
Evolution of Television Broadcasting
- The evolution of television broadcasting spans over a century, marked by significant
technological advancements and shifts in content delivery.
1926
- The American inventor Philo Taylor Farnsworth was 21 years old when he made the
first electronic television. This system captured moving images using a beam of
electrons. This is what we know today as a primitive camera.
1934
- The first fully electronic cathode ray tube television was manufactured by Telefunken
in Germany. It was followed by other manufacturers in France and the United
Kingdom (1936), and the United States (1938)
1949
- Philips markets its first televisions. Today, Philips is considered one of the largest and
most important technology companies in the world. Its main focus is on the
electronics and healthcare sectors.
1950
- The first remote control was the Lazy Bones, developed by Zenith Radio Corporation.
It was a remote control that was connected to the television by a cable, and in fact,
its operation was more mechanical than electronic, since it activated a small motor
that was used to move the TV dial.
1954
- The first colour television. Formed by a trichromatic system, a sequence of fields
based on the primary colours red, green and blue (RGB). RCA launched the first
model, the CT100, popularly known as “The Merrill”.
1955
- The first wireless remote control. It worked with 4 light sensors placed in each corner
of the television. Each sensor had a function: to turn the volume up and down and to
turn the dial to one side or the other. The remote control directed light onto these
sensors and triggered the function, but, being a photosensitive system, the TV could
go crazy if direct sunlight hit it.
1956
- First television broadcast in Spain. Television sets began to become popular in
homes. TVE began to broadcast regularly as a single channel, with programming
designed to entertain viewers and bring the audience all the Spanish news of the
time
1960
- The first portable television set was produced. Sony TV8-301 had an 8-inch,
black-and-white screen and could be powered by mains electricity or two internal
6-volt batteries. It weighed 5.9 kg. The 1960s is marked by various approaches to
portable television and, beyond that, to pocket television.
1978
- The first time that TVE broadcast in colour was in 1969, the Eurovision Song Contest
from Madrid. From 1973 onwards, colour and black and white broadcasts began to
be combined. But it was not until 1978 that the definitive switch to colour took place,
almost three decades after the first broadcast of this type was made in the United
States in the early 1950s.
2008
- Hyundai introduced the first 3D television to the public in Japan. It was a 46-inch set
with a resolution of 1920 x 1080 pixels. The starting price was around 3,100 euros.
Not everyone who had the opportunity to test the system was very satisfied. Some
people found wearing glasses annoying and the intermittency of the glasses seemed
to adversely affect some users.
2009
- The world’s first edge-lit LED TV created by Samsung. This highdefinition TV offered
users ultra-high contrast ratios and vivid colours, thanks to its innovative LED edge
lighting. It was also the world’s thinnest.
2011
- The first models arrived in 2005 and were known as Internet TVs, but from 2010
onwards they became known as Smart TVs. The first Smart TVs were launched on
the market in 2011.
DIGITAL EVOLUTION
EVOLUTION OF EMAIL, INSTANT MESSAGING, AND SOCIAL MEDIA
EMAIL
1970- The concept of electronic mail (email) emerged with the development of ARPANET,
the precursor to the internet.
1990- With the commercialization of the internet, email usage exploded. Services like
Hotmail (1996) and Yahoo Mail (1997) offered free email accounts to the public.
2000-PRESENT- Email continues to evolve, with improvements in spam filtering, encryption,
and integration with other services.
INSTANT MESSAGING
1990- The rise of the internet and advancements in computing technology led to the
development of instant messaging services.
2000- The popularity of instant messaging continued to grow, with the introduction of
features like file sharing, voice and video calls, and presence indicators.
2010-PRESENT- The proliferation of smartphones led to the rise of mobile messaging apps
such as WhatsApp (2009), Facebook Messenger (2011), and WeChat (2011).
SOCIAL MEDIA
EARLY 2000- Social media platforms began to emerge, allowing users to create profiles,
connect with friends, and share content online.
MID 2000- Facebook was founded in 2004 and quickly became the dominant social
networking site, reaching millions of users worldwide
LATE 2000- Social media continued to evolve with the rise of visual platforms like Instagram
(2010) and Snapchat (2011), as well as professional networking platforms like LinkedIn.

MOBILE COMMUNICATION AND SMARTPHONES


MOBILE COMMUNICATION AND SMARTPHONES
- We will see how the physical size of the phones have changed over the years and
the reasons for the size change. We will look at the transition from black and white
analog call only capability to a super-smart usability device in full color. The timeline
of 1G to 4G and our current 5G WAP service. We will also see the change from
traditional button input to swipe and scroll input (touch screen technology ). One will
also see the changes as it relates to the camera and other smart features.
PHONES
1983 – 1989- Introduced to the world in 1983 was the first-ever portable mobile phone, the
Motorola DynaTAC 8000X. Although this phone was large and heavy, the price point was
expensive for that era, the phone going price was USD 4000.
1991 – 1994- The world’s first GSM phone and the first phone to receive a text message
GSM first propelled in Europe 1991 with the Orbitel TPU 900 first to advertise, however, it
wasn’t until 1992 that mobile phone restriction was left from business use only. Nokia was
one of the first to exploit this change
1995 – 1998- The first Phone with color. Despite the fact that it just offered four colors, the
Siemens S10 breathed life into cell phone shows without precedent for 1997. The same year
Hagenuk launched the GlobalHandy, the first device without an external aerial.
1999 – 2002- In 1999 saw Nokia divulge the 7110, which was the first gadget to exploit WAP.
WAP( Wireless Application Protocol ) a method for getting data over a mobile wireless
network. Now a year later, in 2000, we see the launching of the world’s absolute first camera
mobile phone, the J-SH04. It was just accessible in Japan yet flagged the beginning of the
open’s fixation on mobile phone photography. It wasn’t until 2002 and the arrival of the Sony
Ericsson T68i with a clip-on camera, which grabbed the interest of the western markets for a
camera phone.
2003 – 2006- BlackBerry Pearl 8100, 2006 and Sony Ericsson Z1010 In March 2003, we
saw the implementation of 3G, which took download speeds up to 2MBS. The 3G service
was first offered in the UK.
2007-2010- Mobile Phones are Getting Smarter First touchscreen Phone was the LG Prada
The era of the traditional input button has been replaced with swiping and scrolling. Ahead of
the Apple iPhone in May 2007 was the LG Prada who boasted the first touchscreen on the
market.
2011 – 2014- Smartphones offer much more than just communication features.
Smartphones are the major hub of communication. Phone speed has moved from 1G to 4G,
talking download speeds up to 12mbps. There is also the implementation of Voice
recognition.
2015 – 2018- Smartphone size that compliments the features on the phone ( Apple and
Samsung ) The worldwide adoption of 4G vastly improves video streaming and video calling
capacities. Screen sizes keep on developing to amplify the experience of the features the
phone carries with the iPhone 7 Plus display now 57% bigger than the first iPhone from
2007.
PRESENT- Everything is more advanced. There’s way more memory Devices are far faster
and more powerful You can use multiple applications at the same time Cameras are HD
Music and video streaming are easy, as well as online gaming
FUTURE TRENDS AND EMERGING TECHNOLOGIES
- THE INTERNET OF THINGS (IOT) DESCRIBES THE NETWORK OF PHYSICAL
OBJECTS—“THINGS”—THAT ARE EMBEDDED WITH SENSORS, SOFTWARE,
AND OTHER TECHNOLOGIES FOR THE PURPOSE OF CONNECTING AND
EXCHANGING DATA WITH OTHER DEVICES AND SYSTEMS OVER THE
INTERNET
- SMART HOME DEVICES. SMART DEVICES ARE INTERACTIVE ELECTRONICS
THAT USE WIRELESS CONNECTIONS TO UNDERSTAND USER
INSTRUCTIONS. TO AN EXTENT, SMART HOME DEVICES LIKE THERMOSTATS
AND HOME SECURITY SYSTEMS CAN WORK AUTONOMOUSLY TO ASSIST
WITH DAILY TASKS
- WEARABLE TECHNOLOGIES. ONE OF THE MOST COMMON INTERNET OF
THINGS EXAMPLES IS SMARTWATCHES. WEARABLE IOT TECHNOLOGY LIKE
FITBITS AND APPLE WATCHES CONNECT TO OTHER DEVICES (LIKE YOUR
SMARTPHONE) TO SHARE DATA. THEY TYPICALLY ALSO CONNECT TO THE
INTERNET TO TRACK GPS LOCATIONS
- AUTONOMOUS VEHICLES. SELF-DRIVING CARS AND OTHER CONNECTED
VEHICLES RELY ON THE INTERNET TO SHARE REAL TIME INFORMATION.
SENSORS THROUGHOUT THE VEHICLE HELP MAP ITS SURROUNDINGS,
TRANSMIT CAMERA FOOTAGE, AND RESPOND TO TRAFFIC SIGNALS
MODULE 10: ONLINE COLLABORATION AND VIDEO CONFERENCING
WHAT IS COLLABORATION?
- the act of working together with two or more individuals, groups, or companies to
produce or create a project, product, or business
● platform/place
● context/goal
● individuals/persons involved
● Product
WHY IS COLLABORATION IMPORTANT?
● IT ENABLES US TO SHARE RESOURCES, ACHIEVE SHARED GOALS, AND
SHARE NEW IDEAS AND PERSPECTIVES. WHY IS COLLABORATION
IMPORTANT?
● IT ALLOWS US TO LEVERAGE NEW RELATIONSHIPS BY TAKING ADVANTAGE
OF TOOLS AND SKILL SETS UNIQUE TO EACH INDIVIDUAL
ONLINE COLLABORATION
● Online collaboration happens when individuals use a digital meeting platform to work
together on certain tasks from various locations. Team members can jointly create a
document or presentation from wherever they are
● Online collaboration is a way for teams and organizations to grow and improve
project efficiency by eliminating various barriers, such as distance and time, and
facilitating better connection and communication
TWO TYPES OF ONLINE COLLABORATION
● SYNCHRONOUS
○ Synchronous collaboration systems allow a team to work on a project
from different locations simultaneously. This way, any two or more
team members can view and edit a task together through the use of
software programs.
● ASYNCHRONOUS
○ This type of online collaboration doesn 't operate in realtime, and team
members can 't work on a project at the same time. Instead, team
members work within defined schedules to execute their portion of a
project one at a time. Email interactions, group calendars and group
postings are examples of asynchronous online collaboration
FEATURES OF ONLINE COLLABORATION TOOLS
SECURITY SYSTEMS
● Security is really important when people collaborate online because they often share
private information. Companies work hard to keep this info safe, both on devices and
in online tools
● Encryption is like a secret code that makes files unreadable to anyone who isn't
supposed to see them.
FILE SHARING
● Departments within organizations may also wish to share files with each other, such
as text documents, images and videos. Online collaboration tools ensure this is
seamless. Many times, these files contain a large volume of information that may
exceed size limits. The sender can track the download history to keep track of the
file's security.
DISCUSSION FORUMS
● Interactions are very helpful for efficient online collaboration, especially when team
members want to share ideas on the platform. One important feature of online
collaboration is the ability to message individual team members or groups on the
platform. Since these messages deliver instantly, a task can become faster to
execute and complete
ONLINE SURVEYS
● Teamwork involves regular communication for employees to make decisions and
take action. The online survey feature can help an organization or department save
time. It allows all team members to express their opinions and come to decisions on
time since everyone can instantly see what their coworkers think and avoid lengthy
deliberations.
CLOUD FILE STORAGE
● Once a team completes a project, members can use a cloud file storage feature to
keep these files secure and accessible. Team members and other interested parties
may want to access the finished work, so cloud storage gives everyone access to it
regardless of their location. It can help facilitate team and client collaborations
remotely.
CALENDAR VIEWS
● Companies typically use calendars to track projects. There are milestones to reach
and deadlines to meet at specific times, and using a calendar can allow each
member of a team to understand when their tasks are due. The calendar feature
enables team members to track general company timelines and meet their
department targets
WHY IS ONLINE COLLABORATION IMPORTANT?
- ELIMINATES BARRIERS SUCH AS DISTANCE AND TIME AS IT FACILITATES
BETTER CONNECTION AND COMMUNICATION
- SAVES VALUABLE TIME AND RESOURCES
- IMPROVES COMMUNICATION WITHIN TEAMS, BETWEEN TEAMS AND WITH
THIRD PARTIES
- BOOSTS TEAM MORALE BY MAKING WORK PROCESSES SIMPLER AND
GENERATING IMPROVED RESULTS
- INCREASES PRODUCTIVITY SO YOU CAN FOCUS ON THE MOST IMPORTANT
TASKS.
ADVANTAGES AND DISADVANTAGES
PRODUCTIVITY
PROS- gives team members the necessary tools and resources to collaborate within their
organiZation regardless of their location
CONS- reduced personal contact leads to confusion over what is expected of certain tasks
and time tracking
EFFICIENCY
PROS- online collaborative working tools can eliminate redundant emails and streamline
resource management
CONS- email inboxes can quickly get cluttered with the vast number of notifications and
direct messages
COST
PROS- enables individuals to work remotely and share files from any location, potentially
reducing office expenses such as equipment, utilities, and space
CONS- some online softwares offer a more expensive package and limits acces to a few
users
AUDIENCE
PROS- increase engagement with audience outside of your organization through online
workspace
CONS- without proper assessment, it can lead to a diffusion of focus and a slowing down of
the collaborative process with online tools
SECURITY
PROS- most trusted collaboration tools have many safeguards in place to protect their users’
data
CONS- there are still a few people with the mindset that storing data and file sharing in a
cloud storage system is not as secure as keeping it on their servers
PROJECT MANAGEMENT
PROS- ensure all project materials and communications with external parties are kept within
the same workspace
CONS- A project is only as good as the way it is managed
TRACK CHANGES WITH EASE
PROS- provide version control and tracking features that make monitoring and managing
document changes easy
CONS- can lead to cluttered documents and potential confusion if not managed properly
VIDEO CONFERENCING
WHAT IS VIDEO CONFERENCING?
● widely accepted mode of communication among business houses as well as other
organizations.
● achieved through audio and video communication over the internet or dedicated
networks, allowing participants to see and hear each other as if they were in the
same room, despite being geographically apart
FEATURES
● Live Video Feed
- Participants can see each other through live video feeds, enabling
face-to-face interaction and nonverbal communication cues
● Audio Transmission
- Real-time audio allows participants to hear and speak to each other during
the conference
● Screen Sharing
- Participants can share their screens to display presentations, documents, or
applications, facilitating collaboration and information sharing
● Chat Messaging
- Text-based chat allows participants to communicate via messages without
interrupting the main audio/video conversation
● Recording and Playback
- Some video conferencing platforms offer the ability to record meetings for
future reference, training, or sharing with absent participants
COMPONENTS
● Camera
- Capture video of participants and surroundings. Can be built-in webcams,
external cameras, or professional video cameras
● Microphone
- Capture audio input from participants. Includes built-in microphones, external
microphones, and conference room microphones
● Speakers
- Output audio to participants. Includes built-in speakers, external speakers, or
headphones for clear sound output
● TV or Monitor
- Show video feeds of remote participants, shared content, and presentations.
Includes monitors, projectors, or interactive displays
VIDEO CONFERENCING SYSTEMS
WHAT ARE THESE SYSTEMS?
● Dedicated Systems
- Have all required components packaged into a single piece of equipment
- Usually a console with a high quality remote controlled video camera
● Desktop Systems
- Are add-ons to normal PCs, transforming them into video conferencing
devices
- These systems configure any computer into a video conferencing system
using add-ons
DIVIDED INTO 3 GROUPS:
LARGE GROUP VIDEO CONFERENCING
non-portable, large, more expensive devices used for large rooms and auditoriums.
SMALL GROUP VIDEO CONFERENCING
non-portable or portable, smaller, less expensive devices used for samll meeting rooms.
INDIVIDUAL VIDEO CONFERENCING
usually portable devices, meant for single users, have fixed cameras, microphones and
loudspeakers integrated into the console
VIDEO CONFERENCING TYPES
POINT-TO-POINT
● a video conference that connects two locations
● each site sees and hears the other sites at all times
MULTI-POINT
● a video conference that connects to more than two sites through the use of a
multi-point control unit (MCU) or video hub
● Participants at all sites can hear one another at all times and see the site that is
currently speaking (Video Activated Switching)
● This is a bridge that interconnects calls from several sources
ADVANTAGES
- STUDENT LEARNING IS IMPACTED IN SEVERAL WAYS:
● Enhances student motivation
● Is exciting or different, cathes the student’s attention Connects with the real world
● Promotes student retention and learning
● Accesses information from primary sources
● Accomodates many learning styles
ADVANTAGES
- STUDENTS HAVE THE OPPURTUNITY TO INTERACT WITH THE EXPERTS IN A
PARTICULAR FIELD OF STUDY
- VIDEO CONFERENCING ACCOMODATES A VARIETY OF DIFFERENT
LEARNING STYLES THROUGH SEVERAL MODALITIES
● Videos
● Animations
● Audio
● Graphics
● Collaboration
- VIDEO CONFERENCING AFFORDS STUDENTS THE OPPORTUNITY TO
DEVELOP AND IMPROVE VARIOUS COMMUNICATION SKILLS
- Presentation and speaking skills
- Communication and management skills
- Questioning and interviewing skills
- USE OF SIGN LANGUAGE COMMUNICATIONS FOR DEAF, HARD-OFHEARING
AND MUTE
- CAN IMPROVE WORK QUALITY
- REDUCE COSTS
- IMPROVES COMMUNICATION
- GROUPS CAN MEET MORE FREQUENTLY
- CRITICAL MEETINGS CAN BE CONDUCTED IN LESS TIME
- MORE FACULTY AND STAFF CAN BE INVOLVED
DISADVANTAGES
- INITIAL COST OF THE EWUIPMENT IS HIGH
- GHOST/ BLURRED IMAGES SEEN WHEN RAPID MOVEMENT OCCURS:
- Wear nuetral, solid colors
- Avoid checks and stripes
- Avoid white and shades of red
- Red is not codec-friendly
- Use plain background
- Avoid glass in the background
- AUDIO ECHO EFFECT SEEN WHEN SYSTEM IS NOT PROPERLY INSTALLED
- Switch OFF microphone when not in use
MODULE 11- FUTURE TRENDS IN COMMUNICATION TECHNOLOGY
INTRODUCTION
- In the modern times, Communication and Technology are very closely related It has
become impossible for institutions to run without modern technology Telephone,
Television and Internet have become an integral part of day to day life
HERE ARE THE MILESTONES OF TECHNOLOGY IN COMMUNICATION:
● TELECOMMUNICATION
- Telecommunications involves the use of electrical devices such as the
telegraph, telephone, and teleprinter, as well as the use of radio and
microwave communications, as well as fiber optics and their associated
electronics, plus the use of the orbiting satellites and the internet
- The non - electric telegraph was invented by Claude Chappe in 1794
- In 1809, a crude telegraph was invented in Bavaria by Samuel Soemmering
● TELEGRAPH
● FAX
● TELEPHONE
○ TIN CAN TELEPHONE OR LOVER’S PHONE
○ SWEDISH TELEPHONE
○ GERMAN ROTARY PHONE
○ TOUCH PAD TONE DIALING
○ CORDLESS PHONE
○ WIRELESS LOCAL LOOP (WLL)
● INVENTION OF RADIO
- It started with the discovery of “radio waves” - electromagnetic waves that
have the capacity to transmit music, speech, pictures and other data invisibly
through the air
- Guglielmo Marconi, an Italian inventor, proved the feasibility of radio
communication. He sent and received his first radio signal in Italy in 1895
- By 1899 he flashed the first wireless signal across the English Channel and
two years later received the letter “S”, telegraphed from England to
Newfoundland. This was the first successful transatlantic radiotelegraph
message in 1902
● FM/AM (1897 - 1920)
○ This is the most primitive type of radio where the signals are
received by the radio set. There is no subscription required
and it’s a free service
● SATELLITE RADIO (1992)
○ Here the radio is not a free service. It is just like the DTH
service of television, the customer will need to subscribe to the
provider (such as World Space Radio) and the signals can be
received in any part of the country
● INTERNET RADIO (1994)
○ Internet Radio is totally computer - based and there is no
separate device for accessing the content
● INVENTION OF TELEVISION
- As a 23-year-old German university student, Paul Nipkow proposed and
patented the first electromechanical television system in 1884
- In 1926, just a little after Jenkins, a British inventor known as John Logie
Baird, was the first person to have succeeded in transmitting moving pictures
● CABLE (1948)
○ The channels were received by the use of cables. A satellite
receiver would be placed by the cable operator at the tv center
and all the households would be connected by the use of
cables.
● DTH (Direct to Home) (1977)
○ It eliminated the need for a cable operator and long cables,
because people could set up their own dish and connect it to
their television, via set top box. This has made tv viewing
hassle free. And the digital encoding made the picture quality
much more superior
● INTERNET TV (1998)
○ Internet TV is yet to be fully developed in countries like India,
for example. The television is connected to broadband internet
and live video streaming is received by the television
● INVENTION OF COMPUTER
- The concept of the first programmable computer is often attributed to Charles
Babbage, with his design of the Analytical Engine in the 1830s.
- Device which aid humans in performing various kinds of computations or
calculations such as abacus.
- Most significant of those shifts was the invention of the Graphical User
Interface (GUI)
● FIRST GENERATION (1940's - 1950'S)
● SECOND GENERATION (1955 - 1960)
● THIRD GENERATION (1960s)
● FOURTH GEN
○ FIRST GENERATION OF MICROCOMPUTERS
○ SECOND GENERATION OF MICROCOMPUTERS
○ GRAPHICAL USER INTERFACE (GUI)
○ LAPTOPS
○ ULTRABOOKS
○ TABLET PC
● INTERNET
- The Internet was the result of some visionary thinking by people in the early
1960s who saw great potential value in allowing computers to share
information on research and development in scientific and military fields.
- known as ARPANET, was brought online in 1969 under a contract let by the
renamed Advanced Research Projects Agency (ARPA)
● DOWNLOAD
○ In computer networks, to download means to receive data to a
local system from a remote system, or to initiate such a data
transfer. Examples of a remote system from which a download
might be performed include a web server, FTP server, email
server, or other similar systems
● STREAMING MEDIA (1996)
○ Multimedia that is constantly received by and presented to an
end-user while being delivered by a provider.
○ "To stream", refers to the process of delivering media in this
manner; the term refers to the delivery method of the medium
rather than the medium itself
● WIRELESS TECHNOLOGY
- Free Space Optical (FSO) networks are capable of providing low cost
fibre-like quality, reliability, and capacity, without requiring buried optical fibre
cabling.
- Accordingly, they are well suited for ultra broadband last-mile business and
residential services, and for cellular and WiFI backhaul
FUTURE TRENDS IN COMMUNICATION TECHNOLOGY
5G AND BEYOND
5G networks offer lightning-fast and highly reliable wireless connectivity. 6G and beyond
network technologies are already in an early stages of development, promising even faster
speeds, lower latency, and broader network capabilities
AI DRIVEN VIRTUAL ASSISTANT
Advanced software programs that employ artificial intelligence to perform tasks, enhancing
productivity. A more sophisticated, capable of natural language understanding, multitasking,
and personalized interactions. Examples are Siri the voice-controlled assistant on various
apple devices, Amazon’s Alexa, and Google assistant
UBIQUITOUS CONNECTIVITY
Nearly everything is connected. The Internet of Things (IoT) continue to expand, with billions
of everyday objects and devices being connected to the internet. This includes smart homes,
vehicles, appliances, wearables, and industrial equipment
AUGMENTED REALITY (AR) AND VIRTUAL REALITY (VR)
Augmented Reality (AR) - is an interactive experience that enhances the real world with
computer-generated perceptual information. Using software, apps, and hardware such as
AR glasses, augmented reality overlays digital content onto real-life environments and
objects.
Virtual Reality (VR) - is a computer-generated environment with scenes and objects that
appear to be real, making the user feel they are immersed in their surroundings
INTERNET OF THINGS (IOT)
describes the network of things or objects that are embedded with sensors, software, and
other technologies for the purpose of connecting and exchanging data with other devices
and systems over the internet. Examples are connected cars, wearables (health tracking
bands, smart watches, etc.), and smart TVs
IMMERSIVE COMMUNICATION TECHNOLOGIES
- haptic feedback - the use of physical stimuli, like vibration patterns, to simulate tactile
experiences. Examples include a video game controller vibrating and a smartphone
screen providing a button-clicking sensation.
- spatial audio - brings theater-like sound from the movie or video you're watching.
- 3D visualization - the process of creating and displaying digital content using 3D
software
BIOMETRIC AUTHENTICATION
Biometric authentication is a cutting-edge technology that is revolutionizing the way we
secure our personal information and access sensitive data. Examples: facial recognition,
voice recognition, and brainwave authentication
QUANTUM COMMUNICATION
- Quantum encryption and communication methods will offer unprecedented levels of
security for sensitive communications, making it nearly impossible to intercept or
hack data.
- Its most interesting application is protecting information channels against
eavesdropping by means of quantum cryptography
DECENTRALIZED AND SECURE COMMUNICATION
- Decentralized communication- refers to a system where information is not controlled
by a single entity. Ensuring no one party has complete control over conversations,
making it harder for malicious actors to intercept or manipulate messages.
- Secure communication- involves using encryption and other security measures to
protect our data from unauthorized access. By encrypting our messages, we can
ensure that only the intended recipient can read them, keeping our conversations
private and confidential
GLOBAL COLLABORATION
- Collaboration tools and platforms will facilitate global cooperation, enabling
distributed teams to work seamlessly across time zones and borders.
- By collaborating on a global scale, we are able to share knowledge, resources, and
ideas that can lead to innovative solutions for complex problems.
SUSTAINABILITY FOCUS
- Communication technologies will strive to be more energy-efficient and
environmentally friendly, aligning with global sustainability goals.
- By adopting sustainable practices in our daily lives, businesses, and governments,
we can reduce our impact on the environment and promote a more balanced
relationship with nature.
MODULE 12: INTERNET OF THING
WHAT IS THE INTERNET OF THINGS?
Internet of things (IoT) is a system of interrelated devices connected to the internet to
transfer and receive data from one to the other.

THING
SENSE+COMMUNICATIOn

- IN SIMPLE WORDS, While the internet of people connects people, internet of things
(IoT) is — things connect with other things. Devices connect, sense, and
communicate with each other and control each other ' s functions. Thus, it is called
the Internet of Things.
A smart home is the best example of IoT
- It is connected to the home router via Ethernet. The sensors send and receive
commands via this centralized gateway. The gateway then takes this communication
to the cloud. This means that all the devices are interconnected, and it is possible to
set up a desired sequence of actions.
- Home appliances can be interconnected to share data with the user over a mobile
application. The user can get a detailed insight into the working devices
The internet helps people to connect with each other. Now, an object or things have
the ability to sense the surroundings to interact and collaborate with one another

3 types of IoT applications


1. Consumer IoT
Consumer IoT refers to personal and wearable devices that connect to the internet.
These devices are often referred to as smart devices.
2. Industrial IoT
The industrial Internet of Things is the system of interconnected devices in the
industrial sector. Manufacturing machinery and devices used for energy management
are a part of the industrial Internet of Things.
3. Commercial IoT
Commercial IoT refers to the tools and systems used outside of the home. For
example, businesses and health care organizations leverage commercial IoT for
auditable data trails and consumer management

Components of IoT
1. Thing or Device
Devices and sensors are the components of the device connectivity layer. These
smart sensors continuously collect data from the environment and transmit the
information to the next layer.
- General Devices- the main components of the data hub and data
exchange
● Smart home devices- Smart devices are interactive electronics
that use wireless connections to understand user instructions.
To an extent, smart home devices like thermostats and home
security systems can work autonomously to assist with daily
tasks. For example, you may program your smart thermostat to
adjust automatically to a cooler setting before you arrive home
from work. Or, you may receive a security camera notification
to inform you that someone is at the door when you are not
home.
● Wearable technologies- One of the most common Internet of
Things examples is smartwatches. Wearable IoT technology
like Fitbits and Apple Watches connect to other devices (like
your smartphone) to share data. They typically also connect to
the internet to track GPS locations.
● Personal medical devices- Personal medical devices like
pacemakers are also IoT devices. Remote medical devices
can help monitor and share a patient' s vital signs or detect
early signs of health issues for fast intervention
● Autonomous vehicles- Self-driving cars and other connected
vehicles rely on the internet to share real-time information.
Sensors throughout the vehicle help map its surroundings,
transmit camera footage, and respond to traffic signals.
- Sensing Devices
● A device that detects and responds to some type of input from
the physical environment. The specific input could be light,
heat, motion, moisture, pressure.
● IoT sensors, sometimes called smart sensors, convert
real-world variables into data that devices can interpret and
share. Many different types of sensors exist. For example,
temperature sensors detect heat and convert temperature
changes into data. Motion sensors detect movement by
monitoring ultrasonic waves and triggering a desired action
when those waves are interrupted.
How are the devices connected?
- Most modern smart devices and sensors can be connected to low-power wireless
networks like Wi-Fi, ZigBee, Bluetooth, Z-wave, LoRAWAN, etc. Each of these
wireless technologies has its pros and cons in terms of power, data transfer rate, and
overall efficiency
2. Gateway
- IoT Gateway manages the bidirectional data traffic between different networks
and protocols. Another function of the gateway is to translate different network
protocols and make sure interoperability of the connected devices and
sensors
- Gateways can be configured to perform pre-processing of the collected data
from thousands of sensors locally before transmitting it to the next stage. In
some scenarios, it would be necessary due to the compatibility of the TCP/IP
protocol.
- IoT gateway offers a certain level of security for the network and transmitted
data with higher-order encryption techniques. It acts as a middle layer
between devices and the cloud to protect the system from malicious attacks
and unauthorized access
3. Cloud
- The Internet of Things creates massive data from devices, applications, and
users, which has to be managed in an efficient way. IoT cloud offers tools to
collect, process, manage and store huge amounts of data in real time.
Industries and services can easily access these data remotely and make
critical decisions when necessary.
- Basically, the IoT cloud is a sophisticated, high-performance network of
servers optimized to perform high-speed data processing of billions of
devices, traffic management, and deliver accurate analytics. Distributed
database management systems are one of the most important components of
the IoT cloud
- Cloud systems integrate billions of devices, sensors, gateways, protocols,
and data storage and provide predictive analytics. Companies use these
analytics data to improve products and services, preventive measures for
certain steps, and build their new business model accurately
4. Analytics
- One of the major advantages of an efficient IoT system is real-time smart
analytics which helps engineers to find out irregularities in the collected data
and act fast to prevent an undesired scenario. Service providers can prepare
for further steps if the information is collected accurately at the right time.
- Big enterprises use the massive data collected from IoT devices and utilize
the insights for their future business opportunities. Careful analysis will help
organizations to predict trends in the market and plan ahead for a successful
implementation.
- Information is very significant in any business model, and predictive analysis
ensures success in the concerned area of the business line
5. User Interface
- User interfaces are the visible, tangible part of the IoT system which users
can access. Designers will have to make sure of a well-designed user
interface for minimum effort for users and encourage more interactions
- Modern technology offers much interactive design to ease complex tasks into
simple touch panel controls. Multicolor touch panels have replaced hard
switches in our household appliances, and the trend is increasing for almost
every smart home device.
- The user interface design has higher significance in today ’ s competitive
market; it often determines the user whether to choose a particular device or
appliance. Users will be interested in buying new devices or smart gadgets if
it is very user-friendly and compatible with common wireless standards
Benefits of the Internet of Things
Before the introduction of the IoT, devices could only collect and share information with
human interaction. Today, the IoT enables lower operational costs, increased safety and
productivity, and overall improved customer experience. Here are a few notable pros of the
Internet of Things:

Automation- Removing the need to perform mundane tasks like turning the thermostat on
and off or locking doors increases efficiency and quality of life.
Conservation- Automation makes it easier to manage energy consumption and water usage
without human oversight or error.
Big data analytics- Information that was previously difficult to collect and analyze can be
tracked effortlessly with the Internet of Things
Potential drawbacks of IoT
Managing large amounts of data poses certain risks and disadvantages. For example, more
IoT devices mean more human intervention through network and device monitoring. Some
security researchers believe that cybersecurity professionals may face an increased
workload as the IoT grows. Here are a few more potential drawbacks of the Internet of
Things:
Privacy concerns. It can be challenging to protect the data mined by IoT devices. Increased
tracking threatens the confidentiality of the information we share over the internet.
Security issues. Individual device security is left up to the manufacturers. Wireless network
security could become compromised if manufacturers do not prioritize security measures.
Bandwidth. Too many connected devices on a shared network results in slow internet
speeds

You might also like