0% found this document useful (0 votes)
273 views21 pages

A Information Technology Devices

This document provides an overview of a lesson on information technology devices. It outlines the course outcomes which include explaining the differences and purposes of various IT devices, describing the relationships between data and information, and discussing how technology is used across different sectors of society. The document then defines what a computer is and describes different categories of computers like personal computers, servers, and mobile/game devices. It explains key concepts like hardware, data, information, and the input-output processing (IPO) cycle that computers perform.

Uploaded by

Jezzel Verdera
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
273 views21 pages

A Information Technology Devices

This document provides an overview of a lesson on information technology devices. It outlines the course outcomes which include explaining the differences and purposes of various IT devices, describing the relationships between data and information, and discussing how technology is used across different sectors of society. The document then defines what a computer is and describes different categories of computers like personal computers, servers, and mobile/game devices. It explains key concepts like hardware, data, information, and the input-output processing (IPO) cycle that computers perform.

Uploaded by

Jezzel Verdera
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 21

Lesson: Information Technology Devices

Overview

Most of us are a user’s or at least familiar with


information technology devices. However, were
in this age of digital technology and with a trend
of advances in technology, we need to keep
oppressed or we’re going to be left behind.

Course Outcomes
 Explain the differences between IT
devices.
 Describe the purpose and uses of these
devices.
 Describe the relationship between data
and information. *Electronic Device can accept data called input.
 Describe the functions of the different It can convert data into some other form which
input, output, and storage devices and means it gives some processing. And after
media. processing you have information which called
output.
 Differentiate the web from the Internet.
 Describe the relationship between the
Are computers capable of doing processing on
web, web pages, websites, and web
their own?
servers.
Definitely not. It needs instructions to control
 Explain the purpose of a browser and a each operations. This instruction called software
search engine. or programs and they are stored in the
 Discuss how technology is use in the computer memory.
different sectors of society. Computers are also described as a data
(education, government, finance, healthcare, processing device. This is so, because its main
publishing, manufacturing and a lot more) function is to produce data.
Introduction This processing cycle is called IPO
Everyday were using different technology Input (data)
devices to do some tasks, do some assignments, Process
streaming show, prepare some lessons, browse Output (Information)
on online shops, listen to music, may videocall Storage
the friends and family and more.
Why IPO and not IPOS?
This and many other technologies are integral Because there are some processing that doesn’t
part of our daily life. Our task becomes easier require storage of output.
because of technology. People who knows how Ex: You use your laptop to search for some
to takes advantage of this often-called Tech topics. After the research you didn’t restore or
Savvy. Because technology changes, you must save the result of your searching, you only use
keep up with those changes to remain digital IPO or your data processing is up to output only
literate. since you didn’t restore the information that you
have search.
Digital Literacy involves 7 current knowledge
and understanding of computers, mobile devices, Hardware
the web/weave? and other related technologies. Computers contain many electric, electronic, and
mechanical components and they are called
Whereas, before were using the term computer hardware.
literacy and information literacy now the term
use is digital literacy.

Digital Technology Devices

Computer this are electronic devices capable of


accepting data, convert the data into some other
form to produce information.

CPU stands for Central Processing Unit which


is also known as the computer processor. The
case is called the system unit. CPU is one of the
small components that is house inside the system
unit.
Monitors, keyboard, mouse, printers, speakers, o You often can exchange information
scanners are also hardware components of the between the internet and a mobile device
computer system. or between a computer or network and a
mobile device.
Hardware refers to all the physical o Popular mobile devices are
components of the computer system. Smartphones, Digital Cameras, Portable
-Anything or part of the computer system that and Digital Media Players, Ebook
you can touch. Readers and Wearable Devices.

*Computers are not limited to those systems Game Devices


that you are familiar with. Any device that is o Game console -A mobile computing
capable of doing the IPO cycle is considered as device design for single player or
Computer. multiplayer videogames.
o Gamers often connect the game console
Categories of Computers to television so that they can view their
 Personal Computer game play on the television screen.
 Servers o Many game console models are internet
 Mobile and Game Devices capable and also allow you to listen to
music, watch movies or view photos.
Personal Computer (PC)
o It is called PC because it was developed
and is a unit that is intended to be use by
one person at a time. Hence, the name
PC or Personal Computer.

There are several types of PC


 Desktop PC
 All in one Desktop PC Computer is a data processing device its main
 Laptop function is to do data processing. This data
 Tablets processing involves a cycle where input data are
converted into information via processing.
o Desktop PC has the CPU and the other
hardware, house in a system unit. Data is a collection of unprocessed items, which
o All-in-one Desktop Pc has the can include text, numbers, images, audio, and
processor install at the back of the video.
monitor that’s why its named All-in-one -Anything you collect because you need to do
PC. something to it is considered data.
*Most personal computers today can
communicate with other computers and Information is processed data which conveys
devices. meaning to users.
-This are data that has been subject to
Servers processing.
 Is a computer dedicated to providing one Ex:
or more services to other computers or
devices on a network.
Network is a collection of computers and
devices connected together.

 Services provided by servers includes


storing content and controlling access to
hardware-software and any other
resources on a network.
 A server can support from two to several
thousand connected computers and
Why do we need information?
devices at the same time.
Many of our daily activities requires
 Servers are available in a variety of sizes information.
and types were both small and large in Ex:
business applications. When it’s raining hard, most students go to
government page to check if the classes are
Mobile Devices suspended.
o Is a computing device small enough to -Information is part of our daily life.
hold in your hand because of the reduce
size the screens on mobile devices are How important is information?
small often between 3-5 inches. Some Decision-making involves choosing the best
mobile devices are internet capable among several options. Generally, the best
meaning they can connect to the internet decision is always base on good information.
wirelessly.
Latest Computer Peripheral and Gadgets Touchpad
-The technology is similar to touchscreen but the
Different devices of data processing cycle function is the same as the mouse.
This are pieces of hardware that are plant in to Touchpad are common the laptops and
the computer externally they are called notebooks.
peripherals. Some of them are called non-
essential peripherals because the computer can Magnetic Ink Character Recognition Devices
operate without them. And almost all peripherals (MICR)
connect to the computer externally via USB. Fyi, -This is a character recognition system that uses
USB stands for Universal Serial Bus. special ink and characters. When the document
contains this ink needs to be read, it passes
Three General Categories of Peripherals through the machine which magnetizes the ink
 Input Devices and then translate the magnetic information into
 This are the devices that converts characters.
data and instruction into computer- -MICR technology is used by banks. It is used
readable format or sometimes called for checks.
machine language. It is used by the
user to communicate with the Advantage: Speed and accuracy.
computer. However, MICR documents are expensive to
 Output Devices produce.
 This device reverses the process of
input. It translates machine language Optical Mark Reader (OMR)
into form intelligible to user. -This reader is use to capture human mark data
from document forms. Generally, used in
multiple choice type of questions or surveys
 Storage Devices
where you simply mark your answer or choice.
 Its function is to store data
Ex: If you already voted, you are able to use
processed by the computer.
this. Used in election by shading the candidate
of your choice.
Input Devices
-These are electronic devices used in the input
phase of the data processing cycle. It’s what the
Benefits: speed and accuracy
user used to communicate instructions and data Limitations: OMR documents are expensive to
to the computer.
produce. Marks outside considered as spoiled
-Remember, these devices convert your English documents.
language command or data into machine
language. Optical Character Reader (OCR)
-This device converts images, hand-written or
Keyboard printed text into machine encoded text. The
Most popular input devices is the keyboard.
function is like a scanner.
 Desktop keyboard -Most smartphone now has this capability you
 Laptop keyboard just used the camera and focus it on optical
 On-screen keyboard character and the English translation of that
 Virtual keyboard character will be displayed on your smartphone
screen.
Keyboards are common, they are cheap and they
are simple to use. However, they are labor Benefits: Excellent and quick input of graphics
intensive and is low compare to other input and text.
devices. It is also prone to errors. Limitations: It can be somewhat inaccurate if
input image is of low quality.
Touchscreen
-Is an IO (input-output) device. Because it can Mouse/Trackball
be used both as an input and output device. -There is another type of mouse that is called
-In the case of on-screen keyboard, so when you trackball
use it, you’re actually typing using the screen so Trackball- It is an inverted mouse because the
it is an input device and the result of your ball in the first few styles of the trackball is in
command or whatever instruction should be the top instead at the bottom. Nowadays, the ball
given to the computer using touchscreen the can be on top or side.
result will also be on the screen on the same
screen. Benefits: very easy to use, very common, cheap
and simple.
Benefits: It saves space, the design is user- Limitations: slow and can be prone to error.
friendly.
Limitations: It has difficulties in data entry, it Scanner
is also labor-intensive and very slow to use. -A light-sensing input device that converts
printed text and images into a form computer
can process.
-A popular type of scanner works in manners Pen Input Devices
similar to copying-machine except of instead -This technology lets you interact directly with a
creating a re-copy of document or photo its computer using a pen. The pen is paired with the
stores the scan document or photo electronically. digitize tablet, the pen can be used for pointing
-Some smartphones nowadays have mobile- simple text entry drawing or sketching.
scanning capability. Ex: Stylus for smartphones.

Benefits: They are excellent and quick input of 1. Draw on the


graphics and text or the scanners are capable of digitize pad
producing excellent and input of graphics and and the
text. drawing was
Limitations: It can slow to scan multiple images reflected on
and sizes can be very large or very high-quality the monitor.
scans. 2. This is use
for digital signature.
Voice Input Devices 3. It shows that the digitize pad is the
-Enable you to encode data or instructions using monitor itself.
voice. Similar to touchscreen technology, the
-Some smartphones have this capability; you can difference is that a pen is used rather than the
use your voice to send text messages, a schedule hand. Hand-written input can be converted to
on appointment, dial a phone number or search type text.
for something and more.
-Some of this devices function as language Output Devices
translator. It is very useful when you travel to -This are devices that presents the computer
the non-English speaking countries. output to the user. The distinction between the
input or output devices (ID-OD) is there
Language translator relationship with the processor.
-In using it, you will speak to -Input device sends data and instruction to
your language and speak to the the processor while output device gets
voice input device then play it output or information from the processor.
using the language of your -However, technology has advanced to the
choice. stage where some devices combine input
and output capability. Thus, these devices
Benefits: They are convenient are called input-output (IO) devices. Some
and simple to use. However, it can be inaccurate of this IO devices include touchscreen monitor-
and most of the time or there is a time that it is you touch it to give instructions and the result is
affected by external interference or noise. also shown on that screen. A headset with
microphone is another-you give voice
Bar Code Reader instructions via microphone and the results via
-This input device is a common fixture in speaker. A Bluetooth device is another, it is
department stores, supermarkets, and all most all capable of receiving and transmitting signals.
type of stores.
-A barcode reader is an optical scanner that can Types of Output produce by the Different
read printed bar codes, decode the data contain Devices
in the bar code and send the data through a  Visual
computer.  Audio
 Digital
Benefits: They are very common, accurate, and
quick. Devices that includes the output
Limitations: Damage bar codes are impossible
to read and there are some cases of Monitor
incompatibility issues. -most popular
-It is a bit-like television screen. It provides
visual output from the computer for text and
graphics
Digital Camera -Monitors only offered temporary output that’s
-This is an input device captures images and why the output produced by the monitor are
videos digitally. It uses an image sensor chip to called softcopy. The image is loss when the
capture the image. power is removed.
-Monitors can be external such as those found
Benefits: They are versatile, quick, accurate. attached to PCs or can be integrated into the
Wide-variety of high-quality image editing computer such as with laptops and notebooks.
software is now available. -An external monitor can be upgraded or
Limitations: Higher quality means larger file changed whereas built-in monitors offer much
size which can become expensive and difficult less flexibility.
to manage.
There are different types of monitor depending
on the technology used

Liquid-Crystal Display (LCD) Monitor


-It is a flat-screen that used liquid-crystals,
organic oil like material place between two
polarizers to firm characters and graphic images
to backlit screen.

Plasma Display
-It uses thousands of smart sales which we
called pixels consisting of electrodes and neon 3D Printer
and Zenon gases that are electrically turn to -It can print solid objects such as clothing,
plasma to emit light. prosthetics, eyewear, implants, toys, parts,
prototypes and more.
Organic Light Emitting Diode (OLED) -It uses a plastic substance that prints in layers to
-This monitor used as a solar organic material create a 3dimensional model of an object. A 3D
sandwich between two conductors which in turn printer turns digital model into something
are sandwich between a glass top plate and a physical. It is classified as additive
glass bottom plate. manufacturing.
-When electric current is applied the two
conductors a bright electro luminescent light How 3D Printer works
produce directly from the organic material. Stage 1: Modeling
Cathode Ray Tube (CRT) Stage 2: Slicing
-The last and oldest type Stage 3: Printing
-It uses cathode ray tube.
Plotters
Printer -It is used for general design work.
-This device prints output on paper or other -Plotters are typically used to generate paper or
materials. The type of output is somewhat acetate blueprints, instamatics and growing of
permanent that’s why they are called hard-copy buildings or new product onto paper,
output. transparency’s or any other materials.
-It can be impact or non-impact. -Standard plot width is between 24 or 36 inches;
-Impact printers produce text and images by length can be whatever meets the needs from
striking an ink-ribbon or burning dots onto few inches to several feet.
coated paper Ex: Tarpaulin
-Non-impact printers produce images without
actually striking the paper simply put impact Audio Output Devices
printers’ sub-ribbon while non-impact uses ink.
Speakers
Two types of Impact Printer -Speakers are attached to computers, it produces
 Thermal printer a sound via electronic component called sound
-Example output: card which is house in the system unit.
o Receipts issued by atm machines -It ranges from simple-single speaker output
o Cash registered of department stores and device offering low-quality audio to surround
the like sound multi-channel units sending different
 Dot Matrix Printer output to multiple speakers in different
locations.
Two types of Non-Impact Printer
 Laser Jet Printer Headsets and Earbuds
 Inkjet Printer -Headset without microphone is an output
device while those with microphone is an input-
output device.
-A new variety of these is the earbuds, this
gadget is becoming popular because it provides
increasingly cost-effective method of
communicating with friends and family over the
internet.

Digital Audio Player


-This is a device that can store, organize and
play digital music files.
-mp3 is a popular format for compressing a
sound sequence into a very small file while
preserving the original level of sound quality
when it is played. Compressing the sound file
requires less time to download the file and less
storage space on a hard-drive.
-This output device is becoming less popular -Gamers often connect the game console to a
because smartphones now has the same television so that they can view their game play
capability as digital audio player. to a television screen.
-Many game console models are internet capable
Electronic Book (EBook) Reader and allows you to listen to music and watch
-This is a mobile device that is used primarily movies or view photos.
for reading ebooks. -Typically weighing between 3 and 11 pounds,
the compact size of a game console makes them
-Ebook or digital books is an electronic version easy to use at home, in the car, in the hotel or in
of a printed books, readable on computers and any location that does have electrical outlet and
other digital devices. television screen.
-In addition, to books it can be typically  Handheld Game Device
purchase and read other forms of digital media -It is small enough to fit in one hand making it
such as newspapers and magazines. more portable than console because of the
-Most ebook reader models have a touchscreen reduced size the screens are small similar in size
and some our internet capable. These devices are of some smartphones.
usually smaller than tablets but larger than -Some handled game device, are internet capable
smartphones. and also can communicate wirelessly with other
-It may look like an ordinary tablet or Ipad but it similar devices for multi-player gaming.
is different because its function is limited to
being a reader. Memory and Storage

Smartphones Computers restore data and information in


-Is an internet capable phone that usually memory.
includes calendar, dress book, calculator,
notepad, games and several other apps. Memory consist of electronic components that
-Other apps are available to an app store that’s store instructions waiting to be executed and the
typically associated with the phone. data needed by those instructions.
-Smartphones typically communicate wirelessly -Although, some forms of memory are
to other devices or computers. permanent, most memory keeps data and
-Most smartphones model, you can also listen to instructions temporarily that’s why they called
music, take photos and record videos. volatile memory which means its contents is
-Smartphones are touchscreen and the others are erase when the computer is shut off.
called tablet because it combines the features of -This type of memory is often referred to as
smartphone and tablets. primary memory. Storage by contrast holds
data instructions and information for future use.
Wearable Devices Simply put whatever you save and storage will
-It is a small mobile computing device designed be there permanently until such time as to
to be worn. These devices often communicate remove or erase it.
with a mobile device or a computer.
-Wearable Devices include activity tracker,
smarthwatches and smarthglasses.
-Activity trackers-monitor heart rate, measure
pulse, count steps and track sleeps. -In addition,
to keeping time a smartwatch can communicate
with the smartphone to make and answer phone
calls, read and send messages, access the web,
play music, work with apps such as fitness
trackers and GPS and more.
-Smart glasses an eyeglass type device that is
used to view information or take photos and
videos to the projected miniatures screen or *Data instructions in the primary memory can be
camera in the users’ field of vision. in either Random Access Memory (RAM) or
Read Only Memory (ROM). This memory are
Gaming Devices installed when you purchase a computer.
 Gaming Console
-It is a mobile computing device design for a
single player or multi-player video games.
Storage Devices and Media Optical Disk this is a type of storage media that
The computer systems also need to store larger consist of flat-round portable metal disk made of
amount of data-instructions and information metal, plastic and locker that is written and read
more permanently than the main memory by a laser.
allows.
Secondary storage also called permanent storage Two types of Optical Disk
serves this purpose these devices have a greater Compact Disk (CD)
capacity compared to memory; they are less Digital Versatile Disk (DVD)
expensive but they are slower compared to
primary memory. Cloud Storage is an internet service that
When it comes to secondary storage, you need provides remote storage to computer users. This
both a device and media. is a trend now for business and even personal
USB Flashdrive (Media) computing, the idea is access anywhere anytime
USB PORT (Device) as long as you’re connected in the net you have
access to your data. There are a lot of providers
Media is where the data instructions and for cloud storage. There is available cloud
information are stored. storage for free.
Device is the component that reads meaning iCloud for Apple users
access in right meaning save that media. Google drive for Google users
One drive for Microsoft users and Dropbox.
Which storage media is the best?
Capacity- refers to how much data can you *It is free but with limited capacity, if you go
store in the media. beyond the free you have to pay the
Portability- refers to how easily can you carry subscription.
and move it. *serves as backup for your data.

Different choices of secondary storage in


media World Wide Web (WWW)
Hard Disk this is a storage device that contains  Worldwide web or simply web
one or more inflexible circular platters that use  is a global library of information
magnetic particles to store data-instructions and available to anyone but the only way to
information. access this global library of information
-The entire device is enclosed in an air-tight
is by connecting to the internet or the
sealed case to protect it from contamination.
net
-Laptops and desktops often contain at least one
hard-disk that is mounted inside the computers  connects people when you access the
case. web you are looking at the content of
-Hard-disk can also be external. An external that site which created by the people
hard-drive is a separate portable free-standing who built the website
hard-disk or it can be an SSD that usually
connect to the computer via USB or an HDMI Internet it is the largest computer network
cable. connecting millions of computers and devices
around the world.
Solid State Drives (SSD) this is a storage
device that typically uses as flask memory to
store data-instructions and information.
Flask memory contains no moving parts
making more durable and shock resistant than
the other types of media. For this reason, some
manufacturers are using SSD instead of Hard-
Disk in their laptops, tablets and desktops.

USB Flash Drives is a portable flask memory


storage device that you plug-in to a USB port
which is special easily accessible opening on a
computer or a mobile device.
Main Difference between the net and the web
-This is convenient for mobile users because
they are small and light-weight enough to be The net connects with other computers if you’re
transported on a keychain or in a pocket. searching for anything. The internet search the
network for a specific computer where the data
Memory Cards this are removable flask or information you’re searching is located.
memory usually no bigger than 1.5 inches in
height or width. Data on memory card are The web connects people when you access a
usually access via memory card slot and devices. web or looking at the content of that site which
If no slot is available, card reader writer is use to are created by people who build the website.
access the data in the card.
Businesses called Internet Service Providers  any idea or concept that we want to seek
(ISP) offers users and organizations access to information we look for it in the web
the internet free or for a fee. using search engine
 is a software that find websites,
*By subscribing to an ISP you can connect to
webpages, images, videos, news, maps
the internet through your computers and mobile
and other information related to specific
device.
topic
What are the ISPs in Bataan?  the most popular search engine is
Google
 PLDT
 Bing
 Globe
 Yahoo
 Smart
 AOL
 Converge
 Ask
 Cable providers that offers a package
includes internet and cable connection Search Bar and Address Bar
 the box where you type a web address or
Web a text reference when you are searching
 consist of worldwide collection of on the web.
electronic document
 electronic document on the web is Social Media Network/Online Social
called a web page Network/ Social Networking Site
 which can contain text, graphics,  online social network also called social
audio and a video networking site
 this is a website that encourages
Website members in each online community to
 is a collection of related webpages share their interest, ideas stories, photos
which are stored on a web server music and videos with other registered
 web server is a computer that users
delivers requested webpages to your
 popular online social networks
computer or mobile devices
 Facebook
Link  Twitter
 short for hyperlink  Linked-in
 is a built – in connection to other  Some online social networks have no
documents, graphics, audio files, videos, specialized audience others are more
webpages or websites focus, a photo sharing site is a specific
 to activate an item associated with the type of online social network that allows
link, simply tap or click the link users to create an online photo album
and store and share their digital photos
Browser  Similarly a video sharing site known as
 is a software that enable users with an vlog is a type of online social network
internet connection to access and view that enables users to store and share
webpages on a computer or a device their personal videos
Surfing Internet
 is simply moving from one site to  is the larger computer network
another if you are searching for anything connecting millions of computers and
Widely Use and Popular Browser devices around the world
 Opera  connects with other computers, if you
 Firefox are searching for anything the internet
 Google Chrome search the net for the specific computer
where the data or the information that
 Safari
you’re searching is located
 Internet Explorer
 Microsoft is dropping in the near ISP
future they replace it with  Internet Service Providers offer users
Microsoft Edge and organizations access to the internet
 All of this browsers works on windows fee or free
except for Safari which is dedicated to  by subscribing you can connect to the
Apple internet through your computers and
mobile devices
Search Engine
 ISP’ in Bataan (PLDT, GLOBE,
 we used the web to search for specific
SMART, CONVERGE and some cable
information including text, photos,
providers that offers a package that
music and videos
includes net connections and cable  others destroys or corrupt data,
connection as well instructions and information stored on
the infected computer or mobile device
Internet Communications
 if you notice any unusual changes in the
 is only one of the services on the
performance of your computer or mobile
internet, other services on the internet
device, it may be infected by malware
facilitate communications among users
*It is impossible to ensure that a virus or a
E – mail
malware will never attack your computer or any
 where users can send and receive
device that you are using. Experts give the
messages and files from other users via following practices to protect your devices
computer network
Messaging Services 1.Use virus protection software
 you can have a real time type  we normally call it anti – virus
conversation with another connected  install a good a anti – virus program and
user then scan the entire computer to be
 real time it means both of you are certain it is free of viruses and other
online at the same time malware
 don’t forget to update the anti – virus
VOIP programs and the virus signatures
 Voice Over Internet Protocol regularly
 is another service facilitated by the  updating of anti – virus is very
internet important because every day new
 enables users to speak to another users viruses are being developed by good
over the internet people
 Ex: Facetime or Videocalls
2.Use firewall
FTP  set up a hardware firewall or install a
 File Transfer Protocols software firewall that protects your
 this servers allows the users to transfer networks resources from outside
items to and from the other computers intrusions.
on the internet
Unsolicited E – mail
 be suspicious of all unsolicited e – mail
Digital Security and Privacy and text messages
 people rely on computers to creates,  it means never open an e – mail
store and manage their information, to messages unless you are expecting it or
safe guard information the user must it is from a trusted source or somebody
protect their computers and mobile you know or you are waiting for e –
devices mail or message
 users should be aware of health risks  when in doubt ask the sender to confirm
and environmental issues associated that the message is legitimate before you
with using computers and mobile open it
devices  be careful also on clicking links in e –
mail and text messages, even
attachments you should be careful in
Digital Security
Viruses opening
 viruses and other malwares are threats in Disconnect from the Net
the digital world  if you do not need an internet access,
Malware disconnect the computer from the net
 Malicious Software  some security experts even recommend
 is a software that acts without the users disconnecting from the computer
knowledge and deliberately alters the network before opening an e – mail
computers or mobile devices operations attachment
 includes viruses, worms, trojan horses, Download Software with Caution
rootkits, spyware, adware and zombies  be careful
 each of this types of malware attacks  download programs or apps only from
your computers or mobile devices websites you trust especially those with
differently music and video sharing software
 some are harmless, pranks, temporarily  this is particularly important if you are
freeze or free sounds or display downloading free software
messages on your computer or mobile
devices Close Spyware Window
 if you suspect pop up window (a  adults, teens and children around the
window suddenly appears on your world are using online social
screen) networks to share their photos,
 if you suspect this maybe a spyware, videos, journals, music, etc.
close the window never tap or click an  this information when you uploaded
ok or agree button in a suspicious to online social networks, it is as if
window. you have shown it publicly
 some of this unsuspecting innocent
Scan before using computer users are fallen victim to
 before using any removable media scan crimes committed by dangerous
it for malware strangers
 follow this procedure even for strength-
wraps? software from major developers Health
 some commercial software has been
 prolong or improper computer and
infected and distributed to unsuspecting
mobile device use can lead to injuries or
users
disorders of the hands, wrist, elbows,
 never start the computer with removable eyes, neck and back
media inserted in the computer unless  Ergonomics computer and mobile
you are certain the media is infected
devices uses can protect themselves
Keep Current from this health risk through proper
 install the latest updates for your work place design
computer software  good posture while using computers
 stay inform about new virus alerts and and appropriate space work break
virus hoaxes  the problem that is arising now is the
growing use of ear buds and
Backup Regularly headphones, some users are
 one of the most important experiencing hearing loss
 in the event your compute become
unusable due to a virus attack or other
malware you will able to restore 2 Behavioral Health Risk Related to
operations if you have a clean Technology
uninfected backup  once recognized both technology
addiction and technology overload are
Privacy treatable disorders
 state of being free from public attention
 in this age of digital technology almost 1.Technology Addiction
all of our life event is stored in a  occurs when someone becomes obsessed
computer somewhere with using technology
 your student profile in school has all the
pertinent data about you, if you have 2.Technology Overload
visiting a medical practitioner all data  individual suffering from technology
about your personal and medical are also overload feel distress, when deprived of
collected computers and mobile devices
 in many instances were personal and Environmental Concerns
confidential records were not properly  environmental issues
protected individuals have found their  one issue the world is facing now is
privacy violated and their identities is electronic waste
stolen  e – waste is a term for electronic
Techniques products that have become unwanted or
 you can use to protect yourself from not working or obsolete and have
identity theft include shredding essentially reach the end of their useful
documents before discarding them life
 increasing levels of electronic waste and
Ex: Receipt of ATM Machine its improper and unsafe treatment and
Resume disposal pose significant risk to the
 avoid clicking links in unsolicited e – environment and human health
mail messages
 do not share information that would E – Waste Facts 2016
allow others to identify or locate you Report by UN University (Nov 2017)
 do not disclose condidential The 44.7 metric tons of e – waste is equivalent
to 4,500 Eiffel Tower. And it is expected to
information identification numbers,
increase to 52.2mt by 2021
usernames, passwords or other security
details
E – Waste Software
 contains hazardous components that  also called program
contaminate the air, water and soil  is a consist of series related instructions,
 dismantling processes that do not utilize organize for a common purpose that tells
adequate means, facilities and trained the computers what task to perform and
people pose additional threats to people how to perform them
and the planet.  how to do a task
 software makes your hardware useful
Causes of the increase in E – waste Two Categories of Software
 increasing number of users System Software
 many people own more than one IT  consist of the program that control or
device maintain the operation of the computer
 rapid technological advances (mabilis and its devices
magbago)  although there are several system
 most people in the world have access to software the most known is the
mobile networks and services operating system
What are the measures implemented by most Operating System
countries to address the E – waste challenge?  is a set of programs that coordinates all
the activities among computer hardware
Green Computing  directs the interaction of all your
 concern with the efficient and hardware devices
environmentally responsible design,  its provides a means for users to
manufacture, operation and disposal of communicate with computer or mobile
IT – related products device and other software
 simply put involves reducing the  the use application your computer or
electricity consumed and environmental mobile device must be running an
waste generated when using a computer operating system
Steps to Go Green  you will see the relationship between the
Green Use different hardware and application
 reducing the energy consumption of software
computers and other information  on most computers and mobile devices
systems nowadays can be any of the following
 these are the most widely used operating
Green Disposal
system
 reduction of waste, reuse and
 Microsoft windows, 95, XP, 7, vista
refurbishment of hardware and recycling
& 10
of out of use peripherals and other items
 Macintosh for apple
Green Design  IOS for apple mobile devices
 designing energy – efficient and  Linux
environmentally sound components,  Android
computer, servers, cooling equipment  Ubuntu
and data centers  Red hat

Green Manufacturing Application Software


 manufacturing electronic components,  or an app
computers and other subsystems with  is consist of programs design to make
minimal impact on the environment users more productive and / or assist
them with personal task
How can we contribute and support Green
 browsers are application software that
Computing?
enable users with an internet connection
`List of some habits you have to change if you to accept and view webpages
want to support the move
 do not leave your IT devices running Six Categories of Application Software
overnight
 turn off computers, monitor, printer, and
other devices when in not in use
 use paperless methods to communicate
 buy energy efficient software
 recycle
Short Summary of the Relationship between
the Hardware, System Software and
Application Software.

In the diagram, there is no direct connection


between the Hardware and Application
Software, the link between the two is the System
Software. Simply put, you cannot use an
Application Software without the System
Software.

Communications and Network

Communications technologies are everywhere,


many required to subscribe to an internet service
provider. With others an organization such as a
business or school provides communication
Applications can also be categorized where it is services to employees, students or customers.
stored. And the course of a day it is unlikely the due
didn’t use at least one of the many
Desktop Apps is an application stored on a communications technologies available now.
computer. With this new normal the use of communication
Web/Server Apps an application stored on a technology becomes a necessity specifically you
web server that you can access through browser. need it to attend to your online classes.
Mobile Apps is an application you download
from an app store or other location on the Computer Communications is describe as a
internet to a smartphone or other mobile device. process of transferring data-instructions and
information between two or more computers.
Installing and Running Programs A hardware called communication device and
Installing a program is a process of setting up sometimes called transmitter transfer data-
the program to work with a computer or mobile instructions and information from computers
device, printer and or other hardware. transmission media and vice-versa.
-Generally, when you buy a computer or a Examples of communication devices are
mobile device it usually has some software such modems, wireless access points, and routers.
as an operating system pre-installed on its
internal media. Some communication involves cables and wires.
-This OS generally includes some application Others are sent wirelessly through the air.
such as browser, media-player and calculator.

-To use additional apps on a computer or a


mobile device, you usually need to install the
software.
-In a case, of web app no installation is needed
just access the app and the website.

*Once, a program is installed you can start


interacting with it. When you instruct a
computer or mobile device to run a program, In the communication process there is always a
they loaded it which means the program sender or a source and a receiver or a
instructions are copied from the storage to destination. Let’s assume that the source is the
memory. Once, in a memory the device can workstation and the destination is the server.
carry out or execute the instructions in the The user and the sender unit use an input device
program so that you can use it. and generates the data to be transmitted. This
data is in digital format. Digital data cannot be
*You interact with the program through User handled by telecommunication media.
Interface.
-The User Interface controls how you enter data The cable(diagram) needs to be transform into a
and instructions and how information is different type which is the analog type. This
displayed on screen. Often, you work with icons conversion process is the function of
or tiles that link to programs, media, documents communication device or transmitter. In the
or other objects. diagram the transmitter is the modem. There are
two modems in the diagram, the second modems
function is the reverse of the first modem. If the
first modem converts digital signal to analog, the
second modem converts the analog signal to
digital. So that, the user and the receiver end will
understand the message.
Wired communications as the name implies used Networks allows computer to share resources
cables to send communication signals. The such as hardware, software data and information.
wiring or cables typically are use within Sharing resources saves time and money.
buildings or underground between buildings.
The type of cable used can either be a telephone A network typically has one or more server and
wire or coaxial cable or a fiber optic cable. several client computers.

The first picture is the telephone wire, the In many networks, one or more computers act as
second is the coaxial cable and the third is the server. The server controls access to the
fiber optic cable. resources on the network. The other computers
on the network are called client. Each client
computer request resources from the server.
Servers computer typically has more power, has
more storage, space and expanded
communications capabilities.

Many homes and most businesses and schools’


network there are computers and devices. Most
allow users to connect their computers
wirelessly to a network.
Users often are required to sign in or log on the
network which means they enter a username and
Wireless communication many users choose or password to access the network and its
opt for wireless communications which send resources.
signals through air or space.
Home Networks
Wireless Fidelity (Wi-Fi) -It saves the home user money and provide
-uses radio signals to provide high speed internet many conveniences. They are usually small
and network connections to computers and existing within a single structure and use
devices capable of wireless connections. wireless technologies. It simply needs a
-Most computers and many mobile devices are communication device like a router to enable
just smartphones and portable media players can home users to connect their devices to network.
connect to a Wi-Fi network.
It simply needs a communication device like a
Bluetooth router, to enable the home users to connect their
-uses short-range radio signals to enables devices to the network.
computers and devices to communicate with
each other. Business Networks
-It can be small such as in a room or building or
Cellular Radio widespread connecting computers and devices
-uses the cellular network to enable high-speed across the city or a country or the globe.
internet connections to devices such as Why do businesses need to network their
smartphones. Cellular network providers use the computers?
category 3G,4G,5G to denotes cellular First reason, to facilitate communications,
transmissions speed with 5G being the fastest. using network employees and customers
communicate efficiently and easily via email,
FYI, Wi-Fi and Bluetooth are both hot spot messaging services, vlogs, online social
technologies. networks, video calls, online meetings, video-
conferencing, BOIP and more.
A hotspot is a wireless network that provides Second, hardware can be shared in a network
internet connections to mobile computers and environment which computer on the network can
devices. access the hardware on the network. Instead of
providing issues with the same piece of
Wi-Fi hotspots provide a wireless network hardware. For ex: I can do remote printing if I
connection to users in public locations such as am connected to a network with shared laser
airports, airplanes, train-stations, hotels, printer.
convention centers, schools, camp-crowds, Third, data, information, and software can be
marinas, shopping malls, libraries, restaurants, shared in a network environment any authorize
coffee shops and more. computer user can access data, information and
software stored in other computers on the
Bluetooth hotspots provide location base network. For ex: A large company, might have a
service to users whose Bluetooth enable device data base of customer information that any
is within the coverage range. authorize users can access.

A network is a collection of computers and Business Networks can be small, such as in a


devices connected together often wirelessly via room or building, or widespread, connecting
communications devices and transmission computers and devices across a city, country, or
media. the globe.
Investors also use computers in online investing
Technology Uses and buying and selling of stocks and bonds.
-Technology has changed the society today as With online investing the transaction fee is trade
much as the individual revolution changed the much less than when they are using brokers.
society in the 18th and 19th centuries. People
interact directly with technology in fields such Retailing just about any product now is
as education, government, finance, retail, available online, you can buy groceries, flower,
entertainment, travel, manufacturing and more. book, computers, mobile-devices, airline tickets,
concert tickets and more. To purchase from an
How technology issues in this fields. online retailer, a customer usually visits the
business store front which contains product
Education educators and teaching institutions descriptions, images and shopping card.
used technology to assist with education. Even -The shopping card allows the customers to
before this pandemic, schools are already using collect purchases when ready to complete the
the technology in the teaching-learning process. sale the customers enter personal data and the
Computer subjects are part of the curriculum and method of payment.
most learning institutions have computer -Many mobile apps make shopping experience
laboratory used by both teachers and students. more convenient; some enables you to manage
-In this new normal, most schools are using your words use coupons locate stores or pick for
course management system as sometimes called goods and services directly from your phone or
Learning Management System (LMS). This is other device.
a software that contains tools for class
preparation, distribution and management. Entertainment before computer was used in
Through this LMS, students can access scores, different fields, it is already used in the field of
materials, grades, assessment and a variety of entertainment specially in the field of the video
collaboration tools. games. Nowadays, computers and mobile
-Many schools also offer Distance Learning devices are used in any area of entertainment be
classes where the delivery of education occurs to it in audio, video, television shows, reading and
one place while the learning occurs at another gaming.
location. Distance learning courses provide time If you are busy you can download anything and
and distance place advantages for students who then watch, listen or read it in some other time.
live far from the campus or working full-time. A Some websites even support streaming where
few schools offer entire degrees online. National you can access the video content while it
and International companies offer distant downloads. You can also create videos, take
training because it eliminates the costs of airfare, photos, record audio or upload media content to
hotel and meals for centralize training sessions. the web to share with others such as social
network.
Technology has made learning easy, interactive,
and interesting. Healthcare nearly every area of healthcare
today uses computers whether you are visiting a
Government most government offices have family doctor for a regular check-up, having lab
websites to provide citizens with up to date work on out-patient or an out-patient is giving a
information. Almost all government agencies prescription or being rush in for emergency
units have websites that citizen can use to surgery. The medical staff around you will be
transact business with them. You can now apply using computers for various purposes.
for passport, NBI Clearance and other permits Computers are use in accessing patients
online. If you need data about population, records. It is also use to monitor patients’ vital
supreme-court ruling, you can access it on the signs. It assists surgeons during operations as
agency website. In this new normal, the national well as during medical test.
government is looking for ways to implement
“cashless transactions” meaning no exchange of Science all branches of science from biology to
cash would take place on transaction instead astronomy to meteorology uses computers to
payment should be done digitally or online. assist them by collecting, analyzing and
modeling data. Scientist also use the internet to
Finance many people and company use communicate with colleagues around the
financial institutions like banks or some are world. Breakthroughs in surgery medicine and
installing finance software on their personal treatments often result with the scientists use of
computers. They use this to pay their bills, track computers. Tiny computers now imitate
personal-income and expenses, manage functions of the central nervous system, retina of
investments and evaluate financial plans. The the eye and the cochlea of the ear. The cochlea
difference between using banking institution implant allows a deaf person to distinguish
websites vs. the finance software that they store sounds and then electrodes implanted in the
in their computer is that all their account brains stop of tremors associated with
information is stored on the bank’s computer Parkinson’s Disease. These are all science
instead of their computer. inventions through the help of computers.
The advantage is you can access your financial
records from anywhere in the world. Travel whether travelling by car or by plane
your goal is to arrive safely at your destination.
As you make the journey you may interact with industries including oil drilling, power
the navigation system or a GPS which uses the generation, food production and automobile
satellite signals to determine a geographic manufacturing.
location. Ex: Automobile plants have an entire line of
GPS Technology also assist people with creating industrial robots that assemble a car
maps, determining the best route between two
points, locating a lost person or stolen object, Technology users’ everyday people around the
monitoring a person’s movement and a lot more. world use various technology at home, at work
Many mobile devices such as smartphones also and at school. Depending on the hardware,
have built-in navigation system. In preparing for software and communications requirements,
a trip, you may need to reserve a car, hotel or these users generally can be classified as one of
flight. Many websites offer services to the public five categories. A single user may fall in to more
where you can search for and compare flights than one category.
and prices, you can also order airline tickets or
reserve s rental car, you can also print driving Home user is any person who spends time using
directions and maps from the web. technology at home.
Ex: Parents, children, teenagers, grandparent,
Publishing many publishers of books, singles, couples, etc.
magazines, newspapers, music, film and video
make their works available online. Small home/office user includes employees of
Organizations and individuals published their companies with fewer than 50 employees as well
thoughts and ideas using any of the three as self-employed who work from home. Small
different platforms a blog/vlog, podcast and a offices include local low practices, accounting
wiki. offices, travel agencies, flourish and a lot more.

Blog/Vlog is an informal website consisting of Mobile Users this includes any person who work
time stop articles or post in a diary or journal with computers or mobile devices while away
format usually listed in reverse chronological from a main office, home or school.
order, post can contain text, photos, links and Ex: sales representatives, real-estate agent,
more. insurance agents, meter-readers, package-
delivery people, journalist, consultants and
Others, read articles in the blog they can reply students.
with their own thoughts. The blog that contains a
video is called a vlog or a video vlog Power user is a user who requires the
capabilities of powerful computer like engineers,
Podcast are popular way to distribute audio or scientist, architects, desktop-publisher and
video on the web. A podcast is recorded media graphic artist.
that users can download or stream to a computer
or a portable media player. Enterprise user an enterprise has hundreds or
Ex: lectures, political-messages, video shows thousands of employees or customers who work
and commentaries. in or do business with offices across region, the
country or the world.
Podcasters registered their podcast so that -Each employee or customer uses computer,
subscribers can select content to automatically mobile devices and other technology in the
download when they are connected. enterprise is an enterprise user.

Wiki is a collaborative website that allow users


to create, add to, modify or delete the content via
their browser. Many wiki are open to
modification by the general public. The
difference between a wiki and a blog is that
users cannot modify original post made by a
blogger. You cannot rely so much on data and
information in a wiki this is because everybody
can post or upload anything in a wiki or they can
modify the previous post. There are some good
people who post to a wiki with an intentional or
with an accurate data they post intentionally.

Manufacturing one technology that is use today


in the area of manufacturing is computer-aided
manufacturing. This technology uses computer
to assist with the manufacturing process such as
fabrication and assembly. Industries use cam to
reduce product development cost, shorten
products time to market and stay ahead of the
competition. Often, robots carry out processes in
a calm environment. Calm issues by a variety of
Lesson B: Connecting and Research Institution and the last one is
in UU or University of Uta.
Communicating Online  Each of these computers serves as a host
Internet
on the network.
 One of the major reasons business,  A host or a server is a computer that
home and other users purchase provides services and connections to
computers and mobile devices is for other computers on a network.
internet access.  Host often used high-speed
 The internet is a worldwide collection communications to transfer data and
of networks that connects millions of messages over a network
businesses, government-agencies,  By 1984, ARPANET had more than
educational institutions and individuals. 1000 individual computers link as host.
 Each of the networks on the internet  Today, millions of hosts to connect to
provides resources that add to the many this network which is now known as the
goods, services and information internet.
accessible via the internet
 Today, almost all home and business
users around the world access the Today the internet is consist of mainly
internet using computers and mobile Local, Regional, National and an
devices. International Networks.
 There are lots of internet service
available for the users: there is the web,  Both public and private
messaging, video communications, organizations, all networks on the
chatrooms, discussion forums, file internet.
transfer and many more.  These networks along with phone
companies, cable and satellite
The Evolution of the Internet
companies and government. All
contribute toward the internal
The origin of the net
structure of the internet.
 The internet started as the networking
Ways of connecting to Internet?
project of Pentagons ARPA
(Advanced Research Projects
 Wired
Agency).
 Wireless
 Pentagon is an agency of the US
Department of Defense. Users can connect their computers and mobile
 The project has two goals: devices to the internet through wired or wireless
1. They want to come up with the network technology.
that will allow scientist from different
locations to share information and work With wired connections a computer or device is
together on military and scientific physically attached via cable or wire to a
projects. communications device like a modem that
2. They want to come up with the network transmits data and other items over transmission
that will continue to function even if media to the internet.
some parts were disabled or destroyed
by a disaster.
 That network called ARPANET became
functional in September, 1969.
 ARPANET links scientific and
academic researchers across the United
States.
 The original ARPANET is consisted of
four main computers. Each installed in
different locations. One, is located at
UCLA or University of California Los *The computer is connected to the router. The
Angeles. The other one is in UCSB or router is connected to the modem and the
University of California in Santa modem is connected to the internet cable. Both
Barbara. One in SRI or Stanford
the modem and the router in this diagram are
communications device.

Wireless Connection

 As the term denotes everything is


wireless the only wired connection here Many public locations such as shopping malls,
is the connection between the internet coffee shops, restaurants, schools, airports,
and the communications media (in this hotels, and city parks have Wi-Fi hotspots
case is the modem) and between the
modem and the wireless router.  Recall, that a hotspot is a wireless
network that provides internet
 Most mobile computers devices are Wi-
connections to mobile computers and
Fi ready.
devices.
What if my device is not Wi-Fi ready?  Although most hotspots are unrestricted
or with open access, some requires users
 For computers without Wi-Fi capability, to agree to terms of service or obtain a
you can use a wireless modem or other password or perform some other actions
communications device that enables in order to connect to the internet.
wireless connectivity.  Home and small business users can
 A wireless modem uses a wireless share and provide wireless internet
communications technology such as a connections by creating their own Wi-Fi
Cellular Radio, a satellite or Wi-Fi to hotspot.
connect to the internet.  Through a communications device in a
 The wireless modem also known as a home or business that is connected to
dangle which is a small device that broadband internet service a mobile
connects to computer and enables hotspot can be created this is known as
additional functions when attached. tethering.
 Today’s most popular internet service is  Tethering transforms as smart
broadband. This is because of its fast phone or internet capable device
data transfer speeds and is always on into a portable communications
connection. device that shares its internet access
 Through broadband internet service with other computers and devices
users can download pages quickly, play wirelessly.
online games, and  In cases like this, users maybe
charge with additional fees for
mobile hotspot and tethering
services.
communicate in real time with others and more.
Internet Service Provider (ISP)
Examples of popular wired and
wireless broadband internet service  A business that provides individual and
technologies from home, and small organizations access to the internet
business users. either for free or for a fee.
 ISPs often charge a fixed amount for an
internet connection, offering customers
of variety of plans

based on desired speeds, bandwidth and


services.

 In addition, to internet access ISPs may


include additional services such as e-
mail and online storage.

What is Bandwidth and why does it matter?

 Bandwidth is the (represents) amount


of data that travels over a network.
 Higher bandwidth means more data
transmits.
 Data sizes typically or stated in terms of  Every server has a unique Internet
megabytes and gigabytes. Protocol Address or IP Address just like
 A megabyte or MB is equal to a postal address IP Addresses help
approximately one million characters computers find each other but since
and a gigabyte or GB is equal to 72.14.205.100 doesn’t exactly roll of the
approximately one billion characters. tongue, we also give them names like
google.com, facebook.com or security
catalyst.com.
 So, this is how it works, your computer
at home is not a server because it’s not
connected directly to the internet.
 Computers you and I use everyday are
called clients because they’re connected
indirectly to the Internet through an
Internet Service Provider.
 Here we’ll pretend that this is my home
laptop and I’m using DSL. Now, let’s
pretend that I want to visit aol.com
*You have a list that you normally do using the which is coincidentally both a server and
internet and then you have the estimated an ISP. I hop on my laptop with DSL go
consumption in megabytes per hour. through my ISP onto the internet and
look at aol.com. My computer connects
For example, you’ve been browsing the net for with aol.com and I can look at its web
one hour, approximately you are consuming 240 pages. Now, let’s say that I want to send
megabytes (mb), if you are going to send an an email to Aunt Ruth and Ruth has
email without attachment you are consuming AOL dial-up from home and I’ve got a
approximately 0.1mb. Gmail account. I log on to gmail.com
and compose a message to Aunt Ruth’s
How the internet works?
email address, Aunt Ruth’s aol.com.
Once, I click send gmail.com since the
 Most of us know how to use the internet
email to aol.com the next day Aunt Ruth
without actually understanding how it
dials into AOL servers and retrieves the
works, sort of like electricity in your
email. Whenever an email picture or
home you use it every day but may not
webpage travels across the internet
understand the mechanics behind it and
computers break the information into
if the electric grid is difficult to
smaller pieces called packets when
understand then the internet must be
information reaches its destination the
impossible, right?
packets are reassembled in their original
 Whenever, most people think of the
order to make a picture email web page
Internet this is what comes to mind, the
or tweet.
Internet is not a bubble cloud even in the
 Imagine, you’re at work sitting next to
new age of cloud computing, the whole
your boss and you’re both surfing online
fuzzy cloud picture was created by
, your boss is doing market research and
people more concerned about job
you’re updating your Facebook profile ,
security than education.
you’re both sending packets back and
 This is the internet. The internet is a
forth over the Internet but what’s to
wire actually buried in the ground, it
keep your packets from accidentally
might be fiber optics, copper or
ending up on your boss’s screen that
occasionally beamed to satellites or
could be embarrassing, the solution to
through cell phone networks but the
that problem is IP Addresses and
Internet is simply a wire
routers, everything connected directly or
 The internet is useful because two
indirectly to the internet has an IP
computers connected directly to this
Address, everything that includes your
wire can communicate a server is a
computer servers, cell phones and all of
special computer connected directly to
the equipment in between anywhere two
the Internet and web pages are files on
or more parts of the internet intersect
that servers’ hard drive
there’s a piece of equipment called a
router.
 Routers direct your packets around the
internet helping each packet get one step
closer to its destination, every time you
visit a website upwards of ten to fifteen
routers may help your packets find their  Each Domain Name has a suffix called
way to and from your computer. Top Level Domain or the TLD.
 Imagine, each packet as a piece of candy  This TLD identifies the type of
wrapped in several layers. The first layer organization associated with the domain.
is your computer’s IP Address, your  New TLDs are being introduced to give
computer sends the packet to the first individuals and businesses flexibility
router which adds its own IP Address and creativity when purchasing Domain
each time the packet reaches a new Names.
router another layer is added until it  Here are some examples of TLD:
reaches the  .edu for education sites
 .pro for professional sites
 .gov for government sites
 .com for commercial sites
 .mil for military sites
server then when the server sends back  .org for organization sites
information it creates packets with an identical
And so, on and so forth. There are lots of
wrapping as the packet makes its way over the
domain we use today.
internet back to your computer each router
unwraps a layer to discover where to send the
packet next until it reaches your computer and
not your bosses.

PACKETS

 That’s what happen when you compose


a message. Once, the message is sent it
Use terms in the video
is divided into small chunk called
IP Address packets.
 Each of these packet carries the IP
 The internet relies on an addressing Addresses of each sender and each
system to send data to a computer or receiver along with other technical
device at specific destination. information.
 An IP Address short for Internet  So, although they pass through different
Protocol Address is a sequence of routes they will arrive at the same
numbers uniquely identified the location destination because they have the same
of each computer or device connected to IP Address of the destination unit.
the internet.
 Since, it will be difficult for people to WWW
memorize those linked-in numbers of
 While the internet was developed in the
the IP address the Domain Name
late 1960’s the world wide web
System or DNS was inter choose.
emerged in the early 1990’s
 A Domain Name is a text-based that
 The web make it easy to access online
corresponds to the IP Address of a
information using a browser since then it
server that host own site. In short,
has grown phenomenally to become one
whether you type the IP Address or the
of the more widely used services in the
Domain Name in the browser you will
internet.
be sent to the same website.
 World Wide Web or simply the Web
consists of worldwide collection of
electronic documents.
Webpage homepage provides information about
each purpose and content.
 Each electronic document on the web
is called a webpage. The time require to Web Address
download a webpage varies depending
on the speed of your internet connection  A webpage has a unique address called
and the amount of graphics and other a web address or in technical term is
media involved. URL or Uniform Resource Locator.
 For example: the web address is
Website www.bpsu.edu.ph, identifies the BPSU
homepage, browser retrieves a webpage
 Is a collection of related webpages and using each web address.
associated items stored on the web  If you know the web address of a page
server. you can type it directly in the address
bar of the browser then click the search
Web server
button or any similar button the browser
then downloads and displays the
 Is a computer that delivers requested
associated page.
web pages to your computer or mobile
device.
Uniform Resource Locator
 The same web server can store multiple
websites as web technology matured in
the mid 20’s industry experts introduced
the term web 2.0

Web 2.0

 This web 2.0 refers to websites that


provide a means for users to share
personal information like online social
media, allows users to modify websites
content like wiki’s and provide
applications through a browser like web
 The web address is consists of protocol,
apps.
domain name sometimes the host name
Navigating the Web pat to a specific webpage or file name of
the webpage
 Browsers is an application that enables  The http which stands for Hypertext
users with an internet connection to Transfer Protocol is a set of rules
access and view webpages on a governing the format of data send over
computer or mobile device the internet or other network
 Internet capable mobile devices such as  Many web addresses begin with http as
smartphones uses special type of protocol. The text between the protocol
browser called mobile browser. and the domain name is the host name.
It identifies the type of internet server or
the name of the web server.
 So, in this example, the www indicates
 This mobile browser is assigned for the that the host is a web server then the
smaller screens and limited computing domain name is bbc, the domain
power. extension or the TLD is .co.uk (.co
 Many websites can detect if you’re stands for a company, .uk stands for the
accessing their content on the mobile country United Kingdom) then the web
device, when you run a browser it may page that it wants to display is the World
retrieve and display starting webpage War 2 page, the type is html and it is in
sometimes called the homepage the folder name or subdirectory history.

Homepage

 Refers to the first page that is displayed


on a website. Similar, to a book cover or
a table of contents. The website
*When you enter a web address in a browser,
you are requesting or pulling information from a
web server. Another way user can pull content is
by subscribing to a web feed.

Web Feed

 It works like the notification you get


from your social media accounts.
 Mass media, Blocks and Online Social
Networks often provide web feeds.
 Saving users, the time spend checking
the websites for updated content.
 Most browser contain capability to read
web feeds.

Web Application or Web App

 It is an application stored on a web


server that you access through a
browser.
 Users typically interact with web apps
directly on a website or the host.
 Web app host usually provides storage
for user’s data and information under
servers this are known as cloud storage
 Many web app hosts provide free access
to their software others offer part of the
web app free and charge for access to
more comprehensive program.
 Free version of web app has
advertisements popping up when in use,
some allows you to use the web app free
then require you to pay a fee when
certain action occurs.

Mobile Applications

 This is an application you download


from an app store in your mobile device.
 Google play store is a site where you
can download mobile apps for your
android smartphone.
 Mobile apps often take advantage that
feature your device such as touchscreen,
digital cameras, and microphones and
embedded GPS receivers to enable you
to enter and capture data.

You might also like