it file (1) (1)
it file (1) (1)
HISTORY OF INTERNET
The internet's history is a fascinating journey of innovation and collaboration that
has transformed the world. Here's a brief overview:
1. Origins (1960s-1970s):
• ARPANET: The precursor to the internet, ARPANET, was developed by the
U.S. Department of Defense's Advanced Research Projects Agency (ARPA)
in 1969. It aimed to enable secure communication between government and
academic institutions.
• Packet Switching: Pioneered by researchers like Leonard Kleinrock, packet
switching technology allowed data to be broken into packets, sent
independently, and reassembled, forming the backbone of the internet.
1
Information Technology
Impact:
Today, the internet is central to communication, commerce, education, and
entertainment, serving over 5 billion users globally. It continues to evolve with
technologies like AI, blockchain, and quantum computing shaping its future Web
browser
2
Information Technology
WEB BROWSER
3
Information Technology
• The data accessed by a user frequently is stored by the web browsers in the form of
cache. This saves the loss of data and time while accessing the data again and again.
4
Information Technology
Modernization (2000s):
Mozilla Firefox emerged in 2004 as an open-source alternative to Internet
Explorer.
• In 2008, Google Chrome entered the scene, emphasizing speed, simplicity, and
performance, quickly becoming the most popular browser.
5
Information Technology
• Modern browsers focus on speed, security, and features like syncing across
devices and supporting advanced web technologies.
6
Information Technology
• Google Chrome
The most popular web browser in the world, with 65.12% of the global market share in
2024. It's fast, easy to use, and offers a safe browsing experience.
• Apple Safari
The native web browser for Apple Mac and iOS devices, with 18.17% of the
global market share in 2024. It has a classic design and protects user privacy.
• Microsoft Edge
The third most popular web browser in the world, with 5.21% of the global
market share in 2024.
• Mozilla Firefox
The fourth most popular web browser in the world, with 2.82% of the global
market share in 2024.
7
Information Technology
• Opera
The sixth most popular web browser in the world , with 2.54% of the global market
share in 2024
8
Information Technology
Blog
9
Information Technology
An early example of a "diary" style blog consisting of text and images transmitted
wirelessly in real-time from a wearable computer with head-up display, February
22, 1995
The term "weblog" was coined by Jorn Barger on December 17, 1997. The short
form "blog" was coined by Peter Mercola, who jokingly broke the word weblog
into the phrase we blog in the sidebar of his blog Peterme.com in May 1999.
Shortly thereafter, Evan Williams at Pyra Labs used "blog" as both a noun and
verb ("to blog", meaning "to edit one's weblog or to post to one's weblog") and
devised the term "blogger" in connection with Pyra Labs' Blogger product, leading
to the popularization of the terms.
• Origins
Before blogging became popular, digital communities took many forms, including
Usenet, commercial online services such as GEnie, Byte Information Exchange
(BIX) and the early CompuServe, e-mail lists, and Bulletin Board Systems (BBS).
In the 1990s, Internet forum software created running conversations with
10
Information Technology
"threads". Threads are topical connections between messages on a virtual
“corkboard”
to foster research communities and the exchange of ideas and scholarship, and
how this new means of networking overturns traditional power structures.
• Technology
Early blogs were simply manually updated components of common Websites. In
1995, the "Online Diary" on the Ty, Inc. Web site was produced and updated
manually before any blogging programs were available. Posts were made to
appear in reverse chronological order by manually updating text-based HTML
code using FTP software in real time several times a day. To users, this offered the
appearance of a live diary that contained multiple new entries per day. At the
beginning of each new day, new diary entries were manually coded into a new
HTML file, and at the start of each month, diary entries were archived into their
own folder, which contained a separate HTML page for every day of the month.
Then, menus that contained links to the most recent diary entry were updated
manually throughout the site. This text-based method of organizing thousands of
files served as a springboard to define future blogging styles that were captured by
blogging software developed years later.
• Rise in popularity
After a slow start, blogging rapidly gained in popularity. Blog usage spread during
1999 and the years following, being further popularized by the near-simultaneous
arrival of the first hosted blog tools:
>launched Open Diary in October 1998, which soon grew to thousands of online
diaries. Open Diary innovated the reader comment, becoming the first blog
community where readers could add comments to other writers' blog entries.
>Brad Fitzpatrick starteBruce Ablesond LiveJournal in March 1999.
>Andrew Smales created Pitas.com in July 1999 as an easier alternative to
maintaining a "news page" on a Web site, followed by DiaryLand in September
1999, focusing more on a personal diary community.
>Blogger (blogspot.com) was launched in 1999
12
Information Technology
• Political impact
13
Information Technology
Similarly, blogs were among the driving forces behind the "Rathergate" scandal.
Television journalist Dan Rather presented documents on the CBS show 60
Minutes that conflicted with accepted accounts of President Bush's military service
record. Bloggers declared the documents to be forgeries and presented evidence
and arguments in support of that view. Consequently, CBS apologized for what it
said were inadequate reporting techniques (see: Little Green Footballs). The
impact of these stories gave greater credibility to blogs as a medium of news
dissemination.
In Russia, some political bloggers have started to challenge the dominance of
official, overwhelmingly pro-government media. Bloggers such as Rustem
Adagamov and Alexei Navalny have many followers, and the latter's nickname for
the ruling United Russia party as the "party of crooks and thieves" has been
adopted by anti-regime protesters. This led to The Wall Street Journal calling
Navalny "the man Vladimir Putin fears most" in March 2012.
• Mainstream popularity
By 2004, the role of blogs became increasingly mainstream, as political
consultants, news services, and candidates began using them as tools for outreach
and opinion forming. Blogging was established by politicians and political
candidates to express opinions on war and other issues and cemented blogs' role as
a news source. (See Howard Dean and Wesley Clark.) Even politicians not
actively campaigning, such as the UK's Labour Party's Member of Parliament
(MP) Tom Watson, began to blog to bond with constituents. In January 2005,
Fortune magazine listed eight bloggers whom business people "could not ignore":
Peter Rojas, Xeni Jardin, Ben Trott, Mena Trott, Jonathan Schwartz, Jason
Goldman, Robert Scoble, and Jason Calacanis.
Israel was among the first national governments to set up an official blog. Under
David Saranga, the Israeli Ministry of Foreign Affairs became active in adopting
Web 2.0 initiatives, including an official video blog and a political blog. The
Foreign Ministry also held a microblogging press conference via Twitter about its
war with Hamas, with Saranga answering questions from the public in common
14
Information Technology
15
Information Technology
>>Types of blogs
There are many different types of blogs, differing not only in the type of content,
but also in the way that content is delivered or written.
I) Personal blogs
The personal blog is an ongoing online diary or commentary written by an
individual, rather than a corporation or organization. While the vast majority of
personal blogs attract very few readers, other than the blogger's immediate family
and friends, a small number of personal blogs have become popular, to the point
that they have attracted lucrative advertising sponsorship. A tiny number of
personal bloggers have become famous, both in the online community and in the
real world.
III) Microblogging
Microblogging is the practice of posting small pieces of digital content—which
could be text, pictures, links, short videos, or other media—on the internet.
Microblogging offers a portable communication mode that feels organic and
spontaneous to many users. It has captured the public imagination, in part because
the short posts are easy to read on the go or when waiting. Friends use it to keep in
touch, business associates use it to coordinate meetings or share useful resources,
and celebrities and politicians (or their publicists) microblog about concert dates,
lectures, book releases, or tour schedules. The resulting profusion of functionality
is helping to define new possibilities for this type of communication. Examples of
these include Twitter, Facebook, Tumble and, by far the largest, Weirdo.
17
Information Technology
V) Aggregated blogs
Individuals or organization may aggregate selected feeds on a specific topic,
product or service and provide a combined view for its readers. This allows
readers to concentrate on reading instead of searching for quality on-topic content
and managing subscriptions. Many such aggregations called planets from name of
Planet (software) that perform such aggregation, hosting sites usually have planet.
By genre
Some blogs focus on a particular subject, such as political blogs, journalism
blogs, health blogs, travel blogs, gardening blogs, house blogs, Book Blogs,
fashion blogs, beauty blogs, lifestyle blogs, party blogs, wedding blogs,
photography blogs, project blogs, psychology blogs, sociology blogs,
education blogs, niche blogs, classical music blogs, quizzing blogs, legal
blogs, or dream logs. How-to/Tutorial blogs are becoming increasing popular.
Two common types of genre blogs are art blogs and music blogs. A blog
featuring discussions, especially about home and family is not uncommonly
called a mom blog.
By media type
19
Information Technology
An artist's depiction of the interconnections between blogs and blog authors in the
"blogosphere" in 2007
Blogosphere
The collective community of all blogs and blog authors, particularly notable
and widely read blogs, is known as the blogosphere. Since all blogs are on the
internet by definition, they may be seen as interconnected and socially
networked, through blogrolls, comments, linkbacks (refbacks, trackbacks or
pingbacks), and backlinks. Discussions "in the blogosphere" were
occasionally used by the media as a gauge of public opinion on various issues.
Because new, untapped communities of bloggers and their readers can emerge
in the space of a few years, Internet marketers pay close attention to "trends in
the blogosphere".
Early popularity
➢ Before 2006: The blogdex project was launched by researchers in the MIT
Media Lab to crawl the Web and gather data from thousands of blogs to
investigate their social properties. Information was gathered by the tool for over
four years, during which it autonomously tracked the most contagious information
spreading in the blog community, ranking it by recency and popularity. It can,
therefore, be considered the first instantiation of a memetracker.
➢ 2006: Blogs are given rankings by Alexa Internet (web hits of Alexa Toolbar
users), and formerly by blog search engine Technorati based on the number of
incoming links (Technorati stopped doing this in 2014). In August 2006,
Technorati found that the most linked-to blog on the internet was that of Chinese
actress Xu Jinglei. Chinese media Xinhua reported that this blog received more
than 50 million page views, claiming it to be the most popular blog in the world at
the time.[better source needed] Technorati rated Boing Boing to be the most-read
group-written blog.
21
Information Technology
➢ 2008: As of 2008, blogging had "become such a mania that a new blog was
created every second of every minute of every hour of every day" .Researchers
have actively analyzed the dynamics of how blogs become popular. There are
essentially two measures of this: popularity through citations, as well as popularity
through affiliation (i.e., blogroll). The basic conclusion from studies of the
structure of blogs is that while it takes time for a blog to become popular through
blogrolls, permalinks can boost popularity more quickly and are perhaps more
indicative of popularity and authority than blogrolls since they denote that people
are reading the blog's content and deem it valuable or noteworthy in specific cases.
22
Information Technology
Consumer-generated advertising
Consumer-generated advertising is a relatively new and controversial
development, and it has created a new model of marketing communication from
businesses to consumers. Among the various forms of advertising on blog, the
most controversial are the sponsored posts. These are blog entries or posts and
may be in the form of feedback, reviews, opinion, videos, etc. and usually contain
a link back to the desired site using a keyword or several keywords. Blogs have
led to some disintermediation and a breakdown of the traditional advertising
model, where companies can skip over the advertising agencies (previously the
only interface with the customer) and contact the customers directly via social
media websites. On the other hand, new companies specialised in blog advertising
have been established to take advantage of this new development as well.
However, there are many people who look negatively on this new development.
Some believe that any form of commercial activity on blogs will destroy the
blogosphere's credibility.
Defamation or liability
Several cases have been brought before the national courts against bloggers
concerning issues of defamation or liability. U.S. payouts related to blogging
totalled $17.4 million by 2009; in some cases these have been covered by
umbrella insurance. The courts have returned with mixed verdicts. Internet Service
Providers (ISPs), in general, are immune from liability for information that
originates with third part. In a bizarre twist, the Cahills were able to obtain the
identity of John Doe, who turned out to be the person they suspected: the town's
mayor, Councilman Cahill's political rival. The Cahills amended their original
complaint, and the mayor settled the case rather than going to trial.
23
Information Technology
In January 2007, two prominent Malaysian political bloggers, Jeff Ooi and
Ahirudin Attan, were sued by a pro-government newspaper, The New Straits
Times Press (Malaysia) Berhad, Kalimullah bin Masheerul Hassan, Hishamuddin
bin Aun and Brenden John a/l John Pereira over alleged defamation. The plaintiff
was supported by the Malaysian government. Following the suit, the Malaysian
government proposed to "register" all bloggers in Malaysia to better control
parties against their interests. This is the first such legal case against bloggers in
the country. In the United States, blogger Aaron Wall was sued by Traffic Power
for defamation and publication of trade secrets in 2005. According to Wired
magazine, Traffic Power had been "banned from Google for allegedly rigging
search engine results." Wall and other "white hat" search engine optimization
consultants had exposed Traffic Power in what they claim was an effort to protect
the public. The case was dismissed for lack of personal jurisdiction, and Traffic
Power failed to appeal within the allowed time.
In 2009, NDTV issued a legal notice to Indian blogger Kunte for a blog post
criticizing their coverage of the Mumbai attacks. The blogger unconditionally
withdrew his post, which resulted in several Indian bloggers criticizing NDTV for
trying to silence critics.
• Employment
Employees who blog about elements of their place of employment can begin to
affect the reputation of their employer, either in a positive way, if the employee is
praising the employer and its workplaces, or in a negative way, if the blogger is
making negative comments about the company or its practices.
In general, attempts by employee bloggers to protect themselves by maintaining
anonymity have proved ineffective. In 2009, a controversial and landmark
decision by The Hon. Mr Justice Eady refused to grant an order to protect the
anonymity of Richard Horton. Horton was a police officer in the United Kingdom
who blogged about his job under the name "NightJack".
Delta Air Lines fired flight attendant Ellen Simonetti because she posted
photographs of herself in uniform on an aeroplane and because of comments
24
Information Technology
posted on her blog "Queen of Sky: Diary of a Flight Attendant" which the
employer deemed inappropriate. This case highlighted the issue of personal
blogging and freedom of expression versus employer rights and responsibilities,
and so it received wide media attention. Simonetti took legal action against the
airline for "wrongful termination, defamation of character and lost future wages".
The suit was postponed while Delta was in bankruptcy proceedings.
In early 2006, Erik Ringmar, a senior lecturer at the London School of Economics,
was ordered by the convenor of his department to "take down and destroy" his
blog in which he discussed the quality of education at the school.
Mark Jen was terminated in 2005 after 10 days of employment as an assistant
product manager at Google for discussing corporate secrets on his personal blog,
then called 99zeros and hosted on the Google-owned Blogger service. He blogged
about unreleased products and company finances a week before the company's
earnings announcement. He was fired two days after he complied with his
employer's request to remove the sensitive material from his blog.
In India, blogger Gaurav Sabnis resigned from IBM after his posts questioned the
claims made by a management school. Jessica Cutler, aka "The Washingtonienne",
blogged about her sex life while employed as a congressional assistant. After the
blog was discovered and she was fired, she wrote a novel based on her experiences
and blog: The Washingtonienne: A Novel. As of 2006, Cutler is being sued by one
of her former lovers in a case that could establish the extent to which bloggers are
obligated to protect the privacy of their real life associates.
Catherine Sanderson, a.k.a. Petite Anglaise, lost her job in Paris at a British
accountancy firm because of blogging. Although given in the blog in a fairly
anonymous manner, some of the descriptions of the firm and some of its people
were less than flattering. Sanderson later won a compensation claim case against
the British firm, however.
On the other hand, Penelope Trunk wrote an upbeat article in The Boston Globe in
2006, entitled "Blogs 'essential' to a good career". She was one of the first
journalists to point out that a large portion of bloggers are professionals and that a
well-written blog can help attract employers.
25
Information Technology
• Business owners
Business owners who blog about their business can also run into legal
consequences. Mark Cuban, owner of the Dallas Mavericks, was fined during the
2006 NBA playoffs for criticizing NBA officials on the court and in his blog.
• Political dangers
Blogging can sometimes have unforeseen consequences in politically sensitive
areas. In some countries, Internet police or secret police may monitor blogs and
arrest blog authors or commentators. Blogs can be much harder to control than
broadcast or print media because a person can create a blog whose authorship is
hard to trace by using anonymity technology such as Tor. As a result, totalitarian
and authoritarian regimes often seek to suppress blogs and punish those who
maintain them.
In Singapore, two ethnic Chinese individuals were imprisoned under the country's
anti-sedition law for posting anti-Muslim remarks in their blogs. It is the first time
in the history of Egypt that a blogger was prosecuted. After a brief trial session
that took place in Alexandria, the blogger was found guilty and sentenced to
prison terms of three years for insulting Islam and inciting sedition and one year
for insulting Mubarak .
• Personal safety
One consequence of blogging is the possibility of online or in-person attacks or
threats against the blogger, sometimes without apparent reason. In some cases,
bloggers have faced cyberbullying. Kathy Sierra, author of the blog "Creating
Passionate Users",was the target of threats and misogynistic insults to the point
that she cancelled her keynote speech at a technology conference in San Diego,
fearing for her safety. While a blogger's anonymity is often tenuous, Internet trolls
who would attack a blogger with threats or insults can be emboldened by the
anonymity of the online environment, where some users are known only by a
pseudonymous "username" (e.g., "Hacker1984").
26
Information Technology
Search engine
For a search provider, its engine is part of a distributed computing system that can
encompass many data centers throughout the world. The speed A search engine is
a software system that provides hyperlinks to web pages and other relevant
information on the Web in response to a user's query. The user inputs a query
within a web browser or a mobile app, and the search results are often a list of
hyperlinks, accompanied by textual summaries and images. Users also have the
option of limiting the search to a specific type of results, such as images, videos,
or news and accuracy of an engine's response to a query is based on a complex
system of indexing that is continuously updated by automated web crawlers. This
can include data mining the files and databases stored on web servers, but some
content is not accessible to crawlers.
There have been many search engines since the dawn of the Web in the 1990s, but
Google Search became the dominant one in the 2000s and has remained so. It
currently has a 90% global market share. Other search engines with a smaller
market share include Bing at 4%, Yandex at 2%, and Yahoo at 1%. Other search
engines not listed have less than a 3% market shareThe business of websites
improving their visibility in search results, known as marketing and optimization,
has thus largely focused on Google.
>History
Timeline (full list)
Year Engine Current status
W3Catalog Inactive
ALIWEB Inactive
1993
JumpStation Inactive
WWW Worm Inactive
1994 WebCrawler Active
Go.com Inactive, redirects to Disney
27
Information Technology
28
Information Technology
29
Information Technology
>Pre-1990s
In 1945, Vannevar Bush described an information retrieval system that would
allow a user to access a great expanse of information, all at a single desk. He
called it a memex. He described the system in an article titled "As We May Think"
that was published in The Atlantic Monthly.The memex was intended to give a
user the capability to overcome the ever-increasing difficulty of locating
information in ever-growing centralized indices of scientific work. Vannevar Bush
envisioned libraries of research with connected annotations, which are similar to
modern hyperlinks.
Link analysis eventually became a crucial component of search engines through
algorithms such as Hyper Search and PageRank.
30
Information Technology
The first tool used for searching content (as opposed to users) on the Internet was
Archie. The name stands for "archive" without the "v". It was created by Alan
Emtage, computer science student at McGill University in Montreal, Quebec,
Canada. The program downloaded the directory listings of all the files located on
public anonymous FTP (File Transfer Protocol) sites, creating a searchable
database of file names; however, Archie Search Engine did not index the contents
of these sites since the amount of data was so limited it could be readily searched
manually.
The rise of Gopher (created in 1991 by Mark McCahill at the University of
Minnesota) led to two new search programs, Veronica and Jughead. Like Archie,
they searched the file names and titles stored in Gopher index systems. Veronica
(Very Easy Rodent-Oriented Net-wide Index to Computerized Archives) provided
a keyword search of most Gopher menu titles in the entire Gopher listings.
Jughead (Jonzy's Universal Gopher Hierarchy Excavation And Display) was a tool
for obtaining menu information from specific Gopher servers. While the name of
the search engine "Archie Search Engine" was not a reference to the Archie comic
book series, "Veronica" and "Jughead" are characters in the series, thus
referencing their predecessor.
In the summer of 1993, no search engine existed for the web, though numerous
specialized catalogs were maintained by hand. Oscar Nierstrasz at the University
of Geneva wrote a series of Perl scripts that periodically mirrored these pages and
rewrote them into a standard format. This formed the basis for W3Catalog, the
web's first primitive search engine, released on September 2, 1993.
In June 1993, Matthew Gray, then at MIT, produced what was probably the first
web robot, the Perl-based World Wide Web Wanderer, and used it to generate an
index called "Wandex". The purpose of the Wanderer was to measure the size of
the World Wide Web, which it did until late 1995. The web's second search engine
Aliweb appeared in November 1993. Aliweb did not use a web robot, but instead
depended on being notified by website administrators of the existence at each site
of an index file in a particular format.
31
Information Technology
32
Information Technology
In 1996, Netscape was looking to give a single search engine an exclusive deal as
the featured search engine on Netscape's web browser. There was so much interest
that instead, Netscape struck deals with five of the major search engines: for $5
million a year, each search engine would be in rotation on the Netscape search
engine page. The five engines were Yahoo!, Magellan, Lycos, Infoseek, and
Excite.
Google adopted the idea of selling search terms in 1998 from a small search
engine company named goto.com. This move had a significant effect on the search
engine business, which went from struggling to one of the most profitable
businesses in the Internet.[citation needed]
Search engines were also known as some of the brightest stars in the Internet
investing frenzy that occurred in the late 1990s. Several companies entered the
market spectacularly, receiving record gains during their initial public offerings.
Some have taken down their public search engine and are marketing enterprise-
only editions, such as Northern Light. Many search engine companies were caught
up in the dot-com bubble, a speculation-driven market boom that peaked in March
2000.
33
Information Technology
AltaVista) in 2003. Yahoo! switched to Google's search engine until 2004, when it
launched its own search engine based on the combined technologies of its
acquisitions.
Microsoft first launched MSN Search in the fall of 1998 using search results from
Inktomi. In early 1999, the site began to display listings from Looksmart, blended
with results from Inktomi. For a short time in 1999, MSN Search used results from
AltaVista instead. In 2004, Microsoft began a transition to its own search
technology, powered by its own web crawler (called msnbot).
Microsoft's rebranded search engineBing, was launched on June 1, 2009. On July
29, 2009, Yahoo! and Microsoft finalized a deal in which Yahoo! Search would be
powered by Microsoft Bing technology.
34
Information Technology
35
Information Technology
• Posture: Keep your back and neck straight, feet flat on the ground, and wrists
neutral.
• Elbows: Elbows should be at a 90–110° angle. If your elbows are closed, the
keyboard may be too close. If your arms are straight out, you may be too far away.
• Monitor: Position your monitor so the top is at eye level.
• Keyboard: Position your keyboard directly in front of you and aligned with your
monitor.
• Wrist: Keep your hands over the keyboard in a neutral position. You can also
stretch your fingers, hands, and forearms before and after typing.
• Chair and desk: Adjust your chair and desk height so that your keyboard is at the
right height.
• Accessories: Use ergonomic typing accessories.
Poor typing posture can lead to chronic pain, headaches, and overuse injuries like
carpal tunnel syndrome.
36
Information Technology
37
Information Technology
Chart
A chart is a graphical representation of data. Visualizing data through charts helps
to uncover patterns, trends, relationships, and structure in data.
38
Information Technology
Types of chart
1.Area chart
Area charts can be used to plot change over time and draw attention to
the total value across a trend. By showing the sum of the plotted
values, an area chart also shows the relationship of parts to a whole
39
Information Technology
2. Column chart
A column chart is a data visualization where each category is represented by a
rectangle, with the height of the rectangle being proportional to the values being
plotted. Column charts are also known as vertical bar charts.
40
Information Technology
3. Bar chart
A bar chart is a graphical representation used to display and compare discrete
categories of data through rectangular bars, where the length or height of each bar
is proportional to the frequency or value of the corresponding category.
41
Information Technology
4. Pie chart
A pie chart is a type of graph that represents the data in the circular graph. The
slices of pie show the relative size of the data, and it is a type of pictorial
representation of data. A pie chart requires a list of categorical variables and
numerical variables.
42
Information Technology
5. Dounut chart
A donut chart is a type of pie chart that features a hole in the center, similar to a
donut. Donut charts present categories in the form of arcs instead of slices.
43
Information Technology
6. XY(scatter) Chart
A XY (scatter) chart, commonly referred to as a scatter plot, is a graphical
representation used to explain the relationship between two continuous variables
within a dataset
44
Information Technology
7. Net chart
A net chart is a graphical representation of a network topology, which shows a set
of items connected by lines based on peer relationships.
45
Information Technology
What is computer?
A computer is an electronic device that can store and process data, and produce
information based on a set of instructions:
46
Information Technology
characteristics of a computer
Strengths of computer
* Ability to learn and adapt through artificial intelligence and machine learning
* High-speed processing and data transmission
* Ability to perform multiple tasks simultaneously
* Ability to interact with humans through user interfaces and voice assistants
weakness of computer
* zero IQ
* lack of decision making
* computer can not decide their own
47
Information Technology
ICT
Information and communications technology (ICT) is an extensional term for
information technology that stresses the role of unified communications and the
integration of telecommunications (telephone lines and wireless signals) and
computers, as well as necessary enterprise software, middleware, storage.
IMPACT OF ICT
48
Information Technology
ICT tools
Information and Communication Technology (ICT) tools are hardware and
software resources that allow users to store, manage, and communicate
information. Some examples of ICT tools include:
Computers: Laptops, desktops, and other computers
Software: Google Meet, Google Spreadsheets, Microsoft Office PowerPoint
Devices: Tablets, smartphones, and other devices
Projectors: Overhead projectors and other projectors that can display images on a
screen
Social media: WhatsApp, Instagram, YouTube, and Twitter
Online tools: Google Classroom, which allows teachers to set assignments, collect
student work, and grade papers
Other tools: Video conferencing, email, blogs, and the internet
49
Information Technology
Role of ICT
Information and Communication Technology (ICT) is important for businesses,
society, and education:
Business
ICT can help businesses improve their efficiency, competitiveness, and customer
service. ICT tools like cloud computing, data analytics, and telecommunication
systems can help businesses streamline processes, reduce costs, and improve
productivity. ICT can also help businesses adapt to changing market dynamics and
consumer preferences
Society
ICT has led to broad shifts in society, with more people moving from face-to-face
interactions to digital interactions. This new era is often called the digital age.
Education
ICT tools like multimedia presentations, videos, and online educational resources
can help students learn in more engaging ways. ICT can also help students access
educational resources from anywhere in the world, and learn at their own pace.
50
Information Technology
Importance of ICT
51
Information Technology
52