0% found this document useful (0 votes)
55 views46 pages

LIT Era Module 1

The document discusses the evolution of information and communication technologies from pre-mechanical to electronic periods. It covers key inventions like the abacus, analytical engine, telegraph, telephone and computer processors. The impacts of ICT on society are also examined, highlighting both positive impacts like access to information and education, and negative impacts like job losses and reduced social interaction.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views46 pages

LIT Era Module 1

The document discusses the evolution of information and communication technologies from pre-mechanical to electronic periods. It covers key inventions like the abacus, analytical engine, telegraph, telephone and computer processors. The impacts of ICT on society are also examined, highlighting both positive impacts like access to information and education, and negative impacts like job losses and reduced social interaction.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

LIVING IN THE IT ERA

Introduction to Computing
Prepared by: PROF. CANDICE B. YEE
EVOLUTION OF MEDIA
Four main periods in history that divides
the era of ICT.
• Pre-mechanical
• Mechanical
• Electromechanical
• Electronics

2
PRE-MECHANICAL PERIOD
PRE-MECHANICAL PERIOD 3000 BC (Before Christ) to 1 450 DA (Anno Domini)
During this period humans started communicating using words and pictograms curved in rocks.

Pictographs - the signs were written vertically. The


hand on the upper right means "to receive". The Storing of information was revolutionized when paper was
dots along the top are numbers. The earliest
produced from papyrus plants. They compiled records written on
forms of Sumerian writing were pictographs
("picture words") where the sign resembles the paper and bound them together, eventually books was first
object it represents (grain, hand, etc.). introduced. Then books grew in number and needed to be
compiled and stored in areas; hence libraries were created.

Libraries- first data centers in history


Abacus - the first counting device that
process information
3
MECHANICAL PERIOD
MECHANICAL PERIOD Started around 1450-1480
This period concentrated primarily on the development of machines that will enhance calculation speed.

Pascaline – the first mechanical calculator was Analytical Engine - Invented by Charles Babbage in
invented. 1837 to automate counting and calculations.

Pascaline – Invented by famous mathematician This invention earned Babbage the title as the “Father
of the Computers”
inventor Blaise Pascal along Wilhelm Schickard in
1642
4
ELECTROMECHANICAL PERIOD
ELECTRO MECHANICAL PERIOD Started around 1840-1940

The beginnings of telecommunication. The use of electricity for information handling and transfer bloomed.

1837 – Telegraph was invented by William Cooke and


Charles Wheatstone

1844 – Samuel Morse first invented a single-circuit


telegraph, which gave rise to Morse code.

1876 – Alexander Graham Bell was granted the patent


for the telephone.
Alexander Graham Bell - invented the telephone.
Telegraph - transmit information over long distance. It
was considered as the first electrical
communications device.
5
E L E C T RO N I C P E R I O D
E L E C T RO N I C P E R I O D Started around 1940 to present
Focus on the advent of solid-state devices or electronic devices.

Four main events in Electronic Period:

1. The late vacuum tubes period


2. The transistors period
3. The integrated circuits period
4. Computer processors period

6
THE LATE VACUUM TUBES
THE LATTER PERIOD OF VACUUM TUBE MACHINES IS THE START OF ELECTR ONIC PERIOD.

The ENIAC, circa 1946


Vacuum Tubes - was developed by Lee De
Forest which provide electricity-controlled ENIAC (Electronic Numerical Integrator and Computer)
switch. First high-speed, digital computer capable of being
reprogrammed to solve a full range of computing problems. It
was a big machine that occupied an area of 167 square meters.
7
THE TRANSISTORS AND INTEGRATED CIRCUIT
1947 – transistors was invented. It is the foundation of every electronic device today.
1957 – first full transistor computer was developed and was faster than vacuum computers.
1958 – Integrated Circuit (IC)was introduced by American Electrical Engineer Jack Kilby. It is used in processing
devices, and processors are constructed in IC forms.

Transistor – is an electronic device with properties Integrated Circuit – composed of a group of transistors
and functions like vacuum and circuit elements compressed in a single package.
8
COMPUTER PROCESSOR
PC used these processors made of ICs to deliver user applications.

Olivetti Programma 101 - first commercial


personal computer invented by the Italian IBM 5150 – was introduced in August 1981 and was
engineer Pier Giorgio Perotto. developed by the IBM Entry Systems Division Team
led by Don Estridge. 9
IMPACT OF INFORMATION
AND COMMUNICATIONS
TECHNOLOGY IN THE
SOCIETY
POSITIVE IMPACTS OF ICT
➢ Access to information: Increase in access to information and
services that has accompanied the growth of the Internet. Some of
the positive aspects of this increased access are better, and often
cheaper, communications, such as VoIP phone and Instant
Messaging.
➢ Improved access to education, e.g., distance learning and online
tutorials. New ways of learning, e.g., interactive multi-media and
virtual reality.
➢ New tools, new opportunities: ICT gives access to new tools that did
not previously exist digital cameras, photo-editing software and
high-quality printers, screen magnification or screen reading
software enables partially sighted or blind people to work with
ordinary text rather than Braille.
8/06/20XX 11
POSITIVE IMPACTS OF ICT
➢ Communication: Cost savings by using e.g., VoIP instead of normal
telephone, email / messaging instead of post, video conferencing
instead of traveling to meetings, e-commerce web sites instead of
sales catalogues. Access to larger, even worldwide, markets.
➢ Information management: Data mining of customer information to
produce lists for targeted advertising. Improved stock control,
resulting in less wastage, better cash flow, etc.
➢ Security: ICT solves or reduces some security problems, e.g.
Encryption methods can keep data safe from unauthorized people,
both while it is being stored or while it is being sent electronically.
➢ ICT allows people to participate in a wider, even worldwide, society.

8/06/20XX 12
POSITIVE IMPACTS OF ICT

➢ Distance learning: students can access teaching materials from all


over the world.
➢ ICT facilitates the ability to perform ‘impossible’ experiments’ by
using simulations.
➢ Creation of new more interesting jobs. Examples would be systems
analysts, programmers and software engineers, as well as help desk
operators and trainers.

8/06/20XX 13
NEGATIVE IMPACTS OF INFORMATION
AND COMMUNICATION TECHNOLOGY
➢ Job loss: Manual operations being replaced by automation. e.g.,
robots replacing people on an assembly line. Job export. e.g., Data
processing work being sent to other countries where operating costs
are lower. Multiple workers being replaced by a smaller number who
can do the same amount of work. e.g. A worker on a supermarket
checkout can serve more customers per hour if a bar-code scanner
linked to a computerized till is used to detect goods instead of the
worker having to enter the item and price manually.
➢ Reduced personal interaction: Most people need some form of social
interaction in their daily lives and if they do not get the chance to
meet and talk with other people, they may feel isolated and unhappy.

14
NEGATIVE IMPACTS OF INFORMATION
AND COMMUNICATION TECHNOLOGY
➢ Reduced physical activity: This can lead to health problems such as
obesity, heart disease, and diabetes.
➢ Cost: A lot of ICT hardware and software is expensive, both to
purchase and to maintain. An ICT system usually requires specialist
staff to run it and there is also the challenge of keeping up with ever-
changing technology.
➢ Competition: this is usually thought of as being a good thing, but for
some organizations being exposed to greater competition can be a
problem. If the organization is competing for customers, donations,
or other means of funding nationally or even internationally, they
may lose out to other organizations that can offer the same service
for less money.
15
THE INTERNET
➢ Was made in 1960’s and was
introduced in 1969 by the Department
of Advance Research Projects Agency
(DARPA) as a military research project
to help soldiers share information
using only 4 computers.
➢ It is simply called “The Net”, a large
computer network that is made up of
thousand network worldwide.

16
The number of internet users
globally raise to 5.3 billion this year
2023, according to the source. The
compound annual growth rate for
the whole period from 2018 to
2023 is six percent. The fastest
expected growth from this period
was in 2019, with 300 million new
internet users and a growth rate of
7.7 percent from 2018.

17
WWW – WORLD WIDE WEB

World Wide Web or www - is


widely used information system
today that enables you to
access hypertext documents
and other files over the
internet. And was invented by
Tim Berners-Lee in 1989.

18
WORLD WIDE WEB EVOLUTION

PC + Modem Mobile, Wifi and other Everything are digital


wired devices

19
WEB 1.0
• Refers to the first stage of the World Wide Web
• Websites are content driven, and the users are not
able to interact with the interface or increase their
involvement.
• Read-only web and cannot be manipulated by the
user.
• It was based on HTML which is a basic computer
language.
• It was characterized by static pages (there is no
interactivity between users and websites).
• It was also characterized by slow connection speed.
• The software was very expensive, generally on CDs
or DVDs to be installed.
20
WEB 2.0
• Websites are all about user interaction and participation.
• It is based on more sophisticated computer languages
(PHP, MySQL, Java Script…)
• The pages are dynamic pages, which means that there is
the possibility of interactivity between users and the web.
• It is characterized by speed.
• The software is more accessible. It is online or
downloadable.
• Read and write web and encourages users to participate,
collaborate, and share information. Examples:
podcasting, blogging, tagging, and web content voting.
• Popular websites includes YouTube, Facebook, Twitter,
and Flickr.
21
WEB 3.0 OR SEMANTIC EXECUTING WEB
• Portable personal web.
• Non-browser, Applications
• also known as “The Intelligent Web”
• Read, write and execute web.
• Users are served more intelligently.
• Personalized information.
• Machine comprehension.
• Cloud Technology.
• Everything is connected.
• Immersion.

22
23
THE FUTURE OF WWW IS PROMISING.
THE WEB WILL DEVELOP EVEN MORE POSSIBILITIES
Web 4.0 - Web 4. or the symbiotic web will lead to an interaction between humans
and machines in symbiosis. Machines would be clever on reading the contents of the
web and react fast by providing superior quality content.

IoT – The internet of Things.


- sophisticated sensor chips embedded where everything are predicted for users

Web 5.0 or the emotional web is a version that is still developing underground. The web will
interact with users and will be able to recognize their emotions. So far, the web is neutral as
far as emotions are concerned. This will probably change in the future.

24
E-COMMERCE
Different Perspective of E -Commerce

• A communication perspective – the delivery of information,


product/services or payment by electronic means.
• A business perspective – the application of technology towards the
automation of business transactions and workflows.
• A service perspective – enabling cost cutting at the same time as increasing
the speed and quality of service delivery.
• An online perspective – the buying and selling of products and information
online.

25
E-COMMERCE
Different Perspective of E -Commerce

• It is not solely restricted to the actual buying and selling of products, but
also pre-sale and post- sales activities across the supply chain.
• E-Commerce is the sharing of business information, maintaining business
relationships, and conducting business transactions by means of
telecommunications networks. (Zwass ,1998)

26
E-COMMERCE FUNDAMETALS

Concept
• This describes the strength of business model. It includes:
Potential to generate revenue ;
Superior customer value – value proposition
First mover advantage

Innovation
• The extent to which the business model merely imitates real-world or online models.
Companies that continue to innovate will clearly gain competitive advantage and this is
also assessed.

Execution
• Aspects of execution that can be seen to have failed for some companies are
promotion, performance, availability, security & fulfillment.
E-COMMERCE FUNDAMETALS

Traffic
• This is measured in terms of page impressions and online revenues.

Financing
• This describes the ability of the company to attract venture capital or other
funding to help execute the idea.

Profile
• This is the ability of the company to generate favorable publicity and to create
awareness within its target market.
S U P P LY C H A I N M A N A G E M E N T
Supply chain management is the coordination of all supply activities of an
organization from its suppliers and partners to its customers.
An e-commerce transaction can be considered from two perspectives: buy -side
and sell-side transactions.

BUY-SIDE E-Commerce • Refers to e-commerce transactions between a


purchasing organization and its suppliers.
SELL-SIDE E-Commerce • Refers to e-commerce transactions between a
supplier organization and its customers.

A broader term of how technology can benefit all internal business processes
and interactions with the third parties. This includes the buy -side and sell-side
E- commerce and internal value chain.

29
THREE(3) ALTERNATIVE DEFINITIONS OF
THE RELATIONSHIP BETWEEN E-COMMERCE
AND E- BUSINESS:

E-Commerce (EC)
EC is broadly EC is a subset of EB.
has some degree of
equivalent to EB.
overlap with
electronic business
(EB).

30
E-COMMERCE ENVIRONMENT

• Electronic communications have also given rise to many exciting new


business models and create potentials.
• Electronic communications are disruptive technologies – new
technologies that prompt businesses to reappraise their strategic
approaches
• Strategy development is strongly influenced by considering the
environment the business operates in.
• All organizations operate within an environment that influences the way
in which they conduct business.

31
BUSINESS MODELS

B2C– commercial transactions are between an organization and consumers


B2B– commercial transactions are between an organization and other
organizations.
C2C– consumers transact directly with consumers (e.g., online auctions,
community sites)

E-COMMERCE - An architecture for product, service and information flows,


including a description of the various business actors and their roles, and a
description of the potential benefits for the various business actors, and a
description of the sources of revenue.
BUSINESS MODELS FOR E -COMMERCE
Timmers (1999) identified 11 different types of business model
that can be facilitated by the web:

• E-shop
• E-auctions
• Third-party marketplaces
• Information brokerage
• E-procurement
• Virtual communities
• Value chain integrators
• Trust and other services
• E-malls
• Collaboration platforms
• Value chain service providers
33
M-COMMERCE
M-commerce (mobile commerce) is the buying and selling of goods and
services through wireless handheld devices such as cellular telephone
and personal digital assistants (PDAs). Known as next- generation e-
commerce, m-commerce enables users to access the Internet without
needing to find a place to plug in. The emerging technology behind m -
commerce, which is based on the Wireless Application Protocol (WAP),
has made far greater strides in Europe, where mobile devices equipped
with Web-ready micro-browsers are much more common than in the
United States.

34
I C T T O DAY
Authenticity Verification of Information from the Web

• Published author’s name – name of the one who wrote the article or information.

• Credible websites – Error-free article are more likely published by credible sites.
You must check for author’s name and the date it was published.

• Rating, number of viewers and number of shares – mostly credible sites are more
likely to receive a high rating and normally high number of shares.

• Reference and related articles – a credible articles include a list of references or


articles related to the published one.

35
ONLINE ETHICS AND ETIQUETTE
Netiquette – is a coined or portmanteau term of network and etiquette.
- set of ideal rules and conduct that netizen should observe in communicating
and/or publishing information and materials over the World Wide Web and in ICT in
general.

Netizen – refers to a person who is part or a member of the online community


36
ONLINE ETHICS AND ETIQUETTE
Key points to keep in mind to maintain good conduct over the internet

1. Recognize that your online avatar or your online representation in


not another world but an extension of the existing society that you
are part of.
2. You should apply also the values and conduct learned since
childhood in the online extension of our society.
3. Keep in mind that there is a laws existing in our society and on the
web. There is a corresponding punishment laid by the
government, but not for the sake of punishing but to give peace
and order among the citizens.

37
ONLINE ETHICS AND ETIQUETTE
Key points to keep in mind to maintain good conduct over the internet

4. Be sensitive with the beliefs, cultures and religions of people from


other countries participating online.
5. Everything posted online are copyrighted or owned by another
individual. Certain rules should be followed in academic writing,
referencing, and making citation acknowledgement.
6. Be careful in selecting words to communicate. Use appropriate
manner of communication and avoid threatening and
disrespectful words.

38
ONLINE SAFETY AND SECURITY
Threats that can be acquired from connecting to the World Wide Web.

Spam – this refers to the transmission of unsolicited messages from


various origins using email and messenger. This is use by attackers as
tool for advertisement.

8/06/20XX 39
ONLINE SAFETY AND SECURITY
Threats that can be acquired from connecting to the World Wide Web.

Phishing – a software or a program used by attacker to obtain personal


information. Attackers commonly target user passwords to hack and
take control of a user account.

8/06/20XX 40
ONLINE SAFETY AND SECURITY
Threats that can be acquired from connecting to the World Wide Web.

Malware – short term for malicious software that is sent by attackers to


inflict chaos on a computer’s operation and processes. This is also used
to spy upon the activity of the computer and steal information

8/06/20XX 41
MALICIOUS SOFTWARES:
❑ Virus – execute itself and spreads by infecting other programs or files.
❑ Worm – can self-replicate without any human interaction or directives from malware
authors.
❑ Trojan Horse – designed to appear as a legitimate program, once activated installation,
Trojans execute their malicious functions.
❑ Spyware – designed to collect information and data on users and observe their activity
without user’s knowledge.
❑ Ransomware – designed to infect a user’s system and encrypt the data. Cybercriminals
then demand a ransom payment from the victim in exchange for decrypting the system's
data.
❑ Rootkit -designed to obtain administrator-level access to the victim's system. Once
installed, the program gives threat actors root or privileged access to the system.
❑ Remote Access Trojan (RAT) - that secretly creates a backdoor into an infected system
that allows threat actors to remote access it without alerting the user or the system's
42
security programs.
GOVERNMENT PROVISIONS
FOR ONLINE COURTESY
AND ETIQUETTE
LAWS THAT AIM TO PROTECT THE FILIPINO
PEOPLE FROM THESE ILLEGAL ACTIVITIES:

Republic Act 10627 or Anti-Bullying Act of 2013


– this Law protects individuals from bullying through
electronic means.
Bullying – defined as severe or repeated use by one or more
students of a written, verbal or electronic expression, or a
physical gesture, or any combination thereof, directed to
another student that has the effect of causing fear of physical
or emotional harm or damage to his property.
LAWS THAT AIM TO PROTECT THE FILIPINO
PEOPLE FROM THESE ILLEGAL ACTIVITIES:

Republic Act 10175 or Cybercrime Prevention Act of 2012


- this law protects an individual from various unwanted
online and cyber acts that may harm or evade one’s privacy and
integrity.
Integrity and availability of data, illegal access of computers
through remote means without permission, interception of one’s
information from a private conversation or correspondence,
acquisition of passwords and other vital information from an
individual, computer forgery and libel.
THE END

You might also like