0% found this document useful (0 votes)
26 views16 pages

It Era Reviewer

The document outlines the definition and core concepts of Information and Communication Technology (ICT), highlighting its role in enhancing productivity, communication, and access to information. It discusses various examples of ICT tools and their applications in daily life, such as education, banking, and e-commerce, while emphasizing the importance of ICT in driving economic growth and innovation. Additionally, the document provides a historical overview of computer development and the evolution of the internet, including key technologies and governance policies.

Uploaded by

Danica Sosa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views16 pages

It Era Reviewer

The document outlines the definition and core concepts of Information and Communication Technology (ICT), highlighting its role in enhancing productivity, communication, and access to information. It discusses various examples of ICT tools and their applications in daily life, such as education, banking, and e-commerce, while emphasizing the importance of ICT in driving economic growth and innovation. Additionally, the document provides a historical overview of computer development and the evolution of the internet, including key technologies and governance policies.

Uploaded by

Danica Sosa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

CHAPTER 1: INFORMATION AND productivity, and

COMMUNICATION TECHNOLOGY entertainment.


AND SOCIETY
Keyword: Mobile
Access
Definition of ICT: ICT involves the
use of electronics such as 3. Internet: Enables global
computers, communication communication,
devices, and software for collaboration, and
processing, storing, and information sharing.
transmitting information.
Keyword: Global
Core Concepts: Connectivity

 Information: Knowledge 4. Networking Equipment:


obtained from reading, Routers, switches, modems
research, or investigation that connect devices and
used to make decisions. provide internet access.

 Communication: The Keyword: Network


exchange of information Backbone
between individuals, now
5. Software Applications:
enhanced by digital tools like
Programs like word
email and video
processors, spreadsheets,
conferencing.
databases used for various
 Technology: The application tasks.
of scientific knowledge to
Keyword: Task
fulfill human needs,
Automation
especially in communication
and spreading information. 6. Cloud Computing: Provides
on-demand access to
EXAMPLES OF ICT:
storage, applications, and
1. Computers and Laptops: resources over the internet.
Used for word processing,
Keyword: On-Demand
data analysis, programming.
Resources
Keyword: Productivity
7. Social Media Platforms:
Tools
Tools like Facebook, Twitter
2. Smartphones and Tablets: for social interaction and
Offer communication, networking.
internet access, apps for
Keyword: Social visualizes spatial data for
Interaction urban planning and
environmental monitoring.
8. Video Conferencing Tools:
Zoom, Microsoft Teams, Keyword: Spatial Data
Skype for virtual meetings
14. Educational
and remote work.
Technologies: Learning
Keyword: Remote Management Systems (LMS),
Communication e-learning platforms.

9. E-commerce Platforms: Keyword: Digital Learning


Websites like Amazon, eBay
15. Digital Cameras and
for online buying and selling.
Imaging Software: Used for
Keyword: Online photography, medical
Trade imaging.

10. Data Storage Keyword: Digital Imaging


Devices: Hard drives, SSDs,
USAGE OF ICT IN DAILY LIFE:
and USB drives used for
storing and retrieving digital  Education: Teachers,
data. students, and administrators
use ICT for teaching,
Keyword: Digital Storage
research, and operations.
11. Information
 Banking: ICT facilitates
Systems: ERP, CRM systems
online banking and efficient
streamline business
banking operations.
processes and manage data.
 Industry: ICT helps in
Keyword: Business Systems
machine operation, data
12. Robotics and analysis, and controlling
Automation: ICT is used in production systems.
controlling robotics in
 E-Commerce: ICT improves
manufacturing, healthcare,
the efficiency of buying and
logistics.
selling online.
Keyword: Automated IMPORTANCE OF ICT:
Control

13. Geographic
Information Systems
(GIS): Captures and
 Enhanced Communication: supports telemedicine,
Global instant electronic health records
communication via emails, (EHRs), and patient
messaging apps, and video monitoring.
conferencing.
Keyword: Digital Healthcare
Keyword: Instant
 Globalization and Trade:
Communication
ICT enables businesses to
 Access to Information: The communicate and transact
internet provides vast across borders, supporting
amounts of data for globalization.
education, research, and
Keyword: Global Trade
personal use.
 Social Connectivity: Social
Keyword: Unlimited
media and online
Information
communities allow people to
 Education and E-Learning: connect across distances.
ICT transforms education
Keyword: Online
with e-learning platforms,
Communities
digital resources, and
interactive tools.  Government Services: ICT
enables e-governance,
Keyword: Digital Education
reducing bureaucracy and
 Business Efficiency: Tools increasing transparency.
like ERP and CRM enhance
Keyword: E-Governance
decision-making, streamline
processes, and improve  Research and Innovation:
operations. Data analytics, simulations,
and high-performance
Keyword: Operational
computing drive scientific
Efficiency
breakthroughs.
 Economic Growth: ICT
Keyword: Research Tools
fosters innovation,
productivity, and job  Disaster Management: ICT
creation, driving the tech supports coordination of
economy. emergency services and aid
distribution during crises.
Keyword: Innovation Growth
Keyword: Crisis
 Healthcare
Coordination
Advancements: ICT
 Environmental
Monitoring: Sensors and
data analytics monitor
climate change and
biodiversity.

Keyword: Environmental
Tech

 Crisis Response and


Humanitarian Aid: ICT
helps manage logistics and
communication during
humanitarian crises.

Keyword: Aid Coordination

 Financial Inclusion: ICT


expands financial services to
underserved populations
through mobile banking and
digital payments.

Keyword: Inclusive Finance

 Personal Productivity:
Productivity software and
apps enhance time
management and task
automation.

Keyword: Time
Management
CHAPTER 2: HISTORY OF 5. Aristotle’s Tree of
COMPUTER Porphyry (383 BC - 322
BC):
LIFE BEFORE COMPUTERS:
A visual representation of
1. The Number System: relationships between
Early humans used their species and things,
fingers for counting, leading structured like a family tree.
to the development of the
o Keyword: Hierarchy of
decimal system (base-10).
Being
o Keyword: Decimal
6. John Napier’s Bones (1600
Counting
AD):
2. Computation Tools (30000 A tool for multiplying and
BC - 20000 BC): dividing large numbers.
Small stones, pebbles, and
o Keyword:
marked bones were used to
Multiplication Aid
represent numbers for early
computation. 7. Wilhelm Schickard’s
Calculating Clock (1625
o Keyword: Primitive
AD):
Tools
A mechanical device for
3. First Place-Value System adding and subtracting
(1900 BC): numbers up to 6 digits.
Babylonians invented the
o Keyword: Mechanical
sexagesimal system (base-
Calculator
60), still used today in time
(60 seconds, 60 minutes) and 8. Pascal’s Arithmetic
angles (360 degrees). Machine (1640 AD):
The first mechanical adding
o Keyword: Base-60
machine for 8-digit
System
calculations.
4. Abacus (1000 BC - 500
o Keyword: Pascaline
BC):
Invented by the Babylonians 9. Leibniz’s Stepped
or Chinese, the abacus was Reckoner (1671):
the first calculating machine. A machine capable of all four
basic arithmetic operations
o Keyword: First
(addition, subtraction,
Calculator
multiplication, division).
o Keyword: Four
Operations
TECHNOLOGICAL TRENDS
10. Jacquard’s Loom
1. Touch Screen:
(1804):
A monitor that functions as
An automated loom that used
both a display and an input
punched cards to produce
device, sensitive to pressure.
intricate designs, influencing
later computers. o Keyword: Interactive
Screen
 Keyword: Punch Cards
2. Gestural Interfaces:
11. Babbage’s Machines
Allows users to control a
(1822, 1833):
computer without physical
Charles Babbage, known as
touch, through gestures.
the Father of Modern
Computers, invented the o Keyword: Touch-Free
Difference Engine for Interaction
calculations and the
3. 3D Technology:
Analytical Engine, the
Creates three-dimensional
precursor to modern
visuals on computers, TVs, or
computers.
movies, mimicking real life.
 Keyword: Father of
o Keyword: Real-Life
Computers
Imaging
12. Binary Arithmetic
4. Motion Capture:
(1840):
Records human movement
Lady Ada Lovelace used
and translates it into digital
the binary system (0s and 1s)
models, used in movies,
for computation, becoming
video games, and healthcare.
the first programmer.
o Keyword: Digital
 Keyword: Binary System
Motion
13. Hollerith’s
5. Mobile Devices:
Tabulating Machine
Handheld devices like
(1890):
smartphones and tablets,
Herman Hollerith’s punch-
providing computing on the
card-based machine laid the
go.
foundation for IBM.
o Keyword: Pocket
 Keyword: IBM Roots
Computers
6. Artificial Intelligence (AI) conferencing, cloud-based
& Machine Learning (ML): collaboration tools, and
AI and ML are transforming remote work technologies
industries through accelerated during the
applications like predictive COVID-19 pandemic.
analytics and natural
 Keyword: Remote
language processing.
Collaboration
o Keyword: Smart
11. Wireless Charging:
Automation
Devices that charge without
7. 5G Technology: cords, commonly used in
Faster and more reliable phones, cars, and more.
communication networks,
 Keyword: Cordless Power
paving the way for IoT,
augmented reality (AR), and 12. Smart Rings:
virtual reality (VR). Wearable devices that
provide workout data, sleep
o Keyword: Next-Gen
insights, and health tracking.
Networks
 Keyword: Wearable Tech
8. Edge Computing:
Processes data closer to the 13. Neural Headphones:
source rather than relying on Headphones that interpret
centralized cloud servers, brainwaves and provide
essential for real-time control over computers
processing. without physical interaction.

o Keyword: Local Data  Keyword: Mind Control


Processing

9. Cybersecurity:
As technology advances,
cybersecurity measures like
advanced encryption,
biometrics, and AI-based
solutions are crucial.

o Keyword: Tech
Security

10. Remote Work


Technologies:
The rise of video
CHAPTER 3: THE INTERNET AND 1. DSL Modem: Converts
WWW digital signals to analog for
WHAT IS THE INTERNET? transmission over telephone
lines, enabling internet
 The Internet is a global
access.
network that connects
computers, allowing o Keyword: Signal
information sharing and Converter
communication worldwide.
2. DSL Filter: Filters DSL
Keyword: Global Network signals from phone signals,
allowing simultaneous
internet and phone use.
HISTORY OF THE INTERNET
o Keyword: Signal
 1960s Cold War: ARPANET, Separator
created by the U.S.
3. Router: Directs data packets
Department of Defense, was
between networks, ensuring
the first prototype of the
efficient data delivery.
Internet, designed for
decentralized communication o Keyword: Traffic
using packet-switching. Director
 1974: Vint Cerf and Robert 4. Firewall: Protects a network
Kahn introduced TCP/IP, from unauthorized access,
enabling data transfer across blocking harmful information.
interconnected networks.
o Keyword: Network
 1989: Sir Tim Berners-Lee Security
proposed the World Wide
5. Internet Connection
Web (WWW) using HTML and
Sharing (ICS): Allows
HTTP to share and access
multiple devices on a local
information easily.
network to share a single
 1990s: The release of internet connection.
Mosaic, the first web browser
o Keyword: Shared
with a graphical interface,
Connection
made the internet more
accessible. 6. Network Hub: Connects
multiple Ethernet devices,
Keyword: ARPANET, TCP/IP, WWW
allowing data communication
COMPONENTS OF THE across the network.
INTERNET:
o Keyword: Data 3. Routers: Direct data packets
Connector across networks, choosing
the most efficient path.
7. Network Switch: Like a hub,
but smarter—it sends data to o Keyword: Data Traffic
specific devices on the Manager
network using their MAC
4. DNS (Domain Name
addresses.
System): Translates human-
o Keyword: Data readable domain names (like
Switchboard google.com) into IP
addresses for easier access.
8. Wireless Access Point
(WAP): Connects wireless o Keyword: Address
devices to a wired network Translator
via Wi-Fi or Bluetooth.
5. DNS Caching: Stores
o Keyword: Wi-Fi Access previously translated IP
addresses locally to speed up
future lookups.
HOW THE INTERNET WORKS:
o Keyword: Faster
1. IP Address: A unique Lookup
identifier for each device on
the internet, ensuring
accurate data delivery. INTERNET GOVERNANCE:

o Keyword: Digital 1. Governments: Set rules for


Address internet usage, including
content regulation, privacy,
2. IP Types:
and cybersecurity.
o IPv4: Older format with
o Keyword: Regulators
four sets of numbers
(e.g., 192.168.0.1). 2. Internet Service Providers
(ISPs): Provide internet
o IPv6: Newer, longer
access, managing the
format with eight sets
infrastructure but not
of hexadecimal
controlling content.
numbers (e.g.,
2001:0DB8:85A3::). o Keyword: Internet
Providers
o Keyword: IPv4 vs IPv6
3. International
Organizations
(ICANN/IETF): Manage Ensures that online content is
domain names and develop accessible to people with
standards to ensure smooth disabilities.
operation across the internet.
o Keyword: Accessibility
o Keyword: Internet Standards
Standards
4. Universal Service Fund
4. Technology Companies: (USF): Supports extending
Build platforms (e.g., Google, telecommunications to
Facebook) but don’t control underserved areas.
the entire internet.
o Keyword: Bridging
o Keyword: Platform Digital Divide
Builders
INTERNET SERVICES:
5. Individual Users: Shape the
1. Information Services:
internet by creating content
Search engines and content
and interacting with it.
portals like Google and
o Keyword: Content Wikipedia provide
Creators information.

o Keyword: Info Search

INTERNET POLICIES: 2. E-commerce: Online


shopping platforms like
1. GDPR (General Data
Amazon and eBay enable
Protection Regulation):
buying and selling.
Governs how personal data is
collected, stored, and used in o Keyword: Online
the EU. Shopping
o Keyword: Data 3. Communication Services:
Protection Tools like email, instant
messaging, and social media
2. Net Neutrality: Ensures that
allow global communication.
ISPs treat all internet traffic
equally, without favoring o Keyword: Global
certain websites or services. Communication
o Keyword: Equal 4. Financial Services: Online
Internet banking, investing, and
digital wallets like PayPal
3. Web Content Accessibility
enable financial transactions.
Guidelines (WCAG):
o Keyword: Digital 2. Components:
Banking
o Web Page: An
5. Travel and Transportation: individual document
Online platforms help book available on the web.
flights, hotels, and
o Website: A collection
transportation.
of related web pages.
o Keyword: Online
o Home Page: The main
Travel
page of a website.
6. Entertainment: Streaming
o Web Server: Stores
platforms like Netflix and
and delivers web
Spotify provide media
pages.
content.
o Browser: Software to
o Keyword: Streaming
access and view web
7. Health and Telemedicine: pages (e.g., Chrome,
Remote healthcare services Firefox).
via the internet.
o URL: The web address
o Keyword: Online of resources on the
Healthcare WWW.
8. Cloud Computing: Provides o Hypertext- allows the
storage and computing user to select a word or
power over the internet (e.g., phrase from text and
Google Drive, AWS). thereby access other
documents that contain
o Keyword: Remote
additional information
Storage
pertaining to that word
or phrase.
WORLD WIDE WEB (WWW): o Hypermedia
documents feature
1. Definition: The WWW is an
links to images,
information retrieval service
sounds, animations,
on the internet, linking
and movies.
documents through hypertext
(links). o Keyword: Web Basics
o Keyword: Linked
Information
3. Key Developments:
o Tim Berners-Lee:
Created HTTP, HTML,
and the idea of the
WWW in 1989.

o Mosaic Browser: The


first graphical web
browser, popularized
the web.

o Netscape Navigator:
Dominant browser in
the mid-1990s.

o Internet Explorer:
Released by Microsoft
in 1995, later
challenged by Firefox
and Chrome.

o Keyword: Web History


CHAPTER 4: NETIQUETTE professional contexts.
Keyword: Respectful
1. Definition:
4. Send Messages if
o Netiquette refers to a
Appropriate
set of guidelines for
proper online behavior, o Keep communication
aiming to foster respect relevant, avoiding
and positive unnecessary emails or
interactions across messages.
digital platforms. Keyword: Appropriate
Messages
2. Importance of Netiquette:
5. Check for Grammar
o Promotes clear
Mistakes
communication,
reduces conflicts, and o Proofread to avoid
contributes to creating errors and ensure
safer and more professionalism.
productive online Keyword: Proofread
environments.
6. Respect Other People’s
10 RULES OF NETIQUETTE: Privacy

1. Practice Empathy o Never share personal


information without
o Understand others'
consent.
perspectives before
Keyword: Privacy
reacting or replying.
Keyword: Empathy 7. Ensure Messages are
Clear
2. Use a Friendly Tone
o Use simple and direct
o Ensure that your words
language to avoid
convey respect and
confusion.
kindness.
Keyword: Clarity
Keyword: Friendly
Tone 8. Create Appropriate Posts

3. Use Respectful Language o Ensure what you post


reflects a positive,
o Be mindful of the
professional image.
language you use,
Keyword: Appropriate
especially in
Posts
9. Respond to Emails on Common Types of Cybercrime:
Time
1. Identity Theft
o Timely responses keep
o Stealing personal data
communication smooth
(e.g., credit card info)
and efficient.
to create false
Keyword: Timeliness
identities.
10. Read Content Keyword: Stolen
Thoroughly Identity

 Understand messages fully 2. Cyberbullying


before replying to prevent
o Harassing or mentally
misunderstandings.
abusing individuals
Keyword: Thorough Reading
through digital
TYPES OF NETIQUETTE: platforms.
Keyword: Online
1. Netiquette of Sending
Harassment
o Keep messages brief,
3. Cyber Libel
use clear subject lines,
and limit attachments. o Defaming or harming
Keyword: Brief and someone’s reputation
Clear through false
information online.
2. Netiquette of Replying
Keyword: Defamation
o Acknowledge important
4. Internet Fraud
communications and
only reply when o Deceptive schemes
necessary. online to steal money
Keyword: or personal details
Acknowledgement (e.g., fake websites,
emails).
3. Netiquette of
Keyword: Online
Confidentiality
Scam
o Protect personal and
5. ATM Fraud
sensitive information
when communicating o Stealing card data and
online. PINs to create fake
Keyword: cards and withdraw
Confidentiality funds.
Keyword: Card  Malicious software designed
Cloning to damage or disrupt
computer systems.
6. Wire Fraud
Keyword: Malware
o Fraud involving the
12. Denial of Service
transfer of money
(DoS) Attacks
electronically under
false pretenses.  Overloading a network or
Keyword: Fake system to make it
Transfers unavailable to users.
Keyword: System Overload
7. File Sharing and Piracy
13. Spam and Email
o Illegal distribution and
Hacking
reproduction of digital
files like movies,  Sending large amounts of
software, or music. unsolicited messages or
Keyword: Piracy hacking emails to steal
information.
8. Counterfeiting and
Keyword: Spam
Forgery
14. Sabotage
o Tricking people by
distributing fake or  Deliberately damaging
forged documents and systems or infrastructures
products. through digital means (e.g.,
Keyword: Fake Goods hijacking websites, disrupting
services).
9. Child Pornography
Keyword: System
o Exploiting minors by Destruction
distributing illegal
15. Phishing
sexual content.
Keyword: Exploitation  Fraudulent emails or websites
that trick people into giving
10. Hacking
up personal information.
 Unauthorized access to Keyword: Fake Emails
systems or devices to steal,
16. Web Threats (e.g.,
manipulate, or destroy data.
WannaCry Ransomware)
Keyword: Unauthorized
Access  Cyberattacks like
ransomware that infect and
11. Computer Viruses
lock down computers until a
ransom is paid.
Keyword: Ransomware

You might also like