0% found this document useful (0 votes)
30 views

Computer in Our Daily Life

The document discusses various topics related to computers and technology including how computers interpret and process data, how computers communicate with one another through networks and IP addresses, different ways computers can connect like LAN, WAN, wireless networks, Bluetooth, mobile networks and more. It also discusses how computers have significantly impacted and transformed many aspects of everyday life like communication, education, work, healthcare, entertainment and more. The document concludes with a section on computer ethics and important issues like privacy, data protection, cybersecurity, intellectual property, digital divide and social media conduct.

Uploaded by

Franny Be Amino
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views

Computer in Our Daily Life

The document discusses various topics related to computers and technology including how computers interpret and process data, how computers communicate with one another through networks and IP addresses, different ways computers can connect like LAN, WAN, wireless networks, Bluetooth, mobile networks and more. It also discusses how computers have significantly impacted and transformed many aspects of everyday life like communication, education, work, healthcare, entertainment and more. The document concludes with a section on computer ethics and important issues like privacy, data protection, cybersecurity, intellectual property, digital divide and social media conduct.

Uploaded by

Franny Be Amino
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

IT vs ICT

Information technology refers to the use of technology for information management and processing. It includes
a wide range of methods and techniques that use networks, hardware, software, and computers to transmit,
receive, store, and alter data. IT focuses on the technological systems and infrastructure that facilitate the
management and processing of information within companies. It involves duties like database management,
network administration, cybersecurity, and upkeep of computer hardware and software.

Information and Communication Technology is a more general phrase that not only incorporates the technologies
used for communication but also for information management. It is a broader word that covers not only IT but
also the tools and technologies that make cooperation and communication easier, frequently through digital
methods. ICT encompasses not only conventional IT components but also social media, mobile devices, internet
services, and telephony. It acknowledges how communication and information management interact in the
current digital era.

How computer interpret data?

Data entry: The computer system receives data entry commands via a variety of input devices, including
keyboards, mouse, touchscreens, microphones, cameras, and sensors. Text, numbers, photos, audio, video, and
other types of data can be included as raw data.

Processing: The computer's "brain" is the central processing unit (CPU). To interpret and manipulate the input
data, it carries out commands from the computer's software. A series of processes, including arithmetic
computations, logical comparisons, and data movement, are used to carry out these instructions.

How computer communicate with one another?

Data Transfer: Computers exchange data packets to communicate. These packets include the data required for
reassembly, error checking, and routing. Text, pictures, files, and other types of digital data can all be included.

Network Infrastructure: Computers are connected to each other through a network infrastructure, which can be
wired (e.g., Ethernet) or wireless (e.g., Wi-Fi). Network devices like routers, switches, hubs, and access points
help route and manage the flow of data between computers.

IP Addresses: Every device on a network is assigned a unique IP (Internet Protocol) address. This address acts
as the identifier for the device on the network. IP addresses can be IPv4 (e.g., 192.168.1.1) or IPv6 (e.g.,
2001:0db8:85a3:0000:0000:8a2e:0370:7334).

How computer connect?

Through a variety of networks, computers can communicate with one another. These networks allow for resource
sharing and data exchange between connected devices. Following are a few typical methods for connecting
computers:

LAN: Local Area Network

LANs are networks that link computers and other devices inside a specific physical space, like a house, business,
or school. LANs frequently employ Ethernet cables or Wi-Fi connectivity. LANs enable direct communication
between devices and the sharing of resources like printers and files.

WAN: Wide Area Network

WANs connect devices over wider geographic distances, frequently via open or closed communication channels.
The most prominent illustration of a WAN is the internet. WANs make it possible for computers that are far apart
or even in separate countries to communicate.
Wireless networks

Wi-Fi networks enable wireless connections between computers. Wi-Fi eliminates the need for physical cords by
enabling connections between devices and the internet. In homes, workplaces, cafes, and other public places,
Wi-Fi is often used.

Bluetooth:

Bluetooth is a wireless technology that connects and communicates between devices across short distances. It
is frequently used to connect gadgets like laptops, smartphones, and peripherals like headphones and keyboards.

Mobile Networks:

Computers and mobile devices can connect to the internet over long distances by employing cellular networks,
such as 3G, 4G, and 5G, which utilize cellular towers. Mobile devices like smartphones and tablets frequently
utilise this technology.

Communication by satellite:

Satellite communication can be used to link computers to the internet via satellite links in remote locations or
circumstances when regular networks are not available.

VPNs (virtual private networks):

Secure connections are established across open networks, such the internet, through VPNs. They are frequently
used to provide a secure, private channel of communication between computers, protecting the privacy and
security of data.

Ethernet:

Computers in a LAN are linked together via cables and a technology called Ethernet. Ethernet cables are widely
used in office settings because they can offer fast and dependable connectivity.

Optical Fiber Networks:

Light signals are transmitted over great distances at fast rates via fiber optic connections. They enable quick
and dependable communication in both LANs and WANs.

Networks between peers:

Peer-to-peer networks do not rely on a centralized server and instead connect computers directly to one another.
This method is frequently applied to cooperative projects and file sharing.

How computer affects everyday life?

Computers have significantly changed many facets and sectors of daily life. Here are some examples of how
computers have shaped daily life and continue to do so:

Communication: Instant communication is made possible by computers thanks to email, messaging services,
and social media sites. The ability to interact with friends, family, and coworkers anywhere in the world has
made communication more effective and available.

Access to Information: The internet, which is run by computers, puts a wealth of knowledge at our fingertips.
Answers to queries, news updates, educational resources, and more are provided via online search engines and
websites.

Education: The availability of online courses, virtual classrooms, e-learning platforms, and instructional software
has transformed education. Students have remote access to educational resources and peer and teacher
collaboration.
Work and Productivity: Computers are necessary office equipment that assist a variety of office activities,
including document generation, data analysis, project management, and communication. They've revolutionized
the way work is done by making remote work and flexible scheduling possible.

Healthcare: Computers help with patient care, diagnosis, and medical research. Medical imaging technology like
MRI and CT scans depend on computer analysis, and electronic health records (EHRs) expedite the management
of patient information.

Entertainment: With the advent of video streaming, online gaming, digital music and movie distribution, virtual
reality experiences, and more immersive content, computers have completely transformed the entertainment
industry.

Transportation: Modern transportation systems depend heavily on computers, which manage traffic signals, GPS
systems, airline reservations, and self-driving cars.

Retail and E-Commerce: Computer-powered online shopping platforms let customers order goods from the
convenience of their homes and have them delivered right to their front doors.

Social interaction: Online communities and social media platforms give people a place to meet, exchange stories,
and work together on a range of interests.

Environmental Monitoring: Through simulations, data analysis, and models used to examine climate change,
pollution, and resource management, computers contribute to environmental research and monitoring.

Art and design: Digital art production, 3D modeling, animation, graphic design, and other creative professions
have been altered by computers.

Agriculture: Computers help in precision farming by analyzing data to optimize crop planting, irrigation, and pest
management, which results in increased effectiveness and less resource use.

Home automation: To improve convenience and energy efficiency, smart homes use computer technology to
remotely manage appliances, lighting, heating, security systems, and other systems.

Emergency Services: During emergencies, computers help emergency response teams coordinate their
operations, manage their resources, and share vital information.

Scientific Research: Computers speed up scientific research and discoveries by enabling sophisticated
simulations, data analysis, and modeling across a range of scientific disciplines.

Computer Ethics

The term "computer ethics" refers to the moral precepts and standards that direct the moral application of
computer technology as well as the responsible conduct of people and organizations in the digital sphere.
Computer ethics are crucial to ensuring that technology is used in ways that promote wellbeing, respect, and
fairness as it develops and becomes more interwoven into our lives. The following are some crucial computer
ethics-related areas of worry:

Privacy and Data Protection: It is a fundamental ethical concept to respect people's privacy and protect their
personal data. Informed consent must be obtained, data must be securely sent and stored, and unauthorized
access or data breaches must be avoided.

Cybersecurity: To stop cybercrimes, hacking, and unauthorized access, proper cybersecurity practices are crucial.
Protecting one's own systems and abstaining from malevolent actions toward others are both components of
ethical behavior.
Respecting the rights to intellectual property is essential. The creative efforts of people and organizations are
undermined by unethical practices including plagiarism, copyright violations, and software piracy.

Digital Divide: It is morally wrong to deny everyone access to technology and digital resources. To provide
underserved populations a chance to benefit from technology, efforts should be made to close the digital divide.

Social media and Online Conduct: Ethical online conduct involves courteous and ethical social media use,
abstaining from cyberbullying, spreading false information, and harassing other online users.

Artificial intelligence and automation: To use AI and automation ethically, decision-making algorithms must be
transparent, fair, and free of bias. They must also respect human rights.

Environmental Impact: In the age of technology, it is an ethical duty to take into account how computing,
particularly energy use and electronic waste, affects the environment.

Deepfakes and digital manipulation: Creating or disseminating modified content, such as false information or
deepfakes, can have negative effects. Being cautious and responsible when sharing or producing digital content
is part of ethical behavior.

Professional Responsibilities: IT professionals have moral duties to the public, their employers, and their clients.
This entails making sure that their work is of the highest caliber and security, as well as being open and honest
about any hazards.

Social implications of Technology: When creating and deploying new technologies that may have social, cultural,
or political ramifications, ethical issues should be taken into account.

Dual-Use Technologies: Sometimes, technologies created for good reasons are misapplied. Anticipating potential
negative effects and taking action to lessen them are ethical considerations.

Autonomy and Decision-Making: As AI and automation proliferate, ethical questions about machine decision-
making and its effect on human autonomy surface.

ONLINE SAFETY, SECURITY, ETHICS, AND ETIQUETTE

Online Safety

– pertains to the act of staying safe online. As a user of the World Wide Web we must protect our self from
online harms and risk that may jeopardize our personal information. These can result to unsafe communication
and may also affect our well-being. Below are some of the threats than can be obtain from connecting to the
World Wide Web.

1. Spam – Pertains to the transmission of unsolicited messages from various origins using electronic messaging
systems such email and chat messengers. Usually the attackers use spam as a tool for advertisement. Email
spam is the most common form, which is also known as unsolicited bulk email. Spam can be a source of computer
virus and can fill your email with unnecessary emails. That’s why it is important to maintain and update your
antivirus software and avoid opening spam messages.

2. Phishing - It is a software or program used by an attacker to obtain personal information. Sometimes attackers
deceive users by asking for their account credentials and account information. Attackers commonly target user’s
password to hack and take control of a user account. Credit card numbers are also targeted by phishing.
Installing security tools such as antivirus, firewall, gateway email filter, web security gateway, spam filter,
phishing filter, anti-spyware and anti-phishing toolbar are highly recommended to avoid this kind of threats.

Below are some of the indication of phishing attempt.

• The message uses subdomains, misspelled URLs (typo squatting) or otherwise suspicious URLs.
• The recipient uses a Gmail or other public email address rather than a corporate email address.

• The message is written to invoke fear or a sense of urgency.

• The message includes a request to verify personal information, such as financial details or a password.

• The message is poorly written and has spelling and grammatical errors

3. Malware – A short term for malicious software. It is a software send by attackers to inflict chaos on a computer
operation and processes. In most cases this software is disguised as enticing web sites. Malware are used to
spy upon the activity of the computer and steal information.

4. Virus – this security threats attach itself to a computer program (software) or files to spread from one
computer to another. Like human virus this can mildly affect your computer, but some severe virus can totally
damage the hardware, software or files of the computer. Virus can be spread by sharing infected files or by
sending emails with viruses attached on the email.

5. Worm – this is the common type of internet security threats. It is similar to virus, but it has the capability to
transfer from one computer to another without human action. It uses the file or information transport features
on your system, which is what allows it to travel on itself. The danger about worm is that it can replicate itself
that can consume too much system memory causing the network or the computer to stop responding. Some
worm are design to infiltrate your computer system and allows the worm user to take control of computer
remotely.

6. Trojan horse – A threat that disguise as a useful computer software or program, but it will actually damage
your computer once you use or install the software. Trojan horse do not reproduce by infecting other files or
replicate their self unlike virus and worm. If this threat is activated on your computer they can cause serious
damage. They can delete files, destroys information on your computer system and the user of this threat can
access your confidential or personal information.

7. Ransomware – it is a form of malware that lock your system, encrypt, or hold your file in the computer and
then demand payment before the system or files will be restored.

8. Spyware – Spyware works by monitoring the internet user activity on the Internet and transmits that
information to someone else. They can also gather information about e-mail addresses and even passwords and
credit card numbers.

9. Adware – These are advertising supported software and these advertisements pop ups up on the computer
when certain applications are being used. They mainly lower the speed of the computers and in some
circumstances this adware may cause an unstable computer system.

10. Rootkits - The job of the rootkits is to give cover to the hackers. The best or the worst part about rootkits is
that they are able to hide themselves from the antivirus software as well, due to which the user is not aware
that a rootkit is present on the system. This helps the hacker and he is able to spread malware on the system.
Therefore, it is important that one opts for antivirus, which also has a rootkit scanner, which will be able to
detect the invasion.

10 Tips on Online Safety

1. Know the scam – Learn the different type of scams and the procedures on how to avoid them.

2. Think twice before you click – Think twice before clicking any links or button when surfing the internet.

3. Safety peruse – Be careful to some websites that may have an address that’s very similar to a legitimate site,
but the page can have misspellings, bad grammar or low-resolution images.
4. Shop safely - Don’t shop on a site unless it has the “https” and a padlock icon to the left or right of the URL.

5. Kick-butt passwords - Use an Extremely uncrack able password in your online accounts like “N9Bk$.13&)
(@K,”

6. Protect your info - Keep your guard up. Backup all of your data on your computer, smartphone and tablet,
theft or a crash.

7. Watch your Wi-Fi connectivity - Protect your network by changing your router’s settings and making sure that
you have the connection password-protected. Change also your Wi-Fi password every month.

8. Install a firewall - A firewall is a great line of defense against cyber-attacks.

9. Keep up to date - The best security updates automatically to protect your computer. Update your security
software like antivirus regularly to prevent new virus from infecting your computer. Use the manufacturer’s latest
security patches to make regular updates and make that you have the software set to do routine scans.

10. Use your noggin - Use you COMMON SENSE while surfing the web.

Netiquette – It is a network etiquette or the do’s and don'ts of online communication. Below are some of the
important rules of online etiquette.

1. The golden rule - Treat others as you would like to be treated.

2. No Flaming – Flame is a personal insult communicated through the internet.

3. Don’t Type in ALL CAPS – avoid typing in all caps because some people may misinterpret it. All caps are
equivalent of yelling so it is not necessary unless you are actually “YELLING”.

4. Don’t SPAM – SPAM is any unsolicited e-mail from unknown sources. Avoid opening spam message because
they may contain some security threats.

5. Don’t talk with people with people you do not know and do not arrange to meet anyone you meet online.

6. Obey Copyright Laws - Don’t steal someone else’s idea, Property and rights.

7. Use Proper Grammar and Spelling - Errors diminish the credibility of the message.

8. Be Honest/be yourself - Do not pretend to be someone else.

9. Follow the Terms of Service or TOS – These are the Rules and policy of the website.

10. Shop Secure Sites – Shop from websites which is secure from online hackers.

Ten Commandments of Computer Ethics – it was introduced in 1992 by the Computer Ethics Institute.

1. You shall not use a computer to harm other people - It is not right to use a computer and steal/access/destroy
their personal information.

2. You shall not interfere with other people’s computer work - Generating and consciously spreading computer
viruses is unethical.

3. You shall not snoop around in other people’s computer files - Reading other people’s e-mail messaged is a
bad as opening and reading their letters. This is invading their privacy.

4. You shall not use a computer to steal - Using a computer to break into accounts of a company or a ban and
transferring money should be judged the same way as robbery.

5. You shall not use a computer to bear false witness - The internet can spread untruth as fast as it can spread
truth. Spreading false rumors about a person or false propaganda about historical events is unethical.
6. You shall not copy or user proprietary software for which you have not paid (without permission) – A software
is an intellectual product.

7. You shall not use other people’s computer resources without authorization or proper compensation - Hacking
a system to break and bypass the authorization is unethical.

8. You shall not appropriate other people’s intellectual output - Copying somebody else’s program without proper
authorization is software piracy and is unethical.

9. You shall think about the social consequences of the program you are writing or the system you are designing
- You have to think about computer issues in a more general social framework.

10. You shall always use a computer in ways that ensure consideration and respect for your fellow humans. -
The fact that you cannot see the people you are interacting with does not mean that you can be rude to them

You might also like