ELECTIVE LIVING IN IT ERA_ECE (1)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 20

LESSON #1 : LIVING IN THE IT ERA USES OF INFORMATION AND COMMUNICATION

TECHNOLOGY IN OUR DAILY LIVES


LIVING IN IT ERA - it is a condition in which people blend,
Communication
integrate and live in adaptation to dynamic trends of
Nowadays people are in touch with
technology.
the help of ICT. Through chatting,
LIVING - to exist or the condition of being alive. E-mail, voice mail and social
networking people communicate
ERA - refers to a period, remarkable years or time. with each other. It is the cheapest
means of communication.
INFORMATION TECHNOLOGY - it is technology which
uses computers to gather, process, store, protect,transfer and Job Opportunities
manipulate information. In the employment sector, ICT
enables organizations to operate
OVERVIEW more efficiently, so employing staff
The quickening pace of evolution in technology is with ICT skills is vital to the
very evident in this era. It seems that it is progressing smooth running of any business.
faster than ever. From year to year, the evolution of Being able to use ICT systems
technology is one of staggering promise and opportunity as well effectively allows employees
as uncertainty. more time to concentrate on areas
Basically, technology has been around before, and of their job role that require soft
as long as there are people, information technology skills.
will be there also because there were always ways of
communicating through technology available at that point Education
in time. ICT as also become integral to the
teaching learning interaction,
The future may be unknown, but digital advancement continues through such approaches as
to reshape our world in ways that encourage people to form replacing chalkboards with
new habits, find new ways to work together, and become better interactive digital whiteboards,
human beings. using students’ own smartphones
or other devices for learning during
And, in most cases, these changes translate into a range of
class time
opportunities and disruptions across every industry. Humans
have always been quick to adapt technologies for better and
faster communication. Socializing
The internet and social media
INFORMATION AND COMMUNICATION TECHNOLOGY provide young people with a range
of benefits, and opportunities to
is the convergence of computing, telecommunication and empower themselves in a variety of
governance policies for how information should be accessed, ways. Young people can maintain
secured, processed, transmitted and stored. social connections and support
a diverse set of technological tools and resources used to networks that otherwise wouldn't
transmit, store, create, share or exchange information. be possible and can access more
refers to all the technology used to handle information than ever before
telecommunications, broadcast media, intelligent building
management systems, audiovisual processing and
IMPACT OF INFORMATION AND COMMUNICATION
transmission systems, and network-based control.
TECHNOLOGY IN SOCIETY
these technological tools and resources include computers, the
Internet (websites, blogs and emails), live broadcasting POSITIVE IMPACT:
technologies (radio, television and webcasting), recorded
broadcasting technologies (podcasting, audio and video Access to Information
players, and storage devices) and telephony (fixed or mobile, Increase in access to information
satellite, video-conferencing, etc.). and services that has accompanied
the growth of the Internet. Some of
the positive aspects of this
HISTORY OF INFORMATION AND COMMUNICATION
increased access are better, and
TECHNOLOGY
often cheaper, communications,
such as phone and Instant
ICT, or information and communications technology (or
Messaging.
technologies), is the infrastructure and components that
enable modern computing.
Although there is no single, universal definition of ICT, Improved Access to Education
the term is generally accepted to mean all devices, In this new era, access to
networking components, applications and systems that education is easy, e.g. distance
combined allow people and organizations (i.e., businesses, learning and online tutorials. New
nonprofit agencies, governments and criminal enterprises) ways of learning, e.g. interactive
to interact in the digital world. multi-media and
virtual reality.
New Tools, New Opportunities
LESSON #2 : HISTORY OF COMPUTER
ICT gives access to new tools that did
not previously exist: digital cameras,
HISTORY OF COMPUTER - simply refers to know the detailed
photo-editing software and high
accounts or the development of computer over time.
quality printers, screen
magnification or screen reading
HISTORY - the study of past events, the term history has
software enables partially sighted or
evolved from an verb that means“to know,”came from Greek
blind people to work with ordinary
word “historia” originally meant inquiry, the act of seeking
text rather than Braille.
knowledge.

Information Management COMPUTER - derived from the Latin word “computare”,


Data mining of customer information which means “to calculate”,“to count”, “to think”, or “to
to produce lists for targeted sum up”.
advertising. Improved stock control,
resulting in less wastage, better cash OVERVIEW
flow, etc.
✓ Now a days, computer plays a vital role for a speedy
accessing, processing of data and information, as a matter of
Communication fact, it is the first window to access the super highway of
Cost savings by using e.g. VoIP information, the internet.
instead of normal telephone, email
messaging instead of post, video ✓ This is an important tool for every individual such as the
conferencing instead of traveling to students, teachers, business personnel, office workers who
meetings, e-commerce web generally rely on it in preparing their reports, researched, etc.
sites instead of sales catalogues.
Access to larger, even worldwide, ✓ Computer has become very important nowadays because it is
markets. very much accurate, fast and can accomplish many tasks easily,
otherwise to complete those tasks manually much more time is
required. It can do very big calculations in just a fraction of a
Security
second. Moreover it can store huge amount of data in it
ICT solves or reduces some security
.
problems, e.g. Encryption methods
Various Definition of Computers
can keep data safe from unauthorized
people, both while it is being stored ✓ is an accurate and high speed EDP (electronic data processing)
or while it is being sent electronically. machine that is capable of accepting, processing and
manipulating input data and presenting the result to the outside
world by means of a computer program.
Other Positive Impacts: ✓ is an electronic device that manipulates information, or data.
✓ ICT allows people to participate in a wider, even worldwide, It has the ability to store, retrieve, and process data.
society ✓ any device which aids humans in performing various kinds of
✓ Distance learning: students can access teaching materials from computations or calculations.
all over the world ✓ is a machine that manipulates data according to a list of
✓ ICT facilitates the ability to perform‘impossible’experiments’ by instructions (program)
using simulations ✓ is an electronic device that is capable of performing logical and
✓ Creation of new more interesting jobs. mathematical operations by accepting data and performing the
said operation to obtain result or output, once it has given a
sequence of instructions, it will do the necessary processing of the
NEGATIVE IMPACT:
data until it generates output.
Job Loss ✓ computers have no initiative and cannot do any useful work
✓ Manual operations being replaced by automation. e.g. robots until properly provided with sequences of instructions (called
replacing people on an assembly line. Job export. e.g. Data PROGRAMS) which control the manner on how to carry out its
processing work being sent to other countries where operating operational functions.
costs are lower. PROGRAM - is a set or list of instructions for a computer to
✓ Multiple workers being replaced by a smaller number who are follow or to perform.
able to do the same amount of work. e.g. A worker on a
supermarket checkout can serve more customers per hour if a bar- Computer has:
code scanner linked to a computerized till is used to A. Characteristics:
B. Capabilities:
detect goods instead of the worker having to enter the item and ✓ it is electronics
✓ perform logical operation
price manually ✓ it is a machine
✓ control error
✓ it has memory
✓ check itself
Reduced Physical Activity ✓ it can manipulate data
✓ This can lead to health problems such as obesity, heart disease, ✓ it has a logic function
and diabetes.
C. Limitations: D. Failures:
Competition
✓ inability to derive ✓ input errors
✓ this is usually thought of as being a good thing, but for some
meanings from objects ✓ errors in instructing a
organizations being exposed to greater competition can be a
✓ inability to generate computer
problem. If the organization is competing for customers,
information ✓ communication gap
donations, or other means of funding nationally or even
✓ cannot correct wrong ✓ improper controls
internationally,they may lose out to other organizations that
instructions ✓ lack of standards
can offer the same service for less money.
Three Principal Characteristics of Computer Storage Capacity - computers can store vast amount of data.
Today’s computers have increased storage capacity compared to
✓ It responds to a specific set of
earlier days. Besides, we also have the option to store data in
instructions in a well-defined manner.
secondary devices such as external drives, or floppies tec. These
✓ It can execute a pre-recorded list of
secondary devices can be kept separate from the computer or
instructions.
attached to other computers. Due to their incredible speed,
✓ It can quickly store and retrieve large
computers can quickly retrieve data from storage devices.
amounts of data.

Remembrance power - the computer has the power and capability


to store any data or information for as long as we like. Data can
also be recalled easily if needed. It is our choice to decide how
much data we want to store on the computer and when to recall
or erase these data.

Automation - computers can also be used to automate routine


tasks with the help of a task scheduler such as launching a specific
application or software, sending an email, scanning for viruses
and many other maintenance tasks. Besides, computers can also
be programmed to perform many complex tasks.

Application of Computer in Our daily Lives


Specific Characteristics of Computer
1. Business
Speed - is one of the major characteristics of the computer
✓ Almost every business uses computers nowadays. They can
system. A computer works so fast that it can process any task
be employed to store and maintain accounts, personnel
and provide the output in fractions of seconds. A powerful
records, manage projects, track inventory, create
computer can handle trillions of instructions per second which
presentations and reports. They enable communication with
is really incredible.
people both within and outside the business, using various
Accuracy - computers not only provide incredible speed, instead, technologies, including e-mail. They can be used to promote
they are also capable of consistently working with accuracy. The the business and enable direct interaction with customers.
degree of accuracy in computers is very
high; computers can perform accuracy at almost 100% accuracy. 2. Education
Errors may occur in a computer system, but only because of ✓ Computers can be used to give learners audio-visual
wrong human input or inaccurate data. packages, interactive exercises, and remote learning, including
tutoring over the internet. They can be used to access
Diligence - unlike human, the computer does’nt get tired or lacks educational information from intranet, extranet and internet
its concentration. Due to this characteristics, it over powers sources, or via e-books. They can be used to maintain and
human being in most of the regular tasks. It can monitor student performance, including through the use of
work for hours without any fault. This means that if millions of online examinations, as well as to create projects and
calculations are to be done, a computer will perform every assignments..
calculation and provide all the results with the same accuracy.

3. Healthcare
Versatility - is one of the most wonderful features of computers.
✓ Healthcare continues to be revolutionized by computers. As
This means that the computer has the ability to perform
well as digitized medical information making it easier to store
completely different kinds of works with the same accuracy and
and access patient data, complex information can also be
efficiency at the same time. It is not a calculating machine
analyzed by software to aid discovery of diagnoses, as well as
anymore. E.g.; for one moment it can be used to create invoices
search for risks of diseases. Computers control lab equipment,
or bills, and the next moment it can be used for inventory
heart rate monitors, and blood pressure monitors. They enable
management or any multimedia task, etc.
doctors to have greater access to information on the latest
drugs, as well as the ability to share information on diseases
Reliability - The results obtained by the computer are very
with other medical specialists.
reliable. But this is true only when the data given to the
computer is correct and reliable.
4. Retail and Trade
✓ Computers can be used to buy and sell products online - this
Consistency - The computer is so consistent that it can perform enables sellers to reach a wider market with low overheads, and
trillions of processes without errors for several hours. This buyers to compare prices, read reviews, and choose delivery
means that we can use a computer 24 hours a day or 365 days a preferences. They can be used for direct trading and advertising
year continuously. Furtheremore, it provides consistent results too, using sites such as eBay, Craigslist, or local listings on
for the same set of data, that is, if it is given the same set of data social media or independent websites.
multiple times, it will give the same result each time.
5. Government
Memory - computer has a built-in memory, where it can store ✓ Various government departments use computers to improve
instant data immediately. Here, we are referring to the RAM the quality and efficiency of their services. Examples include city
(primary memory) that holds data as long as the planning, law enforcement, traffic, and tourism. Computers can
computer is connected to a power source. Data is erased from the be used to store information, promote services, communicate
memory after shutting down the computer. In addition, the internally and externally, as well as for routine administrative
computer includes the TROM, the cache memory of different purposes.
levels, virtual memory and others thereby speeding up the
performance.
6. Marketing 15. Military
✓ Computers enable marketing campaigns to be more precise ✓ Computers are used extensively by the military. They are use
through the analysis and manipulation of data. They facilitate for training purposes. They are used for analyzing intelligence
the creation of websites and promotional materials. They can be data. They are used to control smart technology, such as guided
used to generate social media campaigns. They enable direct missiles and drones, as well as for tracking incoming missiles and
communication with customers through email and online chat. destroying them. They work with other technologies such as
satellites to provide geospatial information and analysis.
7. Science
✓ Scientists were one of the first groups to adopt computers as a 16. Social and Romance
work tool. In science, computers can be used for research, ✓ Computers have opened up many ways of socializing that
sharing information with other specialists both locally and didn't previously exist. Social media enables people to chat in text
internationally, as well as collecting, cate gorizing, analyzing, or audio in real time across large distances, as well as exchange
and storing data. Computers also play a vital role in launching, photographs, videos, and memes. Dating sites and apps help
controlling, and maintaining space craft, as well as operating people to find romance. Online groups help people to connect
other advanced technology. with others who have similar interests. Blogs enable people to
post a variety of views, updates, and experiences. Online forums
8. Publishing enable discussions between people on specialist or general topics.
✓ Computers can be used to design pretty much any type of
publication. These might include newsletters, marketing 17. Booking Vacations
materials, fashion magazines, novels, or newspapers. Computers ✓ Computers can be used by travelers to study timetables,
are used in the publishing of both hard-copy and e-books. They examine route options, and buy plane, train, or bus tickets.
are also used to market publications and track sales. They can be used to explore and book accommodation,
whether traditional hotels, or through newer services, such as
Air BnB. Guided tours, excursions, events, and trips can also be
9. Arts and Entertainment
explored and booked online using computers.
✓ Computers are now used in virtually every branch of the arts,
as well as in the wider entertainment industry. Computers can be
18. Security and Surveillance
used to create drawings, graphic designs, and paintings. They can
✓ Computers are increasingly being combined with other
be used to edit, copy, send, and print photographs. They can be
technologies to monitor people and goods. Computers
used by writers to create and edit. They can be used to make,
combined with biometric passports make it harder for people to
record, edit, play, and listen to music.
fraudulently enter a country or gain access to a passenger
airplane. Face-recognition technology makes it easier to
10. Communication
identify terrorists or criminals in public places. Driver plates
✓ Computers have made real-time communication over the
can be auto scanned by speed cameras or police cars. Private
internet easy, thanks to software and videoconferencing services
security systems have also become much more sophisticated
such as Skype. Families can connect with audio and video,
with the introduction of computer technology and internet
businesses can hold meetings between remote participants.
technology.

11. Banking and Finance


19. Weather Forecasting
✓ Most banking in advanced countries now takes place online.
✓ The world's weather is complex and depends upon a
You can use computers to check your account balance, transfer
multitude of factors that are constantly changing. It's
money, or pay off credit cards. You can also use computer
impossible for human beings to monitor and process all the
technology to access information on stock markets, trade stocks,
information coming in from satellite and other technologies,
and manage investments. Banks store customer account data, as
never mind perform the complex calculations that are needed to
well as detailed information on customer behavior which is used
predict what is likely to happen in the future. Computers can
to streamline marketing.
process the large amounts of meteorological info.

12. Transport
20. Robotics
✓ Road vehicles, trains, planes, and boats are increasingly
✓ Robotics is an expanding area of technology which combines
automated with computers being used to maintain safety and
computers with science and engineering to produce machines
navigation systems, and increasingly to drive, fly, or steer. They
that can either replace humans, or do specific jobs that humans
can also highlight problems that require attention, such as low
are unable to do. One of the first use of robotics was in
fuel levels, oil changes, or a failing mechanical part. Computers
manufacturing to build cars. Since then, robots have been
can be used to customize settings for individuals, for example,
developed to explore areas where conditions are too harsh for
seat setup, air-conditioning temperatures.
humans, to help law enforcement, to help the military, and to
assist healthcare professionals.
13. Navigation
✓ Computers combined with satellites mean that it's now easy to
pinpoint your exact location, know which way that you are Earliest Computers originally calculations were computed by
moving on a map, and have a good idea of amenities and places humans, whose job title was computers.
of interest around you.
✓ These human computers were typically engaged in the
14. Working From Home calculation of a mathematical expression.
✓ Computers have made working from home and other forms of ✓ The calculations of this period were specialized and expensive,
remote working increasingly common. Workers can access requiring years of training in mathematics.
necessary data, communicate, and share information without ✓ The first use of the word "computer" was recorded in 1613,
commuting to a traditional office. Managers are able to monitor referring to a person who carried out calculations, or
workers' productivity remotely. computations, and the word continued to be used in that sense
until the middle of the 20th century.
PRIIMITIVE CALCULATION:
d. Punch Card Loom
a. Tally Sticks ✓ also called Jacquard loom is a
✓ A tally stick was an ancient memory mechanical loom, invented by
aid device to record and document Joseph-Marie Jacquard in 1801.
numbers, quantities, or even messages. ✓ It is an automatic loom
controlled by punched cards

✓ Tally sticks first appear as animal bones carved with notches


during the Upper Palaeolithic; a notable example is the Shingo e. Arithmometer
Bone. Marco Polo (1254–1324) mentions the use of the tally in ✓ A mechanical calculator invented
China. Tallies have been used for numerous purposes such as by Thomas de Colmar in 1820
messaging and scheduling, and especially in financial and legal ✓ The first reliable, useful and
transactions, to the point of being currency. commercially successful calculating
machine.
✓ The machine could perform the
b. Abacus
four basic mathematic functions.
✓ An abacus is a mechanical device used
✓ The first mass-produced
to aid an individual in performing
calculating machine.
mathematical calculations.
✓ The abacus was invented in Babylonia
in 2400 B.C.
✓ invented by Chinese Suan Pan in 300 f. Analytical Engine
B.C. ✓ invented by an English
✓ It used to perform basic arithmetic operations. mathematician Charles Babbage in
✓ in Japan called “ SOROBAN “ 1834 (father of computer), which lead
✓ in Russia called “ SCHOTY “ down to the foundation of modern
computers.
✓ assisted by Augusta (lady) Ada
c. Quipo Inca Byron who was credited as the “ first
✓ making knots on the string used by lady programmer. “
Incas in Peru.

g. Scheutzian Calculation Engine


d. Napier Bones
✓ Invented by John Napier in 1614. ✓ Invented by Per Georg
✓ Allowed the operator to Scheutz in 1843.
multiply, divide and calculate ✓ Based on Charles Babbage's
square and cube roots by moving difference engine.
the rods around and placing them ✓ The first printing calculator.
in specially constructed boards.

EARLY MECHANICAL CALCULATORS: h. Odhner Calculator


✓ developed by Willgodt
a. Slide Rule Ohdner in 1870, an
✓ Invented by William Ought red improvised designed of
in 1622. Leibniz
✓ Is based on Napier's ideas about
logarithms.
✓ Used primarily for
multiplication, division, roots, i. Cash Register
logarithms, Trigonometry ✓ invented by John H.
✓ Not normally used for addition Patterson in 1884.
or subtraction.

b. Pascaline j. Marconi Box


✓ Invented by Blaise Pascal ✓ Forerunner of
in 1642. comptometer which
✓ It was its limitation to developed by Dorr E. Felt in
addition and subtraction. 1887.
✓ It is too expensive ✓ chief advantages were
✓ First Adding Machine speed, versatility, and ease of
used for over 300 yrs use.

k. 10 Key Adding Machine


c. Stepped Reckoner
✓ Invented by Gottfried Wilhelm ✓ first adding machine to
Leibniz in 1672. perform multiplication by
✓ Called as calculating machine direct method, developed by
✓ The machine that can add, Leon Bollee in 1887.
subtract, multiply and divide
automatically.
l. Tabulating Machine
✓ Invented by Herman
Hollerith in 1890.
✓ To assist in summarizing e. Whirlwind
information and accounting. ✓ first real-time high-speed digital computer using random
✓Also called Hollerith Punch access magnetic-core memory. Whirlwind featured outputs
Card Machine displayed on a CRT, and a light pen to write data on the screen.
✓commonly called “Census ✓ can perform 300,000 addition and 6,000 multiplication
Machine“, per second credit was given to Jay Wright Forrester

f. UNIVAC 1 ( Universal Automatic computer )


✓ first business Data processing Machine which can stored data
m. Power Punch Card system and program in memory.
✓ was the first commercial computer and designed by John
developed by James Power in 1910.
Presper Eckert and John Mauchly.

g. The First Portable Computer


✓ Osborne 1 – the first portable computer.
EARLY MECHANICAL CALCULATORS: ✓ Released in 1981 by the Osborne Computer Corporation.
✓ The First Commercially Successful "Portable" Computer
a. MARK 1
✓ an automatic calculating machine developed by Howard
h. The First Computer Company
Aiken in 1937, it can add and subtract 3/10 of a second, can
✓ The first computer company was the Electronic Controls
multiply in 6 seconds and process up to 23 digits
Company.
✓ lso known as the IBM Automatic Sequence Controlled
✓ Founded in 1949 by John Presper Eckert and John Mauchly.
Calculator
✓ The first electro-mechanical computer.
BASIC COMPUTING PERIODS: AGES
b. SSEC
1. Pre Mechanical
✓ was the first computer that could modify a stored
✓ The pre mechanical age is the earliest age of information
program. It featured 12,000 vacuum tubes and 21,000
technology. It can be defined as the time between 3000B.C. and
electromechanical relays.
1450A.D. We are talking about a long time ago. When humans
✓ installed at IBM New York in 1947 which is 100 times faster
first started communicating they would try to use language or
than MARK 1
simple picture drawings known as petroglyths which were
c. Z1 usually carved in rock. Early alphabets were developed such as
✓ The first programmable computer. the Phoenician alphabet.
✓ It was a binary electrically driven mechanical calculator
with limited programmability, reading instructions from 2. Mechanical
punched tape The mechanical age is when we first start to see connections
✓ Created by Konrad Zuse in Germany from between our current technology and its ancestors. The
1936 to 1938. mechanical age can be defined as the time between 1450 and
✓ To program the Z1 required that the user insert punch tape 1840. A lot of new technologies are developed in this era as there
into a punch tape reader and all output was also generated is a large explosion in interest with this area. Technologies like
through punch tape. the slide rule (an analog computer used for multiplying and
dividing) were invented.
EARLY ELECTRONIC MACHINE
3. ElecroMechanical
a. ABC (Atanasoff Berry Computer) Now we are finally getting close to some technologies that
✓ built by Dr. Atanasoff and Clifford Berry which consists resemble our modern-day technology. The electromechanical age
memory of 45 vacuum tubes. can be defined as the time between 1840 and 1940. These are the
✓ It was the first electronic digital computing device. beginnings of tele communication. The telegraph was created in
the early 1800s. Morse code was created by Samuel Morse in
b. ENIAC (Electronic Numerical Integrator And Calculator) 1835. The telephone (one of the most popular forms of
✓ invented by John W. Mauchly and J. Presper Eckert in 1946, communication ever) was created by Alexander Graham Bell in
which can perform 5,000 addition and 3,000 multiplication per 1876. The first radio developed by Guglielmo Marconi in 1894.
second using 18,000 vacuum tubes.
✓ It was the first electronic general-purpose computer. 4. Electronics
The electronic age is what we currently live in. It can be defined
as the time between 1940 and right now. The ENIAC was the
c. EDVAC (Electronic Discrete Variable Automatic Computer)
first high-speed, digital computer capable of being
✓ developed by Dr. John Von Neumann in 1946 which is
reprogrammed to solve a full range of computing problems. This
smaller and more versatile than ENIAC.
computer was designed to be used by the U.S. Army for artillery
firing tables. This machine was even bigger than the Mark 1
d. EDSAC ( Electronic Delay Storage Automatic Calculator )
taking up 680 square feet and weighing 30 tons.. It mainly used
✓ was originally built in in the Cambridge University
vacuum tubes to do its calculations.
Mathematical Laboratory by a team lead by the late Professor
Sir Maurice Wilkes.
The Fifth Generation
HISTORY OF COMPUTER: GENERATIONS OF
✓ This generation employs the implementation of microchips,
COMPUTER
virtual memories that leads to the advancement of robotic
theory.
The First Generation ✓ Fifth generation computing devices, based on artificial
✓ The first computers used vacuum tubes for circuitry and intelligence, are still in development, though there are some
magnetic drums for memory, and were often enormous, taking up applications, such as voice recognition, that are being used
entire rooms. They were very expensive to operate and in addition today. The use of parallel processing and superconductors is
to using a great deal of electricity, generated a lot of heat, which helping to make artificial intelligence a reality. Quantum
was often the cause of malfunctions. computation and molecular and nanotechnology will radically
✓ First generation computers relied on machine language, the change the face of computers in years to come. The goal of
lowest- level programming language understood by computers, to fifth-generation computing is to develop devices that respond to
perform operations, and they could only solve one problem at a natural language input and are capable of learning and self
time. Input was based on punched cards and paper tape, and organization
output was displayed on print outs. ✓ Based on Artificial Intelligence (AI). Still in development.
The use of parallel processing and superconductors is helping to
make artificial intelligence a reality. The goal is to develop
The Second Generation devices that respond to natural language input and are capable
✓ moved from cryptic in binary machine language to symbolic, of learning and self-organization. There are some applications,
or assembly, languages, which allowed programmers to specify such as voice recognition, that are being used today.
instructions in words. High-level programming languages were
also being developed at this time, such as early versions of
CLASSIFICATION OF COMPUTERS
COBOL (Common Business Oriented Language) and
FORTRAN (FORmula TRANslation). These were also the first 1. According to Age of Technology:
computers that stored their instructions in their memory, which a. First Generation ( early 1940's – 1958 ) – uses vacuum tubes
moved from a magnetic drum to magnetic core technology. b. Second Generation ( 1959 – 1964 ) – uses diodes and
✓ Transistors replaced vacuum tubes and ushered in the second transistors
generation of computers. One transistor replaced the equivalent c. Third Generation ( 1965 – 1970 ) – uses integrated circuits
of 40 vacuum tubes. Allowing computers to become smaller, d. Fourth Generation ( 1970 – 1990's and beyond) – uses LSIC,
faster, cheaper, more energy-efficient and more reliable. Still VLSIC, microprocessor
generated a great deal of heat that can damage the computer. e. Fifth Generation ( Present to Future) – uses microchips,
Second- generation computers moved from cryptic binary virtual memory, artificial intelligence and robotics.
machine language to symbolic, or assembly, languages, which
allowed programmers to specify instructions in words. How 1st generation is characterized:
✓ They were big in terms of size
✓ hey generated a lot of heat
The Third Generation
✓ They used punched card as their mode of input
✓ Integrated solid-state circuitry, improved secondary storage
✓ They had an operation speed of 40, 000 operation/second
devices, and new input/output devices were the most
✓ They only required experts to operate
important advances in this generation. The new circuitry
✓ They used vacuum tubes as their principle logic element
increased the speed of the computer by a factor of about
10,000 over the first generation computers. Arithmetic and
logical operations were being performed in microseconds or 2. According to Size and Capacity:
even nanoseconds. There were related developments that a. microcomputer – 8 to 16 bits with 4K to 64 k storage
followed. Because of the faster speed of operation, more than locations
one program could be run through the computer at the same ex. Apple 2, TRS 80, Genie III
time. The smaller size chips improved the computing power b. minicomputer – 16 bits with 8 K to 256 K memory storage
and storage capacity of computers. locations
✓ The development of the integrated circuit was the hallmark of ex. IBM System 3, Honeywell 200
the third generation of computers. Transistors were miniaturized c. mainframe – 32 bits above
and placed on silicon chips, called semi conductors, which
drastically increased the speed and efficiency of computers. It How 2nd generation is characterized:
could carry out instructions in billionths of a second. Much • This was in the 1950s
smaller and cheaper compare to the second-generation • The principle logic element was Transistors
computers. words. • Smaller in size compared to the First Generation computers
• Their operation speed was 200, 000 operations per second
• Their internal memory was inform of magnetic core/ drum
The Fourth Generation and stored data on magnetic tapes
✓ The major innovations were in the development of
microelectronics and in the development of different areas in 3. According to Operation or the Data Handled::
computer technology such as multiprocessing, multi a. Digital Computer
programming, miniaturization, time-sharing, operating speed, b. Analog Computer
and virtual storage. Because of microprocessors, the fourth c. Hybrid Computer
generation includes large computers that are much faster, much
less expensive, and of much greater data processing capacity than How 3rd generation is characterized:
equivalent-sized third generation computers. ✓Numerous Transistors were concentrated on a small surface to
form ICs that served as the computer’s principle logic element.
✓Their processing speed was higher, 1, 000, 000 operations per
second.
✓Smaller than the first and Second Generation Computers.
✓They were multitasking in nature.
✓They had higher internal storage
a. Desktop Case - designed to sit horizontally on a surface, so
4. According to Design and Purpose
that it is wider than it is long.
a. General Purpose Computer
b. Tower Case - designed to sit vertically on a surface, so that it
b. Special Purpose Computer
is higher than it is wide.
✓ Mini-sized Tower Cases
How 4th generation is characterized:
✓ Mid-sized Tower Case
✓ They are the computers in use today
✓ Full-sized tower Case
✓ They are the smallest in size
✓ They have higher processing speed
2. Motherboard - is the biggest printed circuit board of computer
✓ They have large internal memory
it is sometimes called as main board, or system board. It is where
✓ They are relatively cheap compared to others
CPU, expansion slots, expansion cards, CMOS battery, memory
slots, memory cards IDE controllers etc. are located and fitted.
5. According to Application
3. Main Memory (RAM) – Random Access Memory
a. Business
4. Secondary Storage (Drives) HDD (Hard Disk Drive), FDD
b. Scientific
(Floppy Disk Drive), CD/DVD Drive, flash drive
5. System Power Supply
How 5th generation is characterized:
6. SATA (Serial Advanced Technology Attachment), IDE
• They are many predictions that by the end of this century
(integrated drive electronics), Floppy Controllers and cables
computers will have been developed which will be able to
respectively
converse with people in a human like manner and which will be
7. CMOS Battery and others
able to mimic human senses, manual skills and intelligence For
8. CPU - is a chip attached to the motherboard that carries out
example; Mobiles accept voice input/ output
the instructions of a computer program. It performs the basic
arithmetical, logical, and input/output operations of a computer
system. The CPU is like the brain of the computer - every
LESSON #2 : FAMILIARIZING instruction, no matter how simple and

COMPUTER (part 2) complex it has to go through the CPU.


✓ Control Unit – controls the entire operation and operations of
other unit, it also sequences the operation within the computer.
COMPUTER - is a group of interacting or interrelated elements
✓ ALU ( Arithmetic Logic Unit ) – performs the mathematical
that act according to a set of rules to form a unified whole.
and logical operations of the computer.
✓ Memory – storage place for data, instructions, and
SYSTEM - The term system comes from the Latin word systēma
information.
"whole concept made of several parts or members," “literary
composition"
THE MEMORY
COMPUTER SYSTEM - consists of a group of components
1. ROM ( Read Only Memory ) – refers to memory chips that
that interact together for the purpose of manipulating data and
only can be read and used; that is, they cannot be modified.
presenting accurate results through the aid of computer
ROM is nonvolatile memory, meaning that its contents are not
program.
lost when the computer’s power is turned off.
Kinds of ROM:
✓ PROM ( Programmable ROM ) – allows user to store data by
applying high currents termed as “burning in.“
✓ EPROM ( Erasable PROM ) – uses MOSFET and data can
be erased by exposing to ultraviolet light.
✓ EAPROM ( Electrically Alterable PROM ) – can be erased
by electrical signal.
✓ EEPROM ( Electrically Erasable PROM ) – can be erased by
electrical pulses, charge and voltage
✓ Flash Memory - memory chip that is nonvolatile, re-writable
that functions like a combination random access memory and a
BASIC COMPONENTS OF COMPUTER: hard disk drive. In the case of power being lost, data is retained
in memory.
Input Unit – reads the data
ex. : keyboard, mouse, scanner, card reader
2. RAM (Random Access Memory) consists of memory chips
that the processor can read from and write to. RAM is
Output Unit – presents the results of the manipulated data
volatile memory, meaning that its contents are lost when the
ex.: monitor, printer, speaker, buzzer, lights
computer’s power is turned off.
Kinds of RAM:
System Unit - sometimes called the chassis, is a box like case
✓ DRAM (Dynamic RAM) - The most common type of
housing the electronic components of a computer that are used
computer memory. DRAMs hold data for a relatively brief
to process data. System unit components include the
period of time and need to be refreshed at regular intervals.
motherboard, disk drives, system power supply, processor,
✓ SRAM (Static RAM) - A memory chip that retains memory
memory module, cards, ports, connectors etc.
and does not need refreshing. Another advantage of SDRAM
is that it synchronizes with the CPU timing.
THE SYSTEM UNIT COMPONENTS ✓ DDR SDRAM (Double Data Rate SDRAM) is synchronous
1. System Case - also termed as computer case, computer dynamic RAM (SDRAM) that can theoretically improve
chassis or cabinet, is a small enclosure or box into which all the memory clock speed.
major computer components and peripherals are fitted. System
case has front panel, back panel, bays and cover. Computer
cases can be broadly classified into 2 different categories.
Firmware – the systems software stored in a computer’s read-
FUNDAMENTAL ELEMENTS only memory (ROM) or elsewhere in the computer’s circuitry,
Hardware – refers to the physical equipment or components of such as the basic input-output system (BIOS) chips in the IBM
an electronic data processing system. It may also referred to as PC-compatible computers.
the machinery that performs the mechanics of operations. Compiler - is a program that translates the entire piece of source
a. Keyboard – the most frequently used input device. The code into an object code.
keyboard provides a set of alphabetic, numeric, punctuation, Interpreter - is a program that analyzes and executes each line of
symbol, and control keys. When a character key is pressed, a source code in succession, without looking at the entire
coded input signal is sent to the computer, which echoes the program.
signal by displaying a character onscreen. ✓ Source Code - is the version of a computer program as it is
b. Monitor – this device produces an on-screen image, including originally written (i.e., typed into a computer) by a human in a
display and all necessary internal support circuitry. programming language.
c. Motherboard – a circuit board that contains the computer’s ✓ Object Code - is the output of a compiler after it processes
central processing unit, microprocessor support chips, random- source code
access memory, and expansion slots.
d. Mouse – small handheld device that is dragged across a flat
surface to move the cursor on a computer screen, typically
having buttons that are pressed to control functions.
e. CPU- this is the computer’s internal storage, processing, and
control circuitry including the arithmetic-logic unit(ALU), the
control unit, read-only memory (ROM) and random access
memory (RAM).

Software – Organized information in the form of operating Installation - is simply to prepare or set in, both hardware and
systems, utilities programs, and application programs that software into the computer for use.
enable computers to work. A set of instructions, stored digitally ✓ Hardware Installation - is the term used to describe the
within the computer's memory, which tells the computer system process of physically connecting correctly a component
what to do. within a computer.
✓ Software Installation - is the process or creating and
Types of Software: moving all of the necessary files to run a software program
1. System Software (Operating Systems) – is the software used on a computer hard drive.
to manage and control the hardware components and which
allow interaction between the hardware and the other types of Types of Software Installations
software. The most obvious type of system software is the • Manual software installation - When you download, what
computer's operating system. e.g. DOS, Windows, Linux, Unix you get is the software program itself, complete and ready
to run. This software will run from anywhere - from the
2. Application Software – handles multitudes of common and Desktop, from a floppy, or from a USB memory stick.
specialized tasks a user wants to perform, such as accounting, • Imaged Installation - This type of installation is very useful if
communicating, data processing, word processing database there has been some data loss or corruption because what
management and the like. e.g. MS WORD, MS EXCEL Imaged Installation does is it creates a disk image (computer
file, usually an ISO) containing the complete contents and
Others: structure of a data storage medium or device. It is also good if a
a. Network Software – enables the group of computers to user wants to “ghost” their computer back to its original state -
communicate. similar to a reformat.
e.g. Windows NT, Client for Microsoft Network, Novell • Software-assisted installation - This is usually where you have
b. Language software – provides programmers the tools access to a setup file (installer) and have to execute it, run
they need to write programs. e.g. Visual Basic, Turbo Pascal, through its GUI instructions, and then it will finish installing
Fox Pro, Clipper, C++ itself (usually requires a restart of a computer). This is the most
c. Utility software - These programs are designed to help you commonly used type of installation.
manage the computer or diagnose or fix problems. • Scripted installation - this type of installation is done using the
e.g. anti-virus, firewalls, disk defragmenters command prompt and a series of scripts. Advantages are that it
d. Driver Software - a special type of program that allows can be quicker and more customizable when installing an
specific hardware to work. This type of software comes with the application this way. Disadvantages are that this type of
hardware it supports. e.g. web cam driver, print driver, NIC installation is only recommended for more experienced users.

Category of Software:
What is Software Copyright?
a. Open Source Software – refers to something that can be
✓ When someone creates an original piece of software, that
modified because its design is publicly accessible. This software
person then holds something called the copyright for that
the source code is available for modification or enhancement by
software. (This is also true when people create books, films
anyone. Thus, it is not exclusive property or design of particular
and songs.)
vendor. e.g. UNIX, LINUX, Open office
✓ It is used by proprietary software companies to prevent the
unauthorized copying of their software.
b. Proprietary Software– software products are designed for
✓Holding the copyright for software means that you have the
particular systems and cannot be used with other hardware.
protection of the law if anyone tries to steal your software.
These software are exclusive property of their developers or
publishers, and cannot be copied or distributed without
Under copyright law, people must not:
complying with their licensing agreements. e.g.. MAC OS X,
✓ Copy the software for other people
Android, Photoshop
✓ Lend the software to other people
✓ Rent the software to other people
Peopleware – represents the personnel involved in systems
✓ Install the software on a network when other users can access
analysis, programming, computer operations, systems
it (unless it is a special ‘network’ version)
maintenance and the like.
What is a Software License?
✓ is a document that provides legally binding guidelines on the
LESSON #3: web and the internet
use and distribution of software. Web and the Internet are two things that works hand in hand
✓ software licenses typically provide end users with the right to to allow the exchange of information globally, a web is simply
one or more copies of the software without violating copyrights. a subset of internet.
The license also defines the responsibilities of the parties
entering into the license agreement and may impose restrictions WEB
on how the software can be used. ✓an interconnected system of public webpages accessible
through the Internet.
✓The World Wide Web
Types of Licenses
✓ Freeware - Freeware software is created by an author and put
INTERNET
into the public domain; there are no copyright restrictions. It
✓the “Net" is a worldwide system of computer network
can be copied and distributed freely.
✓The “information superhighway”
✓ Shareware - software that the developer encourages you to
copy and distribute. This permission is explicitly stated in the OVERVIEW
documentation. In today era, everybody turns to internet in their everyday
✓ Limited License (LL) - an agreement whereby software is activities. To search for an answer of things around us the
purchased with limits and/or restrictions on the number of internet is there for us to assist and help what we are looking
copies available for installation or use. for. Basically, internet is just a global interconnection of
✓ Unlimited Site License (USL) - an agreement whereby computers that are link to one another. Which such
software is purchased with no limit on the number of copies technology, people are able to communicate, access and
available for installation. search anywhere as long as it is connected in the net. Internet
✓ Volume Purchase Agreement (VPA) - an agreement whereby is also defined as an information superhighway, to access
software is purchased in large volume at a reduced price. information over the web. However, it can be defined in
many ways, internet is a world-wide global system of
interconnected computer networks.

PART 1: THE WEB

Where the Web was born?


Tim Berners-Lee, a British scientist, invented the World Wide
Web (WWW) in 1989, while working at CERN. The Web was
originally conceived and developed to meet the demand for
automated information-sharing between scientists in
universities and institutes around the world. CERN is not an
isolated laboratory, but rather the focal point for an extensive
SOFTWARE LICENSE AGREEMENT community that includes more than 17 000 scientists from
A software license agreement is a legal document that stipulates over 100 countries. Although they typically spend some time
several key conditions between a software company or on the CERN site, the scientists usually work at universities
developer and a user to allow use of the software. These and national laboratories in their home countries. Reliable
conditions are designed to protect the developer’s intellectual communication tools are therefore essential.
property rights and to limit claims against them for potential
damage resulting from use of their software. The name CERN is derived from the acronym for the French
The primary purpose of the agreement, however, is to provide "Conseil Européen pour la Recherche Nucléaire", or
detailed ground rules for use of the software: European Council for Nuclear Research, a provisional body
✓ Where the software may be installed and how many founded in 1952 with the mandate of establishing a world-
instances may be installed. class fundamental physics research organization in Europe
✓ How the software can be used.
✓ Whether the software may be copied, modified, or Where the Web was born?
redistributed. The basic idea of the WWW was to merge the evolving
✓ Any copyrights that apply to the software. technologies of computers, data networks and hypertext into a
✓ Ownership of the software most often specifying that the powerful and easy to use global information system. Tim
provider retains all rights of ownership. Berners-Lee proposed the architecture of what became known
✓ Duration of the terms of the agreement. as the World Wide Web. He created the first web server, web
✓ What constitutes correct usage of the software. browser, and webpage on his computer at the CERN physics
research lab in 1990. In 1991, he announced his creation on
What are the benefits of software licensing? the alt.hypertext newsgroup, marking the moment the Web
✓ Allows you to legally distribute software within your was first made public.
organization as covered by the licensing agreement.
✓ Provides expert help and advice whenever you have a concern The system we know today as "the Web" consists of several
or query regarding your software licensing agreement. components:
✓ Preferential pricing and Volume discounts are available on ✓ The HTTP protocol governs data transfer
most programs. between a server and a client.
✓ Selected programs include technical support. ✓ To access a Web component, a client supplies
✓ Improves the manageability of your software assets. a unique universal identifier, called a URL (uniform resource
✓ Volume licensing simplifies and streamlines all your software locator) or URI (uniform resource identifier) (formally called
purchasing, re-ordering and accounting procedures. Universal Document Identifier, UDI)).
✓ HTML (hypertext markup language) is the most common
What is End User License Agreement (EULA)? format for publishing web Documents.
✓ is a legal contract between a software application author or
publisher and the user of that application.
Linking, or connecting resources through hyperlinks, is a Example of Web 2.0 are the following:
defining concept of the Web, aiding its identity as a collection
of connected documents. Soon after inventing the Web, Tim A. Social Networking - is the use of Internet-based social media
Berners- Lee founded the W3C (World Wide Web sites to stay connected with friends, family, colleagues,
Consortium) to standardize and develop the customers, or clients. Social networking can have a social
Web further. This consortium consists of core Web interest purpose, a business purpose, or both, through sites such as.
groups, such as web browser developers, government entities, Example:
researchers, and universities. Its mission includes education ➢ Facebook, twitter, google+, pinterest, Instagram, Page
and outreach.
B. Blogs - is a discussion or informational website published on
Various Definition of Web (World Wide Web) the world wide web consisting of discrete, often informal diary-
✓ is simply known as "web" it consists of all the public web style text entries (posts). Posts are typically displayed in reverse
sites connected to the Internet worldwide chronological order, so that the most recent post appears first,
✓ consists of information organized into Web pages at the top of the web page.
containing text and graphic images. Example:
✓ web is larger collection of interconnected documents or ➢ Wordpress , Blogger ,Tumblr
content. It contains hypertext links, or highlighted keywords
and images that lead to related information C. Wikis - is a hypertext publication collaboratively edited and
✓ refers to all the public websites or pages that users can access managed by its own audience directly using a web browser. A
on their local computers and other devices through the typical wiki contains multiple pages for the subjects or scope of
internet. These pages and documents are interconnected by the project and may be either open to the public or limited to
means of hyperlinks that users click on for information. use within an organization for maintaining its internal
✓ commonly referred to as WWW, W3, or the Web is an knowledge base.
interconnected system of public webpages accessible through Example:
the internet. The Web is not the same as the Internet: the Web ➢ Wikipedia,Wikibooks
is one of many applications built on top of the Internet.
✓ one of many applications of the Internet. D. Video Sharing Sites - a website that lets people upload and
✓ It follows only one protocol called the HTTP (Hyper Text share their video clips with the public at large or to invited
Transfer Protocol). guests.
✓ A collection of linked Web pages that has a common theme Example:
or focus is called a Web site. ➢ Youtube, Facebook
✓ The main page that all of the pages on a particular Web site
are organized around and link back to is called the site’s home Key Features of Web 2.0 :
page ✓ Folksonomy – allows users to categorize and classify/arrange
information using freely chosen keywords (e.g. tagging).
WEB VERSIONS ✓ Rich User Interface – content is dynamic and is responsive to
1. WEB 1.0 (Read - Only Static Web) user’s input. An example would be a website that shows local
✓ It is an old internet that only allows people to read from the content.
internet. First stage worldwide linking web pages and hyperlink. ✓ User Participation – the owner of website is not the only one
Web is use as “information portal”. It uses table to positions and who is able to put content. Others are able to place a content on
align elements on page. their own by means of comments, reviews, and evaluation.
➢ Most read only web. It focused on company’s home pages. ✓ Long Tail – services are offered on demand rather than on a
➢ Dividing the world wide web into usable directories one-time purchase. This is synonymous to subscribing to a data
➢ It means web is use as “Information Portal” plan that charges you for the amount of time you spent on
➢ It started with the simple idea “put content together” Internet or a data plan that charges you for the amount of
bandwidth you used.
Example of Web 1.0
➢ Mp3.com, Home page, HTML, Page view 3. WEB 3.0 (Read – Intelligent Web)
✓ Suggested name by John Markoff of the New York Times for
2. WEB 2.0 (Read – Write Interactive Web) the third generation of the web.
✓ A term used to describe a new generation of Web services ✓ In this generation, all the application on web or mobile will
and applications with an increasing emphasis on human be upgraded with more features. It applies same principles as
collaboration. Web 2.0: two-way interaction.
➢ It is a platform that gives users the possibility (liberty) to ✓ Web 3.0 will be more connected, open, and intelligent, with
control their data semantic web technologies, distributed databases, natural
➢ This is about user-generated content and the read-write web language processing, machine learning, machine reasoning and
➢ People are consuming and contributing information autonomous agents.
through blogs or sites ✓ Semantic Web - provides a framework that allows data to be
➢ Allows the user to interact with the page known as shared and reuse to deliver web content specifically targeting
DYNAMIC PAGE; instead of just reading a page, the user the user.
may be able to comment or create a usermaccount. Dynamic ✓ It is a web of data, it makes objects talk to each other,
page refers to the web pages that are affected by user input or ✓ Changing the web into a language that can be read and
preference. categorized by the system rather than humans.
➢ Is focused on the ability for people to collaborate
and share information online via social media, blogging and
Web-based communities
TYPES OF WEBSITES
PART 2: THE INTERNET
ECommerce Website - is a website people can directly buy
The Internet or “net” (network of networks) is the largest
products from. you’ve probably used a number of ECommerce
computer network in the world that connects billions of
websites before, mostly for big brands and plenty of smaller
computer user. The word internet comes from combination
ones. Ecommerce or electronic commerce refers to a business
between “interconnection” and “network”. Network is a
model that involves sales transactions being done on the web.
collection of computers and devices connected via
communication channels and transmission media allow to
Business Website - is any website that’s devoted to representing
share resources (hardware, software, data, information).
a specificbusiness. It generally serves as a space to provide
Generally, nobody owns the internet.
general information about your company or a direct platform
for e-commerce
HISTORY OF INTERNET
Entertainment Website - is a website that focuses on creating
high quality content that is entertaining for the target audience. ARPA (Advanced Research Project Agency) - January 2, 1969
It could be anything from information pieces and news to started an experimental computer network. Concept of No
videos, films to blog posts, or even films. Server, but equal importance/participation to every computer
in the network. Even if, one or two node destroyed that will
Media Website - collect news stories or other reporting. There’s now affect the network. In 1982 the word internet started.
some overlap here with entertainment websites, but media 1986 First “ free net” created in Case Western Reserve
websites are more likely to include reported pieces in addition University 1991: US government allowed business agencies to
to or instead of content meant purely for entertainment. connect to internet. Now all people can connect to the internet
and improve their life and work quality. The internet support
Portfolio Website - are sites devoted for showing examples of various aspects in our life. Vinton Gray Cerf ForMemRS is an
past work. Service providers who want to show potential clients American Internet pioneer and is recognized as one of "the
the quality of the work they provide can use a portfolio website fathers of the Internet", sharing this title with TCP/IP co
to collect some of the best samples of past work they’ve done. It developer Bob Kahn
is an online representation of work you have created, as well as
your skills and experiences. It could be a website, blog, or even
The Internet, sometimes called simply "the Net," is a
a video channel.
worldwide system of computer networks, a network of
networks in which users at any one computer can, if they have
Infopreneur Website - essentially informational websites that
permission, get information from any other computer (and
additionally serve as a sales portal to information-based
sometimes talk directly to users at other computers). It was
products or services. They represent a unique type of online
conceived by the Advanced Research Projects Agency
business. Infopreneurs create and sell information products.
(ARPA) of the U.S. government in 1969 and was first known
That could be in the form of courses, tutorials, videos or
as the ARPANET. The original aim was to create a network
eBooks
that would allow users of a research computer at one
university to "talk to" research computers at other
Brochure Website - is an informational website that is designed
universities. A side benefit of ARPA Net's design was that,
to look and feel like a printed brochure. It contains compelling
because messages could be routed or rerouted in more than
text and images that advertise a company's products or services,
one direction, the network could continue to function even if
and typically ranges from one to five pages.
parts of it were destroyed in the event of a military attack or
other disaster. Today, the Internet is a public, cooperative and
Nonprofit Website - A nonprofit website is the easiest way for self-sustaining facility accessible to hundreds of millions of
many potential donors to make donations and will be the first people worldwide. It is used by many as the primary source of
place many people look to learn more about a nonprofit and information consumption, and fueled the creation and growth
determine if they want to support it. of its own social ecosystem through social media and content
sharing. Furthermore, e-commerce, or online shopping, has
Educational Website - websites that have games, videos or topic become one of the largest uses of the Internet.
related resources that act as tools to enhance learning and
supplement classroom teaching. These websites help make the Various Definition of Internet
process of learning entertaining and attractive to the student, ✓ the Internet, is also called "the Net," it is a worldwide
especially in today's age. system of computer networks
✓ a network of networks in which any users can get
Personal Website – websites created by an individual to contain information from any other computer provided it is for
content of a personal nature rather than content pertaining to a public domain.
company. This category includes personal blogs, vlogs, and ✓ It was conceived by the Advanced Research Projects
photo diaries people share with the world Agency (ARPA) of the U.S. government in 1969 and was first
known as the ARPANet.
Wiki or Community Forum Website - A wiki is any website ✓ The original aim was to create a network that would allow
where various users are able to collaborate on content and all user from a research computer at one university to "talk to"
make their own tweaks and changes as they see fit. research computers to other universities.
✓ a global computer network providing a variety of
Web Portal - are often websites designed for internal purposes information and communication facilities, consisting of
at a business, organization, or institution. They collect interconnected networks using standardized communication
information in different formats from different sources into one protocols.
place to make all relevant information accessible to the people
who need to see it.
BENEFITS OF INTERNET Education
✓ Availability (Operates 24 hours, 7 days a week) The Internet offers a wealth of educational material on any
✓ Vast Range of Information subject with structured navigation and search facilities. Those
✓ Up-to-date and Immediate Distribution of Information who cannot attend physical (face-to-face) classes can take an
✓ Easy to Connect People online course where they get connected to the teacher, in the
✓ Access to other Culture other part of the world, in video mode and get taught on the
✓ On-line Activities subject backed up by other audiovisual tools.
.
USES OF INTERNET Collaboration
➢ Look for information Online chat tools like messenger, Skype, and other video
➢ School works, jobs, and home purposes conferencing tools help people to get connected 24 x7 and have
➢ Send and receive electronic mail hassle-free business and personal discussions.
➢ Video teleconferencing (videocall, video chat)
➢ Buy and sell product
MAJOR COMPONENTS OF THE INTERNET
➢ Social networking
➢ Watch & post videos
1. Servers – is a computer program that provides service to
➢ Games
another computer program and it’s user.
➢ Take college courses
Types of Servers
➢ Monitor home while away
✓ Application Server – a program in computer that provides the
➢ Financial transactions
business logic for an application program.
➢ Download music and movies
✓ Web Server – a computer program that serves requested
HTML pages or files.
Top 8 USES OF INTERNET ✓ Proxy Server – is a software that acts as an intermediary
between an endpoint device, such as computer and another
Electronic Mail (email)
server from which a user is requesting.
The first major use of the internet is Email. People used to
✓ Mail Server – is an application that receives incoming e-mail
email for sharing information, data files, Photos, Videos,
from local users and remote senders and forward outgoing e-
Business communications, and more. This has enabled faster
mail for delivery
communication between people and improved business
✓ File Server – is a computer responsible for central storage
efficiency. An email has reduced paper usage and the load on
and management of data files so that other computer on the
physical mail systems.
same network can access them.
✓ Policy Server – is a security component of a policy, based
FTP File Transfer
network that provides authorization services and facilities
This is the second major use case for the internet in the early
tracking and control of files.
days. FTP is the file transfer protocol that enables data
exchange between two stakeholders over internet
2. IP Address (Internet Protocol) – is a numerical label
media in a secure way.
assigned to each device. This provides identity to a network
device.
Social Networking
➢ IP V4 - consist of 32 bits
Internet connects people online and enables them to form
- written in decimal, referred to as the dotted-decimal format.
social groups. Information, Ideas, views, and opinions on
- formatted as four 8-bit fields that are separated by periods.
social/political issues are exchanged. Political and social
- made of Network Part (Address) and Host Part (Address)
organization uses this platform to promote their interest
- 129.144.50.56
among the public.
➢ IP V6 - consist of 126 bits
- written using hexadecimal
Search Engines
- made of 8 groups or blocks separated by a : (colon)
These engines locate the information one seeks, available on
- 1 st 48 bits for Global Unicast Address, the 16 its for Subnet
whichever server across the globe (world wide web). Google,
ID and l64 bits for Interface ID
Yahoo, and MSN are renowned search engines
- 2001:0:9d38:6ab8:1c48:3a1c:a95a:b1c2
today. One can search for anything on this site, and the search
question can be in any format. People have started using the
3. Browser – is an application program that provides a way to
word Google as a generic verb synonymous with
look information on the web. Example of browsers are Google
search.
chrome, safari, internet explorer, opera, Mozilla.

E-Commerce
4. Domain Name System (DNS) – is the phonebook of
The Internet enables the selling of goods and services in online
internet. We access information online through domain names.
mode. Many e-commerce platform vendors like Amazon and
Ola aggregate several products/services available in the market
5. Internet Service Provide (ISP) – is an organization that
and sell them through their portal to customers.
provides services for accessing, using or participating in the
internet.
Cashless Transactions
Two types of ISP:
Bill Payment at merchandise outlets through debit cards and
➢ National ISP – provided internet access to a specific
credit cards is increasing. Cash circulation gets reduced in the
geographic area
system to the extent of the growth of these transactions. It’s
➢ Regional ISP – business that provides internet access in
growing by more than 50% yearly and is expected to grow by
cities and towns nationwide
10 times over the next 5 years.
Example of ISP: Sky Broadband, PLDT, Converge
INTERNET TERMS AND DEFINITION LESSON #4 (part 1): The
✓ Internet - A global network of thousands of computer Netiquette and the Computer
networks linked by data lines and wireless systems. Ethics
✓ Web – a collection of billions of webpages that you can view
with a web browser What is Ethics?
✓ Email – the most common method of sending and receiving ✓ The word "ethics" is derived from the Greek word ethos
messages online (character), and from the Latin word mores (customs).
✓ Social Media – websites and apps that allow people to share
comments, photos, and videos What is Computer Ethics?
✓ Online Gaming – games that allow people to play with and ✓ addresses the ethical issues and constraints that arise from the
against each other over the Internet use of computers.
✓ Software Updates – operating system and application updates
can typically downloaded from the Internet What is Netiquette?
✓ HTML (Hypertext Markup Language) - is a coding language ✓ blend of "net" (as in “network,”) and "etiquette”
used to tell a browser how to place pictures, text, multimedia and ✓ often referred to as etiquette for the internet.
links to create a web page.
✓ URL (Uniform Resource Locator) - is a web address used to OVERVIEW
connect to a remote resource on the world wide web.
✓ Bit - is a single digit in the binary numbering system . As we use the internet in our day to day activities, we need to
✓ Byte – is made up of consecutive bits, generally consists of observe the correct or acceptable way of communicating on the
eight bits. internet. So Netiquette, is simply stated, it’s network etiquette
✓ Upload - to upload is to transfer data from your computer to that is the etiquette of cyberspace and “etiquette” means the
another computer. forms of required by good breeding or prescribed by authority
✓ Download - to download is to transfer data from another to be required in social or official life. In other words, netiquette
computer to your compute. is a set of rules for behaving properly online. Netiquette, or
✓ HTTP - is the acronym for Hypertext Transfer Protocol, the network etiquette, is concerned with the "proper" way to
data communication standard of web pages. communicate in an online environment. Consider the following
✓ HTTPS - is the acronym for Hypertext Transfer Protocol "rules," adapted from Virginia Shea's the Core Rules of
Secure. This indicates that the web page has a special layer of Netiquette, whenever you communicate in the virtual world.
encryption added to hide your personal information and When you use e-mail, instant messenger, video calls, or
passwords from others. discussion boards to communicate with others online, please be
✓ Router or router-modem - combination is the hardware device sure to follow the rules of professional online communications
that acts as the traffic cop for network signals arriving at your known as netiquette. REMEMBER THE GOLDEN RULE
home or business from your ISP. A router can be wired or Even though you may be interacting with a computer screen,
wireless or both. you are communicating with a real person who will react to
✓ Encryption - is the mathematical scrambling of data so that it is your message. Make a good impression treat others with the
hidden from eavesdroppers. same respect that you would like to receive and avoid
✓ Web Bot - A term that applies to programs/applets (macros confrontational or offensive language.
and intelligent agents) used on the Internet.
Netiquette
✓ Search Engine - specialized software, such as Google and
✓ it describes the rules of conduct for respectful and appropriate
Yahoo, that lets www browser users search for information on
communication on the internet.
the web by using keywords, phrases
✓ Netiquette is often referred to as etiquette for the internet.
✓ Browser - A Web browser such as mozilla firefox, Microsoft
These are not legally binding rules, but recommended rules of
edge, internet explorer, chrome etc, is a client program that uses
etiquette.
HTTP (Hypertext Transfer Protocol) to make requests of Web
✓ it represents the importance of proper manners and behavior
servers throughout the Internet on behalf of the browser user.
online.
✓ Chatroom - a site on the internet, or another computer
✓ In general, netiquette is the set of professional and social
network, where users have group discussions by electronic mail,
etiquettes practiced and advocated in electronic communication
typically about one subject
over any computer network. This word was first posted in the
✓ Cookie - a piece of data downloaded to a computer by a
Usenet forum in 1982. The same year the word internet was first
website, containing details of the preferences of that computer's
used. Netiquette was created as a joke. It was then used to
user which identify the user when revisiting that website.
describe effective email communication.
✓ Bookmark - an address for a website stored on a computer so
that the user can easily return to the site
✓ Domain Name - a unique name, corresponding to one or more Some Inappropriate Actions:
numeric IP addresses, used to identify a particular web page or AVOID SLANG, ACRONYMS, AND TEXT TALK –
set of web pages on the internet Communicating effectively in college and business
✓ eBay - a website that people and companies can use to buy or environments requires the use of correct terminology, spelling,
sell goods; items may be bought for a fixed price, or sold to the and grammar that can easily be understood. For example, use
buyer who offers the highest price “your” instead of “ur”
✓ Generation C - the people who create and publish material such
as blogs, podcasts, videos, etc, on the internet AVOID “SCREAMING” IN TYPED MESSAGES – Typing
✓ Home page - (on a website) the main document relating to an an entire message using all capital letters is known as
individual or institution that provides introductory information “screaming”. It is distracting and generally frowned upon in
about a website with links to the actual details of services or professional environments. It is better to draw emphasis to
information provided. selected words or phrases by: using italic or bold text emphasis
using special characters (Example: **Important**)
PROOFREAD YOUR MESSAGES BEFORE SENDING TEN COMMANDMENTS OF COMPUTER ETHICS
THEM – Proofreading your messages before you send them is a
best practice for effective and efficient communication. Strive to In 1992, Ramon Barquin of the Computer Ethics Institute
make your communications concise and free of any: presented a paper outlining the basics of standardized, ethical
✓ Spelling and grammar errors computer conduct, dubbed the "TEN COMMANDMENTS OF
✓ Confusing terms or phrases that could be misunderstood COMPUTER ETHICS." This list mimicked the Biblical "Ten
✓ Errors of omission, such as missing content or recipients Commandments" as detailed in the language of the King James
✓ Errors in accuracy of information translation, using the words "Thou Shalt" and "Thou Shalt Not"
to preface each commandment. Barquin's outline has drawn
EXERCISE GOOD JUDGMENT WHEN SHARING criticism from the hacker and hacktivist community as being too
INFORMATION WITH OTHERS ONLINE – E-mail and restrictive
chat messages that you send or receive are considered private
and should not be forwarded or copied to others without I & II: Harm & Interference
gaining the consent of all involved participants. In general, • The 1st commandment of computer ethics is "thou shalt not use
messages posted to discussion boards and social media sites can a computer to harm other people." It's generally accepted that
be read by the public. You may never know who might read or hurting people in any way is wrong, and this first commandment
share what you post. It is a good practice to always ask a post’s reaffirms that this applies to harm inflicted using a computer.
author for permission before sharing a post with other parties.
✓ To protect your privacy and safety, do not share online any • The 2nd commandment states "thou shalt not interfere with
sensitive personal information such as: other people's computer work." Work with a computer can be a
✓ Your home address or phone number delicate and time consuming endeavor, and disrupting that work
✓ Personal conversations is not only rude and an invasion of privacy, but can potentially
✓ Social plans, such as vacations cause damage or loss of data.

RESPECT DIVERSITY IN VIEWPOINTS - Be constructive III & IV: Trespassing & Theft
and respectful when sharing opinions, beliefs, and criticisms, or • The 3rd commandment of computer ethics is "thou shalt not
responding to those of others in the conversation. snoop around in other people's computer files." Personal privacy
is important for everyone, and looking through someone's files
Virginia Shea’s Rules of Netiquette uninvited, whether in person or over the Internet, is a violation of
1. Remember the human on the other side of the electronic that privacy.
communication.
2. Adhere to the same standards of behavior online that you • The 4th commandment reads "thou shalt not use a computer to
follow in real life. steal." Just as stealing in the real world is a crime, using a
3. Know where you are in cyberspace. computer as a means to steal money, data, copyrighted material
4. Respect other people’s time and bandwidth. and other information is not only disruptive and potentially
5. Make yourself look good online. damaging, it's often illegal.
6. Share expert knowledge.
7. Keep flame wars under control. V & VI: Lying & Software Theft
8. Respect other people’s privacy. • The 5th commandment of computer ethics states "thou shalt not
9. Don’t abuse your power. use acomputer to bear false witness." A computer should never be
10.Be forgiving of other people’s mistakes. used as an aid to medium for lying, perjury or fraud, regardless of
the method or reason.
What is Ethics?
✓ Ethics focuses on the care for the soul • The 6th commandment says "thou shalt not copy or use
✓ Area of philosophy that deals man’s pursuit of the “good life” proprietary software for which you have not paid." No matter
✓ Study and philosophy of human conduct with emphasis on how much it may cost to obtain legally, pirating or copying
the determination of right and wrong software you haven't purchased for any reason is like stealing
✓ Ethics as a concept suggest the notion of correct or incorrect money from developers and the programmers who write the
practices relative to various concerns or field study. software.
✓ Study of the morality of human actions.
✓ examines the rational justification for our moral judgments; it VII & VIII: Resource Use & Intellectual Property
studies what is morally right or wrong, just or unjust. • The 7th commandment of computer ethics states "thou shalt not
use other people's computer resources without authorization or
What is Computer Ethics? proper compensation." Stealing someone's bandwidth, software
✓ Computer ethics is the application of moral principles to the or even hardware is wrong. Always have permission to use such
use of computers and the Internet. resources, and if necessary, be willing to pay for them.
✓ is a part of practical philosophy which deals with how
computing professionals should make decisions regarding • The 8th commandment is "thou shalt not appropriate other
professional and social conduct. people's intellectual output." Plagiarism is a crime. Never take
✓ deals with the procedures, values and practices that govern someone's work, be it artwork, music, video, writing or any other
the process of consuming computing technology and its related product of someone's effort, and claim it is your own. Always get
disciplines without damaging or violating the moral values and permission, and give credit where it's due.
beliefs of any individual, organization or entity.
✓ is a concept in ethics that addresses the ethical issues and
constraints that arise from the use of computers, and how they
can be mitigated or prevented.
✓ is the set of commonly agreed principles that govern the use
of computers.
IX & X: Responsible Design & Consideration Recap
• The 9th commandment of computer ethics states "thou shalt COMPUTER CRIME: or cybercrime, is any crime that involves
think about the social consequences of the program you are a computer and a network. The computer may have been used
writing or the system you are designing." When designing software in the commission of a crime, or it may be the target
or a computer system, always consider the ways it can affect Alternatively referred to as cyber crime, e-crime, electronic
downstream consumers. crime, or hi-tech crime. computer crime is an act performed by a
knowledgeable computer user, sometimes referred to as a hacker
• The 10th and final commandment of computer ethics is "thou that illegally browses or steals a company's or individual's
shalt always use a computer in ways that ensure consideration and private information. In some cases, this person or group of
respect for your fellow humans." Use computers responsibly, to do individuals may be malicious and destroy or otherwise corrupt
positive and productive things for yourself and the people around the computer or data files
you. Never use the computer in a way that might demean your
COMMON FORMS OF CYBERCRIMES:
fellow human beings, or cause others to do so.

a. Copyright
✓ The exclusive legal right, given to an originator or an
LESSON #4 (part 2): CYBERCRIME assignee to print, publish, perform, film, or record literary,
artistic, or musical material, and to authorize others to do the
CYBERCRIME - is an act that is not moral and against the
same.
norms punishable by law that uses computer and technology in
such an act.
Copyright infringement
CYBER - Cyber is a prefix that denotes a relationship with ✓ is the violation, piracy or theft of a copyright holder's
information technology. exclusive rights through the unauthorized use of a copyrighted
CRIME - An act that causes physical or psychological harm, material or work.
damage to or loss of property, and is against the law.
b. Plagiarism
What is Cyber? ✓ An act or instance of using or closely imitating the language
✓ It is the characteristics of the culture of computers, and thoughts of another author without authorization.
information, technology and virtual reality.
c. Computer Addiction
What is Cybercrime? ✓ Internet addiction is characterized by excessive or poorly
✓ computer crime and web crime are all terms that describe controlled preoccupations, urges or behaviours regarding
illegal activity that takes place over the Internet or within a computer use and internet access that lead to impairment or
computer or computer system. distress.
✓ is criminal activity that either targets or uses a computer, a
computer network or a networked device. Offline:
✓ Cybercrime is construed as using a computer as a weapon, or ✓ generally used when speaking about excessive gaming
instrument, to advance or secure something deemed illegal. behavior, which can be practiced both offline and online.

What is Cybercriminals? Online:


✓ may use computer technology to access personal ✓ Also known as “Internet Addiction”, gets more attention in
information, business trade secrets or use the internet for general from scientific research than offline computer addiction,
exploitative or malicious purposes. mainly because most cases of computer addiction are related to
✓ are individuals or teams of people who use technology to the excessive use of the Internet. *Virtual Self -The persona you
commit malicious activities on digital systems or networks with create about yourself virtually.
the intention of stealing sensitive company information or
personal data, and generating profit. VARIOUS CRIMINAL ACTIVITIES
✓ A cybercriminal is an individual who commits cybercrimes,
where he/she makes use of the computer either as a tool or as a a. Hacking
target or a s both. ✓ Unauthorized access of or interference with computer systems,
servers, or other information and communication systems
Cybercriminals use computers in three broad ways: ✓ Unauthorized access to corrupt, alter, steal, or destroy
1. Select computer as their target: These criminals attack other electronic data using computers or other information and
people's computers to perform malicious activities, such as communication systems without the computer or system
spreading viruses, data theft, identity theft, etc. owner’s knowledge and consent
2. Uses computer as their weapon: They use the computer to ✓ The introduction of computer viruses resulting in the
carry out "conventional crime", such as spam, fraud, illegal corruption, alteration, theft, or loss of such data
gambling, etc. ✓ Illegal Access
3. Uses computer as their accessory: They use the computer to ✓ Illegal Interception
save stolen or illegal data. ✓ Data Interference
✓ System Interference
Republic Act No. 10175 Cybercrime Prevention Act of 2012 is ✓ Misuse of Devices
a law in the Philippines approved on September 12,2012 which ✓ Infection of IT Systems with Malware – if the act is committed
aims to address legal issues concerning online interactions and against critical infrastructure of the Philippines the, penalty is
internet. Republic Act No. 10173 Data Privacy Act of 2012 is between 12-20 years reclusion temporal
an act protecting individual personal information. ✓ Six years up to twelve years of imprisonment also known as
prison mayor
b. Computer-related forgery, fraud and/or identity theft
✓ An attempt to obtain sensitive information such as usernames,
LESSON #4 (part 3): INTERNET
passwords, and credit card details and (indirectly money), often THREATS
for malicious reasons.
✓ Phishing
INTERNET THREATS
✓ Pharming
✓ Internet threats are using WWW (World Wide Web) to make
✓ Spam
cybercrime. It is also known as web threats.
✓ An Internet threat is a threat that makes use of the World Wide
c. Electronic theft
Web to disperse, conceal, and update itself to facilitate
✓ Illegal Downloading
cybercrime.
✓ Obtaining files that you do not have the right to use from the
✓ All types of internet threats apply various forms of malware
internet.
and fraud, in which every part of it uses HTTP or HTTPS
✓ Digital Piracy
protocols, and utilize other protocols and components, such as
✓ Practice of illegally copying and selling digital music, video,
links in email or instant messaging, or malware attachments that
computer software, etc.
have access to the Web.
✓ Copyright Infringement
✓ Most types of internet threats assist cybercriminals by filching
information for consequent sales and assist in absorbing infected
d. Cyberbullying
PCs into botnets.
✓ The use of electronic communication to bully a person,
typically by sending a message of an intimidating or threatening Here is the list of all the types of internet threats:
nature. Adware
✓ The Anti-Bullying Act of 2013 (RA 10627) ✓ Adware is any software application in which advertising
banners are displayed while a program is running. The ads are
e. Cybersex delivered through pop-up windows or bars that appear on the
✓ Willful engagement, maintenance, control, or operation, program’s user interface. Adware is commonly created for
directly or indirectly of any lascivious exhibition of sexual organs computers, but may also be found on mobile devices.
or sexual activity with the aid of a computer system for favor or
consideration. Asset (computing)
✓ Penalty at least Php 200,000 and or prison mayo ✓ An asset is a part of software or hardware contained by an
information technology environment that hold up data related
f. Child Pornography activities. The stalking of assets within an asset management
✓ Is a form of child sexual exploitation system can be essential to the functioning or monetary success of
✓ Unlawful or prohibited acts defined and punishable by an organization.
Republic Act No. 9775 or the AntiChild Pornography Act of
2009, committed through a computer system.
Bluejacking
✓ Penalty of 12-20 years of imprisonment or reclusion temporal
✓ Bluejacking is a hacking method that allows an individual to
send anonymous messages to Bluetooth-enabled devices within
g. Cyber Defamation
a certain radius. First, the hacker scans his surroundings with a
✓ Is an unprivileged false statement of fact which tends to harm
Bluetooth-enabled device, searching for other devices. The
the reputation of a person or company.
hacker then sends an unsolicited message to the detected
✓ Penalty of 6-12 years of imprisonment or prison mayor.
devices.

h. Others
Bluesnarfing
➢ Child Pornography: Making or distributing child pornography
✓ Bluesnarfing is the use of Bluetooth connection to steal
➢ Cyber Terrorism: Hacking, threats, and blackmailing towards
information from a wireless device, particularly common in
a business or person
smartphones and laptops. Using programming languages that
➢ Cyberbully or Cyberstalking: Harassing others online
allow them to find Bluetooth devices left continuously on and in
➢ Creating Malware: Writing, creating, or distributing malware
“discovery” mode, cybercriminals can attack devices as far as
(e.g. viruses and spyware.)
300 feet away without leaving any trace.
➢ Denial of Service Attack: Overloading a system with so many
requests resulting the system can no longer serve normal requests
Botnets
➢ Espionage: Spying on a person or business
✓ Botnets are compilations of any form of internet-connected
➢ Fraud: Manipulating data, e.g. changing banking records to
system that an attacker has compromised. Botnet is the
transfer money to an account.
compilation of software robots, or ‘bots’, that generates an
➢ Harvesting: Collect account or other account related
army of infected computers (also regarded as ‘zombies’) that are
information on other people.
distantly controlled by the inventor. It acts as a power
➢ Identity Theft: Pretending to be someone you are not
multiplier for cybercriminals to force an entry into their
➢ Intellectual Property Theft: Stealing another persons or
recipient device. The bots are dispersed because the attacker
companies intellectual property
uses several computers, together with yours, to lift off the
➢ Phishing: Deceiving individuals to gain private or personal
distributed denial-of-service attacks (DDOS).
information about that person.
➢ Salami Slicing: Stealing tiny amounts of money from each
Browser Hijackers
transaction
✓ A browser hijacker is a malware program that modifies web
➢ Spamming: Distributed unsolicited e-mail to dozens or
browser settings without the user’s permission and redirects the
hundreds of different addresses
user to websites the user had not intended to visit. Often called a
➢ Spoofing: Deceiving a system into thinking you are someone
browser redirect virus because it redirects the browser to other,
you really are not
usually malicious, websites, a browser hijacker enables browser
➢ Unauthorized access: Gaining access to systems you have no
hijacking.
permission to access
➢ Wiretapping: Connecting a device to a phone line to listen to
conversations.
Browser Security
High Orbit Ion Cannon
✓ The web browser is inarguably the most popular platforms
✓ High Orbit Ion Cannon is a limitless, open-source network
for people to gain access to the internet for any specified range
stress application which was developed to substitute the Low
of consumer or business intentions. There are different
Orbit Ion Cannon. It is used to dispatch DoS and DDoS
vulnerabilities which the web browser encounters which may
attacks, which intends to flood a target’s network with web
stem from poor implementation, poor design, or a diffident
traffic and close down the website. While the majority of the
configuration. Browser security serves as an application of the
malicious software tools involve a great point of technical skill,
internet security to web browsers in order to secure networked
the HOIC offers an easy and accessible interface and can be put
data and computer systems from violations of privacy or
on with the click of a button.
malware. It makes use of JavaScript with cross-site scripting
and also with a secondary payload through adobe flash.
Hacking
✓ Hacking is a term used to describe actions taken by someone
Chat Clients
to gain unauthorized access to a computer. The availability of
✓ This is the software that resides in the user’s computer for
information online on the tools, techniques, and malware makes
handling instant messaging (IM) or chat rooms. It an
it easier for even non- technical people to undertake malicious
application that enables you to connect to an XMPP for instant
activities. The process by which cyber criminals gain access to
messaging with other people over the Internet. There are many
your computer
free clients you can use to do this, for many different devices
and operating systems.
IT Risk
✓ An it-related risk is any type of risk interconnected to
Countermeasure (computer)
information technology. While information has been
✓ In this perspective, a threat is a possible or real adversarial
appreciated as a valued and vital asset for a long time, the
event that may be malicious, which can compromise the assets
escalation of the information economy and the digital
of an organization or the reliability of a computer or network.
revolution has steered organizations in becoming gradually
A countermeasure is an exploit, system or device that is
dependent on information, information processing and
employed to stop, prevent or lessen various possible threats
particularly IT.
computers, servers, networks, operating systems (OS) or
information systems (IS) can face. Countermeasure implements
Image Spam
different tools such as anti-virus software and firewalls.
✓ Image spam is a type of spam, or rather, a spamming
technique, in which a spam message is delivered in the form of
Cyber Attack
an image. This is done to circumvent spam filters that scan for
✓ A cyber-attack is an intentional manipulation attack against
particular keywords. This works because a user can read an
computer systems, networks, and internet supported device. It
image, whereas many anti-spam systems cannot.
makes use of malicious code to change the computer code,
logic, or data causing troublesome outcomes that can
Internet safety
compromise data and result to cybercrime such as information
✓ Internet safety is the act of trying to be safe on the internet
and identity damage. It is also acknowledged as computer
and the understanding of exploiting the user’s personal safety
network attack (CNA).
and security threats to private information and assets associated
Cyberwarfare with using the internet, and the self-defense from computer
✓ Cyberwarfare is any simulated clash instigated as a driven crime as a whole.
attack on an opponent’s computer and information systems.
Conducted through the Internet, these attacks restrict financial
Internet security
and organizational systems by filching or changing confidential
✓ Internet security is a part of computer security particularly
data to destabilize networks, websites, and services.
interrelated to the Internet, which involves browser security and
also network security on a more universal level, as it pertains to
Cybercrime
other applications and operating systems altogether. Its
✓ Cybercrime is any criminal activity that requires a computer,
intention is to create rules and measures to utilize against
networked gadget or a network. While most cybercrimes are
attacks over the Internet.
incorporated with the intention of generating profit for the
cybercriminals, some cybercrimes are carried out against
Key Logger
computers or devices openly to damage or deactivate them,
✓ A keylogger, sometimes called a keystroke logger or system
while others use it to distribute malware, illicit information,
monitor, is a type of surveillance technology used to monitor
images or other materials.
and record each keystroke typed on a specific computer’s
keyboard. A keylogger can record instant messages, email, and
Denial-of-Service Attack (DOS)
capture any information you type at any time using your
✓ A Denial-of-Service (DoS) attack is an attack intended to close
keyboard, including usernames, passwords, and other
down a system or network, making it unreachable to its
personally identifiable information.
prospected users. DoS attacks achieve this plan by deluging the
target with traffic or sending an information that generates a
Low Orbit Ion Cannon
crash. The attack denies authentic users of the service or asset
✓ The Low Orbit Ion Cannon is a comprehensible tool used to
they anticipated.
launch DoS and DDoS attacks which overwork a server with
malicious traffic flow. It was initially built by Praetox
Email-Borne Viruses
Technology as a network stress-testing application, but it has
✓ Email-borne viruses are the malicious programs which are
subsequently turned into an open-source which is now applied
attached to the emails and are inflicted on the target computer or
with a malicious target.
computer system. These viruses may be carried with a spam or
phishing message from your friend who might also be unaware
that his computer system is inflicted with such viruses.
Man-in-the-Browser Rich Internet Applications
✓ Man in the browser is a security attack where the culprit set ✓ Rich Internet applications (RIA) are web-based applications
up a Trojan horse on a target’s computer that has the capacity that is designed to deliver some features of graphical desktop
of altering the user’s Web transactions as they take place in real applications. Put together with controlling development outfits,
time. The usage of this method has been narrowing to financial RIAs runs faster and can be more occupying. They provide users
fraud generally, due to the assets required. an enhanced visual experience and extra interactivity than
normal traditional browser applications that make use of only
Malware HTML and HTTP. RIAs usually divide the processing through
✓ Malware is any program that is detrimental to a computer the network by pinpointing the user interface and related
user. Malware consist of computer viruses, spyware, worms, activity, and also the data manipulation and processing of the
Trojan horses. These malicious programs can execute a selection application server side.
of functions, ranging from stealing, encoding or deleting
delicate data, modifying or hijacking essential computing Spam
tasks and monitoring users’ computer action without their ✓ It is a mass distribution of unwanted messages, advertising or
consent. Malware is one of the more common ways to infiltrate pornography to individuals which can simply be found on the
or damage your computer. Malicious software that infects your Internet such as social networking sites, company websites and
computer, such as computer viruses, worms, Trojan horses, personal blogs.
spyware, and adware
Spoofing
Mousetrapping ✓ Spoofing, in general, is a fraudulent or malicious practice in
✓ Mousetrapping is a technique used by some websites to keep which communication is sent from an unknown source disguised
visitors from leaving their website, either by launching an as a source known to the receiver. Spoofing is most prevalent in
endless series of pop-up ads known colloquially as a soggy communication mechanisms that lack a high level of security.
biscuit or by re-launching their website in a window that cannot
be easily closed (sometimes this window runs like a stand-alone Spyware
application, and the taskbar and the browser’s menu become ✓ Spyware is software that is installed on a computing device
inaccessible). Many websites that do this also employ browser without the end user’s knowledge. Such software is controversial
hijackers to reset the user’s default homepage. because it is sometimes installed for relatively innocuous reasons
as it can violate the end user’s privacy and has the potential to be
Overseas Money Transfer Scam abused. Software that collects personal information about you
✓ This type of scam is specifically tricky where the scammer without you knowing. They often come in the form of a ‘free'
sends you money under a guise of payment. Once a device is download and are installed automatically with or without your
compromised, hackers have access to everything on it: contact, consent. These are difficult to remove and can infect your
emails, passwords, photos, and any other information. To make computer with viruses.
matters worse, they can also leave victims with costly bills.
Scareware
Pharming ✓ Scareware is a type of malware designed to trick victims into
✓ Pharming is another way hackers try to deploy users on the purchasing and downloading useless and potentially dangerous
Internet. Pharming is a tracking system in which malicious code software. Scareware, which generates pop-ups that resemble
is installed on a private computer or server, directing users to Windows system messages, usually purports to be antivirus or
fraudulent Web sites without their awareness or permission. antispyware software, a firewall application or a registry
Pharming is a common type of online fraud. A means to point cleaner. The messages typically say that a large number of
you to a malicious and illegitimate website by redirecting the problems such as infected files have been found on the
legitimate URL. Even if the URL is entered correctly, it can still computer and the user is prompted to purchase software to fix
be redirected to a fake website the problems.

Phishing SQL Injection


✓ Phishing is a cyber-attack that uses concealed email as a tool. ✓ SQL Injection refers to an injection attack wherein an attacker
The objective is to false the email recipient into considering that can execute malicious SQL statements (also commonly referred
the message is something they need or require an application to as a malicious payload) that control a web application’s
from their bank, for instance, or a mail from their company. database server (also commonly referred to as a Relational
Database Management System RDBMS). Since an SQL
RootKit Injection vulnerability could possibly affect any website or web
✓ A rootkit is a program or, more often, a collection of application that makes use of an SQL based database, the
software tools that gives a threat actor remote access to and vulnerability is one of the oldest, most prevalent and most
control over a computer or other system. While there have been dangerous of web application vulnerabilities.
legitimate uses for this type of software, such as to provide
remote end-user support, most rootkits open a backdoor on Trojan Horses
victim systems to introduce malicious software, such as viruses, ✓ In computing, a Trojan horse is a program that appears
ransomware, keylogger programs or other types of malware, or harmless, but is, in fact, malicious. Trojan horse is any malicious
to use the system for further network security attacks. computer program which misleads users of its true intent.
Unexpected changes to computer settings and unusual activity,
Ransomware even when the computer should be idle, are strong indications
✓ Ransomware is a type of malware that restricts access to your that a Trojan is residing on a computer.
computer or your files and displays a message that demands
payment in order for the restriction to be removed. The two
most common means of infection appear to be phishing emails
that contain malicious attachments and website pop-up
advertisements.
Threat (computer)
WPA2 Handshake Vulnerabilities
✓ In computer security, a threat is a potential risk that develop a
✓ A flaw in WPA2’s Handshake Vulnerabilities could be
vulnerability to breach security and therefore cause danger. A
exploited to read and steal data that would otherwise be
threat can be either be intentional (for instance, hacking an
protected. In some situations, the vulnerability even leaves room
individual, cracker or a criminal organization) or accidental (for
for an attacker to manipulate data on a Wi-Fi network, or inject
instance, the probability of a computer malfunctioning, or the
new data in. In practice, that means hackers could steal your
chance of a natural disaster such as an earthquake, a fire, or a
passwords, intercept your financial data, or even manipulate
tornado).
commands to, say, send your money to themselves.
Viruses
Hacker: is term evolved to an individual who hacked out
✓ A computer virus is a malicious code that replicates by copying
computer code and had an advanced understanding of
itself to another program, computer boot sector or document
computers, networking, programming, or hardware, but did not
and changes how a computer works. The virus requires someone
have any malicious intents.
to knowingly or unknowingly spread the infection without the
knowledge or permission of a user or
Black Hat: is a malicious hacker usually referred to as criminal
system administrator.
hacker, which describes any individual who illegally breaks into
computer systems to damage or steal information, Describes a
Vulnerability (computing)
deceptive user, computer hacker, or an individual who attempts
✓ A vulnerability is a security flaw in a software database that
to break into a computer system or computer network. Their
places the program or computer at risk of malicious programs
intent is often to steal, destroy, or otherwise modify data on that
and users. For instance, an Internet browser possesses a
computer system without permission.
vulnerability that crashes the browser and let an individual read
or copy files from the computer when you visit a web page with
White Hat: an ethical hacker who attempts to find
the malicious code.
vulnerabilities in computer and network systems; a white hat
identifies security weaknesses then informs the appropriate
Web Applications
personnel. These individuals are employed by companies and
✓ A web application is any computer program that executes a
governments, usually to protect the organization's information
precise task by making use of a web browser as its user. It is an
systems.
application program that is kept on a remote server and
conveyed throughout the network via a browser interface. The
Gray Hat: is a reference to a computer hacker who acts illegally
application is as simple as a message board or an interaction
to expose a security threat but does not use that threat
form on a website.
maliciously against the vulnerable party. Instead, the hacker
makes the party aware of the threat so that the threat can be
Web Development
neutralized. In other words, gray hat hacking is a blend of white
✓ Web development generally implies the tasks related with
hat and a black hat hacker.
emerging websites for hosting through the internet. Web
development is the programming or coding that allows website
Cracker: is an individual who can decipher codes and passwords
functionality, for each of the owner’s desires. The process
being able to break security systems for illegal reasons. Often
consists of web design, web content development, client
this person will use a program or script known as a crack that
side/server-side scripting and network security alignment, among
has been written specifically to do what they're hoping to
other functions.
achieve.
Wi-Fi Eavesdropping
Ethical Hacking and Ethical Hacker: are terms used to describe
✓ Wi-Fi Eavesdropping is as an electronic attack where digital
hacking performed by a company or individual to help identify
communications are intercepted by an individual whom they are
potential threats on a computer or network. An ethical hacker
not intended. This is done in two main ways: Directly listening to
attempts to bypass system security and search for any weak
digital or analog voice communication or the interception or
points that could be exploited by malicious hackers. This
sniffing of data relating to any form of communication.
information is then used by the organization to improve the
WiFi eavesdropping is another method used by cyber criminals
system security, in an effort to minimize or eliminate any
to capture personal information. Virtual “listening in” on
potential attacks.
information that's shared over an unsecure (not encrypted) WiFi
network
Intruder: is an individual or software program that enters a
computer system without authorization.
Worms
✓ A computer worm is a type of malicious software program
Phishing: pronounced like fishing, is a term used to describe a
whose primary function is to infect other computers while
malicious individual or group of individuals who scam users.
remaining active on infected systems. A computer worm is a
They do so by sending e-mails or creating web pages that are
malicious, self-replicating software program (popularly termed
designed to collect an individual's online bank, credit card, or
as ‘malware’) which affects the functions of software and
other login information. Because these e-mails and web pages
hardware programs. Worms are a common threat to computers
look like legitimate companies users trust them and enter their
and the Internet as a whole. A worm, unlike a virus, goes to
personal information.
work on its own without attaching itself to files or programs. It
lives in your computer memory, doesn't damage or alter the
hard drive and propagates by sending itself to other computers
in a network whether within.

You might also like