0% found this document useful (0 votes)
9 views19 pages

Copy of ICT Reviewer

The document provides an overview of computer algorithms, hardware, software, and computer networks, detailing their components and functions. It explains the significance of algorithms in problem-solving, the role of hardware and software in computer systems, and various types of networks including LAN, WAN, and the Internet. Additionally, it discusses the evolution of the Internet and its impact on communication and information sharing.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views19 pages

Copy of ICT Reviewer

The document provides an overview of computer algorithms, hardware, software, and computer networks, detailing their components and functions. It explains the significance of algorithms in problem-solving, the role of hardware and software in computer systems, and various types of networks including LAN, WAN, and the Internet. Additionally, it discusses the evolution of the Internet and its impact on communication and information sharing.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 19

ICT REVIEWER COMPUTER ALGORITHMS

 Comes from the name of a Persian author,


A COMPUTER is an electronic device that manipulates
Abu Ja'far Mohammed ibn Musa al
information or data. It has the capacity to store, retrieve
Khowarizmi (c. 825 A.O.), who wrote a
and process data. It contains both hardware and software
textbook on mathematics.
applications.
 Defines its meaning as “any special method
DIFFERENT COMPONENTS:
of solving a certain kind of problem.”
1. Hardware (Input and Output Devices)
 A tool for solving a well-specified
2. System Unit
computational problem.
 Can also be defined as the unambiguous
HARDWARE is described as any physical component
step-by-step instructions to solve a given
of a computer system that contains a circuit board,
problem on a formal note.
Integrated Circuits (ICs), or other electronics. Without
 TWO CRITERIAS FOR JUDGING:
any hardware, your computer would not function, and
o CORRECTNESS (Does the
software could not be used.
algorithm give a solution to the
 INPUT - a piece of hardware that sends
problem in a finite number of
data to a computer. Most input devices
steps?)
either interact with or control the computer
o EFFICIENCY (How many
in some way. (User to device)
o Ex.: Keyboard, mouse, monitor, resources (in terms of memory and
time) does it take to execute the
etc.
task?)
 OUTPUT - a piece of hardware that
receives data from a computer and then
translates that data into another form. That
form may be audio, visual, textual, or hard COMPUTER NETWORKS
copy such as a printed document. (Device to
user) Computer networks are the basis of communication in
o Ex.: Monitor, printer, projector, etc. IT. They are used in a wide variety of ways and can
include many different types of networks. A computer
SYSTEM UNIT (Also known as “tower” or “chassis”) network is a set of computers that are connected so
is the main part of a desktop computer. It includes the that they can share information.
motherboard, CPU, RAM, and other components. The  TWO POPULAR ARCHITECTURES:
system unit also includes the case that houses the internal o ISO Open Systems Interconnection
components of the computer. (OSI)
o IBM's Systems Network
SOFTWARE gives instructions and command to a Architecture (SNA)
computer. Software comprises the entire set of programs, Networks are used for:
procedures, and routines associated with the operation of  Communicating using email, video, instant
a computer system. messaging, and other methods.
 APPLICATION SOFTWARE - computer  Sharing devices such as printers, scanners,
software package that performs a specific and photocopiers.
function directly for an end user or, in  Sharing files.
some cases, for another application. This  Sharing software and operating programs on
software may be absent, but the computer remote systems.
can still work.  Allowing network users to access and
o Ex.: Word processors, database maintain information easily.
programs, web browsers,
development tools, image editors, CLASSIFICATIONS OF NETWORKS
communication platforms, etc. 1. GEOGRAPHICAL SPAN - Geographically, a
 SYSTEM SOFTWARE - computer network can be seen in one of the following
program that is designed to run a categories:
computer's hardware and application a. spanned across your table, among
programs. This software needs to be Bluetooth enabled devices, Ranging not
present in order for a computer to work. more than few meters.
o Ex.: The operating system is the b. spanned across a whole building,
best-known example of system including intermediate devices to
software. The OS manages all the connect all floors.
other programs on a computer. c. spanned across a whole city, multiple
cities, or provinces.
d. maybe one network covering the whole
world.

J.A.S.
2. INTERCONNECTIVITY understood than wide-area networks, for
a. Every single device can be connected to example, that describe the Internet.
every other device on the network,
making the network mesh.
b. All devices can be connected to a single
medium but are geographically
disconnected, creating a bus-like
structure.
c. Each device is connected to its left and 2. LOCAL AREA NETWORK (LAN) - a group
right peers only, creating a linear of computer and peripheral devices which are
structure. connected in a limited area such as school,
3. ADMINISTRATION - From an administrator's laboratory, home, and office building. The
perspective, a network can be a private network simplest type of LAN network is to connect
that belongs to a single autonomous system. It computers and a printer to someone's home or
cannot be accessed outside its physical or logical office.
domain. A network can be public, which is
accessed by all. 3. METROPOLITAN AREA NETWORK
4. NETWORK ARCHITECTURE (MAN) - consisting of a computer network
a. CLIENT SERVER - There can be one across an entire city, college campus, or a
or more systems acting as servers. small region. This network type is larger than a
Another client requests the server to LAN, mainly limited to a single building or site.
serve requests. The server takes and
processes the request on behalf of 4. WIDE AREA NETWORK (WAN) - another
clients. vital computer network that is spread across a
b. PEER – TO – PEER - Two systems large geographical area. The WAN system
can be connected Point-to-Point, or in a could connect a LAN that connects with other
back-to-back fashion. They both reside LAN's using telephone lines and radio waves. It
at the same level and are called peers. is mainly limited to an enterprise or an
c. HYBRID - There can be a hybrid organization.
network that involves network
architecture of both the above types. OTHER TYPES OF NETWORKS
1. WIRELESS LOCAL AREA NETWORK
HOW DOES A COMPUTER NETWORK WORK? (WLAN) - allows users to move around the
 Switches connect and help to internally coverage area, usually a home or small office,
secure computers, printers, servers, and while maintaining a network connection.
other devices to networks in homes or 2. STORAGE AREA NETWORK (SAN) - that
organizations. allows consolidated, block-level data storage.
o Access points are switches that 3. SYSTEM AREA NETWORK - offers high-
speed connection in server-to-server and
connect devices to networks without
processor-to-processor applications.
the use of cables.
4. HOME AREA NETWORK - always built
 Routers connect networks to other networks
using two or more interconnected computers to
and act as dispatchers. They analyze data
form a local area network (LAN) within the
to be sent across a network, choose the best
home.
routes for it, and send it on its way. Routers
5. PA SSIVE OPTICAL LAN (POLAN) - a
connect your home and business to the
networking technology that helps you to
world and help protect information from
integrate into structured cabling.
outside security threats.
6. ENTERPRISE PRIVATE NETWORK (EPN)
While switches and routers differ in several ways, one key
- a computer network that helps enterprise
difference is how they identify end devices.
companies with several disparate offices connect
 A Layer 2 switch uniquely identifies a
those offices to each in a secure way over a
device by its “burned-in” MAC address.
network.
 A Layer 3 router uniquely identifies a
7. CAMPUS AREA NETWORK - that links the
device's network connection with a
buildings and consists of two or more local area
network-assigned IP address.
networks (LANs) within the limited geographical
A MAC address pertains to a device's manufacturer's
area.
number assigned to a network interface card (NIC).
8. VIRTUAL AREA NETWORK - VPN is a
An IP address refers to a number assigned to a network
private network that uses a public network to
connection.
connect remote sites or users.
TYPES OF NETWORKS
1. PERSONAL AREA NETWORK (PAN) -
network concerned with exchanging information THE INTERNET
in a person's vicinity. PANs are for personal The Internet is defined as a global wide area network
use, so the benefits might be more easily (WAN) that connects billions of computers and other

J.A.S.
electronic devices via servers and routers. With the 3 and other devices in a single local network.
Internet, everyone can access information, communicate An influential paper was written to describe
with anyone, and do other related stuff. It is often used 197 how the computers linked on a network could
interchangeably with the term world wide Web (or 4 send messages thru packet switching using
simply WWW); however, they're not the same. TCP.
Introduced the improved TCP that laid the
INTERNET 197
foundation of the basis of the modern
denotes the global communication system that involves 8
Internet.
the hardware and infrastructure. INTERNET GIVES BIRTH TO THE WEB
VS. Official adoption of TCP/IP as the standard
WWW (WORLD WIDE WEB) 198
way which Internet computers will
pertains to one of the services that are communicated 3
communicate.
over the Internet. 198
2 The development of a Domain Name System
PRECURSOR 198 (DNS)
The transmission of first telegraph message. 4
Samuel Finley Breese Morse, an American 198 NSFnet is created that allows the universities to
painter, and inventor, transmits the first electric 6 be linked in ARPAnet's growing infrastructure.
184
telegraph message, eventually making it 198 Internet Relay Chat was invented, allowing
4
possible for people to send messages around 8 users to create virtual "rooms".
the world in minutes. He developed the Morse A grocery store, named Peapod that
Code. introduced online grocery shopping and e-
The invention of the telephone (by Alexander commerce.
Graham Bell) and the refinement of the 198 The same year, Tim Berners-Lee invents the
phonograph. 9 World Wide Web at CERN, the European
187
The patent for the invented telephone was particle physics laboratory in Switzerland. It
6
given to Bell on March 7, owes a considerable debt to the earlier work of
1876. In 1877, he created the Bell Telephone Ted Nelson and Vannevar Bush.
Company (presently known as the AT&T.) WEB TAKES OFF
George Stibitz accesses a computer in New Mosaic, the first user-friendly web-browser,
194 York using a teletype (remote 199
was introduced. Also, World Wide Web Worm,
0 terminal) in New Hampshire, connected over a 3
one of the first search engines, was developed.
telephone line.
Brian Pinkerton writes WebCrawler, a more
Vannevar Bush, a US government sophisticated search engine, and Jerry Yang
194 scientist, published the paper "As We May 199
and David Filo launch Yahoo!, a directory of
5 Think", which anticipates the development 4
websites organized in an easy-to-use, tree-like
of the World Wide Web by half a century. hierarchy.
195 AT&T and Bell commercially sold the E-commerce properly begins when Jeff Bezos
8 developed modern modems. 199
founds Amazon.com, and Pierre Omidyar sets
5
up eBay.
PREPARING FOR A GLOBAL NETWORK 199 ICQ was considered the first user-friendly
J.C.R. Licklider envisages a network that 6 instant messaging on the Internet.
196
can link people and user-friendly computers 199
3 Published the first blog (weblog).
together. 7
Introduced the concept of communication 199 The Backrub search engine was developed,
195 between computers thru sending "message 8 which was later renamed Google.
8 blocks," which gave a similar idea and coined
The idea of the Internet of Things (IoT)
the term "packet switching." 199
emerged, citing that computers and everyday
Ted Nelson invents hypertext, a way of 9
objects could be part of the Internet.
196 linking together separate documents that
INTERNET AND WEB FOR ALL
5 eventually becomes a key part of the World
200 Virtually every country in the world is now
Wide Web.
3 connected to the Internet.
The start of development of a national
196 Harvard student Mark Zuckerberg
computer network, inspired by the work of
6 200 revolutionizes social networking with
Licklider.
4 Facebook, an easy-to-use website that connects
196 The launching of ARPANET computer
people with their friends.
9 network.
Jack Dorsey and Evan Williams found
Twitter, an even simpler "microblogging"
APPEARANCE OF THE MODERN INTERNET 201
site where people share their thoughts and
Sent the first email introducing the "@" as 6
197 observations in off-the-cuff, 140-character
one way to separate a user's name from the status messages.
1
computer name where the mail is stored.
201 Russian President Vladimir Putin approves a
197 The invention of Ethernet, linking computers 7 plan to create a private alternative to the
J.A.S.
Internet to counter the (traditional) Internet's the help of the internet facility, and it cannot be
historical dominance by the United States. functional without the internet.

5 REASONS WHY INTERNET IS SUCCESSFUL:


TYPES OF INTERNET CONNECTION: 1. Flexibility to Accommodate Arbitrary Networks
2. Flexibility to Accommodate New Apps Quickly
1. DIAL - UP CONNECTION 3. The Advantage of Being Open and Vendor
Requires the user to link a phone line to a computer Independent
before accessing the Internet. This type of internet 4. An Extremely Efficient Design
connection is typically the slowest type among all 5. Packet Switching Is A Fundamentally Better Idea
Internet connections.
2. BROADBAND
A broadband (short for "broad bandwidth") internet 1. EMAIL - Electronic mail (email) was originally
service offers better high-speed connections than dial- designed to allow a pair of individuals to
up service. Generally, it can be categorized as follows. communicate via computer.
 Digital Subscriber Line - uses a broadband Email can be used to:
connection, making it faster than a dial-up  Send a single message to many recipients
connection. DSL connects to the Internet via (i.e., a mailing list).
an existing 2-wire copper phone line.  Send a message that includes text, audio,
 Cable Internet - operates via cable TV video, or graphics.
lines, although you do not necessarily need  Have a computer program to generate and
to have cable TV to get it. It uses a send a message.
broadband connection that has a greater  Have a computer program respond to an
bandwidth than DSL. incoming message.
 Wireless - a kind of internet connection that Three essential parts of an email address:
uses radio frequencies to access the Internet. a. a username,
It is commonly termed as "Wi-Fi" (which b. an "at" sign (@)
some people say stands for "wireless c. the address of the user's mail server.
fidelity"). Undisclosed Recipients
 Fiber Optics - one of the latest trends in the  To: lists the email addresses of the main
broadband world. With this technology, it recipients
offers an incredibly fast internet speed.  Cc: lists email addresses of recipients who
3. SATELLITE should receive a copy
Uses broadband but does not require cable or phone lines  Bcc: lists email addresses of recipients who
to access the Internet. It connects to the Internet should receive a copy, but whose identity
through satellites orbiting the Earth. As a result, it can should be hidden from other recipients
be used almost anywhere globally, but the connection
may be affected by weather patterns. Email Client - a program that lives on your computer
4. CELLULAR TECHNOLOGY and lets you send or receive emails. The emails
It provides wireless Internet access through mobile themselves are stored on your computer’s hard drive as
phones, where speeds vary depending on the internet small files. (Microsoft Outlook, eM Client, Mozilla's
service provider (ISP). Thunderbird, macOS Mail, etc.)
 3G is a term that describes a 3rd generation
cellular network obtaining mobile speeds of Web-based Mail - an email service intended to be
around 2.0 Mbps. primarily accessed via a web browser. Emails live
 4G is the fourth generation of cellular online in the cloud which makes it popular as it allows
wireless standards. The goal of 4G is to you to send or receive email from anywhere. (Google’s
achieve peak mobile speeds of 100 Mbps, Gmail, Microsoft’s Outlook.com and Yahoo! Mail.)
but the reality is about 21 Mbps currently.
 5G is the 5th generation mobile network that 2. WORLD WIDE WEB (WWW) – is a
enables a new kind of network that is combination of all resources and users on the
designed to connect virtually everyone and Internet that are using the Hypertext Transfer
everything, including machines, objects, and Protocol (HTTP).
devices. URLs and their meaning:
 A URL is a string of characters divided into
several parts by punctuation characters.
INTERNET APPLICATIONS  Address of the webpage
o Protocol (http://)
Internet Applications can be described as the type of o Domain name (www._____.com/)
applications which use the internet for operating o Server name (page name)
successfully, that is, by using the internet for fetching, Inside a browser:
sharing, and displaying the information from the  retrieves information from other parts of
respective server systems. It can be accessed only with the web and displays it on your desktop or
mobile device.
J.A.S.
1. TCP / IP (Transmission Control Protocol / 6. VOICE AND VIDEO COMMUNICATION
Internet Protocol) - means that a connection is (VoIP) - allow you to make a call directly from
negotiated between a client and a server. Any a computer, a special VoIP phone, or a
data transmitted between these two endpoints is traditional phone connected to a special
guaranteed to arrive, thus it is a so-called lossless adapter. (Skype, WhatsApp, Viber, Google
protocol. Hangouts, Facebook Messenger, etc.)
2. UDP / IP (User Datagram Protocol / Internet 7. FILE TRANSFER AND DATA SHARING – a
Protocol) - a substitute communication protocol file transfer mechanism is needed to transfer
to TCP implemented primarily for creating loss- arbitrarily large files. Users access FTP
tolerating and low-latency linking between through a web browser — when the user supplies
different applications. a URL that begins with the string ftp://, the
3. HTTP (Hypertext Transfer Protocol) - used to browser becomes an FTP client and accesses an
transmit all data present on the WWW. This FTP server.
includes text, multimedia, and graphics.
4. HTML (Hypertext Markup Language) - is the 8. REMOTE DESKTOP - A remote access facility
standard markup language for creating Web permits a user who is using one device to
pages. access and control another device.
5. HTTPS (Hyper Text Transfer Protocol
Secure) - a standard protocol to secure 9. CLOUD SERVICES AND CLOUD
communication among two computers one COMPUTING - the cloud paradigm represents
using the browser and the other fetching data a major shift in the way individuals and
from web server. corporations use computing. Required for the
6. FTP (File Transfer Protocol) - allows users to Internet of Things (IoT) devices to run and
transfer files from one machine to another. operate.
Types of files may include program files,
multimedia files, text files, and documents, etc. 10. ELECTRONIC COMMERCE (E-
Types of Websites: COMMERCE) – includes the entire online
 Conventional / Static - web pages stored on process of developing, marketing, selling,
the server in the format that is sent to a delivering, servicing, and paying for products
client web browser, and mainly its contents and services.
do not change.
 Dynamic - website is one that changes or 11. BLOCKCHAIN TECHNOLOGY - a type of
customizes itself frequently and DLT (Distributed Ledger Technology) in
automatically, based on certain criteria. which transactions are recorded with an
immutable cryptographic signature called a
3. SOCIAL NETWORKING AND PERSONAL hash.
PUBLISHING – Information dissemination
traditionally followed a publish-subscribe
paradigm. A variety of new publication
mechanisms have been invented, including
moderated and unmoderated discussion
forums.

4. IOT (INTERNET OF THINGS) - Refers to


devices – sensors (devices that measure or
sense their surroundings) actuators (devices
that change or control their surroundings) that
can be accessed and controlled over the Internet.

5. INTERNET SEARCH (SEARCH ENGINES)


a. Indexing in which a set of keywords
are extracted from a page that
distinguish the page from others.
b. Web Crawler that runs before a user
requests a search. A search server uses
the stored information to find a list of
pages pertinent to a given request.
Uses information in two ways:
 To provide personalized answers to search
queries.
 To sell ads that are delivered along with
search results.

J.A.S.
GRAPHICS AND MULTIMEDIA e. File Extensions – there letters indicate
The concept of graphics lies under multimedia. to both your computing device how
each image is stored and what software
GRAPHICS will be necessary to open and display
 Came from the Greek work “graphikos” the image file.
which means “written”. i. Joint Photographic Experts
 Refers to any visual representation of data Group (JPEG)
and includes a variety of forms including: ii. JPG – one of the formats
o Drawings supported by the JPEG
o Photographs compression group.
o Line art iii. JPEG 2000 – a highly
o Graphs advanced compression
o Diagrams technique and a part of the
o Numbers JPEG group.
iv. Graphic Interchange Format
o Symbols
(GIF)
o Geometric designs
v. Portable Network Graphics
o Maps
(PNG)
o Engineering drawings vi. Bitmap Image File (BMP)
 May also include text and they can be used vii. RAW – unprocessed photos
for decorative or functional purposes, viii. Tagged Image File Format
including educating, informing, illustrating, (TIFF)
or entertaining. ix. PSD and PSB – two native
Adobe Photoshop formats.
COMPUTER GRAPHICS x. Canon Raw Version 2 (CR2)
It is any image media crafted through computer hardware
and software. It is sometimes referred to as computer- 2. VECTOR GRAPHICS - vector graphics use
generated imagery or CGI. mathematical formulae to draw lines and
curves to create the image. It is also scalable,
FOUR ELEMENTS OF COMPUTER GRAPHICS: meaning, there is no limit for re-sizing the image
1. IMAGE - It is the visual representation of an for as long as the rule of mathematics was
object–drawn, painted, or photographed. identical and applied correctly.
2. MODELS - it is the 3D representation of any a. Anti-aliasing – a software-based
object but typically on a smaller scale, approach that aims to smoothens the
3. RENDERING - it is the process of generating jagged appearance of the image by
an image from a 2D or 3D model through blending the edge of the pixel with
computer programs. adjacent colors.
4. ANIMATION - it is a way of adding creative
illusive actions through successive images.

TWO TYPES OF COMPUTER GRAPHICS:


1. RASTER GRAPHICS – Digital images made
up of countless tiny squares called pixels. It is
sometimes referred to as bitmap.
a. Bitmap – a way of turning an image
into a computer file that made up of  AI – Adobe Illustrator’s native file format.
binary digits which called as “bits”.  Encapsulated Postscript (EPS)
Bitmaps because there was a “direct  Portable Document Format (PDF)
correspondence” between every pixel  Scalable Vector Graphics (SGV)
of a picture and every bit in the file.
b. Image Resolution – refers to how APPLICATION OF COMPUTER GRAPHICS:
many pixels are displayed per inch of 1. User Interface – it is useful in video games,
an image or PPI. It is usually measured digital art, and virtual reality.
in DPI or Dot Per Inch. 2. Display information – it is used in
c. Image Degradation – there are several computational biology, computational physics,
image compression algorithms that may information of graphics and scientific
help compresses image formats on the visualization.
web like BMP, TIFF, JPEG and GIF. 3. Design – it is used in graphic design,
d. Image Compression – the process of computer-aided design, and web design.
minimizing the size in bytes of a 4. Simulation – it is also useful in education,
graphics file without degrading the information visualization and computer
quality of the image to an unacceptable simulation.
level.

J.A.S.
MULTIMEDIA HYPERTEXT refers to any text or pictures that link to
 Came from the Latin word “multus,” which other path or chains. It was coined by Ted Nelson.
means “many,” and a plural word of
medium, “media.” HYPERMEDIA is a non-linear multimedia presentation
 An interactive way of presenting as it uses hypertext that allows the reader to move from
information using audio, video, and any one path to another.
animation in addition to traditional media
like text, graphs, and images. FORMS OF MULTIMEDIA:
1. ONLINE
EDGAR GALE’S “CONE OF LEARNING” These are the media types that need to communicate with
 10% of what they read, distant resources or distant users. These can only be
 20% of what they hear, utilized with the use of the internet. Examples are
 30% of what they see, websites, applications and other mobile services that
 50% of what they hear and see. need the internet to progress.
2. OFFLINE
BASIC ELEMENTS OF MULTIMEDIA: These media are known to be a self-contained product
1. TEXT - This refers to the characters used for where the users do not need the internet or any online
creating words. connection. This can stand and progress on its own and
2. GRAPHICS - Refers to any non-text does not communicate with anything outside its designed
information like images, drawings, or charts. environment. Examples are CD, DVD, Blu-ray,
3. ANIMATION - These are moving images. It multimedia kiosk.
was created through a series of graphics that 3. HYBRID
portray actions displayed in sequence to create This media has the elements of both on and offline
illusions of motion. products. Common examples are computer games.
4. VIDEO - This refers to moving pictographic
images accompanied by sounds.
5. AUDIO - This refers to any music or sound
effects.

MULTIMEDIA SYSTEM CHARACTERISTICS:


1. Multimedia systems should be computer
controlled.
2. All the components of multimedia are integrated.
3. The interface to the final user may permit
interactivity.
4. Information must be presented digitally.

TYPES OF MULTIMEDIA PRESENTATION:


1. LINEAR PRESENTATION
 The active content of this presentation often
progresses without the control for
navigation of the user. The presentation
plays typically from the start to end or is
looped continually when presenting the
information. The most common type of
this multimedia presentation is a movie,
where the viewer’s just sit and watch the
presentation from the beginning to the end.

2. NON-LINEAR PRESENTATION
 Unlike the linear presentation, the non-linear
presentation offers interactivity to the
users where they can control the progress
of the presentation. That is why it is also
known as interactive multimedia. The
users have the ability to move around on
different paths through the information
presentation. This kind of interactivity is
common in video games or self-paced-
based training. One of its typical examples
is hypermedia.

J.A.S.
HUMAN COMPUTER INTERACTION (HCI) o Virtual reality is a technology that
Study of how people interact with computers and to attempts to regenerate computer
what extent computers are or are not developed for images and videos to produce real-life
successful interaction with human beings. visual experiences that are beyond
 Computer science those achieved on the ordinary
 Ergonomics & Human Factors computer monitor and phone.
 Engineering
 Design
 Sociology & Social Psychology TYPES OF USER INTERFACE
 Ethnography The point at which human users interact with a
 Cognitive Science computer, website, or application.
 Psychology 1. COMMAND LINE (CLI)
 Information Security A Command Line Interface connects a user to a
 Speech-language pathology computer program or operating system. Through the
CLI, users interact with a system or application by typing
TWO SIDES OF HCI in text (commands).
1. Academic Discipline
2. Design Discipline 2. GRAPHICAL (GUI)
A system of interactive visual components for computer
HCI is a broad field which overlaps with areas such as software.; Displays objects that convey information,
user-centered design (UCD), user interface (UI) design and represent actions that can be taken by the user.
and user experience (UX) design. In many ways, HCI The objects change color, size, or visibility when the user
was the forerunner to UX design. interacts with them. (Button, dialog box, icons, menu,
toolbar, window, tab, toolbar, etc.)
 The user interacts directly with hardware for the
human input and output such as displays, e.g., 3. MULTIMEDIA (MUI)
through graphical user interface. Computer interfaces that communicate with users
 The user interacts with the computer over this using multiple media.
software interface using the given input and
output (I/O) hardware. FUTURE INTERFACES
a. VIRTUAL REALITY
GOALS OF HCI o Creates the “illusion of participation
1. To produce usable and safe systems, as well as in a synthetic environment rather
functional systems. than external observation of such an
2. To let the developers understand the factors environment.” (Gigante, 1993)
that determine how people use technology. o Uses VR headsets and input devices
3. To develop tools and techniques to enable
(e.g., joysticks)
building suitable systems.
o Immersive experiences → interaction
with virtual objects, 360° views,
HCI’S CONCEPT
auditory and haptic feedback.
 “As interaction designers, we need to remember
o First or third person viewpoints
that it is not about the interface, it‘s about
what people want to do. To come up with great
b. VOICE UI
designs, you need to know who those people are
o A person talks to an app or device
and what they are really trying to accomplish.” –
with spoken language.
Cordell Ratzlaff, Designing Interactions,
o Users inquire or issue commands.
2007.
o Sometimes proactive.
COMPUTING MACHINES o Problems:
1. EMBEDDED  Mishearing / Voice recognition
o A combination of computer hardware  Security
and software designed for a specific o Siri by Apple, Amazon Alexa device:
function. Embedded systems may also Echo Dot, Echo, Echo Plus
function within a larger system.
o May function as part of a complete c. GESTURE-BASED
device. o Using hands and arms to interact.
2. SPECIALIZED BOXES
o A hardware device–a specialized d. TOUCH-BASED
computer–may have the capabilities of o A type of interaction is executed by
a general-purpose computer but is doing a physical touch on the screen
designed to only do specific tasks. and the computer responds to this
e.g., gaming consoles. touch interaction.
3. VIRTUAL ENVIRONMENTS o ATM, camera, mobile phones, LCD
touch screens, etc.
J.A.S.
and cooperation. It is a self-funding agency of the United
Nations, with 193 member states.

Others may include:


e. HAPTIC (tactile feedback: vibration forces)
o Pertain to the use of technology that INTELLECTUAL PROPERTY MAY INCLUDE…
stimulates the senses of touch and  Intangible property / assets
motion, especially to reproduce in o It concerns creations of the mind.
remote operation or computer  Physical property / assets
simulation the sensations that would o Tangible property/assets
be felt by a user interacting directly  Ownership of one’s ideas.
with physical objects.  Unique product that brings innovative ideas.
o Haptics technologies brings feedback to
the user for the movement that is WHY DOES INTELLECTUAL PROPERTY MATTER?
represented by the computer. 1. To earn recognition or financial benefits from an
o Haptics is the science and technology invention or creation.
of transmitting and understanding 2. To safeguard creations and works from
information through touch. infringers, copycats, and thieves.
3. To build value of a business / company /
f. MULTIMODAL (multiple ways of individual.
experiencing information and controlling
interface) INTELLECTUAL PROPERTY RIGHTS (IPR)
o Smell, taste, temperature  Legal rights that protect creations and/or
inventions resulting from intellectual activity
in the industrial, scientific, literary, or artistic
fields. The most common IPRs include patents,
EXAMPLES OF HCI
copyrights, marks, and trade secrets.
1873 QWERTY – Christopher Latham Sholes  The rights given to persons over the creations
1946 ENIAC “The Birth of a Giant Brain” of their minds. They usually give the creator an
1952 The Trackball of Datar exclusive right over the use of his/her creation
1967 The Gaming Joystick for a certain period of time.
1968 Virtual Reality  Republic Act No. 8293 [An Act Prescribing the
1972 Multi-Touch Tech Intellectual Property Code and Establishing the
1984 3D Printing Intellectual Property Office, Providing for Its
1998 The Smart Watch Powers, and Functions, and for Other Purposes]
2006 WII (World War II) otherwise known as the Intellectual Property
2011 Google Voice Search apps Code of the Philippines.
2016 DEXMO Exoskeleton
2018 and 1. PATENT – used to protect inventions, such as
Multisensory, BCI machines, processes, and new products. They
beyond
give the inventor the exclusive right to make,
THE IMPACT OF HCI IN OUR LIVES: use, and sell their invention for a set period of
1. Daily Activities time.
2. Business and Industry Expiry: 20 years from the filing date of the application.
3. Accessible to the Disabled
4. Software Success 2. TRADEMARKS – used to protect brand
5. Useful for Untrained Users names, logos, and other symbols that are used
to identify and distinguish a particular
company or product from its competitors. They
give the owner the exclusive right to use the
IPR ISSUES IN ICT
trademark in connection with their products or
services.
WHAT IS INTELLECTUAL PROPERTY (IP)?
Expiry: No expiry. It will continue to persist as long as
- These are the creations of the mind:
the owner continues to use it.
o Literary and artistic works
o Designs
3. COPYRIGHTS – used to protect original
o Symbols literary and artistic works, such as books,
o Names music, and paintings. They give the creator the
o Images used in commerce exclusive right to reproduce, distribute, and
perform their work.
WORLD INTELLECTUAL PROPERTY Expiry: If author – the copyright is enforceable for the
ORGANIZATION (WIPO) is the global forum for life of the creator plus another 70 years.
intellectual property (IP) services, policy, information,

J.A.S.
Expiry: If company’s copyright – lasts 120 years from
creation or 95 years from publication, whichever is
shorter.

4. TRADE SECRETS – used to protect


confidential information, such as formulas,
processes, and designs, that give a company a
competitive advantage. They do not require
registration, and the owner must take reasonable
steps to keep the information secret.
Expiry: Can last in perpetuity (forever) – if they are
property maintained and protected. One do not register a
trade secret with the government.

5. INDUSTRIAL DESIGNS –used to protect the


visual appearance of a product, such as its
shape, pattern, or color. They give the owner
the exclusive right to use the design for a set
period of time.

HOW TO PROECTECT ONE’S INTELLECTUAL


PROPERTY:
1. Keep it under scrutiny.
2. Be aware of your IPRs.
3. Consult an expert.
4. Double check if your idea is unique.
5. Hire an auditor.
6. Keep a record of almost everything related.
7. Protect your IP without delay.

J.A.S.
ARTIFICIAL INTELLIGENCE o REINFORCEMENT LEARNING -
 The use of computer systems to simulate uses feedback data to improve the
human mental processes, such as interpreting performance of a model. (ex. games like
and generating language. Chess and Go)
 First coined by John McCarthy in 1956 at the DEEP LEARNING
Dartmouth Conference  application of machine learning that uses
o Defined it as “the science and complex algorithms and artificial neural
engineering of making intelligent networks (ANN – which structures and
machines.” functions like brain neurons) to train a model,
where data and patterns can be better perceived.
AUTOMATION o self-driving cars
setting up robots to follow a set of pre-defined rules. o speech recognition
VS. o pattern recognition
ARTIFICIAL INTELLIGENCE o computer programming
setting up robots to make their own decisions (though o image recognition
still based on human input). o contextual recommendations
o fact checking
COMPONENTS OF INTELLIGENCE:
PREDICTIVE ANALYSIS
1. Learning
 a statistics-based method that data analysts
2. Reasoning
use to make assumptions and test records in
3. Problem-solving
order to predict the likelihood of a given
4. Perception
future outcome.
5. Language
o banking
o healthcare
STRUCTURE OF ARITIFICIAL INTELLIGENCE:
ARTIFICIAL INTELLIGENCE o human resources (HR)
1. MACHINE LEARNING o marketing and sales
a. Deep Learning o supply chain
b. Predictive Analysis NATURAL LANGUAGE PROCESSING
2. NATURAL LANGUAGE PROCESSING  focuses on enabling machines to understand
(NLP) and interpret human language. NLP is used in
a. Translation applications such as chatbots, virtual assistants,
b. Classification and Clustering and language translation.
c. Information Extraction  with NLP, PCs can decode, display, and generate
3. SPEECH human language and communicate.
a. Speech-to-Text AI IN SPEECH
b. Text-to-Speech  uses AI for voice-based technologies: automatic
4. EXPERT SYSTEMS speech recognition (ASR), also known as
5. PLANNING, SCHEDULING, AND speech-to-text (STT), and text-to-speech (TTS).
OPTIMISATION o call center transcription
6. ROBOTICS o clinical note taking
7. VISION o virtual assistants
a. Image Recognition o media and marketing
b. Machine Vision EXPERT SYSTEMS
 uses artificial intelligence (AI) technologies to
simulate the judgment and behavior of a
MACHING LEARNING human or an organization that has expertise
 a subset of AI and experience in a particular field.
 the science of programming machines to think  relies on having a good knowledge base.
and act like humans without being explicitly Experts add information to the knowledge base,
programmed to and nonexperts use the system to solve complex
 aims to enable computers to learn automatically problems that would usually require a human
without human intervention and adjust actions expert.
 uses algorithms that can make predictions o CaDet (Cancer Decision Support
through pattern recognition Tool) is used to identify cancer in its
o SUPERVISED LEARNING - creating earliest stages.
models that can learn from marked o DENDRAL helps chemists identify
dataset to make predictions. (ex. spam unknown organic molecules.
filtering and face recognition) o DXplain is a clinical support system
o UNSUPERVISED LEARNING - that diagnoses various diseases.
given unlabeled dataset, the algorithm o MYCIN identifies bacteria such as
must find some way to learn without the bacteremia and meningitis and
guidance of humans (ex. fraud recommends antibiotics and dosages.
transactions)
J.A.S.
o PXDES determines the type and 2015 Tesla introduces auto drive features
severity of lung cancer a person has. Hanson Robotics introduced Sophia, the first
2016
o R1/XCON is an early manufacturing AI-based humanoid robot
expert system that automatically selects 2017 Sophia became a citizen of Saudi Arabia
and orders computer components based TURING TEST (1950)
on customer specifications.  In a Turing test, the interrogator must determine
PLANNING, SCHEDULING, AND OPTIMISATION which respondent is a computer and which is a
 uses planning to determine ‘what steps to take’ human.
(planning) and ‘when to carry out a certain  Originally called the imitation game
step’ (scheduling) in order to achieve a goal. o a test of a machine's ability to exhibit
 The common term given to an intelligent intelligent behavior equivalent to, or
system that implements planning is ‘agent’. indistinguishable from, that of a human.
The plan implemented by the agent enables it to  “Can machines think?”
search through each and every possible action or JOHN MCCARTHY (1956)
route to reach the set goal.  Known as the Father of Artificial Intelligence
ROBOTICS  He wanted a new, neutral umbrella term that
 a field of AI that involves designing, building, could collect and organize these disparate
and programming robots to perform tasks. research efforts into a single field focused on
Robots are used in various applications such as developing machines that could simulate every
manufacturing, healthcare, and space aspect of intelligence.
exploration. ELIZA (1965)
COMPUTER VISION  considered to be the first chatterbot “chatbot”
 enables computers and systems to derive  natural language processing (NLP) program
meaningful information from digital images,  created from 1964 - 1966 at the Massachusetts
videos, and other visual inputs — and take Institute of Technology (MIT) AI Laboratory
actions or make recommendations based on  aimed at tricking it users by making them believe
that information. If AI enables computers to that they were having a conversation with a real
think, computer vision enables them to see, human being; it was designed to imitate a
observe and understand. therapist who would ask open-ended questions
o The Automotive Industry – and even respond with follow-ups.
Autonomous Vehicles SHAKEY (1969)
o Public Security – Facial Recognition  the world’s first mobile intelligent robot with
o Retail – Customer Experience, cameras and touch sensors, controlled by a
Inventory Management large remote computer
o Medicine – Medical Imaging  this early robot became an archetype from which
o Education – Attendance And subsequent robots were built and significantly
Engagement Monitoring influenced modern robotics and AI techniques
o Fitness And Sports – Tracking Systems  was funded by the Defense Advanced Research
Projects Agency (DARPA)
o Precision Agriculture
STANFORD CART (1979)
o Gaming – Human Pose Estimation
 was originally built to simulate a remote-
o Media & Entertainment – Interactive
controlled moon rover
Media, Smart glasses  In 1979, the cart successfully crossed a chair-
o Manufacturing – Product Assembly, filled room without human intervention in about
Defect Detection five hours.
o Transportation – Violations Detection, DEEP BLUE
Traffic Flow Analysis  chess-playing expert system run on a unique
purpose-built IBM supercomputer
 development began in 1985 at Carnegie Mellon
HISTORY OF ARTIFICIAL INTELLIGENCE University
 On May 11, 1997, it beat the world chess
YEAR EVENT champion, Garry Kasparov, after a six - game
1950 Alan Turing developed “Turing Test” match: two wins for IBM, one for the champion
John McCarthy coined the term “Artificial and three draws.
1956
Intelligence” ROOMBA (2002)
1965 Joseph Weizenbaum at MIT built ELIZA  mobile robot for vacuuming floors
Stanford Research Institute developed SIRI (2011)
1969
Shakey, a robot  spin-off from a project developed by the SRI
Standford Cart – First computer controlled International Artificial Intelligence Center
1979
autonomous vehicle  used the voice of Susan Bennett in US, Jon
1997 Deep Blue Chess Program Briggs in UK, while Karen Jacobsen in
2002 iRobot launched Roomba, a vacuum cleaner Australia
2011 Apple introduced Personal Assistant Siri  Siri means “beautiful woman who leads you to
2014 Amazon launched Alexa victory” in Norwegian and “secret” in Swahili.
J.A.S.
ALEXA (2014)
 a virtual assistant technology
 was first used in the Amazon Echo and Echo TYPES OF AI BASED ON FUNCTIONALITIES
Dot, Echo Studio and Amazon Tap speakers 1. REACTIVE MACHINE
 capable of voice interaction, music playback, - AI systems that have no memory and are task
making to-do lists, setting alarms, streaming specific, meaning that an input always
podcasts, playing audiobooks, and providing delivers the same output.
weather, traffic, sports, and other real-time - example: IBM's Deep Blue
information, such as news 2. LIMITED MEMORY
 can also control several smart devices using a - this algorithm imitates the way our brains’
home automation system. neurons work together, meaning that it gets
TESLA AUTOPILOT (2015) smarter as it receives more data to train on.
 Tesla Version 7.0 software was released, - trains from past data to make decisions
enabling Autopilot as a feature for Model S - examples: self-driving cars and chatbots
drivers. 3. THEORY OF MIND
 a combination of adaptive cruise control and - could have the potential to understand the
Autosteer, a lane centering function designed world and how other entities have thoughts
to keep Tesla vehicles within painted lane and emotions. In turn, this affects how they
lines. behave in relation to those around them.
 Autopilot is not a self-driving system and that - example: Sophia
“the driver is still responsible for, and ultimately 4. SELF-AWARENESS
in control of, the car,” but it also reiterates that - AI would be to design systems that have a sense
Tesla vehicles are equipped with hardware “to of self, a conscious understanding of their
allow for the incremental introduction of self- existence
driving technology.” - only exists hypothetically
SOPHIA (2016)
 the humanoid robot
 has simulations of every major muscle in the EXAMPLES OF AI
human face, allowing her to generate expressions CHATBOTS
of joy, grief, curiosity, confusion, contemplation, - uses artificial intelligence to generate text or
sorrow, frustration, among other feelings. answer queries based on user input.
 In 2017, Sophia was given Saudi Arabian o Chat-based Generative Pre-trained
citizenship, becoming the first robot to receive Transformer, ChatGPT (OpenAI)
citizenship of any country. o ChatSonic (Writesonic)
 One month later, Sophia was named the United o Bing Chat (Microsoft)
Nations Development Program's first
o Jasper Chat (Jasper)
Innovation Champion.
o Replika (by Eugenia Kuyda)
o Socratic (Google)
SMART ASSISTANTS
TYPES OF AI BASED ON CAPABILITIES
- capable of carrying out many of the same
tasks as human assistants, such as reading
1. ARTIFICIAL NARROW INTELLIGENCE
text, taking dictation, making calls, etc.
(ANI)
o Siri (Apple)
- known as weak AI
o Cortana (Microsoft)
- designed and trained with a specific task in mind
o Alexa (Amazon)
and cannot perform beyond its limitations
- have a very limited or narrow range of o Google Assistant (Google)
competencies o Fireflies.ai (Fireflies)
2. ARTIFICIAL GENERAL INTELLIGENCE RETAIL AND E-COMMERCE
(AGI) - banks and financial institutions have used
- known as strong AI data to give their customers better, faster,
- can understand and learn any intellectual task more convenient, and more intelligent
that a human being can banking services
- allows a machine to apply knowledge and skills o Predicting Customer Credit Card
in different contexts Behavior
3. ARTIFICIAL SUPERINTELLIGENCE (ASI) o Banking Chatbots
- surpasses human intelligence and can o Fraud Detection
perform any task better than a human o Reducing False Debit and Credit Card
- include thinking, solving puzzles, making Declines
judgments, and decisions on its own o Personalized Services
SEARCH ENGINES
- employ powerful artificial intelligence
algorithms to decipher the meaning of search

J.A.S.
queries and provide the most accurate and o SnapChat (ML Models and AR
relevant results Technology)
o Bing and Edge (Microsoft) o Twitter (Big Data and AI)
o You.com (Bryan McCann and Richard
Socher)
o Perplexity AI (Aravind Srinivas)
o Neeva (Sridhar Ramaswamy) WHY IS AI IMPORTANT?
MEDIA STREAMING 1. It automates repetitive learning and discovery
- study people’s viewing history, preferences, through data.
and behaviors to provide tailor-made, 2. It adds intelligence to existing products.
enjoyable experiences 3. It adapts through progressive learning
o Netflix algorithms.
o Amazon Prime 4. It analyzes more and deeper data.
o Spotify 5. It achieves incredible accuracy .
o FireStick App 6. It gets the most out of data.
SMART CARS
- include industrial robots constructing a ETHICS AND BIAS
vehicle and autonomous cars navigating As AI becomes more prevalent in society, there are
traffic with machine learning and vision concerns about ethics and bias. There is a need to ensure
o Tesla (Austin, Texas) that AI systems are fair, transparent, and unbiased. This is
o Nauto (Palo Alto, California) particularly important in applications such as hiring,
o SapientX (San Cruz, California) criminal justice, and healthcare.
o Rethink Robotics (Bochum, Germany)
FUTURE OF AI
o Motional (Boston, Massachusetts)
AI is rapidly evolving, and its future is exciting. It has the
o Waymo (Mountain View, California)
potential to revolutionize various industries such as
NAVIGATION APPS
healthcare, transportation, and education. However, there
- has features such as route optimization, GPS
are also concerns about the impact of AI on jobs and
tracking, and real-time traffic alerts
society as a whole.
o Waze (Google)
o Google Maps (Google)
o CoPilot GPS (Trimble MAPS)
o Sygic GPS Navigation (Sygic
Enterprise)
o Apple Maps (Apple)
FACIAL RECOGNITION
- a biometric technology that identifies facial
vectors and features and matches them with a
pre-enrolled individual
o Access Control
o Security and Surveillance
o Health and Safety
o Time and Attendance
o eKYC and Fintech
o Smart Retail and Personalized
Customer Experience
o Law Enforcement
TEXT EDITORS
- make it simple and easy to autogenerate
content for your blog, website, or social media
profiles
o Jasper
o Writesonic
o Article Forge
o Grammarly
o Quillbot
SOCIAL MEDIA FEEDS
- automate many tedious tasks related to social
media management and can-do social media
monitoring at scale
o Facebook (DeepText and DeepFace)
o Twitter (IBM Watson)

J.A.S.
BIG DATA ANALYTICS
DATA is the new oil. 3. PREDICTIVE ANALYTICS
o It comprises predicting the
DATA occurrence of an event or the likely
Fingerprint of creation outcome of an event or forecasting
New Gold the future values using prediction
VS. models.
ANALYTICS o It is done using predictive models
Queen of Sciences which are trained by existing data.
Machinery that mines, molds, and mints. These models learn patterns and trends
from the existing data and predict the
DATA occurrence of an event or the likely
 factual information (such as measurements or outcome of an event (classification
statistics) used as a basis for reasoning, models) or forecast numbers
discussion, or calculation. (regression models).
 information in digital form that can be o What is likely to happen?
transmitted or processed. 4. PRESCRIPTIVE ANALYTICS
 information output by a sensing device or organ o It multiple prediction models to
that includes both useful and irrelevant or predict various outcomes and the best
redundant information and must be processed to course of action for each outcome.
be meaningful. o It can predict the possible outcomes
based on the current choice of actions.
UNIT VALUE o It prescribes actions or the best option
1 byte 8 (binary digits) to follow from the available options.
1 kilobyte 1024 bytes o What can we do to make it happen?
1 megabyte 1024 kilobyte 5. COGNITIVE ANALYTICS
1 gigabyte 1024 megabyte o It combines a number of intelligent
1 terabyte 1024 gigabyte technologies like artificial
1 petabyte 1024 terabyte intelligence, machine-learning
1 exabyte 1024 petabyte algorithms, deep learning etc. to
1 zettabyte 1024 exabyte apply human brain-like intelligence
1 yottabyte 1024 zettabyte to perform certain tasks.
1 brontobyte 1024 yottabyte

DATA ANALYTICS BIG DATA


 It is a broad term that encompasses the  It is defined as collections of datasets whose
processes, technologies, frameworks, and volume, velocity, or variety is so large that it is
algorithms to extract meaningful insights from difficult to store, manage, process, and
data. analyze the data using traditional databases
 It is the process of extracting and creating and data processing tools.
information from raw data by filtering, o 2.5 quintillion bytes of data are created
processing, categorizing, condensing, and every day, based on the IBM estimate.
contextualizing the data. o According to Statista, the estimated
volume of data created worldwide in
I. GOALS 2022 is 97 zettabytes.
- To predict something - There is 10% unique and 90 % replicated data in
- To find patterns in the data the global datasphere.
- Finding relationships in the data - More than 65 billion messages are being
exchanged daily via WhatsApp.
II. TYPES - 80–90% of the data that internet users generate
1. DESCRIPTIVE ANALYTICS daily is unstructured.
o It analyzes past data to present it in a - An internet user would need more than 180
summarized form that can be easily million years to download all the data from the
interpreted. web.
o What has happened? Included - Nearly 80% of companies estimate that 50%-
statistical functions 90% of their data is unstructured.
 counts, maximum, minimum, - An internet user generates about 1.7 megabytes
mean, top-N, percentage (MB) of data per second.
2. DIAGNOSTIC ANALYTICS - Two-thirds of the world population will be online
o It comprises the analysis of past data by the end of 2023.
to diagnose the reasons as to why - In 2023, we will generate nearly 3 times the
certain events happened. volume of data generated in 2019.
o Why did it happen?

J.A.S.
- By 2025, there will be 55.7 billion connected IoT APPLICATION
devices. These IoT devices alone will generate 1. Web
almost 80 ZB by 2025. 2. Financial
- By 2025, more than 150 zettabytes of big data 3. Healthcare
will need analysis. 4. Internet of Things (IoT)
5. Environment
NOTES 6. Logistics and Transportation
 Specialized tools and frameworks are required 7. Industry
for big data analysis when: 8. Retail
o The volume of data involved is so large
that it is difficult to store, process, and DATA ANALYTICS WORKS
analyze data on a single machine, - Data Collection
o The velocity of data is very high, and - Data Processing
the data needs to be analyzed in real- - Data Cleaning / Data Wrangling
time, - Data Analysis
o There is a variety of data involved,
which can be structured, unstructured or BENEFITS OF BIG DATA ANALYTICS
semi-structured, and is collected from  Improvement of decision making.
multiple data sources,  More effective marketing.
o Various types of analytics need to be  Improvement of customer service.
performed to extract value from the  Increased efficiency of operations.
data, such as descriptive, diagnostic,
predictive, and prescriptive analytics. CHALLENGES
 Data Quality
EXAMPLES  Synchronization of Data Sources
 Data generated by social networks including  Organizational Resistance
text, images, audio, and video data  Accessibility to Big Data
 Click-stream data generated by web applications  Maintaining quality data.
such as e-Commerce to analyze user behavior  Keeping data security.
 Machine sensor data collected from sensors  Finding the right tools and platforms.
embedded in industrial and energy systems for  Lack of talent
monitoring their health and detecting failures
 Healthcare data collected in electronic health
record (EHR) systems ICT IN GOVERNANCE
 Logs generated by web applications E-governance refers to the use of information and
 Stock markets datac communication technologies (ICT) to deliver services
 Transactional data generated by banking and to citizens that can transform relations with clients,
financial applications businesses, and other arms of Government.

TYPES Objectives:
1. Unstructured  Promote digital government services for business
o Data that has no inherent structure and individuals
and is usually stored as different  Promote effective operational management
types of files. (Ex. text documents,  Government-wide policy on the use of ICT
PDFs, images, and videos) services
2. Quasi-structured
o Textual data with erratic formats that  DEPARTMENT OF INFORMATION AND
can be formatted with effort and COMMUNICATIONS TECHNOLOGY
software tools. (Ex. clickstream data) (DICT) – DICT founded on June 9, 2016, shall
3. Semi-structured be the primary policy, planning, coordinating,
o Textual data files with an apparent implementing, and administrative entity of the
pattern, enabling analysis. (Ex. Executive Branch of the government that will
spreadsheets and XML files) plan, develop, and promote the national ICT
4. Structured development agenda. (RA 10844).
o Data having a defined data model,
format, structure. (Ex. database) Achievements and Highlights
 Free Public Wi-Fi Project - provides free
CHARACTERISTICS OF BIG DATA internet connectivity to the public by integrating
1. Volume Wi-Fi hotspots all over the country, especially in
2. Velocity public places and facilities.
3. Variety
4. Veracity Programs and Activities
5. Value

J.A.S.
1.Tech4ED (Technology for Education, to gain o Improvements (video card technology
Employment, train Entrepreneurs towards and Internet bandwidth)
Economic Development) o Subscription
2. iGov – a massive undertaking that hopes to make o Opportunity (for creators)
all government ICT services connected and 3. ARTS
available through one single portal o Access
APPLICATION OF E-GOVERNMENT IN THE o Sharing
PHILIPPINES o Creation
o Improvements (computer-aided)
1. GOVERNMENT-TO-CITIZEN (G2C)
4. GAMES
o It relates to the administrative
o Access
services that the government offers its
o Peripheral Devices (increased
people through the creation of an
availability and improvement
electronic government system.
o Customizability
 Government Portal (NGDC,
iGovPhil, GovMail)
 E-election & Voting System HOW TECHNOLOGY IS USED IN
(use of VCMs) ENTERTAINMENT
 UMID System (PhilSys and 1. CONTENT CREATION (create and edit digital
PhilID) content)
2. GOVERNMENT-TO-BUSINESS (G2B) 2. CONTENT DISTRIBUTION (publishing and
o It refers to administrative services promoting)
3. CONSUMPTION
that the government offers to
4. MARKETING AND PROMOTION
business groups and industries via the
(personalization and engagement)
e-Government system.
5. MONETIZATION (through subscription
 WORKNET Employment &
models, online advertising, pay-per-view
Hiring System (PhilJobNet)
streaming, and microtransactions)
 Procurement System
6. VIRTUAL REALITY AND AUGMENTED
(PhilGEPS)
REALITY (realistic graphics and interactive
 Medical and Health
environments)
Information System (CHITS
7. ANALYTICS (collection, storage, and analysis
by DOST-PCHRD)
large amounts of data for optimization)
3. GOVERNMENT-TO-GOVERNMENT (G2G)
o It refers to the provision of
information and administrative
services by government agencies and ICT IN EDUCATION
their departments through the Information and Communication Technology (ICT) in
implementation of e-Government. education is the mode of education that uses
 E-Document & Archiving information and communications technology to
System (GovCloud) support, enhance, and optimize information delivery.
 GEA (Government Enterprise
Architecture) USING IN ICT EDUCATION INCREASES…
 Government Performance 1. students’ interest in learning through varied
Monitoring System resources
2. interactivity by promoting participation
3. collaboration among students enhanced by
several platforms
ICT IN ENTERTAINMENT
4. creativity especially with digital tools
Over the past few years, the entertainment market has
5. communication through various channels more
experienced substantial growth particularly during the
spontaneously and less formally
pandemic, when streaming services and mobile games
6. personalization and up to date- contents in digital
grew in popularity. Due to the variety of entertainment
environments
genres and the ways in which entertainment simulates
the actual world, various forms of technology are
MOST USED TECHNOLOGIES IN THE
utilized in entertainment.
CLASSROOM
 Blogs and Social Networks
HOW TECHNOLOGY TRANSFORMS THE
 Planning Through Tools
ENTERTAINMENT LANDSCAPE
 Cloud Storage
1. MUSIC
 Digital Whiteboards and Interactive Tables
o Access (streaming, upload, and
download)
ADVANTAGES
o Opportunity (for independent
1. Cost-efficient
musicians)
2. Paperless: Eliminate the usage of paper. Eco-
2. TV AND MOVIES
friendly
o Access
J.A.S.
3. Better teaching and learning methods exposure to their online audience in exchange for
4. Enhanced data and information security a fee)
5. Easy student management 5. Government to Consumer (G2C): When a
6. Automatic solutions to manual paper-based government or public sector entity uses
processes and procedures ecommerce to sell goods or services to
7. Interactive and collaborative teaching and consumers (Parents pay for school lunch, sports
learning methods fees, and other miscellaneous fees)
8. Direct classroom teaching 6. Government to Business (G2B): This model
9. Spread awareness of the social impact of can often take the form of online bill payments,
technological change in education tax payments, or the payment for government
10. Independent learning platforms for students. services.
11. Improve the administration and enhance the
quality and efficiency of education EXAMPLES OF E-COMMERCE
12. Promote and improve the digital culture in  Digital products
schools, colleges, and universities  Services
 Retail
DISADVANTAGES  Wholesale
1. It is not accessible everywhere  Drop shipping
2. ICT equipment (including its implementation) is  Crowdfunding
expensive and requires trained staff to maintain it  Subscription
correctly – even the teaching force must have  Physical products
enough experience to handle ICT
3. The hardware can be unreliable, leading to ADVANTAGES
breakdowns 1. Ability to handle multiple purchases
4. Using ICT means children can become 2. Automation minimizes human error
dependent on computers 3. More affordable and effective marketing
5. The Internet can lead to children accessing 4. Lower costs of store maintenance
unsuitable sites 5. You can retarget the customers
6. Plagiarism has increased leading to students 6. Retail with no geographical or time limits
gaining unfair results on coursework 7. Personalize the shopping experience
7. The misuse of technology may be used to spread 8. Detailed product information
misleading and misguided information 9. E-commerce saves time for a customer
8. There may be risks of cyber-attacks and hacks
9. It can be a risk to the traditional book and DISADVANTAGES
handwriting methods. 1. Compulsory registration
10. Implementing computers and the Internet for 2. Complex taxation guidelines
ICT replaces conventional education 3. Some items are hard to purchase online
curriculums; managing online courses is 4. Waiting for a product to be delivered
difficult. 5. Uncertainty about the product quality
6. Technical difficulties
7. Security issues
E-COMMERCE 8. Higher cost of technology
It refers to the buying and selling of goods or services
using the Internet and the transfer of money and data
to execute these transactions. Ecommerce is often used SOCIAL NETWORKS
to refer to the sale of physical products online, but it can From Oxford Languages, it is defined as a network of
also describe any kind of commercial transaction social interactions and personal relationships. Also, it
facilitated through the Internet. may refer to a dedicated website or other application
which enables users to communicate with each other
TYPES OF E-COMMERCE MODELS by posting information, comments, messages, images,
1. Business to Consumer (B2C): When a business etc...
sells a good or service to an individual consumer
(You buy a pair of shoes from an online retailer). ATTRIBUTES OF SOCIAL NETWORKS
2. Business to Business (B2B): When a business  allows the users or organizations to create
sells a good or service to another business (A profiles and connect, communicate, and share
business sells software-as-a-service for other information
businesses to use)  focuses on user-generated content
3. Consumer to Consumer (C2C): When a  forms lasting connections with other users–
consumer sells a good or service to another friending/following
consumer (You sell your old furniture on
marketplace to another consumer). SOCIAL NETWORKS
4. Consumer to Business (C2B): When a  A social network focuses on the connections
consumer sells their own products or services to and relationships between individuals.
a business or organization (An influencer offers
J.A.S.
SOCIAL MEDIA 8. Pinterest
 Social media is more focused on an individual 9. Reddit
sharing with a large audience. In this case, 10. Snapchat
media is used in the same sense as in mass
media.
DIGITAL CITIZENSHIP
PURPOSE OF SOCIAL NETWORKING Refers to the responsible use of technology by anyone
1. SHARING – connect remotely and share who uses computers, the Internet, and digital devices
information despite geographical dispersion. to engage with society on any level.
2. INTERACTING – break barriers of time and  A digital citizen refers to a person who has the
distance with cloud-based interactions/ knowledge and skills to effectively use digital
communication. technologies to communicate with others,
3. LEARNING – receive news/ updates about participate in society and create and consume
recent happenings in your community and the digital content.
world
4. MARKETING – enhance brand awareness, 9 ELEMENTS OF DIGITAL CITIZENSHIP
improve customer retention, promote brand 1. Digital access
identity 2. Digital commerce
3. Digital communication
MOST COMMON TYPES OF SOCIAL 4. Digital etiquette
NETWORKING 5. Digital literacy
 Social Connections – staying in touch with 6. Digital health & welfare
friends, family, and acquaintances (Ex. 7. Digital rights & responsibility
Facebook, Myspace, and Instagram) 8. Digital law
 Professional Connections – designed for 9. Digital security & privacy
business relationships: used to make new
professional contacts, enhance existing business
connections, and explore job opportunities (Ex. CYBERSECURITY
LinkedIn, Microsoft Yammer, and Microsoft  the protection of internet-connected systems
Viva.) such as hardware, software, and data from
 Sharing of Multimedia – providing video and cyberthreats;
photography-sharing services (Ex. YouTube and  the practice is used by individuals and
Flickr) enterprises to protect against unauthorized access
 News or Information – allows users to post to data centers and other computerized systems.
news stories, informational or how-to contents
(Ex. Reddit, Stack Overflow, Digg) TYPES OF SYBERSECURITY CHALLENGES
 Educational – offer remote learning, enabling 1. Evolving threats
students and teachers to interact / collaborate As new technologies emerge, new attack avenues are
(Ex. Google Classroom, LinkedIn Learning) developed.
 Communication - allows users to communicate 2. Data deluge
with each other in one-on-one or group chats With more data being collected, the likelihood of a
(Ex. WhatsApp, WeChat, and Snapchat) cybercriminal who wants to steal personally identifiable
information (PII).
ADVANTAGES AND DISADVANTAGES OF 3. Cybersecurity awareness training
SOCIAL NETWORKING Regular security awareness training will help employees
 Brand awareness do their part in keeping their company safe from
 Instant reachability cyberthreats.
 Build a following 4. Workforce shortage and skills gap
 Business success As the amount of data collected and used by businesses
 Increased website traffic grows, the need for cybersecurity staff to analyze, manage
and respond to incidents also increases.
 Rumors and misinformation 5. Supply chain attacks and third-party risks
 Negative reviews and comments Organizations must address third-party risk in the supply
 Data security and privacy concerns chain and reduce software supply issues.
 Time-consuming process

TOP 10 SOCIAL NETWORKING SITES


1. Facebook
2. YouTube
3. WhatsApp
4. Instagram
5. TikTok
6. Tumblr
7. Twitter
J.A.S.

You might also like