LIT Era Module 1
LIT Era Module 1
Introduction to Computing
Prepared by: PROF. CANDICE B. YEE
EVOLUTION OF MEDIA
Four main periods in history that divides
the era of ICT.
• Pre-mechanical
• Mechanical
• Electromechanical
• Electronics
2
PRE-MECHANICAL PERIOD
PRE-MECHANICAL PERIOD 3000 BC (Before Christ) to 1 450 DA (Anno Domini)
During this period humans started communicating using words and pictograms curved in rocks.
Pascaline – the first mechanical calculator was Analytical Engine - Invented by Charles Babbage in
invented. 1837 to automate counting and calculations.
Pascaline – Invented by famous mathematician This invention earned Babbage the title as the “Father
of the Computers”
inventor Blaise Pascal along Wilhelm Schickard in
1642
4
ELECTROMECHANICAL PERIOD
ELECTRO MECHANICAL PERIOD Started around 1840-1940
The beginnings of telecommunication. The use of electricity for information handling and transfer bloomed.
6
THE LATE VACUUM TUBES
THE LATTER PERIOD OF VACUUM TUBE MACHINES IS THE START OF ELECTR ONIC PERIOD.
Transistor – is an electronic device with properties Integrated Circuit – composed of a group of transistors
and functions like vacuum and circuit elements compressed in a single package.
8
COMPUTER PROCESSOR
PC used these processors made of ICs to deliver user applications.
8/06/20XX 12
POSITIVE IMPACTS OF ICT
8/06/20XX 13
NEGATIVE IMPACTS OF INFORMATION
AND COMMUNICATION TECHNOLOGY
➢ Job loss: Manual operations being replaced by automation. e.g.,
robots replacing people on an assembly line. Job export. e.g., Data
processing work being sent to other countries where operating costs
are lower. Multiple workers being replaced by a smaller number who
can do the same amount of work. e.g. A worker on a supermarket
checkout can serve more customers per hour if a bar-code scanner
linked to a computerized till is used to detect goods instead of the
worker having to enter the item and price manually.
➢ Reduced personal interaction: Most people need some form of social
interaction in their daily lives and if they do not get the chance to
meet and talk with other people, they may feel isolated and unhappy.
14
NEGATIVE IMPACTS OF INFORMATION
AND COMMUNICATION TECHNOLOGY
➢ Reduced physical activity: This can lead to health problems such as
obesity, heart disease, and diabetes.
➢ Cost: A lot of ICT hardware and software is expensive, both to
purchase and to maintain. An ICT system usually requires specialist
staff to run it and there is also the challenge of keeping up with ever-
changing technology.
➢ Competition: this is usually thought of as being a good thing, but for
some organizations being exposed to greater competition can be a
problem. If the organization is competing for customers, donations,
or other means of funding nationally or even internationally, they
may lose out to other organizations that can offer the same service
for less money.
15
THE INTERNET
➢ Was made in 1960’s and was
introduced in 1969 by the Department
of Advance Research Projects Agency
(DARPA) as a military research project
to help soldiers share information
using only 4 computers.
➢ It is simply called “The Net”, a large
computer network that is made up of
thousand network worldwide.
16
The number of internet users
globally raise to 5.3 billion this year
2023, according to the source. The
compound annual growth rate for
the whole period from 2018 to
2023 is six percent. The fastest
expected growth from this period
was in 2019, with 300 million new
internet users and a growth rate of
7.7 percent from 2018.
17
WWW – WORLD WIDE WEB
18
WORLD WIDE WEB EVOLUTION
19
WEB 1.0
• Refers to the first stage of the World Wide Web
• Websites are content driven, and the users are not
able to interact with the interface or increase their
involvement.
• Read-only web and cannot be manipulated by the
user.
• It was based on HTML which is a basic computer
language.
• It was characterized by static pages (there is no
interactivity between users and websites).
• It was also characterized by slow connection speed.
• The software was very expensive, generally on CDs
or DVDs to be installed.
20
WEB 2.0
• Websites are all about user interaction and participation.
• It is based on more sophisticated computer languages
(PHP, MySQL, Java Script…)
• The pages are dynamic pages, which means that there is
the possibility of interactivity between users and the web.
• It is characterized by speed.
• The software is more accessible. It is online or
downloadable.
• Read and write web and encourages users to participate,
collaborate, and share information. Examples:
podcasting, blogging, tagging, and web content voting.
• Popular websites includes YouTube, Facebook, Twitter,
and Flickr.
21
WEB 3.0 OR SEMANTIC EXECUTING WEB
• Portable personal web.
• Non-browser, Applications
• also known as “The Intelligent Web”
• Read, write and execute web.
• Users are served more intelligently.
• Personalized information.
• Machine comprehension.
• Cloud Technology.
• Everything is connected.
• Immersion.
22
23
THE FUTURE OF WWW IS PROMISING.
THE WEB WILL DEVELOP EVEN MORE POSSIBILITIES
Web 4.0 - Web 4. or the symbiotic web will lead to an interaction between humans
and machines in symbiosis. Machines would be clever on reading the contents of the
web and react fast by providing superior quality content.
Web 5.0 or the emotional web is a version that is still developing underground. The web will
interact with users and will be able to recognize their emotions. So far, the web is neutral as
far as emotions are concerned. This will probably change in the future.
24
E-COMMERCE
Different Perspective of E -Commerce
25
E-COMMERCE
Different Perspective of E -Commerce
• It is not solely restricted to the actual buying and selling of products, but
also pre-sale and post- sales activities across the supply chain.
• E-Commerce is the sharing of business information, maintaining business
relationships, and conducting business transactions by means of
telecommunications networks. (Zwass ,1998)
26
E-COMMERCE FUNDAMETALS
Concept
• This describes the strength of business model. It includes:
Potential to generate revenue ;
Superior customer value – value proposition
First mover advantage
Innovation
• The extent to which the business model merely imitates real-world or online models.
Companies that continue to innovate will clearly gain competitive advantage and this is
also assessed.
Execution
• Aspects of execution that can be seen to have failed for some companies are
promotion, performance, availability, security & fulfillment.
E-COMMERCE FUNDAMETALS
Traffic
• This is measured in terms of page impressions and online revenues.
Financing
• This describes the ability of the company to attract venture capital or other
funding to help execute the idea.
Profile
• This is the ability of the company to generate favorable publicity and to create
awareness within its target market.
S U P P LY C H A I N M A N A G E M E N T
Supply chain management is the coordination of all supply activities of an
organization from its suppliers and partners to its customers.
An e-commerce transaction can be considered from two perspectives: buy -side
and sell-side transactions.
A broader term of how technology can benefit all internal business processes
and interactions with the third parties. This includes the buy -side and sell-side
E- commerce and internal value chain.
29
THREE(3) ALTERNATIVE DEFINITIONS OF
THE RELATIONSHIP BETWEEN E-COMMERCE
AND E- BUSINESS:
E-Commerce (EC)
EC is broadly EC is a subset of EB.
has some degree of
equivalent to EB.
overlap with
electronic business
(EB).
30
E-COMMERCE ENVIRONMENT
31
BUSINESS MODELS
• E-shop
• E-auctions
• Third-party marketplaces
• Information brokerage
• E-procurement
• Virtual communities
• Value chain integrators
• Trust and other services
• E-malls
• Collaboration platforms
• Value chain service providers
33
M-COMMERCE
M-commerce (mobile commerce) is the buying and selling of goods and
services through wireless handheld devices such as cellular telephone
and personal digital assistants (PDAs). Known as next- generation e-
commerce, m-commerce enables users to access the Internet without
needing to find a place to plug in. The emerging technology behind m -
commerce, which is based on the Wireless Application Protocol (WAP),
has made far greater strides in Europe, where mobile devices equipped
with Web-ready micro-browsers are much more common than in the
United States.
34
I C T T O DAY
Authenticity Verification of Information from the Web
• Published author’s name – name of the one who wrote the article or information.
• Credible websites – Error-free article are more likely published by credible sites.
You must check for author’s name and the date it was published.
• Rating, number of viewers and number of shares – mostly credible sites are more
likely to receive a high rating and normally high number of shares.
35
ONLINE ETHICS AND ETIQUETTE
Netiquette – is a coined or portmanteau term of network and etiquette.
- set of ideal rules and conduct that netizen should observe in communicating
and/or publishing information and materials over the World Wide Web and in ICT in
general.
37
ONLINE ETHICS AND ETIQUETTE
Key points to keep in mind to maintain good conduct over the internet
38
ONLINE SAFETY AND SECURITY
Threats that can be acquired from connecting to the World Wide Web.
8/06/20XX 39
ONLINE SAFETY AND SECURITY
Threats that can be acquired from connecting to the World Wide Web.
8/06/20XX 40
ONLINE SAFETY AND SECURITY
Threats that can be acquired from connecting to the World Wide Web.
8/06/20XX 41
MALICIOUS SOFTWARES:
❑ Virus – execute itself and spreads by infecting other programs or files.
❑ Worm – can self-replicate without any human interaction or directives from malware
authors.
❑ Trojan Horse – designed to appear as a legitimate program, once activated installation,
Trojans execute their malicious functions.
❑ Spyware – designed to collect information and data on users and observe their activity
without user’s knowledge.
❑ Ransomware – designed to infect a user’s system and encrypt the data. Cybercriminals
then demand a ransom payment from the victim in exchange for decrypting the system's
data.
❑ Rootkit -designed to obtain administrator-level access to the victim's system. Once
installed, the program gives threat actors root or privileged access to the system.
❑ Remote Access Trojan (RAT) - that secretly creates a backdoor into an infected system
that allows threat actors to remote access it without alerting the user or the system's
42
security programs.
GOVERNMENT PROVISIONS
FOR ONLINE COURTESY
AND ETIQUETTE
LAWS THAT AIM TO PROTECT THE FILIPINO
PEOPLE FROM THESE ILLEGAL ACTIVITIES: