Copy of ICT Reviewer
Copy of ICT Reviewer
J.A.S.
2. INTERCONNECTIVITY understood than wide-area networks, for
a. Every single device can be connected to example, that describe the Internet.
every other device on the network,
making the network mesh.
b. All devices can be connected to a single
medium but are geographically
disconnected, creating a bus-like
structure.
c. Each device is connected to its left and 2. LOCAL AREA NETWORK (LAN) - a group
right peers only, creating a linear of computer and peripheral devices which are
structure. connected in a limited area such as school,
3. ADMINISTRATION - From an administrator's laboratory, home, and office building. The
perspective, a network can be a private network simplest type of LAN network is to connect
that belongs to a single autonomous system. It computers and a printer to someone's home or
cannot be accessed outside its physical or logical office.
domain. A network can be public, which is
accessed by all. 3. METROPOLITAN AREA NETWORK
4. NETWORK ARCHITECTURE (MAN) - consisting of a computer network
a. CLIENT SERVER - There can be one across an entire city, college campus, or a
or more systems acting as servers. small region. This network type is larger than a
Another client requests the server to LAN, mainly limited to a single building or site.
serve requests. The server takes and
processes the request on behalf of 4. WIDE AREA NETWORK (WAN) - another
clients. vital computer network that is spread across a
b. PEER – TO – PEER - Two systems large geographical area. The WAN system
can be connected Point-to-Point, or in a could connect a LAN that connects with other
back-to-back fashion. They both reside LAN's using telephone lines and radio waves. It
at the same level and are called peers. is mainly limited to an enterprise or an
c. HYBRID - There can be a hybrid organization.
network that involves network
architecture of both the above types. OTHER TYPES OF NETWORKS
1. WIRELESS LOCAL AREA NETWORK
HOW DOES A COMPUTER NETWORK WORK? (WLAN) - allows users to move around the
Switches connect and help to internally coverage area, usually a home or small office,
secure computers, printers, servers, and while maintaining a network connection.
other devices to networks in homes or 2. STORAGE AREA NETWORK (SAN) - that
organizations. allows consolidated, block-level data storage.
o Access points are switches that 3. SYSTEM AREA NETWORK - offers high-
speed connection in server-to-server and
connect devices to networks without
processor-to-processor applications.
the use of cables.
4. HOME AREA NETWORK - always built
Routers connect networks to other networks
using two or more interconnected computers to
and act as dispatchers. They analyze data
form a local area network (LAN) within the
to be sent across a network, choose the best
home.
routes for it, and send it on its way. Routers
5. PA SSIVE OPTICAL LAN (POLAN) - a
connect your home and business to the
networking technology that helps you to
world and help protect information from
integrate into structured cabling.
outside security threats.
6. ENTERPRISE PRIVATE NETWORK (EPN)
While switches and routers differ in several ways, one key
- a computer network that helps enterprise
difference is how they identify end devices.
companies with several disparate offices connect
A Layer 2 switch uniquely identifies a
those offices to each in a secure way over a
device by its “burned-in” MAC address.
network.
A Layer 3 router uniquely identifies a
7. CAMPUS AREA NETWORK - that links the
device's network connection with a
buildings and consists of two or more local area
network-assigned IP address.
networks (LANs) within the limited geographical
A MAC address pertains to a device's manufacturer's
area.
number assigned to a network interface card (NIC).
8. VIRTUAL AREA NETWORK - VPN is a
An IP address refers to a number assigned to a network
private network that uses a public network to
connection.
connect remote sites or users.
TYPES OF NETWORKS
1. PERSONAL AREA NETWORK (PAN) -
network concerned with exchanging information THE INTERNET
in a person's vicinity. PANs are for personal The Internet is defined as a global wide area network
use, so the benefits might be more easily (WAN) that connects billions of computers and other
J.A.S.
electronic devices via servers and routers. With the 3 and other devices in a single local network.
Internet, everyone can access information, communicate An influential paper was written to describe
with anyone, and do other related stuff. It is often used 197 how the computers linked on a network could
interchangeably with the term world wide Web (or 4 send messages thru packet switching using
simply WWW); however, they're not the same. TCP.
Introduced the improved TCP that laid the
INTERNET 197
foundation of the basis of the modern
denotes the global communication system that involves 8
Internet.
the hardware and infrastructure. INTERNET GIVES BIRTH TO THE WEB
VS. Official adoption of TCP/IP as the standard
WWW (WORLD WIDE WEB) 198
way which Internet computers will
pertains to one of the services that are communicated 3
communicate.
over the Internet. 198
2 The development of a Domain Name System
PRECURSOR 198 (DNS)
The transmission of first telegraph message. 4
Samuel Finley Breese Morse, an American 198 NSFnet is created that allows the universities to
painter, and inventor, transmits the first electric 6 be linked in ARPAnet's growing infrastructure.
184
telegraph message, eventually making it 198 Internet Relay Chat was invented, allowing
4
possible for people to send messages around 8 users to create virtual "rooms".
the world in minutes. He developed the Morse A grocery store, named Peapod that
Code. introduced online grocery shopping and e-
The invention of the telephone (by Alexander commerce.
Graham Bell) and the refinement of the 198 The same year, Tim Berners-Lee invents the
phonograph. 9 World Wide Web at CERN, the European
187
The patent for the invented telephone was particle physics laboratory in Switzerland. It
6
given to Bell on March 7, owes a considerable debt to the earlier work of
1876. In 1877, he created the Bell Telephone Ted Nelson and Vannevar Bush.
Company (presently known as the AT&T.) WEB TAKES OFF
George Stibitz accesses a computer in New Mosaic, the first user-friendly web-browser,
194 York using a teletype (remote 199
was introduced. Also, World Wide Web Worm,
0 terminal) in New Hampshire, connected over a 3
one of the first search engines, was developed.
telephone line.
Brian Pinkerton writes WebCrawler, a more
Vannevar Bush, a US government sophisticated search engine, and Jerry Yang
194 scientist, published the paper "As We May 199
and David Filo launch Yahoo!, a directory of
5 Think", which anticipates the development 4
websites organized in an easy-to-use, tree-like
of the World Wide Web by half a century. hierarchy.
195 AT&T and Bell commercially sold the E-commerce properly begins when Jeff Bezos
8 developed modern modems. 199
founds Amazon.com, and Pierre Omidyar sets
5
up eBay.
PREPARING FOR A GLOBAL NETWORK 199 ICQ was considered the first user-friendly
J.C.R. Licklider envisages a network that 6 instant messaging on the Internet.
196
can link people and user-friendly computers 199
3 Published the first blog (weblog).
together. 7
Introduced the concept of communication 199 The Backrub search engine was developed,
195 between computers thru sending "message 8 which was later renamed Google.
8 blocks," which gave a similar idea and coined
The idea of the Internet of Things (IoT)
the term "packet switching." 199
emerged, citing that computers and everyday
Ted Nelson invents hypertext, a way of 9
objects could be part of the Internet.
196 linking together separate documents that
INTERNET AND WEB FOR ALL
5 eventually becomes a key part of the World
200 Virtually every country in the world is now
Wide Web.
3 connected to the Internet.
The start of development of a national
196 Harvard student Mark Zuckerberg
computer network, inspired by the work of
6 200 revolutionizes social networking with
Licklider.
4 Facebook, an easy-to-use website that connects
196 The launching of ARPANET computer
people with their friends.
9 network.
Jack Dorsey and Evan Williams found
Twitter, an even simpler "microblogging"
APPEARANCE OF THE MODERN INTERNET 201
site where people share their thoughts and
Sent the first email introducing the "@" as 6
197 observations in off-the-cuff, 140-character
one way to separate a user's name from the status messages.
1
computer name where the mail is stored.
201 Russian President Vladimir Putin approves a
197 The invention of Ethernet, linking computers 7 plan to create a private alternative to the
J.A.S.
Internet to counter the (traditional) Internet's the help of the internet facility, and it cannot be
historical dominance by the United States. functional without the internet.
J.A.S.
GRAPHICS AND MULTIMEDIA e. File Extensions – there letters indicate
The concept of graphics lies under multimedia. to both your computing device how
each image is stored and what software
GRAPHICS will be necessary to open and display
Came from the Greek work “graphikos” the image file.
which means “written”. i. Joint Photographic Experts
Refers to any visual representation of data Group (JPEG)
and includes a variety of forms including: ii. JPG – one of the formats
o Drawings supported by the JPEG
o Photographs compression group.
o Line art iii. JPEG 2000 – a highly
o Graphs advanced compression
o Diagrams technique and a part of the
o Numbers JPEG group.
iv. Graphic Interchange Format
o Symbols
(GIF)
o Geometric designs
v. Portable Network Graphics
o Maps
(PNG)
o Engineering drawings vi. Bitmap Image File (BMP)
May also include text and they can be used vii. RAW – unprocessed photos
for decorative or functional purposes, viii. Tagged Image File Format
including educating, informing, illustrating, (TIFF)
or entertaining. ix. PSD and PSB – two native
Adobe Photoshop formats.
COMPUTER GRAPHICS x. Canon Raw Version 2 (CR2)
It is any image media crafted through computer hardware
and software. It is sometimes referred to as computer- 2. VECTOR GRAPHICS - vector graphics use
generated imagery or CGI. mathematical formulae to draw lines and
curves to create the image. It is also scalable,
FOUR ELEMENTS OF COMPUTER GRAPHICS: meaning, there is no limit for re-sizing the image
1. IMAGE - It is the visual representation of an for as long as the rule of mathematics was
object–drawn, painted, or photographed. identical and applied correctly.
2. MODELS - it is the 3D representation of any a. Anti-aliasing – a software-based
object but typically on a smaller scale, approach that aims to smoothens the
3. RENDERING - it is the process of generating jagged appearance of the image by
an image from a 2D or 3D model through blending the edge of the pixel with
computer programs. adjacent colors.
4. ANIMATION - it is a way of adding creative
illusive actions through successive images.
J.A.S.
MULTIMEDIA HYPERTEXT refers to any text or pictures that link to
Came from the Latin word “multus,” which other path or chains. It was coined by Ted Nelson.
means “many,” and a plural word of
medium, “media.” HYPERMEDIA is a non-linear multimedia presentation
An interactive way of presenting as it uses hypertext that allows the reader to move from
information using audio, video, and any one path to another.
animation in addition to traditional media
like text, graphs, and images. FORMS OF MULTIMEDIA:
1. ONLINE
EDGAR GALE’S “CONE OF LEARNING” These are the media types that need to communicate with
10% of what they read, distant resources or distant users. These can only be
20% of what they hear, utilized with the use of the internet. Examples are
30% of what they see, websites, applications and other mobile services that
50% of what they hear and see. need the internet to progress.
2. OFFLINE
BASIC ELEMENTS OF MULTIMEDIA: These media are known to be a self-contained product
1. TEXT - This refers to the characters used for where the users do not need the internet or any online
creating words. connection. This can stand and progress on its own and
2. GRAPHICS - Refers to any non-text does not communicate with anything outside its designed
information like images, drawings, or charts. environment. Examples are CD, DVD, Blu-ray,
3. ANIMATION - These are moving images. It multimedia kiosk.
was created through a series of graphics that 3. HYBRID
portray actions displayed in sequence to create This media has the elements of both on and offline
illusions of motion. products. Common examples are computer games.
4. VIDEO - This refers to moving pictographic
images accompanied by sounds.
5. AUDIO - This refers to any music or sound
effects.
2. NON-LINEAR PRESENTATION
Unlike the linear presentation, the non-linear
presentation offers interactivity to the
users where they can control the progress
of the presentation. That is why it is also
known as interactive multimedia. The
users have the ability to move around on
different paths through the information
presentation. This kind of interactivity is
common in video games or self-paced-
based training. One of its typical examples
is hypermedia.
J.A.S.
HUMAN COMPUTER INTERACTION (HCI) o Virtual reality is a technology that
Study of how people interact with computers and to attempts to regenerate computer
what extent computers are or are not developed for images and videos to produce real-life
successful interaction with human beings. visual experiences that are beyond
Computer science those achieved on the ordinary
Ergonomics & Human Factors computer monitor and phone.
Engineering
Design
Sociology & Social Psychology TYPES OF USER INTERFACE
Ethnography The point at which human users interact with a
Cognitive Science computer, website, or application.
Psychology 1. COMMAND LINE (CLI)
Information Security A Command Line Interface connects a user to a
Speech-language pathology computer program or operating system. Through the
CLI, users interact with a system or application by typing
TWO SIDES OF HCI in text (commands).
1. Academic Discipline
2. Design Discipline 2. GRAPHICAL (GUI)
A system of interactive visual components for computer
HCI is a broad field which overlaps with areas such as software.; Displays objects that convey information,
user-centered design (UCD), user interface (UI) design and represent actions that can be taken by the user.
and user experience (UX) design. In many ways, HCI The objects change color, size, or visibility when the user
was the forerunner to UX design. interacts with them. (Button, dialog box, icons, menu,
toolbar, window, tab, toolbar, etc.)
The user interacts directly with hardware for the
human input and output such as displays, e.g., 3. MULTIMEDIA (MUI)
through graphical user interface. Computer interfaces that communicate with users
The user interacts with the computer over this using multiple media.
software interface using the given input and
output (I/O) hardware. FUTURE INTERFACES
a. VIRTUAL REALITY
GOALS OF HCI o Creates the “illusion of participation
1. To produce usable and safe systems, as well as in a synthetic environment rather
functional systems. than external observation of such an
2. To let the developers understand the factors environment.” (Gigante, 1993)
that determine how people use technology. o Uses VR headsets and input devices
3. To develop tools and techniques to enable
(e.g., joysticks)
building suitable systems.
o Immersive experiences → interaction
with virtual objects, 360° views,
HCI’S CONCEPT
auditory and haptic feedback.
“As interaction designers, we need to remember
o First or third person viewpoints
that it is not about the interface, it‘s about
what people want to do. To come up with great
b. VOICE UI
designs, you need to know who those people are
o A person talks to an app or device
and what they are really trying to accomplish.” –
with spoken language.
Cordell Ratzlaff, Designing Interactions,
o Users inquire or issue commands.
2007.
o Sometimes proactive.
COMPUTING MACHINES o Problems:
1. EMBEDDED Mishearing / Voice recognition
o A combination of computer hardware Security
and software designed for a specific o Siri by Apple, Amazon Alexa device:
function. Embedded systems may also Echo Dot, Echo, Echo Plus
function within a larger system.
o May function as part of a complete c. GESTURE-BASED
device. o Using hands and arms to interact.
2. SPECIALIZED BOXES
o A hardware device–a specialized d. TOUCH-BASED
computer–may have the capabilities of o A type of interaction is executed by
a general-purpose computer but is doing a physical touch on the screen
designed to only do specific tasks. and the computer responds to this
e.g., gaming consoles. touch interaction.
3. VIRTUAL ENVIRONMENTS o ATM, camera, mobile phones, LCD
touch screens, etc.
J.A.S.
and cooperation. It is a self-funding agency of the United
Nations, with 193 member states.
J.A.S.
Expiry: If company’s copyright – lasts 120 years from
creation or 95 years from publication, whichever is
shorter.
J.A.S.
ARTIFICIAL INTELLIGENCE o REINFORCEMENT LEARNING -
The use of computer systems to simulate uses feedback data to improve the
human mental processes, such as interpreting performance of a model. (ex. games like
and generating language. Chess and Go)
First coined by John McCarthy in 1956 at the DEEP LEARNING
Dartmouth Conference application of machine learning that uses
o Defined it as “the science and complex algorithms and artificial neural
engineering of making intelligent networks (ANN – which structures and
machines.” functions like brain neurons) to train a model,
where data and patterns can be better perceived.
AUTOMATION o self-driving cars
setting up robots to follow a set of pre-defined rules. o speech recognition
VS. o pattern recognition
ARTIFICIAL INTELLIGENCE o computer programming
setting up robots to make their own decisions (though o image recognition
still based on human input). o contextual recommendations
o fact checking
COMPONENTS OF INTELLIGENCE:
PREDICTIVE ANALYSIS
1. Learning
a statistics-based method that data analysts
2. Reasoning
use to make assumptions and test records in
3. Problem-solving
order to predict the likelihood of a given
4. Perception
future outcome.
5. Language
o banking
o healthcare
STRUCTURE OF ARITIFICIAL INTELLIGENCE:
ARTIFICIAL INTELLIGENCE o human resources (HR)
1. MACHINE LEARNING o marketing and sales
a. Deep Learning o supply chain
b. Predictive Analysis NATURAL LANGUAGE PROCESSING
2. NATURAL LANGUAGE PROCESSING focuses on enabling machines to understand
(NLP) and interpret human language. NLP is used in
a. Translation applications such as chatbots, virtual assistants,
b. Classification and Clustering and language translation.
c. Information Extraction with NLP, PCs can decode, display, and generate
3. SPEECH human language and communicate.
a. Speech-to-Text AI IN SPEECH
b. Text-to-Speech uses AI for voice-based technologies: automatic
4. EXPERT SYSTEMS speech recognition (ASR), also known as
5. PLANNING, SCHEDULING, AND speech-to-text (STT), and text-to-speech (TTS).
OPTIMISATION o call center transcription
6. ROBOTICS o clinical note taking
7. VISION o virtual assistants
a. Image Recognition o media and marketing
b. Machine Vision EXPERT SYSTEMS
uses artificial intelligence (AI) technologies to
simulate the judgment and behavior of a
MACHING LEARNING human or an organization that has expertise
a subset of AI and experience in a particular field.
the science of programming machines to think relies on having a good knowledge base.
and act like humans without being explicitly Experts add information to the knowledge base,
programmed to and nonexperts use the system to solve complex
aims to enable computers to learn automatically problems that would usually require a human
without human intervention and adjust actions expert.
uses algorithms that can make predictions o CaDet (Cancer Decision Support
through pattern recognition Tool) is used to identify cancer in its
o SUPERVISED LEARNING - creating earliest stages.
models that can learn from marked o DENDRAL helps chemists identify
dataset to make predictions. (ex. spam unknown organic molecules.
filtering and face recognition) o DXplain is a clinical support system
o UNSUPERVISED LEARNING - that diagnoses various diseases.
given unlabeled dataset, the algorithm o MYCIN identifies bacteria such as
must find some way to learn without the bacteremia and meningitis and
guidance of humans (ex. fraud recommends antibiotics and dosages.
transactions)
J.A.S.
o PXDES determines the type and 2015 Tesla introduces auto drive features
severity of lung cancer a person has. Hanson Robotics introduced Sophia, the first
2016
o R1/XCON is an early manufacturing AI-based humanoid robot
expert system that automatically selects 2017 Sophia became a citizen of Saudi Arabia
and orders computer components based TURING TEST (1950)
on customer specifications. In a Turing test, the interrogator must determine
PLANNING, SCHEDULING, AND OPTIMISATION which respondent is a computer and which is a
uses planning to determine ‘what steps to take’ human.
(planning) and ‘when to carry out a certain Originally called the imitation game
step’ (scheduling) in order to achieve a goal. o a test of a machine's ability to exhibit
The common term given to an intelligent intelligent behavior equivalent to, or
system that implements planning is ‘agent’. indistinguishable from, that of a human.
The plan implemented by the agent enables it to “Can machines think?”
search through each and every possible action or JOHN MCCARTHY (1956)
route to reach the set goal. Known as the Father of Artificial Intelligence
ROBOTICS He wanted a new, neutral umbrella term that
a field of AI that involves designing, building, could collect and organize these disparate
and programming robots to perform tasks. research efforts into a single field focused on
Robots are used in various applications such as developing machines that could simulate every
manufacturing, healthcare, and space aspect of intelligence.
exploration. ELIZA (1965)
COMPUTER VISION considered to be the first chatterbot “chatbot”
enables computers and systems to derive natural language processing (NLP) program
meaningful information from digital images, created from 1964 - 1966 at the Massachusetts
videos, and other visual inputs — and take Institute of Technology (MIT) AI Laboratory
actions or make recommendations based on aimed at tricking it users by making them believe
that information. If AI enables computers to that they were having a conversation with a real
think, computer vision enables them to see, human being; it was designed to imitate a
observe and understand. therapist who would ask open-ended questions
o The Automotive Industry – and even respond with follow-ups.
Autonomous Vehicles SHAKEY (1969)
o Public Security – Facial Recognition the world’s first mobile intelligent robot with
o Retail – Customer Experience, cameras and touch sensors, controlled by a
Inventory Management large remote computer
o Medicine – Medical Imaging this early robot became an archetype from which
o Education – Attendance And subsequent robots were built and significantly
Engagement Monitoring influenced modern robotics and AI techniques
o Fitness And Sports – Tracking Systems was funded by the Defense Advanced Research
Projects Agency (DARPA)
o Precision Agriculture
STANFORD CART (1979)
o Gaming – Human Pose Estimation
was originally built to simulate a remote-
o Media & Entertainment – Interactive
controlled moon rover
Media, Smart glasses In 1979, the cart successfully crossed a chair-
o Manufacturing – Product Assembly, filled room without human intervention in about
Defect Detection five hours.
o Transportation – Violations Detection, DEEP BLUE
Traffic Flow Analysis chess-playing expert system run on a unique
purpose-built IBM supercomputer
development began in 1985 at Carnegie Mellon
HISTORY OF ARTIFICIAL INTELLIGENCE University
On May 11, 1997, it beat the world chess
YEAR EVENT champion, Garry Kasparov, after a six - game
1950 Alan Turing developed “Turing Test” match: two wins for IBM, one for the champion
John McCarthy coined the term “Artificial and three draws.
1956
Intelligence” ROOMBA (2002)
1965 Joseph Weizenbaum at MIT built ELIZA mobile robot for vacuuming floors
Stanford Research Institute developed SIRI (2011)
1969
Shakey, a robot spin-off from a project developed by the SRI
Standford Cart – First computer controlled International Artificial Intelligence Center
1979
autonomous vehicle used the voice of Susan Bennett in US, Jon
1997 Deep Blue Chess Program Briggs in UK, while Karen Jacobsen in
2002 iRobot launched Roomba, a vacuum cleaner Australia
2011 Apple introduced Personal Assistant Siri Siri means “beautiful woman who leads you to
2014 Amazon launched Alexa victory” in Norwegian and “secret” in Swahili.
J.A.S.
ALEXA (2014)
a virtual assistant technology
was first used in the Amazon Echo and Echo TYPES OF AI BASED ON FUNCTIONALITIES
Dot, Echo Studio and Amazon Tap speakers 1. REACTIVE MACHINE
capable of voice interaction, music playback, - AI systems that have no memory and are task
making to-do lists, setting alarms, streaming specific, meaning that an input always
podcasts, playing audiobooks, and providing delivers the same output.
weather, traffic, sports, and other real-time - example: IBM's Deep Blue
information, such as news 2. LIMITED MEMORY
can also control several smart devices using a - this algorithm imitates the way our brains’
home automation system. neurons work together, meaning that it gets
TESLA AUTOPILOT (2015) smarter as it receives more data to train on.
Tesla Version 7.0 software was released, - trains from past data to make decisions
enabling Autopilot as a feature for Model S - examples: self-driving cars and chatbots
drivers. 3. THEORY OF MIND
a combination of adaptive cruise control and - could have the potential to understand the
Autosteer, a lane centering function designed world and how other entities have thoughts
to keep Tesla vehicles within painted lane and emotions. In turn, this affects how they
lines. behave in relation to those around them.
Autopilot is not a self-driving system and that - example: Sophia
“the driver is still responsible for, and ultimately 4. SELF-AWARENESS
in control of, the car,” but it also reiterates that - AI would be to design systems that have a sense
Tesla vehicles are equipped with hardware “to of self, a conscious understanding of their
allow for the incremental introduction of self- existence
driving technology.” - only exists hypothetically
SOPHIA (2016)
the humanoid robot
has simulations of every major muscle in the EXAMPLES OF AI
human face, allowing her to generate expressions CHATBOTS
of joy, grief, curiosity, confusion, contemplation, - uses artificial intelligence to generate text or
sorrow, frustration, among other feelings. answer queries based on user input.
In 2017, Sophia was given Saudi Arabian o Chat-based Generative Pre-trained
citizenship, becoming the first robot to receive Transformer, ChatGPT (OpenAI)
citizenship of any country. o ChatSonic (Writesonic)
One month later, Sophia was named the United o Bing Chat (Microsoft)
Nations Development Program's first
o Jasper Chat (Jasper)
Innovation Champion.
o Replika (by Eugenia Kuyda)
o Socratic (Google)
SMART ASSISTANTS
TYPES OF AI BASED ON CAPABILITIES
- capable of carrying out many of the same
tasks as human assistants, such as reading
1. ARTIFICIAL NARROW INTELLIGENCE
text, taking dictation, making calls, etc.
(ANI)
o Siri (Apple)
- known as weak AI
o Cortana (Microsoft)
- designed and trained with a specific task in mind
o Alexa (Amazon)
and cannot perform beyond its limitations
- have a very limited or narrow range of o Google Assistant (Google)
competencies o Fireflies.ai (Fireflies)
2. ARTIFICIAL GENERAL INTELLIGENCE RETAIL AND E-COMMERCE
(AGI) - banks and financial institutions have used
- known as strong AI data to give their customers better, faster,
- can understand and learn any intellectual task more convenient, and more intelligent
that a human being can banking services
- allows a machine to apply knowledge and skills o Predicting Customer Credit Card
in different contexts Behavior
3. ARTIFICIAL SUPERINTELLIGENCE (ASI) o Banking Chatbots
- surpasses human intelligence and can o Fraud Detection
perform any task better than a human o Reducing False Debit and Credit Card
- include thinking, solving puzzles, making Declines
judgments, and decisions on its own o Personalized Services
SEARCH ENGINES
- employ powerful artificial intelligence
algorithms to decipher the meaning of search
J.A.S.
queries and provide the most accurate and o SnapChat (ML Models and AR
relevant results Technology)
o Bing and Edge (Microsoft) o Twitter (Big Data and AI)
o You.com (Bryan McCann and Richard
Socher)
o Perplexity AI (Aravind Srinivas)
o Neeva (Sridhar Ramaswamy) WHY IS AI IMPORTANT?
MEDIA STREAMING 1. It automates repetitive learning and discovery
- study people’s viewing history, preferences, through data.
and behaviors to provide tailor-made, 2. It adds intelligence to existing products.
enjoyable experiences 3. It adapts through progressive learning
o Netflix algorithms.
o Amazon Prime 4. It analyzes more and deeper data.
o Spotify 5. It achieves incredible accuracy .
o FireStick App 6. It gets the most out of data.
SMART CARS
- include industrial robots constructing a ETHICS AND BIAS
vehicle and autonomous cars navigating As AI becomes more prevalent in society, there are
traffic with machine learning and vision concerns about ethics and bias. There is a need to ensure
o Tesla (Austin, Texas) that AI systems are fair, transparent, and unbiased. This is
o Nauto (Palo Alto, California) particularly important in applications such as hiring,
o SapientX (San Cruz, California) criminal justice, and healthcare.
o Rethink Robotics (Bochum, Germany)
FUTURE OF AI
o Motional (Boston, Massachusetts)
AI is rapidly evolving, and its future is exciting. It has the
o Waymo (Mountain View, California)
potential to revolutionize various industries such as
NAVIGATION APPS
healthcare, transportation, and education. However, there
- has features such as route optimization, GPS
are also concerns about the impact of AI on jobs and
tracking, and real-time traffic alerts
society as a whole.
o Waze (Google)
o Google Maps (Google)
o CoPilot GPS (Trimble MAPS)
o Sygic GPS Navigation (Sygic
Enterprise)
o Apple Maps (Apple)
FACIAL RECOGNITION
- a biometric technology that identifies facial
vectors and features and matches them with a
pre-enrolled individual
o Access Control
o Security and Surveillance
o Health and Safety
o Time and Attendance
o eKYC and Fintech
o Smart Retail and Personalized
Customer Experience
o Law Enforcement
TEXT EDITORS
- make it simple and easy to autogenerate
content for your blog, website, or social media
profiles
o Jasper
o Writesonic
o Article Forge
o Grammarly
o Quillbot
SOCIAL MEDIA FEEDS
- automate many tedious tasks related to social
media management and can-do social media
monitoring at scale
o Facebook (DeepText and DeepFace)
o Twitter (IBM Watson)
J.A.S.
BIG DATA ANALYTICS
DATA is the new oil. 3. PREDICTIVE ANALYTICS
o It comprises predicting the
DATA occurrence of an event or the likely
Fingerprint of creation outcome of an event or forecasting
New Gold the future values using prediction
VS. models.
ANALYTICS o It is done using predictive models
Queen of Sciences which are trained by existing data.
Machinery that mines, molds, and mints. These models learn patterns and trends
from the existing data and predict the
DATA occurrence of an event or the likely
factual information (such as measurements or outcome of an event (classification
statistics) used as a basis for reasoning, models) or forecast numbers
discussion, or calculation. (regression models).
information in digital form that can be o What is likely to happen?
transmitted or processed. 4. PRESCRIPTIVE ANALYTICS
information output by a sensing device or organ o It multiple prediction models to
that includes both useful and irrelevant or predict various outcomes and the best
redundant information and must be processed to course of action for each outcome.
be meaningful. o It can predict the possible outcomes
based on the current choice of actions.
UNIT VALUE o It prescribes actions or the best option
1 byte 8 (binary digits) to follow from the available options.
1 kilobyte 1024 bytes o What can we do to make it happen?
1 megabyte 1024 kilobyte 5. COGNITIVE ANALYTICS
1 gigabyte 1024 megabyte o It combines a number of intelligent
1 terabyte 1024 gigabyte technologies like artificial
1 petabyte 1024 terabyte intelligence, machine-learning
1 exabyte 1024 petabyte algorithms, deep learning etc. to
1 zettabyte 1024 exabyte apply human brain-like intelligence
1 yottabyte 1024 zettabyte to perform certain tasks.
1 brontobyte 1024 yottabyte
J.A.S.
- By 2025, there will be 55.7 billion connected IoT APPLICATION
devices. These IoT devices alone will generate 1. Web
almost 80 ZB by 2025. 2. Financial
- By 2025, more than 150 zettabytes of big data 3. Healthcare
will need analysis. 4. Internet of Things (IoT)
5. Environment
NOTES 6. Logistics and Transportation
Specialized tools and frameworks are required 7. Industry
for big data analysis when: 8. Retail
o The volume of data involved is so large
that it is difficult to store, process, and DATA ANALYTICS WORKS
analyze data on a single machine, - Data Collection
o The velocity of data is very high, and - Data Processing
the data needs to be analyzed in real- - Data Cleaning / Data Wrangling
time, - Data Analysis
o There is a variety of data involved,
which can be structured, unstructured or BENEFITS OF BIG DATA ANALYTICS
semi-structured, and is collected from Improvement of decision making.
multiple data sources, More effective marketing.
o Various types of analytics need to be Improvement of customer service.
performed to extract value from the Increased efficiency of operations.
data, such as descriptive, diagnostic,
predictive, and prescriptive analytics. CHALLENGES
Data Quality
EXAMPLES Synchronization of Data Sources
Data generated by social networks including Organizational Resistance
text, images, audio, and video data Accessibility to Big Data
Click-stream data generated by web applications Maintaining quality data.
such as e-Commerce to analyze user behavior Keeping data security.
Machine sensor data collected from sensors Finding the right tools and platforms.
embedded in industrial and energy systems for Lack of talent
monitoring their health and detecting failures
Healthcare data collected in electronic health
record (EHR) systems ICT IN GOVERNANCE
Logs generated by web applications E-governance refers to the use of information and
Stock markets datac communication technologies (ICT) to deliver services
Transactional data generated by banking and to citizens that can transform relations with clients,
financial applications businesses, and other arms of Government.
TYPES Objectives:
1. Unstructured Promote digital government services for business
o Data that has no inherent structure and individuals
and is usually stored as different Promote effective operational management
types of files. (Ex. text documents, Government-wide policy on the use of ICT
PDFs, images, and videos) services
2. Quasi-structured
o Textual data with erratic formats that DEPARTMENT OF INFORMATION AND
can be formatted with effort and COMMUNICATIONS TECHNOLOGY
software tools. (Ex. clickstream data) (DICT) – DICT founded on June 9, 2016, shall
3. Semi-structured be the primary policy, planning, coordinating,
o Textual data files with an apparent implementing, and administrative entity of the
pattern, enabling analysis. (Ex. Executive Branch of the government that will
spreadsheets and XML files) plan, develop, and promote the national ICT
4. Structured development agenda. (RA 10844).
o Data having a defined data model,
format, structure. (Ex. database) Achievements and Highlights
Free Public Wi-Fi Project - provides free
CHARACTERISTICS OF BIG DATA internet connectivity to the public by integrating
1. Volume Wi-Fi hotspots all over the country, especially in
2. Velocity public places and facilities.
3. Variety
4. Veracity Programs and Activities
5. Value
J.A.S.
1.Tech4ED (Technology for Education, to gain o Improvements (video card technology
Employment, train Entrepreneurs towards and Internet bandwidth)
Economic Development) o Subscription
2. iGov – a massive undertaking that hopes to make o Opportunity (for creators)
all government ICT services connected and 3. ARTS
available through one single portal o Access
APPLICATION OF E-GOVERNMENT IN THE o Sharing
PHILIPPINES o Creation
o Improvements (computer-aided)
1. GOVERNMENT-TO-CITIZEN (G2C)
4. GAMES
o It relates to the administrative
o Access
services that the government offers its
o Peripheral Devices (increased
people through the creation of an
availability and improvement
electronic government system.
o Customizability
Government Portal (NGDC,
iGovPhil, GovMail)
E-election & Voting System HOW TECHNOLOGY IS USED IN
(use of VCMs) ENTERTAINMENT
UMID System (PhilSys and 1. CONTENT CREATION (create and edit digital
PhilID) content)
2. GOVERNMENT-TO-BUSINESS (G2B) 2. CONTENT DISTRIBUTION (publishing and
o It refers to administrative services promoting)
3. CONSUMPTION
that the government offers to
4. MARKETING AND PROMOTION
business groups and industries via the
(personalization and engagement)
e-Government system.
5. MONETIZATION (through subscription
WORKNET Employment &
models, online advertising, pay-per-view
Hiring System (PhilJobNet)
streaming, and microtransactions)
Procurement System
6. VIRTUAL REALITY AND AUGMENTED
(PhilGEPS)
REALITY (realistic graphics and interactive
Medical and Health
environments)
Information System (CHITS
7. ANALYTICS (collection, storage, and analysis
by DOST-PCHRD)
large amounts of data for optimization)
3. GOVERNMENT-TO-GOVERNMENT (G2G)
o It refers to the provision of
information and administrative
services by government agencies and ICT IN EDUCATION
their departments through the Information and Communication Technology (ICT) in
implementation of e-Government. education is the mode of education that uses
E-Document & Archiving information and communications technology to
System (GovCloud) support, enhance, and optimize information delivery.
GEA (Government Enterprise
Architecture) USING IN ICT EDUCATION INCREASES…
Government Performance 1. students’ interest in learning through varied
Monitoring System resources
2. interactivity by promoting participation
3. collaboration among students enhanced by
several platforms
ICT IN ENTERTAINMENT
4. creativity especially with digital tools
Over the past few years, the entertainment market has
5. communication through various channels more
experienced substantial growth particularly during the
spontaneously and less formally
pandemic, when streaming services and mobile games
6. personalization and up to date- contents in digital
grew in popularity. Due to the variety of entertainment
environments
genres and the ways in which entertainment simulates
the actual world, various forms of technology are
MOST USED TECHNOLOGIES IN THE
utilized in entertainment.
CLASSROOM
Blogs and Social Networks
HOW TECHNOLOGY TRANSFORMS THE
Planning Through Tools
ENTERTAINMENT LANDSCAPE
Cloud Storage
1. MUSIC
Digital Whiteboards and Interactive Tables
o Access (streaming, upload, and
download)
ADVANTAGES
o Opportunity (for independent
1. Cost-efficient
musicians)
2. Paperless: Eliminate the usage of paper. Eco-
2. TV AND MOVIES
friendly
o Access
J.A.S.
3. Better teaching and learning methods exposure to their online audience in exchange for
4. Enhanced data and information security a fee)
5. Easy student management 5. Government to Consumer (G2C): When a
6. Automatic solutions to manual paper-based government or public sector entity uses
processes and procedures ecommerce to sell goods or services to
7. Interactive and collaborative teaching and consumers (Parents pay for school lunch, sports
learning methods fees, and other miscellaneous fees)
8. Direct classroom teaching 6. Government to Business (G2B): This model
9. Spread awareness of the social impact of can often take the form of online bill payments,
technological change in education tax payments, or the payment for government
10. Independent learning platforms for students. services.
11. Improve the administration and enhance the
quality and efficiency of education EXAMPLES OF E-COMMERCE
12. Promote and improve the digital culture in Digital products
schools, colleges, and universities Services
Retail
DISADVANTAGES Wholesale
1. It is not accessible everywhere Drop shipping
2. ICT equipment (including its implementation) is Crowdfunding
expensive and requires trained staff to maintain it Subscription
correctly – even the teaching force must have Physical products
enough experience to handle ICT
3. The hardware can be unreliable, leading to ADVANTAGES
breakdowns 1. Ability to handle multiple purchases
4. Using ICT means children can become 2. Automation minimizes human error
dependent on computers 3. More affordable and effective marketing
5. The Internet can lead to children accessing 4. Lower costs of store maintenance
unsuitable sites 5. You can retarget the customers
6. Plagiarism has increased leading to students 6. Retail with no geographical or time limits
gaining unfair results on coursework 7. Personalize the shopping experience
7. The misuse of technology may be used to spread 8. Detailed product information
misleading and misguided information 9. E-commerce saves time for a customer
8. There may be risks of cyber-attacks and hacks
9. It can be a risk to the traditional book and DISADVANTAGES
handwriting methods. 1. Compulsory registration
10. Implementing computers and the Internet for 2. Complex taxation guidelines
ICT replaces conventional education 3. Some items are hard to purchase online
curriculums; managing online courses is 4. Waiting for a product to be delivered
difficult. 5. Uncertainty about the product quality
6. Technical difficulties
7. Security issues
E-COMMERCE 8. Higher cost of technology
It refers to the buying and selling of goods or services
using the Internet and the transfer of money and data
to execute these transactions. Ecommerce is often used SOCIAL NETWORKS
to refer to the sale of physical products online, but it can From Oxford Languages, it is defined as a network of
also describe any kind of commercial transaction social interactions and personal relationships. Also, it
facilitated through the Internet. may refer to a dedicated website or other application
which enables users to communicate with each other
TYPES OF E-COMMERCE MODELS by posting information, comments, messages, images,
1. Business to Consumer (B2C): When a business etc...
sells a good or service to an individual consumer
(You buy a pair of shoes from an online retailer). ATTRIBUTES OF SOCIAL NETWORKS
2. Business to Business (B2B): When a business allows the users or organizations to create
sells a good or service to another business (A profiles and connect, communicate, and share
business sells software-as-a-service for other information
businesses to use) focuses on user-generated content
3. Consumer to Consumer (C2C): When a forms lasting connections with other users–
consumer sells a good or service to another friending/following
consumer (You sell your old furniture on
marketplace to another consumer). SOCIAL NETWORKS
4. Consumer to Business (C2B): When a A social network focuses on the connections
consumer sells their own products or services to and relationships between individuals.
a business or organization (An influencer offers
J.A.S.
SOCIAL MEDIA 8. Pinterest
Social media is more focused on an individual 9. Reddit
sharing with a large audience. In this case, 10. Snapchat
media is used in the same sense as in mass
media.
DIGITAL CITIZENSHIP
PURPOSE OF SOCIAL NETWORKING Refers to the responsible use of technology by anyone
1. SHARING – connect remotely and share who uses computers, the Internet, and digital devices
information despite geographical dispersion. to engage with society on any level.
2. INTERACTING – break barriers of time and A digital citizen refers to a person who has the
distance with cloud-based interactions/ knowledge and skills to effectively use digital
communication. technologies to communicate with others,
3. LEARNING – receive news/ updates about participate in society and create and consume
recent happenings in your community and the digital content.
world
4. MARKETING – enhance brand awareness, 9 ELEMENTS OF DIGITAL CITIZENSHIP
improve customer retention, promote brand 1. Digital access
identity 2. Digital commerce
3. Digital communication
MOST COMMON TYPES OF SOCIAL 4. Digital etiquette
NETWORKING 5. Digital literacy
Social Connections – staying in touch with 6. Digital health & welfare
friends, family, and acquaintances (Ex. 7. Digital rights & responsibility
Facebook, Myspace, and Instagram) 8. Digital law
Professional Connections – designed for 9. Digital security & privacy
business relationships: used to make new
professional contacts, enhance existing business
connections, and explore job opportunities (Ex. CYBERSECURITY
LinkedIn, Microsoft Yammer, and Microsoft the protection of internet-connected systems
Viva.) such as hardware, software, and data from
Sharing of Multimedia – providing video and cyberthreats;
photography-sharing services (Ex. YouTube and the practice is used by individuals and
Flickr) enterprises to protect against unauthorized access
News or Information – allows users to post to data centers and other computerized systems.
news stories, informational or how-to contents
(Ex. Reddit, Stack Overflow, Digg) TYPES OF SYBERSECURITY CHALLENGES
Educational – offer remote learning, enabling 1. Evolving threats
students and teachers to interact / collaborate As new technologies emerge, new attack avenues are
(Ex. Google Classroom, LinkedIn Learning) developed.
Communication - allows users to communicate 2. Data deluge
with each other in one-on-one or group chats With more data being collected, the likelihood of a
(Ex. WhatsApp, WeChat, and Snapchat) cybercriminal who wants to steal personally identifiable
information (PII).
ADVANTAGES AND DISADVANTAGES OF 3. Cybersecurity awareness training
SOCIAL NETWORKING Regular security awareness training will help employees
Brand awareness do their part in keeping their company safe from
Instant reachability cyberthreats.
Build a following 4. Workforce shortage and skills gap
Business success As the amount of data collected and used by businesses
Increased website traffic grows, the need for cybersecurity staff to analyze, manage
and respond to incidents also increases.
Rumors and misinformation 5. Supply chain attacks and third-party risks
Negative reviews and comments Organizations must address third-party risk in the supply
Data security and privacy concerns chain and reduce software supply issues.
Time-consuming process