0% found this document useful (0 votes)
10 views6 pages

Reviewer in IT Prelims

The document provides an overview of the history and evolution of computers, detailing the characteristics of different generations from the first generation using vacuum tubes to the current fifth generation incorporating artificial intelligence. It also discusses the role of Information and Communications Technology (ICT) and Information Technology (IT) in modern computing, alongside the various peripheral devices that enhance computer functionality. Additionally, it highlights the significance of data processing, communication, and the components that make up a computer system.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views6 pages

Reviewer in IT Prelims

The document provides an overview of the history and evolution of computers, detailing the characteristics of different generations from the first generation using vacuum tubes to the current fifth generation incorporating artificial intelligence. It also discusses the role of Information and Communications Technology (ICT) and Information Technology (IT) in modern computing, alongside the various peripheral devices that enhance computer functionality. Additionally, it highlights the significance of data processing, communication, and the components that make up a computer system.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Chapter 1: Introduction to Information Fourth

HISTORY
Generation OF COMPUTER (1971-Present): Microprocessors
and Communication Technology - The- Around the 4th century
fourth generation of computers
B.C., a simple can becounting
characterized aid was by
the invented
use of microprocessors—a
in Babylonia (now Iraq) single namedsilicon thechip Abacus.
on which It
thousands
was a wooden
of integrated
rack holding
circuits twowere horizontal
built. The wires
use of
with
• In the age of machines, the computer is the greatest
invention of men. It has paved ways for many other inventions.microprocessors
beads strungconsiderably on them. Numbers reducedwere the represented
size of computers, using
making
the position
it possible of beads
for them on to
thefit rack.
in theSimple
palm of
calculations
a hand.
The idea of having a computer began with the people who
wanted an easier way to solve the calculation problems. ButPersonal were carried
computers out by andappropriately
laptops all made placinguse of the beads.
microprocessors. For the first time in 1981, IBM introduced
now, computers are not only used for the purpose of
computers
- In 1642, fora French
home users,
mathematician
and in 1984,
and Apple
philosopher introduced
Blaise
computation; rather, they have entered our daily lives in
the Pascal
Macintosh. invented Fourth-generation
a calculating device
computers named became
the 'Adding
very
many other aspects.
powerful,
Machine'. and they
It was could
an improvement
now be linked over
together
the Abacus.
to formIt is
networks.
also known
The laptops,
as the 'Numerical
home PCs, Wheel
palmtops, Calculator.'
and mobile It
ICT
phones
utilized
we a
usetrain todayof 8
canmovable
all be attributed
dials to add
to thesumsfourth of up to
- Information and Communications Technology (ICT) is
generation
8 figures of long.
computers. As one dial turned a complete revolution, it
often use in more general sense, and is described as using
mechanically turned the next dial. It provided a fair
computers and other digital technologies to assist individuals
Fifthdegree
Generationof accuracy (Present andand speed.Beyond): Artificial
or institutions in handling or using information.
Intelligence
- This
- Thecategorization
first automated of computer
computer generations
was invented is based by on the
- Also, ICT is technology that supports activities involving
use Charles
of artificial
Babbage,intelligence,a professor which of ismathematics
still in the development
at
information such as gathering, processing, storing and
phase.
Cambridge
However, University,
some robots England have in 1822.
already Charles
been developed
Babbage,
presenting data.
thataareprofessor
assisting of inmathematics
medical science at Cambridge.
and research. He realized Some that
computer
many long
applications,
calculations likeusually
voice consisted
recognition, of a series
text-to- of
IT
speech,
actions andthat speech-to-text,
were constantly canrepeated
be attributed and to hence
fifth-generation
could
- IT, or Information Technology, pertains to the industry that
computers.
possibly Movies
be automated.
like the Terminator
He persuaded seriesthe (1,
British
2, and 3) and
involves computers, software, networking and other IT
Robotgovernment
are based to
on finance
the concepthis design
of fifth-generation
to build a machine
computers that
Infrastructure to help relay and manage information important
would calculate tables for logarithms. Charles
in modern-day living as seen primarily in large companies or
PERIPHERAL
Babbage isDEVICES known as the father of computers.
corporation
- are external or internal hardware components that expand
a computer’s
The evolution functionality
of computers by enabling
can be divided input,into output,5 or
INFORMATION
storage
generations:
operations. These devices are not part of the core
- Information refers to the knowledge obtained from reading,
computer system (CPU, motherboard, and RAM) but are
investigation, study or research. Information is regarded as
processed data. Data refers to raw facts, figures, or symbols essential
First Generation
for interaction (1940-1956):
and data processing.
Vacuum Tubes
- The computers made and used during the years 1940 to
that, when processed, become meaningful information. It can
TYPES1956 OF are PERIPHERAL
believed to be DEVICES
the first generation of computers,
be in various forms, such as numbers, text, images, audio, or
1. Input
which Devices
used vacuum
– Allow tubes
users forto circuitry
enter dataand into
magnetic
the computer.
video
Examples:
drums for Keyboard,
memory. Mouse,
The first-generation
Scanner, Microphone, computers Webcam
relied
2. Output
on machineDevices language,
– Display the lowest
or transmitprogramming
the processed data.
COMMUNICATION
Examples:
language, Monitor,
programmed Printer, in
Speakers,
strings of
Projector
'0's and '1's. It was
- Communication in ICT refers to the transmission of data,
3. Storage
very difficult
Devices to trace
– Store and datacorrect
permanently
programming or temporarily.
errors, if
messages, and information using digital and electronic
Examples:
any. Examples
Hard Drive
of first-generation
(HDD/SSD), USB
computers
Flash Drive,
include Memory
technologies. It enables real-time and asynchronous
Card,UNIVAC
External and Hard
ENIAC. Drive
communication across different platforms, improving
4. Input/Output (I/O) Devices – Perform both input and output
business operations, education, and personal interactions. .
functions.
Second Generation (1957-1963): Transistors
Examples:
- The transistor
Touchscreen, was invented Externalin Hard1947, Drives,
but it Network
was used in
- Wired/Wireless Communication, Internet-based
Adapters,
computers External only Sound
in the late
Cards 1950s. The transistor was
Communication, Real-time communication and Asynchronous
superior to the vacuum tube in the sense that it made
communication.
COMPUTER
computers HARDWARE
smaller, faster, INPUT cheaper,
DEVICES and more energy-
- Theefficient.
hardware It no
pertains
longer torequired
the computer’s
an entire physical
room for devices. It
TECHNOLOGY
is any
operation.
part of the
Second-generation
computer that can computers
be seen used
and touched.
assembly
- Technology refers to the application of scientific knowledge,
language for programming. Some early versions of
tools, and techniques to solve problems, improve efficiency,
- An COBOL
input device
and FORTRAN
is a peripheral were device
also used
that by
accepts
these second-
data or
and make life easier. Technology has made communication
commands
generation and computers.
sends it to the CPU. There are different types
much easier and faster through telephones, fax machines,
of data that can be sent to the CPU, and depending on the data
mobile devices and the internet.
type,Third
specificGeneration
input devices (1964-1971):
are used.Integrated Circuits (ICs)
- In 1958, the development of the integrated circuit (IC)
COMPUTER
KEYBOARD
took place, but it could be used in computers only after
- The computer is a general-purpose electronic device
- Thethe keyboard
mid-1960s, is thewhich
most brought
commonly significant
usedchanges
input device to that
programmed to process data and to convert it into
converts
computing. alphabets,ICs used numbers,
silicon and
chips,other called
special characters
information. It is a programmable electronic machine which
performs high-speed mathematical or logical operations. intosemiconductors,
electrical pulses,which whichdrastically
can be understoodincreasedbythe computers.
speed
Theand most efficiency
popular of keyboard
computers. usedAstoday a result,is the computers
101-key
QWERTY
became keyboard,
smaller in known
size as as more
the standard
components keyboard.were
- A computer consists of many electronic components or
squeezed onto the chip. Another significant
parts, each one having a special role to perform. Some
components are hidden inside the computer, whereas some MOUSE development in third-generation computers included the
- is use
a handheld
of an operating
input device system,
used to whichinteract
allowed with machines
a computer. to
of them are visible from the outside
It allows
run many usersdifferent
to control programs
a cursoraton once,
the screen,
with a central
select items,
andprogram
perform variousmonitoring tasks and through
coordinating
buttonsthe andcomputer’s
scrolling
DATA PROCESSING
mechanisms.
memory.
- Input (data and instructions) – Process - Output
Scanner/Image Scanner 4. VERSATILITY
Character Printer SMA
- is a device that converts photos, drawings, graphics, and - Modern - Onlycomputers
one character are versatile,
at a time capable
is printed.
of performing
It has a - app
text into digital form as input to the computer. It helps preservea wide
relatively
rangeslowerof tasks speed..
simultaneously. They can switch conn
paper documents in electronic form so that they do not between tasks, such as railway/air reservations, banking therm
deteriorate with age and can be displayed or printed whenever operations,
Line Printerand weather forecasting, while managing cont
required. Scanners store documents as images, which can bemultiple - Thesetasksprinters
in the are
background.
capable of printing an entire line at assis
altered and manipulated with image-processing software. There one time. A fast line printer can print as many as 3,000
are two types of image scanners: 5. AUTOMATIC
lines per minute. The disadvantages of these printers areAugm
• Hand-held scanners: These scanners are held in hand to - operate that theyautomatically.
cannot printOnce graphics,
a task the
is assigned,
print qualitythey
is low, - Aug
scan an image or document by moving the scanner over the execute and theythe process
are very without
noisy. requiring ongoing user imm
object. They are portable. intervention. blen
• Flat-bed scanners: These scanners have a flat glass NON IMPACT PRINTERS •A
surface where the document is placed, similar to a Xerox 6. MEMORY
- are now used almost everywhere. They are faster and onto
copier. The lid of the scanner is closed before giving the - do quieter
not forget than information.
impact printers They and
can provide
store vastbetter
amounts
quality
command for scanning. Flat-bed scanners are commonly used of data output.
permanently,
Two commonly which used
can be types
easilyof non-impact
retrieved when printers How
in everyday life. needed.
are: • Use
• Laser Printers • Dig
SYSTEM UNIT CLASSIFICATION
• Ink-Jet Printers OF COMPUTERS time.
- is the enclosure composed of the main elements of a - can be classified based on size and computing power.
computer that are used to administer data. This can be However
SOUND as aSYSTEM/SPEAKERS
modern computers have become smaller, •V
referred to as a computer case or tower. The circuitry of the yet more - These powerful
are output anddevices
relatively
thatcheaper.
produce sound or audio, repla
system unit containing the primary components of a computer such as speech and music. These devices are particularly with
with connectors into which other circuit boards can be SUPERimportant
COMPUTER for visually impaired users who rely heavily
positioned as motherboard. - Most
on sound
powerful systems
and fastest
to operatetypecomputer
of computer. How
- Used for complex calculations like weather forecasting, •AV
MOTHERBOARD nuclear
STORAGE
simulations,DEVICESand scientific research. world
- Inside a computer, there is a motherboard, which gets its Example:
- hardwareIBM Summit,
components Fugakused to store, retrieve, and • Sen
name because it is like a mother to all of the other circuit manage digital data. They can be classified based on intera
boards. This is the main circuit board which connects all of MAINFRAME their storage COMPUTER
type, capacity, and speed. These devices are
the other internal components. - Large,
usedhigh-performance
to store data or programs computers andused
are non-volatile,
by MAC
- The CPU (Central Processing Unit) is the brain of a businesses
meaningand they government
retain information
organizations.
even when the - bra
computer, responsible for executing instructions, performing - Handles computer vast isamounts
turnedof off.
data
Storage
and transactions,
devices can suchbe either
as to le
calculations, and managing data processing tasks. It interpretsbanking internally
systemsbuilt into
andthe airline
computer
reservations.
or externally attached via witho
and processes commands from software and hardware to Example:
USB port. IBMAZhard Series.disk drive is a commonly used storage techn
ensure the computer functions properly device and can be either external or internal. Other time.
MINIexamples
COMPUTER include pen drives, floppy disks, and memory
OUTPUT DEVICES - Smaller
card readers.
than mainframes but still powerful, used in How
- are used to convert the machine codes received from the business and industry for specific tasks. 1. Da
CPU into a form that can be understood by users, i.e., - Often
Volatile
functions
Memory:as a server
Memory in ainnetwork.
which the contents (data or text,
humans. The output generated by output devices may be of twoExample: programs) IBM stored
AS/400. on the storage medium are erased 2.Da
types: when the power supply to the computer is switched for tr
1.Soft copy output PERSONAL
off. (Ex. RAM,COMPUTER Cache Memory) 3.Mo
2.Hard copy out - is a general-purpose computing device designed for 4.Tra
individual
Non-Volatile
use. It Memory:
typically includes
Memoryhardware
that retainscomponents
data even 5.Tes
MONITOR suchwhen
as a theprocessor
power (CPU),
is turned memory
off. (Ex.
(RAM),
HDD,storage
SSD, External perfo
- A monitor is a display device that shows the data received (HDD/SSD),Drive) input devices (keyboard, mouse), and an
from the computer in a readable and understandable form to output display (monitor). PCs run operating systems like Depl
users, i.e., humans, onto a video screen. Monitors vary greatly Windows,
CHARACTERISTICS
macOS, or LinuxOF andCOMPUTER
support various appli
in size and resolution (clarity of graphics). There are three applications
1. SPEED for work, study, entertainment, and
common types of monitors: communication.
- operate at incredible speeds, executing instructions AUT
• VGA (Video Graphics Array): 640 × 400 pixels. and calculations far beyond human capability. They - refe
• SVGA (Super Video Graphics Array): 800 × 600 pixels. EMBEDDED
can perform COMPUTER
operations in a minute that would take a mini
• EVGA or XVGA (Extended Video Graphics Array): 1024 × 768 - specialized
human a computer
lifetime. Modern
systemcomputers
built into a work
larger
in device error
pixels. to perform
nanoseconds dedicated and picoseconds.
functions.
- Found in smart appliances, ATMs, medical devices, and Appl
PRINTERS automotive
2. ACCURACYcontrol systems. • Ma
- are used to print the output data on paper. Such output is - provide highly accurate results. Errors typically occur contr
referred to as a printout or hard copy. TRENDS
only due IN TECHNOLOGY
to programming mistakes or erroneous input, • Bus
Internet
whichofare Things
human (Iot)
errors. This concept is referred to as invoi
Types of Printers - refers
GIGO to a(Garbage
network of In,interconnected
Garbage Out), meaningdevices thatfaulty results • IT A
Impact printers communicate
stem from inaccurate
and exchange instructions
data over or data.
the internet. resou
- refer to those printers where text or images are printed by These devices include sensors, appliances, vehicles, and • Sm
striking hammers or pins against a ribbon. These printers industrial 3. DILIGENCE
machines, allowing automation and remote lighti
have a mechanism similar to a typewriter. They are now control
- Unlike humans, computers are consistent and do not • Hea
phasing out and are being replaced by non-impact printers. experience boredom, tiredness, or lack of concentration. • Fin
Impact printers are of two types They can handle voluminous and repetitive tasks • Agr
without needing breaks.
BIG DATA Dependence on Program: Computers rely entirely on the
- refers to extremely large and complex datasets that programs written for them. If the software or code contains
cannot be easily processed using traditional data errors, the output will be incorrect. Computers cannot identify
management tools. It involves collecting, storing, and or rectify programming mistakes on their own; they need
analyzing vast amounts of data to uncover patterns, human intervention to correct such issues.
trends, and insights.
CHAPTER 2 COMPUTERS IN OUR DAILY LIFE
Applications of Big Data How Computers Work?
• Business & Marketing – Customer behavior analysis, - by processing data through a combination of hardware
targeted advertising (Amazon, Google Ads). and software components. Here's a simple breakdown of
• Healthcare – Disease prediction, medical image how they function. However while we understand human
analysis, drug discovery. language, the computer can understand machine language
• Finance & Banking – Fraud detection, risk analysis,
real-time stock trading. Binary language is the fundamental way computers
• Social Media & Entertainment – Recommendation process and store information. It consists of only two digits:
systems (Netflix, Spotify). • 0 (zero) → Represents "OFF" (low voltage)
• Smart Cities & IoT – Traffic management, energy • 1 (one) → Represents "ON" (high voltage)
optimization, disaster response.
COMPUTER NUMBER SYSTEM
ADVANTAGES OF COMPUTER - is a way of representing and processing numerical
- Time-consuming tasks like spelling checks, dictionary values in computing. Since computers operate using
use, and handling large data sets can be completed electrical signals (ON and OFF), they rely on different
rapidly with computer applications. numbering systems to store, process, and transmit data.
- The internet enables real-time communication and
interaction across the globe. Binary Number System , with the prefix bi, which means 2.
- Information exchange has become easy and cost-
effective, though some information may still require Types of number systems:
payment. 1.Octal Number System - from the prefix word octa, it uses 8
- Computers can produce multiple copies of documents digits.
in seconds, a task that would take humans much longer 2. Hexadecimal Number System - hexa means 6; deci means
- Virtual offices allow people to work from anywhere, 10, meaning it uses 16 digits to represent its values.
saving time and reducing office setup costs, while
increasing time spent with family. HOW COMPUTERS WORK
- Computers assist people with disabilities, such as 1. From the keyboard, pressure pads are typically found
visually challenged individuals, by providing tools like underneath each key. Upon typing a letter, the pressure pad
screen reading software, which greatly aids their studies sends information to the CPU for processing.
and activities.
- Computers can store vast amounts of data in compact 2.The information is then transmitted in the form of 0's and
storage devices for extended periods without the risk of 1's using the ASCII code. ASCII code is a standard that
forgetting. assigns letters, numbers and other characters within the 256
- Computer software can detect and control plagiarism, slots available in the 8-bit code.
ensuring originality and proper attribution of content.
3. The CPU determines what character has been typed and
USE OF COMPUTERS sends the information to the computer monitor, again in 0's
- Education, Health, Business, Travel, Research, Banking, and 1's
and Communication
4. The monitor displays the information in it equivalent
LIMITATIONS OF COMPUTERS character, this time readable and understandable by
- Zero IQ: Computers do not possess intelligence or humans.
understanding. They follow instructions precisely but
cannot handle unexpected situations or errors beyond their - Computer programmers create programs so that
programming. They are unable to infer or make judgments computers can do specific tasks. People who write
on their own. programs are programmers. A term used for a
- No Decision-Making Power: Computers lack the program is codes. Writing program is called
capability to make decisions. They execute tasks strictly programming or coding
according to the instructions provided by their programs.
They do not have the ability to think or choose HOW COMPUTERS WORK WITH EACH OTHER
alternative actions. - through networks using a set of rules called protocols
- No Creativity: Computers cannot exhibit creativity. (like a language for computers)
They are limited to performing tasks based on the
programmed instructions and cannot generate original System Bus
ideas or create new content independently. - is the main communication pathway inside a computer
that allows different components (CPU, memory, and
peripherals) to transfer data. Think of it as a highway where
information travels between parts of the computer.
Types
• Circuit
DATA
CHAPTERofBUS
switching
Application
3 THE and INTERNET
Software:
packet AND switching
WORLD are WIDE
the two WEB 4.Firmware
5.WHAT
VGA –COMPUTERS
The
– Low-level
15-pin Video
software
CAN Graphics
DOembedded
ON THE ArrayINTERNET
in(VGA)
hardware
modes
-INTERNET
Can oftransfer
data transmission
data to and from the memory of a devices
connector
- Some tocomputers
control
has been their
work
provided
functions.
like electronic
on many videofiling cabinets
cards, that
1. computer,
-Productivity
global networkor intoSoftware
or
of interconnected
out–ofUsedthe CPU;
for office
computers
carries
and actual
business
that
data ⚬computer
Examples:
store information
monitors,
BIOS/UEFI, laptop
an send
firmware
computers,
it when
for routers,
clients
and projectors.
firmware
request Itto.
inis
tasks.
- Existing
between
communicate for
components.
almost
usingthreestandardized
decades the protocols,
World Wide allowing Webusers
or smart
now
Thesedevices
slowly
are called
beingservers.
phased out in favor of the faster and

WWW⚬to
Examples:
Example:
share
has developed
information,
Microsoft
a document aOffice
new
access
sent(Word,
virtual
towebsites,
theExcel,
world
printersend
PowerPoint),
within
for emails,
printing
a and more compact HDMI connector.
Google
generation.
more.Docs,
It operates
LibreOffice
through infrastructure like servers, routers, 5.Middleware
• A server is–aActscomputer
as a bridge
that is between
designeddifferent
to process any
and data centers,
ADDRESS BUS enabling billions of devices worldwide to applications,
6.requests
SERIAL for– networks,
An
data
RS-232
and delivers
serial connection
data to other wasclient
once a
2.Multimedia
- Some
-connect
usedwebsites
byandtheSoftware
exchange
CPU have enhanced
–data
Helpsausers
to specify features
create,
physical toedit,
adapt
address andto the
for standard
computers feature
over ofa local
a personal
network computer
or the internet.
used for
view
speedilymedia growing
instructions files. techniques
, files, and other of the user’s
devices way of
within theretrieving connections
• A client is atocomputer
modem, or printer,
device mouse,
that getsandinformation
other

the -Examples:
Most
Web telephone
computer from Adobe
largecompanies
system. Photoshop,
screen computers allVLC
overMedia
thetoworld
small-screen
Player, also function ONLINE
peripheral
from a APPLICATION
server.
devices. Now, SOFTWARE
it has been replaced by USB
Audacity
mobile
⚬asExample
internet
phones. service
: checking provider
which(ISP).
of theInUSBthe Philippines,
ports has a printer the - also
connections.
known as web-based applications or cloud
PLDT, Inc. (formerly
connected, along withknown as Philippine
the mouse, keyboard, Long etc.Distance applications,
- Besides clients
runs on
andtheservers,
internet theinstead
internetofisbeing
made up of a
3.Database
TelephoneManagement
Company) is the Software
largest(DBMS)
network– company.
Used for installed
7.hardware
PARALLEL
on adevice
local
– Similar
device.
designed
toUsers
theto serial
can
receive,
access
connection,
analyze,
these parallel
and
storing,
CONTROL managing, BUS and retrieving data. applications
connections
send incoming through
werepackets
used a web
before
tobrowser
another
to connect
without
network.other
requiring
This is
⚬ -THE
Examples:
INTERNET
carries theMicrosoft THEN
commands Access,
AND NOW
MySQL, Oracle
or instruction fromDatabase
the CPU; downloads
computer
called a router
orperipherals
installationssuch as printers. It has also been
- The Internet
sends startedto
control signals from
managethe Advanced
data flow Research replaced since then by the USB connections.
4.Web
⚬Projects
Browsers
Example Agency – Used
: it tells Network
memory to access
which
whether and
is called
tonavigate
store thenew ARPANET,
thedata or Features of Online Application Software:
internet.
that is established
retrieve existing data by the U.S Department of Defense in the • Cloud-Based-Based
8. PS/2 - The PS/2 is aAccess 6-pin connector
– Accessibleusedfromto connect
⚬ 1960s
Examples:so that Google
the military’s
Chrome,research
Mozilla Firefox,
unit could Microsoft
collaborate or anywhere
the mouse withandan keyboard
internet connection.
to a computer. It is color-
EdgepartnerCOMPUTERS
HOW with businessCONNECT and government TO OTHER laboratories. • Cross-Platform
coded to identify Compatibility
which peripheral – Works
will be on
connected
multiple to
COMPUTERS devices
which port.
(PC, Purple
tablet, smartphone).
is for keyboard and green is for the
5. -Communication
Afterwards,
through networks, otherSoftware
universities – Facilitates
using different and U.S institutions
methodscommunication
and were • Automatic
mosuc h Updates – No need for manual updates; the
overconnected
the internet.
technologies. to ARPANET that resulted in the growth of software provider updates it automatically.
⚬ ARPANET
Examples: different
Zoom, Microsoft
from everyone’s
Teams, Slack
expectations. ARPANET • Collaboration
WIRELESS COMMUNICATION
& Sharing – Allows multiple users to work
then attained NETWORK
COMPUTER the name of SYSTEM “Internet.” together
- Includes
in real-time.
microwave transmission, satellite
6. -Enterprise
is a group Software – Used bycomputers
of interconnected businessesand for devices • Subscription-Based
communication, cellular or Freetransmission,
– Often offered and
as radio
a Software
operations
- Thecommunicate
that advancement
management. and ofshare
hypertext-based
resources (data, technology
files, known astransmission
a Service (SaaS)suchmodel.
as WiFi connectivity.
⚬ internet,
as
Examples:
the World Enterprise
printers,Wide Web,
etc.). Resource
WWW,
These Planning
or just simply
connections (ERP),
can be as wired
Web has
Customer
providedRelationship
(Ethernet, the
fiberchannels
optics)Management
for displaying(Wi-Fi,
or wireless (CRM)
text, graphics,
software
Bluetooth). HOW
1. WIFICOMPUTERS
– Wi-Fi usesIMPACT radio waves EVERYDAY to wirelessly
LIFE transmit
animations, etc. Its other features of enabling easy search - Computers
information have
across
THE WORLD WIDE WEB become
a network.
an essential
Wi-Fi’s signals
part ofare
daily
7. PERSONAL
and
Security
offering Software
navigation
AREA – Protects
NETWORK tools systems
prompted
(PAN) from the cyber
internet’s life,
transmitted
influencing in frequencies
various aspects
of between
of personal,
2.5
- is referred to as the collection of public websites that andprofessional,
5 gigahertz
threats.
-unpredictable
type of connection worldwide which growth.
is often limited to an and
(GHz),
aresocialwhich
activities.
connected aretohigher
From
the than
communication
internet radio and TV
worldwide, to signals
business
togethertowith
avoidthe
Examples:
individualAntivirus
person’s software
personal (Norton, McAfee), Firewall
devices. operations,
interference. theyWi-Fi
enhanceis often efficiency,
used in
client computers which include personal computers, convenience,
schools, companies,
and
software
JOBS INTERNET CAN DO connectivity.
and business
laptops, iPads,establishments,
and smartphonesamong others.itsThis
that access is to
content.
- to move,
LOCAL AREA transfer,
NETWORK or assign (LAN) a computerized information provide network connections to multiple users without the
8. -from
Entertainment
one placeinto
a connection Software
another.
which – Provides
a group leisure and
of computers and other 1.need
Communication
WEBfor cables. Majority
TECHNOLOGIES and Social of Wi-Fi
Interaction
users use mobile
recreational
devices, such functions.
as network printers, share common • Email,
devices, Messaging,
such as tablets,
and
- The WWW is considered to be one Video
laptops,
Calls and– Computers
smartphones
of enable
to
the applications
⚬ communication
-Examples:
data and Information
Videoline games, arestreaming
within transferred
a certainapps around
area (Netflix,
suchthe as world
a instant
connect communication
via an access through
point or
platforms
Wi-Fi
in the internet and computer networks. This is based onhotspot.
like Gmail,
Spotify)
through wired
building or a small or wireless
campus. transmission media. Data is WhatsApp, and Zoom.technologies that are said to be part of
three fundamental
transferred from one network to another until it reaches its Social
2.the
BLUETOOTH
Media – Platforms
WWW development: – Bluetooth like Facebook,
uses radio Instagram,
waves toand
SYSTEM
final destination.
WIDE SOFTWARE
AREA NETWORKS (WAN) Twitter
connect helptopeople
other stay devices.
connected.
The connection via Bluetooth
- type
- may of be
software that manages
less restrictive than computer
LAN as rules hardware and
and policies 2.isEducation
• called
Hypertextpairing.
and Learning
markup Once paired, devices
language (HTML)are – isable to send
a standard
provides
may differ a platform
within its forcoverage.
running application
WAN is considered software. It • E-Learning
and receive
markup Platforms
information
language used– Websites
provided
for likethey
creating Google
webare Classroom,
within a
pages.
serves as a bridge
synonymous between
to the internet. the user and the hardware, Moodle,
given range
Coursera,which andis Khan
typically
Academy
10 meters. offer online
ensuring that all system components work efficiently. education.
• Hypertext transfer protocol (HTTP) – is –classified
Research and Information Access Studentsas
METHODS OF COMMUNICATION and
HOW professionals
HUMAN COMMUNICATE
use Google, Wikipedia,
WITH
the set of standards allowing users of the world wide webCOMPUTERS
and digital
Types
Wired ofCommunication
System Software: libraries
- to
Throughfor knowledge.
computer
interchange software,
information humans
seen on the areweb
ablepages.
to
1. 1.Operating SystemSerial
USB – Universal (OS) –Bus Manages
(USB) is hardware
a connection and or 3.“communicate”
Business and Work with the computer.
software
interface resources,
that allows provides
the computera user interface,
to communicate and with 4. Entertaining
• Web servers sideand web browsers- is a software
controls
system program
peripherals execution.
such as keyboard, mouse, printer, COMPUTER
application for SOFTWARE
recovering. Presenting, and navigating
⚬ etc.
Examples:
as well Windows,
as other devices macOS, likeLinux,
digitalAndroid,
cameras iOSand ADVANTAGES
- information
combinationresources
OF
of instructions,
COMPUTER data, and
on the World Wide programs
Web. that
portable fans. Speed
the computer
and Efficiency
needs in–order Performto dotasksa specific
faster thantask.
2.Utility Software – Helps in system maintenance, humans.
Another term used for computer software
• Here are the different types of browser application that is computer
security, and optimization.
2. FLAT-WIRE – It is a type of connector that can Connectivity
programs.
are currently– in Helps
the people stay connected across the
⚬ transmit
Examples: dataAntivirus
to andsoftware,
from devices Disk Cleanup,
which have Filetypical world.
- Microsoft
Programs are a
Edge; Googleset of codes
Chrome; or Safari,
instructions
and more which are
Compression
high data rates, Toolssuch (WinRAR,
as external7-Zip)hard drives. The transfer Convenience
usually designed – Simplifies
or written banking,
by computershopping,
programmers
and work.
speed of a FireWire is faster than that of a USB. Education
using
CHAPTERa specific
and Learning
programming
KEYNOTES – Provides
language. access to unlimited
3.Device Drivers – Enable communication between the knowledge.
- -The
Themost common
internet started type
withoftheprogramming
so-called ARPANET language which
OS 3.and hardwareCABLE
ETHERNET components. – An Ethernet cable transmits used
was by programmers
established by the is U.S
called object-oriented
Department of Defense in the
⚬ signals
Examples: Printera drivers,
between computer Graphics drivers (NVIDIA,
and network devices such DISADVANTAGES
programming.
1960s so that theOF COMPUTERS
military’s research unit can
AMD), Sound switch,
as a router, drivers or other computers. • Cybersecurity
- collaborate
Programmers Risks
have
or partner developed
– Threats two
like hacking,
with business types of computer
and phishing,
government
and
software
data breaches.
-
laboratories. the system software and application
4. HDMI – High-definition Multimedia Interface (HDMI) • Job
software.
Displacement – Automation reduces the need for
is a connector for transmitting audio/video data which are some jobs.Health Issues – Excessive screen time can
compatible. To computers, projectors, and digital cause
APPLICATION
eye strain andSOFTWAREposture problems.
televisions. • Privacy
- involve Concerns
the use of – application
Social media programs.
and online platforms
collect personal data.
CHAPTER 4 7. Thou shalt not use other people’s computer resources without
authorization or proper compensation
What is Netiquette? 8. Thou shalt not appropriate other people’s intellectual output
It is a network etiquette - that is the etiquette of cyberspace and 9. Thou shalt think about the social consequences of the program
"etiquette" means the forms of required by good breeding or you are writing or the system you are designing
prescribed by authority to be required in social or official life. In other 10. Thou shalt always use a computer in ways that ensure
words, netiquette is a set of rules for behaving properly online consideration and respect for your fellow humans.
Netiquette, or network etiquette, is concerned with the "proper" way
to communicate in an online environment. CYBERCRIMES
WHAT IS CYBER?
REMEMBER THE GOLDEN RULE It is the Characteristics of the culture of computers, information,
- Even though you may be interacting with a computer screen, you technology and virtual reality.
are communicating with a real person who will react to your • Cybercrime is defined as a crime in which a computer is the object
message. Make a good impression - treat others with the same of the crime (hacking, phishing, spamming and child pornography) is
respect that you would like to receive and avoid confrontational or used as a tool to commit an offense.
offensive language. • Cybercriminals may use computer technology to access personal
information, business trade secrets or use the internet for
AVOID SLANG, ACRONYMS, AND TEXT TALK exploitative or malicious purposes.
- Communicating effectively in college and business environments
requires the use of correct terminology, spelling, and grammar that REPUBLIC ACT NO. 10175
can easily be understood. For example, use "your" instead of "ur". CYBERCRIME PREVENTION ACT OF 2012
- is a law in the Philippines approved on September 12,2012 which
AVOID "SCREAMING" IN TYPED MESSAGES aims to address legal issues concerning online interactions and
- Typing an entire message using all capital letters is known as internet.
"screaming". It is distracting and generally frowned upon in
professional environments. It is better to draw emphasis to selected REPUBLIC ACT NO. 10173 DATA PRIVACY ACT OF 2012
words or phrases by: using italic or bold text; using a different color - is an act protecting individual personal information.
for text or background color; or denoting emphasis using special
characters (Example: **Important**). COMMON FORMS OF CYBERCRIMES

PROOFREAD YOUR MESSAGES BEFORE SENDING THEM Copyright


- Proofreading your messages before you send them is a best - The exclusive legal right, given to an originator or an assignee to
practice for effective and efficient communication. Strive to make print, publish, perform, film, or record literary, artistic, or musical
your communications concise and free of any: material, and to authorize others to do the same.
• Spelling and grammar errors
• Confusing terms or phrases that could be misunderstood Copyright infringement
• Errors of omission, such as missing content or recipients - is the violation, piracy or theft of a copyright holder's exclusive
• Errors in accuracy of information rights through the unauthorized use of a copyrighted material or
work.
EXERCISE GOOD JUDGMENT WHEN SHARING INFORMATION
WITH OTHERS ONLINE Plagiarism
- E-mail and chat messages that you send or receive are - An act or instance of using or closely imitating the language and
considered private and should not be forwarded or copied to others thoughts of another author without authorization.
without gaining the consent of all involved participants. In general,
messages posted to discussion boards and social media sites can Computer Addiction
be read by the public. You may never know who might read or share • Offline: generally used when speaking about excessive gaming
what you post. It is a good practice to always ask a post's author for behavior, which can be practiced both offline and online.
permission before sharing a post with other parties. • Online: Also known as "Internet Addiction", gets more attention in
general from scientific research than offline computer addiction,
• To protect your privacy and safety, do not share online any mainly because most cases of computer
sensitive personal information such as: • Virtual Self-The persona you create about yourself virtually.
• Your home address or phone number
• Personal conversations CRIMINAL ACTIVITIES
• Social plans, such as vacations
• Financial information 1. HACKING
• Usernames, passwords, or hints • Unauthorized access of or interference with computer systems.
• Anything personal that you would not want shared by others over servers, or other information and communication systems.
the Internet • Unauthorized access to corrupt, alter, steal, or destroy electronic
data using computers or other information and communication
RESPECT DIVERSITY IN VIEWPOINTS systems without the computer or system owner's knowledge and
- Be constructive and respectful when consent.
sharing opinions, beliefs, and criticisms, or responding to those of • The introduction of computer viruses resulting in the corruption,
others in the conversation. alteration, theft, or loss of such data.
• Illegal Access
• When sharing a viewpoint that differs from someone else's, it is a • Illegal Interception
best practice to first acknowledge the other person by briefly • Data Interference
restating what he or she said, but in your own words. This lets the • System Interference
person know that you are listening and trying to understand them. • Misuse of Devices
• Infection of IT Systems with Malware - if the act is committed
• When presenting an opinion or criticism, it is helpful to use phrases against critical infrastructure of the Philippines the, penalty is
that identify to whose point of view you are referring. If the opinion is between 12-20 years reclusion temporal
yours, you can begin with the phrase "In my experience" or "In my • Six years up to twelve years of imprisonment also known as prison
opinion". If it is a viewpoint of someone else, make sure you identify mayor
that in your message (Example: "According to Eric Ericson," or "The
president believes"). 2. COMPUTER-RELATED FORGERY, FRAUD AND/OR IDENTITY
THEFT
TEN COMMANDMENTS OF COMPUTER ETHICS • An attempt to obtain sensitive information such as usernames,
1. Thou shalt not use computer to harm other people. passwords, and credit card details and (indirectly money), often for
2. Thou shalt not interfere with other people’s computer work malicious reasons.
3. Thou shalt not snoop around in other people’s computer files • Phishing, Pharming
4. Thou shalt not use computer to steal. • Spamming
5. Thou shalt not use computer to bear false witness • Maximum of Php 200,000 fine or prison mayor
6. Thou shalt not copy or use proprietary for which you have not paid
3. ELECTRONIC THEFT
• Illegal Downloading
• Obtaining files that you do not have the right to use from the
internet.
• Digital Piracy
• Practice of illegally copying and selling digital music, video,
computer software, etc.
• Copyright Infringement
• Penalty of Php 50.000-500.000 and or prison mayor

4. CYBERBULLYING
• The use of electronic communication to bully a person, typically by
sending a message of an intimidating or threatening nature.
• The Anti-Bullying Act of 2013 (RA 10627)

5. CYBERSEX
• Willful engagement, maintenance, control, or operation, directly or
indirectly of any lascivious exhibition of sexual organs or sexual
activity with the aid of a computer system for favor or consideration.
• There is a discussion on this matter if it involves "couples" or
"people in relationship" who engage in cybersex.
• Penalty at least Php 200,000 and or prison mayor

6. CYBERSEX
• Is a form of child sexual exploitation.
• Unlawful or prohibited acts defined and punishable by Republic Act
No. 9775 or the Anti- Child Pornography Act of 2009, committed
through a computer system.
• Penalty of 12-20 years of imprisonment or reclusion temporal

7. CYBER DEFAMATION
• Is an unprivileged false statement of fact which tends to harm the
reputation of a person or company.
• Penalty of 6-12 years of imprisonment or prison mayor

You might also like