1/74
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Information Technology (IT)
It encompasses the utilization, creation, and oversight of computer-based systems, software, and networks for the storage, processing, transmission, and retrieval of data.
Information and Communication Technology
There is no universal definition for ______due to how broad it is, but it is usually agreed upon that it has more to do with communication than Information Technology does.
is more inclusive of technologies that allows you to communicate with others and is a direct extension of IT.
Education
Research
Entertainment
Business
Digital Forensics
Impact of ICT
Theodore Kacyznski (The Unabomber)
Humans are biologically and psychologically maladapted to life in a technological society.
The continued development of the technological system will inevitably lead to destruction of humanity
Abacus
Pre-Modern Computing
ENIAC & UNIVAC
First Generation Computers
Transistors & IBM
Second Generation Computers
Integrated Circuits & Mainframes
Third Generation Computers
Supercomputers
Mainframes
Servers
Personal Computers
Embedded System
Types of Computers
Central Processing Unit
Motherboard
Memory (RAM)
Storage Drives (HDD/SSD)
Power Supply Unit (PSU)
Graphics Processing Unit (GPU)
Input Devices
Output Devices
Storage Devices
Internal Components of a Computer
Central Processing Unit
The brain of the computer that performs calculations and executes instructions.
Motherboard
The main circuit board that connects all internal components and allow them to communicate.
Memory (RAM)
Temporary storage used by the CPU to store data that is being processed.
Storage Drives (HDD/SSD)
Devices that store data permanently.
Power Supply Unit (PSU)
Converts electrical power from an outlet into usable power for the computer's internal components.
Graphics Processing Unit (GPU)
Handles rendering of images, video, and animations. Essential for gaming, video editing, and graphic design.
The _____ is also used for computing tasks beyond rendering images and videos e.g. mining cryptocurrencies.
Input Devices
Allow users to input data into the computer.
Examples include keyboards, mice, scanners, and microphones.
Output Devices
Storage Devices
Network Devices
Peripheral Devices
Output Devices
Display or output data from the computer.
Examples include monitors, printers, and speakers.
Storage Devices
External devices for storing data.
Examples include external hard drives, USB flash drives, and memory cards.
Network Devices
Enable computers to connect to networks.
Examples include modems, routers, and network adapters.
Computer Software
refers to a collection of data or computer instructions that tell the computer how to work.
It is the intangible component of a computer, as opposed to the physical hardware.
Operating System (OS)
Device Drives
Utility Programs
System Software
Productivity Software
Media Players
Web Browsers
Graphics and Design Software
Communication Software
Games and Entertainment Software
Application Software
Productivity Software
Tools that assist users in creating documents, spreadsheets, presentations, and other work-related tasks.
Examples include Microsoft Office (Word, Excel, PowerPoint), Google Workspace, and Adobe Acrobat.
Media Players
Software for playing audio and video files.
Examples include VLC Media Player, Windows Media Player, and iTunes.
Web Browsers
Applications for accessing and navigating the internet.
Examples include Google Chrome, Mozilla Firefox, Microsoft Edge, and Safari
Graphics and Design Software
Tools for creating and editing images, videos, and animations.
Examples include Adobe Photoshop, Illustrator, and Premiere Pro.
Communication Software
Programs that facilitate communication through email, instant messaging, and video conferencing.
Examples include Microsoft Outlook, WhatsApp, and Zoom
Games and Entertainment Software
Applications designed for entertainment, including video games and other interactive media
Internet
is a worldwide network of interconnected computer networks that use the Internet Protocol (IP) suite to enable communication between networks and devices.
is often described as a ”network of networks” because it connects private, public, academic, business, and government networks, ranging from local to global in scope.
These connections are made possible through a variety of technologies, including electronic, wireless, and optical networking.
Servers
Browser
IP Address (Internet Protocol)
Internet Service Provider
Major Components of the Internet
Application Server
Web Server
Proxy Server
Mail Server
File Server
Policy Server
Types of Servers
Application Server
business logic, application program
Web Server
HTML pages, files, serve requests
Proxy Server
intermediary, endpoint device, user request
Mail Server
incoming e-mail, outgoing e-mail, delivery
5 File Server
central storage, data files, network access
Policy Server
security, policy-based network, authorization, tracking control
National ISP
Regional ISP
Types of ISP
World Wide Web
commonly referred to as the Web, is an information system that allows users to access documents and other resources through Uniform Resource Locator (URL).
These resources can be connected by hyperlinks and are accessible via the Internet.
Hypertext Transfer Protocol (HTTP).
Information on the Web is transferred using the _____
Web 1.0
Small number of individuals created content for a broad audience.
Allowed direct access to original sources of information.
Simplified information discovery, prioritizing information seeker’s needs
Referred to as the ”read-only Web
Lacked forms, images, controls, and interactive features of the modern internet.
Web 2.0
Extensive creation by many users.
Interactive and participatory.
Fosters interaction and participation.
Referred to as the ”participatory social Web.
Emphasizes users, communities, partnerships, discussions, and social media. Popularized through mobile internet access and apps like Tiktok, Twitter, and Youtube.
Web 3.0
Emphasizes decentralization and openness.
Enhanced user utility through decentralized platforms.
Utilizes AI and ML for intelligent, autonomous internet functions. Functions as a ”global” by analyzing content conceptually and contextually.
Referred to as the ”read, write, executre Web. Originally referred to as the Semantic Web by Tim Berners-Lee.
Shift from centralized platforms (e.g. Facebook, Google, Twitter) to distributed and anonymous services.
Cross Platforms
Web Decentralized Structure
Confidence in Blockchain Innovation
The Rise of Cryptocurrency
Some of the component that are existing and are in use today
Communicating effectively online
is a crucial digital skill for both the workplace and university studies.
Hyperautomation
Multiexperience
Democratization
Human Augmentation
Data Policing
Machine Learning
Robotic Process
Blockchain
Voice Search
Analytics
Current Trends
HYPERAUTOMATION
It is the integration of advanced technologies to automate tasks and processes beyond traditional automation.
Combines technologies like AI, ML, RPA, and decision-making tools.
Aims to automate as many business and IT processes as possible.
MULTIEXPERIENCE
refers to the various overlapping modes of interaction and interfaces between a user and digital technology.
It’s about creating a cohesive experience across web, mobile, wearable, conversational, immersive technologies, and more.
HUMAN AUGMENTATION
Enhancing human abilities through the use of technology. This can include physical, cognitive, and sensory enhancements.
DATA POLICING
refers to the practices and regulations involved in monitoring, managing, and ensuring the responsible use of data.
Crucial for protecting privacy, ensuring data security, and maintaining compliance with legal and ethical standards.
MACHINE LEARNING
is a subfield of artificial intelligence that involves training algorithms on data sets to develop models.
Often powers many of the digital goods and services we use every day
Supervised learning
Semi-supervised learning
Unsupervised learning
Reinforcement learning
Types of Machine Learning
ROBOTIC PROCESS
It is a technology that uses software robots, or “bots,” to automate repetitive tasks typically performed by humans.
can handle tasks such as data extraction, form filling, and file movement.
Blockchain
A decentralized, distributed ledger technology that securely records transactions across a network of computers.
Best known for their crucial role in cryptocurrency systems for maintaining a secure.
Non -Fungible Tokens (NFTs)
are digital assets that represent ownership of unique items like art, music, and videos.
Voice Search
functionality works through the automatic speech recognition system (ASR) to transform voice signals into text.
Speech recognition technology has made our lives even easier and shopping more effortless.
Analytics
It is the process of gathering and analyzing data from a range of digital sources. And when used correctly, it can help inform your marketing decisions.
CYBER/COMPUTER ETHICS
It refers to the code of responsible behavior on the Internet.
This includes social media etiquettes and communication etiquettes
Ethical
Respectful
Responsible
NETIQUETTES
ETHICAL
It means we should share our information and expertise online without any copyright violations.
RESPECTFUL
It means we should respect other people’s privacy and the freedom or personal expression.
RESPONSIBLE
It means we should not indulge in any insulting, degrading or intimidating online behavior which is cyber bullying.
CYBER BULLYING
This happens when a person is harassed, humiliated, embarrassed, threatened or tormented through the use of digital technology.
Protecting personal information
Being careful with online friendships
Managing sensitive and confidential files
Beware of fake news
SOCIAL MEDIA ETIQUETTES
The importance of being precise
Mindfulness during online meetings
Politeness and digital behavior
Building digital credibility
ONLINE MEDIA ETIQUETTES
CYBERCRIME
refers to illegal activities that involve targeting or utilizing computers, computer networks, or networked devices
EMAIL AND INTERNET FRAUD
IDENTITY FRAUD
THEFT AND SALE OF CORPORATE DATA
CYBEREXTORTION
FINANCIAL THEFT OR CARD PAYMENT DATA
RANSOMWARE ATTACKS
CRYPTOJACKING
CYBERESPIONAGE
INFRINGING COPYRIGHT
ILLEGAL GAMBLING
SYSTEMS INTERFERENCE
SELLING ILLEGAL ITEMS ONLINE
SOLICITING, PRODUCING, OR POSSESSING CHILD PORNOGRAPHY
TYPES OF CYBERCRIME
MALWARE ATTACKS
PHISHING
DISTRIBUTED DOS ATTACKS
EXAMPLES OF CYBERCRIME
Hard Disk Drives (HDD)
use spinning disks
Solid-State Drives (SSD)
use flash memory
Domino’s Anyware
This platform enables customers to order pizza using various devices and interfaces, including smartwatches, voice assistants, and social media platforms.
BMW India’s Contactless Experience
This allows customers to explore and purchase vehicles through a fully digital and contactless process, integrating web, mobile, and augmented reality (AR) touchpoints
Democratization
The process of making advanced technologies accessible and usable by a broader, including those without specialized technical skill