Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 38

LIVING IN THE IT

ERA
MODULE 2

Introduction to
Computing
PROF. CANDICE B. YEE
Evolution of Media

Four main periods in history that divide the era of ICT.

• Pre-mechanical
• Mechanical
• Electromechanical
• Electronics
PERIODS OF DEVELOPMENT
Pre Mechanical Period
3000 BC (Before Christ) to 1 450 DA (Anno Domini)

During this period humans started communicating


using words and pictograms curved in rocks.
The earliest forms of Sumerian writing were pictographs
("picture words") where the sign resembles the object it
Pictographs - the signs were written
represents (grain, hand, etc.).
vertically. The hand on the upper
right means "to receive". The dots Storing of information was revolutionized when paper
along the top are numbers. was produced from papyrus plants.
They compiled records written on paper and bound them
together, eventually books was first introduced
Then books grew in number and needed to be
compiled and stored in areas; hence libraries were
created
Abacus - the first counting device Libraries- first data centers in history
that process information
Mechanical Period
Started around 1450-1480

This period concentrated primarily on the


development of machines that will enhance
calculation speed.

Pascaline – the first mechanical calculator was invented.

Pascaline – Invented by famous mathematician


inventor Blaise Pascal along Wilhelm Schickard
in 1642

Analytical Engine - Invented


by Charles Babbage in 1837 to
automate counting and
calculations. This invention
earned Babbage the title “Father
of the Computers”
Electromechanical Period
Started around 1840-1940

The beginnings of telecommunication.


The use of electricity for information handling and
transfer bloomed.
1837 – Telegraph was invented by William
Cooke and Charles Wheatstone,
1844 – Samuel Morse first invented a single-
circuit telegraph, which gave rise to Morse
code.
1876 – Alexander Graham Bell was granted the
patent for the telephone.
Alexander Graham Bell - invented the
telephone.

Telegraph - transmit information over long


distance. It was considered as the first
electrical communications device.
Electronic Period
Started around 1940 to present

Focus on the advent of solid state devices


or electronic devices.
The last period of ICT history.

Four main events in Electronic Period:


1. The late vacuum tubes period
2. The transistors period
3. The integrated circuits period
4. Computer processors period
Four main events in this period:
The late vacuum
tubeslatter period of vacuum tube
The
machines is the start of electronic period.

The ENIAC, circa 1946


ENIAC – Electronic Numerical Integrator
and Computer. First high-speed, digital
computer capable of being reprogrammed
Vacuum Tubes - was developed by Lee to solve a full range of computing
De Forest which provide electricity problems. It was a big machine that
controlled switch. occupied an area of 167 square meters.
Four main events in this period:
The Transistors and Integrated
Circuit
1947 – transistors was invented
It is the foundation of every
electronic device today.
1957 – first full transistor
computer was developed and was
Transistor – is an electronic device
with properties and functions similar faster than vacuum computers.
to vacuum tubes. 1958 – Integrated Circuit (IC)was
introduced by American Electrical
Engineer Jack Kilby. It is used in
processing devices, and processors are
constructed in IC forms.

Integrated Circuit – composed of a


group of transistors and circuit elements
compressed in a single package.
Four main events in this period:
Computer Processor

PC used these processors made of IC’s to deliver


user applications.

Olivetti Programma 101 - first


commercial personal computer
invented by the Italian engineer Pier
Giorgio Perotto.
IBM 5150 – was introduced in August 1981
and was developed by the IBM Entry
Systems Division Team led by Don Estridge.
The future of WWW is promising.
The web will develop even more possibilities .
Web 4.0 - Web 4. or the symbiotic web will lead to an
interaction between humans and machines in symbiosis.
Machines would be clever on reading the contents of the web
and react fast by providing superior quality content.
IoT – The internet of Things.
- sophisticated sensor chips embedded where
everything are predicted for users
Web 5.0 Web 5.0 or the emotional web is a version that is still
developed underground. The web will interact with
users and will be able to recognize their emotions. So
far the web is neutral as far as emotions are
concerned. This will probably change in the future.
The Internet
Internet
- Was made in 1960’s and was
introduced in 1969 by the
Department of Advance Research
Projects Agency (DARPA) as a
military research project to help
soldiers share information using
only 4 computers.
- It is simply called “The
Net”, a large computer network that
is made up of thousand network
worldwide.
WWW – WORLD WIDE WEB

World Wide Web or www - is


widely used information system
today that enables you to access
hypertext documents and other files
over the internet. And was invented
by Tim Berners-Lee in 1989.
WWW EVOLUTION
• Refers to the first stage of the World Wide
Web
• Websites are content driven and the users are
not able to interact with the interface or
increase their involvement.
• Read-only web and cannot be manipulated
by the user. 
• It was based on HTML which is a basic
computer language.
• It was characterized by static pages (there is
PC + Modem no interactivity between users and websites).
• It was also characterized by slow connection
speed.
• The software was very expensive, generally
on CDs or DVDs to be installed.
• Websites are all about user interaction and
participation.
• It is based on more sophisticated
computer languages (PHP, Mysql, Java
Script…)
• The pages are dynamic pages, which
means that there is the possibility of
interactivity between users and the web.
• It is characterized by speed.
• The software is more accessible. It is on
line or downloadable.
Mobile, Wifi and other wired devices • Read and write web and encourages users
to participate, collaborate, and share
information. Examples: podcasting,
blogging, tagging, and web content
voting.
• Popular websites includes YouTube,
Facebook, Twitter, and Flickr.
Web 3.0 or semantic executing
web
• portable personal web.
• Non-browser, Applications
• also known as “The Intelligent
Web”
• Read, write and execute web.
• Users are served more
intelligently.
• Personalized information.
• Machine comprehension.
• Cloud Technology.
Everything are digital
• Everything is connected.
• Immersion.
Web 3.0 applications are Wolfram Alpha and Apple’s Siri, which
can summarise large amounts of information into knowledge and
useful actions for people.

Comparison between
Wolfram Alpha and Google,
using both tools, typing the
“Brazil vs. Argentina” phrase
in both searching engines,
and then we see big
differences in the results:
The future of WWW is promising.
The web will develop even more possibilities .
Web 4.0 - Web 4. or the symbiotic web will lead to an
interaction between humans and machines in symbiosis.
Machines would be clever on reading the contents of the web
and react fast by providing superior quality content.
IoT – The internet of Things.
- sophisticated sensor chips embedded where
everything are predicted for users
Web 5.0 Web 5.0 or the emotional web is a version that is still
developed underground. The web will interact with
users and will be able to recognize their emotions. So
far the web is neutral as far as emotions are
concerned. This will probably change in the future.
E-Commerce
Different Perspective of E-Commerce

A communication perspective – the delivery of information,


product/services or payment by electronic means.
A business perspective – the application of technology towards
the automation of business transactions and workflows.
A service perspective – enabling cost cutting at the same time as
increasing the speed and quality of service delivery.
An online perspective – the buying and selling of products and
information online.
• It is not solely restricted to the actual
buying and selling of products, but also
pre-sale and post- sales activities across the
supply chain.

• E-Commerce is the sharing of business


information, maintaining business
relationships, and conducting business
transactions by means of
telecommunications networks. (Zwass ,
1998)
E-COMMERCE FUNDAMENTALS
Concept
• This describes the strength of business model. It includes:
• Potential to generate revenue ;
• Superior customer value – value proposition
• First mover advantage

Innovation
• The extent to which the business model merely imitates
real-world or online models. Companies that continue to
innovate will clearly gain competitive advantage and this is
also assessed.

Execution
• Aspects of execution that can be seen to have failed for
some companies are promotion, performance, availability,
security & fulfillment.
Traffic
• This is measured in terms of page impressions and online
revenues.

Financing
• This describes the ability of the company to attract venture
capital or other funding to help execute the idea.

Profile
• This is the ability of the company to generate favorable
publicity and to create awareness within its target market.
Supply Chain Management
Supply chain management is the coordination of all supply
activities of an organization from its suppliers and partners to its
customers.
An e-commerce transaction can be considered from two
perspectives: buy-side and sell-side transactions.

BUY-SIDE E-Commerce • Refers to e-commerce transactions


between a purchasing organization and its suppliers.
SELL-SIDE E-Commerce • Refers to e-commerce
transactions between a supplier organization and its customers.

A broader term of how technology can benefit all internal


business processes and interactions with the third parties. This
includes the buy-side and sell-side E- commerce and internal
value chain.
Three(3) alternative definitions of the relationship
between E-Commerce and E- Business:

• E-Commerce (EC) has some degree of overlap


with electronic business (EB).
• EC is broadly equivalent to EB.
• EC is a subset of EB.
E-Commerce Environment
• Electronic communications have also given rise to many
exciting new business models and create potentials.

• Electronic communications are disruptive technologies – new


technologies that prompt businesses to reappraise their
strategic approaches
• Strategy development is strongly influenced by considering the
environment the business operates in.
• All organizations operate within an environment that
influences the way in which they conduct business.
Business Models
• B2C– commercial transactions are between an organization
and consumers
• B2B– commercial transactions are between an organization
and other organizations.
• C2C– consumers transact directly with consumers (e.g. online
auctions, community sites)

E-COMMERCE - An architecture for product, service and


information flows, including a description of the various
business actors and their roles, and a description of the potential
benefits for the various business actors, and a description of the
sources of revenue.
BUSINESS MODELS FOR E-COMMERCE
Timmers (1999) identified 11 different types of business model that can be
facilitated by the web:
•E-shop
•E-auctions
•Third-party marketplaces
•Information brokerage
•E-procurement
•Virtual communities
•Value chain integrators
•Trust and other services
•E-malls •Collaboration platforms
•Value chain service providers
• • Allowing the formation of individualized relationships with
customers, with the aim of improving customer satisfaction
and maximizing profits; identifying the most profitable
customers and providing them the highest level of service.•
Providing employees with the information and processes
necessary to know their customers, understand and identify
customer needs and effectively build relationships between the
company, its customer base, and distribution partners.
M-COMMERCE
 M-commerce (mobile commerce) is the buying and selling of
goods and services through wireless handheld devices such as
cellular telephone and personal digital assistants (PDAs). Known
as next- generation e-commerce, m-commerce enables users to
access the Internet without needing to find a place to plug in. The
emerging technology behind m-commerce, which is based on the
Wireless Application Protocol (WAP), has made far greater
strides in Europe, where mobile devices equipped with Web-
ready micro-browsers are much more common than in the United
States.
ICT Today
Authenticity Verification of Information from the Web

Published author’s name – name of the one who wrote the article or information.
Credible websites – Error-free article are more likely published by
credible sites. You have to check for author’s name and the date it was
published.
Rating, number of viewers and number of shares – mostly credible sites
are more likely to receive a high rating and normally high number of shares.

Reference and related articles – a credible articles include a list of


references or articles related to the published one.
Online Ethics and Etiquette

Netiquette – is a coined or portmanteau term of network and etiquette.


- set of ideal rules and conduct that netizen should observe in communicating and/or
publishing information and materials over the World Wide Web and in ICT in general.

Netizen – refers to a person who is part or a


member of the online community
Online Ethics and Etiquette

Key points to keep in mind to maintain good conduct over the internet

1. Recognize that your online avatar or your online representation in not another
world but an extension of the existing society that you are part of.

2. You should apply also the values and conduct learned since childhood in the online
extension of our society.

3. Keep in mind that there is a laws existing in our society and on the web.
There is a corresponding punishment laid by the government, but not for the
sake of punishing but to give peace and order among the citizens.
Online Ethics and Etiquette
4. Be sensitive with the beliefs, cultures and religions of people from other
countries participating online.

5. Everything posted online are copyrighted or owned by another individual.


Certain rules should be followed in academic writing, referencing, and
making citation acknowledgement.

6. Be careful in selecting words to communicate. Use appropriate manner of


communication and avoid threatening and disrespectful words.
Online Safety and Security
Threats that can be acquired from connecting to the World Wide Web.

Spam – this refers to the transmission of unsolicited messages from


various origins using email and messenger. This is use by attackers as tool
for advertisement.
Online Safety and Security
Phishing – a software or a program used by attacker to obtain personal
information. Attackers commonly target user passwords to hack and take
control of a user account.
Online Safety and Security
Malware – short term for malicious software that is sent by attackers to inflict
chaos on a computer’s operation and processes. This is also used to spy upon
the activity of the computer and steal information.
Online Safety and Security
MALICIOUS SOFTWARES:
Virus – execute itself and spreads by infecting other programs or files.
Worm – can self-replicate without any human interaction or directives from
malware authors.
Trojan Horse – designed to appear as a legitimate program, once activated
installation, Trojans execute their malicious functions.
Spyware – designed to collect information and data on users and observe their
activity without user’s knowledge.
Ransomware – designed to infect a user’s system and encrypt the data.
Cybercriminals then demand a ransom payment from the victim in exchange for
decrypting the system's data.
Rootkit -designed to obtain administrator-level access to the victim's system. Once
installed, the program gives threat actors root or privileged access to the system.
Remote Access Trojan (RAT) - that secretly creates a backdoor into an infected system that
allows threat actors to remote access it without alerting the user or the system's security
programs.
Government Provisions for Online
Courtesy and Etiquette
Laws that aim to protect the Filipino people from these illegal activities:
Republic Act 10627 or Anti-Bullying Act of 2013
– this Law protects individuals from bullying through electronic means.
Bullying – defined as severe or repeated use by one or more students of a
written, verbal or electronic expression, or a physical gesture, or any
combination thereof, directed to another student that has the effect of
actually causing fear of physical or emotional harm or damage to his
property.
Republic Act 10175 or Cybercrime Prevention Act of 2012
- this law protects an individual from various unwanted online and cyber
acts that may harm or evade one’s privacy and integrity.
Offenses includes but not limited to:
Integrity and availability of data, illegal access of computers through remote means
without permission, interception of one’s information from a private conversation or
correspondence, acquisition of passwords and other vital information from an individual,
computer forgery and libel.

You might also like