Module for Ge Elective 1 Computer 1 Introduction to Ict
Module for Ge Elective 1 Computer 1 Introduction to Ict
WEEK 2
Chapter 1
INTRODUCTION
1|Page
Data Processing Cycle
1. Input. This phase involves capturing or obtaining raw data and placing it into the data
processing system. Initially, the data processing cycle begins with data entry. It can be
recorded keyboard or other direct input devices.
2. Process. The conversation of gathered data will be manipulated using any of the
operations:
Classification – data are organized into groups or classes by assigning
predetermined codes to the items being arranged. Codes may be numeric,
alphabetic, and alphanumeric characters.
Calculation – It makes use of the arithmetic operation in the manipulation of data.
Sorting – It arranges the data in a logical sequence from first to last, smallest to
biggest, or oldest to newest.
Summarizing – It reduces the bulk of data to a more concise and usable form.
3. Output. These data are the results of the processing activities. They are transferred or
communicated electronically to other locations, or they may be produced by printers or
similar machines.
4. Storage. The data, information, and programs are stored in computer in a form that can
be accessed such as floppy disk, CD-ROMs, magnetic tape.
2|Page
2 DEVELOPMENT OF COMPUTER
Man used his fingers and toes to calculate, later they realized that by using some
object to represent digits it might be possible to perform computation beyond the limited scope
of one’s toes. Shell, chicken bones and pebbles were use. Actually, the word calculation
comes from the latin word calculi, which means pebbles.
MECHANICAL COMPUTERS
Abacus. The first man made computing device historians believe that the early abacus used
pebbles strung on wires and the wires arranged in rows. It was used to add and subtract large
numbers.
3|Page
Leibnitz Calculator. In 1674, GOTTFRIED WILHELM
VON LEIBNITZ, a German mathematician invented
calculus at the age of 26. He continued the work of
PASCAL and made a machine that can perform
multiplication and division, as well as exact square roots.
4|Page
Difference Engine. In 1833, CHARLES BABBAGE together
with LADY AUGUSTA ADA BYRON, both English
mathematician designed the analytical Engine which was the
first wholly conceived automatic, general purpose digital
computer. This device had the following features:
This machine was never complete because the technical sciences of that age were not
sufficiently advance for practical implementation of the analytical engine. Today, however, some
credits have been to Babbage for this contribution to the development of computers. He is often
referred to as the father of Modern Computers. His analytical engine become the forerunner of
today’s electronic computers. Lady Augusta Byron is often referred to as the first programmer.
ELECTROMECHANICAL COMPUTERS
Key-punched Machine.
5|Page
Electromechanical Accounting Machine (EAM).
Mark I.
The ENIAC.
The EDSAC.
6|Page
The EDVAC.
The UNIVAC 1.
Assembly Language
This generation also marked the development of programming languages from machine
language to assembly language. Assembly language, also known as symbolic language, used
abbreviations for instruction rather than numbers which made programming less difficult.
High level languages came in next after the development of symbolic languages. The
FORTRAN (1954) and COBOL (1959) were more English-like than assembly languages.
7|Page
The IBM 604
In 1963, the PDP-8, the first successful microcomputer, was introduced by the Digital
Equipment Corporation. Its success confirms the tremendous demand for small computers.
In 1964, IBM introduced the 360 series thereby ushering into the third generation of computers.
This computer was known as system 360 was basically designed for both business and
scientific uses. It came to be the forefront in interactive processing, which used a terminal to put
the user to direct contact with the computer. The customer service industry thus began to
flourish with his kind of access, especially in areas of reservations and credit checks.
The most prominent business venture during the early years of the
personal computer was the Apple II computer. The Apple II was
originally design for home use by two computer enthusiasts: Steven
Jobs and Steve Wozniak. It was this company who introduced the popular brand Macintosh.
8|Page
In 1981, IBM introduced the personal computers or the PC. It growth
in sales had made IBM PC the standard for microcomputer industry.
9|Page
3 CLASSIFICATIONS OF COMPUTERS
According to Age
1. First Generation: 1951-1958
Characteristics:
Large, bulky machines
Employed vacuum tubes in their circuitry
Operating speed measured in milliseconds
Memory capacity: 2000-4000 characters
o Examples: UNIVAC1, CRT 102, IBM 701, IBM 650
According to size
1. Supercomputers. These are high capacity machines and are considered the fastest
processing devices. These are used in modelling complex phenomena such as oil
exploration, weather forecasting, nuclear explosions, airplane design, etc. Examples are:
Cray Research, Intel Supercomputers, Convex, Fujitsu, NEC, etc.
2. Mainframes. Mainframe computers are water or air-coiled computers which are capable
of great processing speed and data storage. It is used in banks, airlines, insurance
companies, government agencies such as BIR.
Memory capacity: minimum of 5 megabytes
Execution speed: 100 nanoseconds
Used for general applications
Examples: IBM 360/20, NCR 3, UNIVAC 9400
10 | P a g e
Large scale computers are actual high-level machines that have storage capacities in the
million-byte range. They process full control systems with minimal operator conventions. They
are also capable of linking up with dozens of high-level I/O devices and performing operations at
phenomenal rates.
According to Design
1. General-purpose computer
Designed to program a variety of operations.
Has the ability to store different programs of instructions in its internal storage
The ability to perform a variety of operations is achieved at the expense of speed and
efficiency of performance.
2. Special-purpose computer
Designed for a specific operation and usually satisfies the need of a particular type of
problem.
The instructions that control the machine are built into it.
Specialization of the machine results in the economical, efficient and effective
performance of a specific operation.
11 | P a g e
Examples: ATM (Automated Teller Machines), factory robots, computers used for collecting
highway tolls, airline reservations, and industrial process control.
According to application
1. Business computer
Requires the processing of large number of records or vast amount of data
Perform relatively little computation/manipulation on each record/data
Large volume of output in the form of reports
Emphasize on high-speed input and output instructions to facilitate the conversion
(editing) of sorted data into report format
2. Scientific computer
Requires the processing of a relatively small amount of data
Performs extensive internal computation on data
Produces little output
Uses high-speed internal processing but have limited input/output capabilities
According to Operation
1. Digital Computer
Operates directly on decimal digits that represents either discrete data or symbols
Takes input and gives output in the form of numbers, letters and special characters
represented by holes in punched cards, spots on magnetic tapes, printing on paper,
etc.
Generally used for business and scientific data processing.
Capable of achieving varying degrees of accuracy in both intermediate and final
values of data.
Possesses greater accuracy than the analog computer.
2. Analog Computer
It measures continuous electrical or physical magnitudes like current length,
pressure, voltage, temperature, shaft rotations, which represent or are analogous, to
the number under consideration.
It can process data faster than a digital computer.
3. Hybrid Computer
it has the ability to solve problems at a speed faster than analog computers and
greater accuracy than digital computers.
C PU
USER
12 | P a g e
2. Multi-user Computer
a) Time sharing
Disadvantage: System slows down as the number of users increase.
Remarks: Users request are processed on a first come, first serve basis
CPU
TIME SLICER
b) Multi-processor
Remarks: All arithmetic/ logical operations required by each user are performed by the
corresponding slave CPU while the main CPU performs all I/O operations necessary for
all users.
CPU
TIME SLICER
13 | P a g e
INTRODUCING TODAY’S TECHNOLOGY (PPT FILE)
New Technology Trends for 2025
1. Generative artificial intelligence (AI) is a type of AI that creates new content, such as
images, text, audio, and videos. It uses machine learning models to learn patterns in
data and generate new data based on those patterns.
How it works
Foundation models: Large AI models that can perform tasks like summarization, classification,
and Q&A
Deep learning models: Algorithms that simulate the human brain's learning and decision-
making processes
Fine tuning: Feeding the model labeled data to improve its accuracy and relevance
What it can do :
2. 5G Expansion
How is 5G expanding?
14 | P a g e
Using energy-efficient technology
Companies are using technology that reduces energy consumption and carbon
emissions.
(VR) is a technology that creates a simulated 3D environment that users can interact
with in real time. VR uses devices like headsets, gloves, or body suits to create the
illusion that the user is immersed in a virtual world.
How it works
Headsets
A VR headset or helmet is a device that displays the virtual environment to the user.
Motion sensors
Motion sensors track the user's movements and adjust the view on the screen in real
time.
Gesture recognition
Gesture recognition or handheld controllers track the user's hands and body.
Haptic feedback
Haptic feedback, or touch-sensitive feedback, can be incorporated into the device.
Applications
Entertainment: VR can be used to create immersive entertainment experiences.
Education: VR can be used to help students visualize and understand complex
concepts.
Business: VR can be used to train employees safely and efficiently.
Meditation: VR can be used to help people meditate, reduce anxiety, and increase
mindfulness.
History
In 1968, Ivan Sutherland and Bob Sproull created the first VR head-mounted display,
called the Sword of Damocles.
15 | P a g e
Examples of AR
Gaming: Players can locate and capture Pokemon characters in the real world.
Navigation: Users can see a route to their destination overlaid on a live view of the
road.
Manufacturing: Industrial users can work more efficiently with machines and systems.
Archaeology: AR can help archaeologists reconstruct sites and experience excavation
sites as if they were there.
5. Synthetic Media
is a term for media that has been artificially created or modified using technology, such
as artificial intelligence (AI). It can include images, videos, text, and audio.
How it's created
Synthetic media is created using AI algorithms, machine learning, and other automated
means.
The technology is capable of creating realistic content that may be difficult to identify as
synthetic.
What it can be used for
Synthetic media can be used to mislead people or change the meaning of original
content.
It can also be used for positive purposes, such as in education, healthcare, and
entertainment.
Examples of synthetic media
Deepfakes: A popular type of synthetic media that uses AI to create hyper-realistic
versions of people.
AI-written music: Music created using AI.
Text generation: Text created using AI.
Voice synthesis: Voices created using AI.
Interactive language lessons: Language lessons created using AI.
Medical training simulations: Virtual patients created using AI to help medical
professionals practice procedures.
16 | P a g e
WEEK 3
The Computer System
A computer system is a collection of hardware and software that performs specific tasks. The
term “system” refers to the interconnection of individual components, which work together to
perform an overall task or set of tasks.
Computer systems will include the computer along with any software and peripheral devices
that are necessary to make the computer function. Every computer system, for example,
requires an operating system.
The term “computer system” is often used interchangeably with the term “computer,” but they do
not actually mean the same thing. A computer system can be as simple as a single device, or it
can be an entire network of devices working together.
Hardware in a computer system includes the central processing unit (CPU), memory, storage
devices, input/output (I/O) interfaces, network connections, and other components. Software
consists of applications or programs that run on the CPU to perform various functions for users.
There are many different types of computer systems that can be used by businesses and
organizations but also by consumers. The most common type of computer system is the
desktop computer, which is a personal computer that sits on a desk or table and can be used by
one person at a time.
A laptop or notebook computer is similar to a desktop and is also a computer system, but it has
an internal battery pack so it can be taken with users when they travel. In an increasingly mobile
world, mobile phones and other mobile devices are also considered types of computer systems.
Humanware - is the combination of hardware and software elements that make human interaction with a device as
good as possible.
Firmware - is a form of microcode or program embedded into hardware devices to help them operate effectively.
Bridgeware - Hardware or software that converts data or translates programs from one format into another.
17 | P a g e
The physical components collectively form the hardware of a computer system. Hardware
comprises of the equipment that helps in the working system of the computer.
Following are the different types of hardware components (which have specific functions) −
Computer architecture refers to the design and basic structure of a computer system, including
its hardware structures, their interconnections, and the principles that guide their organization. It
encompasses the higher-level aspects of computer design, such as the instruction set
architecture (ISA), memory hierarchy, and the organization of the central processing unit (CPU).
Computer architecture sets the foundation for building efficient, reliable, and high-performance
computer systems.
Computer architecture refers to those attributes of the system that are visible to the software
programmer and have a direct impact on the logical execution of a program, like the number of
bits used to represent various data types, the instruction set of the computer, technique for
addressing memory, method used for input, output, etc. It basically defines the system in an
abstract manner and deals with the concepts that the programmer deals with directly.
The following 3 main categories are considered while considering the design of
architecture:
System Design (contains hardware components that are used for building the
system)
Instruction Set Architecture (includes all the instructions provided to the computer
system)
Micro Architecture (give minute detail about storage element)
Computer architecture plays a critical role in determining the overall performance, power
efficiency, and scalability of a computer system. Design choices in architecture impact a
18 | P a g e
system's ability to handle various workloads, support future technologies, and deliver a
satisfactory user experience.
Computer organization deals with the physical components of a computer. So, it refers to the
operational unit and the interconnection between them that achieves the architectural
specifications. It tells us about the different functional blocks of the system. It is basically the
realization of architecture and deals with functional structure and various structural
relationships.
Computer organization includes the physical connection component, like circuits with adder
subtractor. If we talk about CPU organization, its three types are:
Computer organization plays a crucial role in determining the overall performance and efficiency
of a computer system. Designing efficient interactions between hardware components is
essential for achieving optimal processing speeds and responsiveness.
Key differences between computer architecture and computer organization are summarized
below:
Computer Architecture is concerned with the Computer organization is concerned with the way
structure and behavior of the computer hardware components are connected together to
system as seen by the user. form a computer system.
19 | P a g e
decided first. architecture.
It acts as an interface between hardware It deals with the components of a computer and the
and software. interconnection of components.
Computer architecture deals with high-level Computer organization deals with low-level design
design issues. issues.
Computer architecture defines the logical Computer organization defines the physical aspects
aspects of a computer system. of the computer system.
It deals with the functional behavior of the It deals with the organizational structure of the
computer system. computer and the various structural relationships.
Concerned with - What to do? (Instruction Concerned with - How to do?(implementation of the
Set) architecture)
COMPUTER PROGRAMS:
Bachelor of Science in Computer Science (BSCS) is a four-year program that includes the
study of computing concepts and theories, algorithmic foundations, and new developments in
computing.
Bachelor of Science in Information System (BSIS), is a four year degree program that deals
with the design and implementation of solutions that integrate information technology with
business processes.
20 | P a g e
and computer science to design and analyze all hardware and software required for a computer
system.
WEEK 4
4 ELECTRONIC DATA PROCESSING
There are different types of data processing system and each performs one or more
required operations on data by means of various devices. When the machine performs most of
the required operations, the systems is called an Automatic Data Processing (ADP) system.
When that machine is an electronic digital computer, the system is described as an Electronic
Data Processing (EDP) system or simply as a computer system.
The Computer System refers to the machines, programs and operating aids that cause these
machines to function; the procedures required to prepare and process the data; and people who
keep the hardware, software and procedure effectively functioning. In technical term, it is also
called as Technoware.
HARDWARE
Hardware accessories such as keyboard, mouse, screen, and printers are called peripherals.
The computer system has four basic components. Input devices accept data. These data are
kept in the memory of the computer in storage for later use. Processing of these data takes
place in the computer. Finally, results flow through output devices.
SOFTWARE
It refers to programs that direct the activities of the computer system. It can be considered into
three major categories: general-purpose software, applications software, and system software.
•Application Software are programs designed and written to perform specific personal,
business, or scientific processing tasks such as payroll processing, inventory management and
that like.
21 | P a g e
The Operating System. The nucleus of any computer system is its operating system. It
monitors and controls all input/output and processing activities within computer system. Some of
the popular operating systems for microcomputer include:
•MS Windows Operating System. Microsoft released Window 3.0, Windows 3.1 and 3.11 in
the market in the early 1990’s with the help of MS-DOS to operate. But the first Windows that
makes use of the Graphical User Interface (GUI) in the operating system was Windows 95.
Later on, an update version was released with a web browser named Internet Explorer in the
Windows 98 release. Then there’s the Windows Me (Millennium Edition) that makes use of the
digital video editing and multi-media support and capabilities. Windows 2000 professional
combines the user-friendly interface of Windows 98 and the capability in networking of
Windows NT (New Technology) used for networking (Windows NT Workstation and Windows
NT Server). With the release of Windows XP, both the Home and Professional Edition, the PC
desktop has more three-dimensional (3D) look. It has advanced networking and
communications feature. The Windows Vista was design to strengthen the Web integration and
the improvement of wireless capability. Unlike Windows Vista which introduced a large number
of new features, Windows 7 was intended to be a more focused, incremental upgrade to the
Windows line, with the goal of being compatible with applications and hardware with which
Windows Vista was already compatible. Windows 8 has been “reimagined from the chipset to
the user experience” to connect more with the user. It features a new user interface inspired by
Microsoft’s Metro design language that can be used for multiple input methods, including
touchscreen input similar to that in Windows Phone and physical button input similar to the Xbox
360 and a PC.
•Macintosh System. The operating system of all Macintosh line of computers. (Apple
Computer, Inc.) Popularly known as Mac OS X, is based on the Unix operating system code
(Berkeley System Distribution). This system supports graphics, multi-media and publishing
projects.
•UNIX. Originally a mainframe operating system particularly used for network operations. It is
used in critical applications such as Web servers that are used for online transactions,
maintaining Internet domain name, and large database servers for data warehouses.
•LINUX. An operating system for microcomputer networking that is applied for multiple users
and multiple processors. It can run on nearly any type of computers and supports any type of
software applications. The most popular Linux operating system distributions are from Red Hat
Linux and Novell Linux and are registered as FOSS, meaning free software.
•Palm Pilot OS. Another kind of operating systems that are used on most communications
gadgets which are directly built into the circuitry of an electronic device such as in our Personal
Digital Assistant (PDA), cell phones, medical equipment’s bar code readers and the like. It
22 | P a g e
makes use of the following operating systems: Microsoft Windows CE.NET and windows XP
embedded, Palm Pilot OS, Microsoft Pocket PC OS, Symbian OS, and lately Android.
Knoware
The term know are or also called people ware represents the personnel involved in
systems analysis, programming, computer operations, system maintenance, and many more.
System analysis and design is the job of the systems analyst. Program development is
the specialty of the programmer. Systems development is carried out by a computer operator,
input data preparation staff, and output preparation clerks.
•System Analyst – The one responsible for analysing the requirements of a company based
applications, indicating their design, and the development of appropriate systems
documentation.
•Programmer – Develops, writes, compiles, tests, and debugs program logic, analyses program
specifications provided by the systems analyst and prepares program documentation.
•Computer Operator – Runs computer programs, conducts test runs for system being
developed, responds to program request, reports problem to programmers, label files, and
performs back-up procedures.
•Computer Engineer – Design computer system using the latest technology and development
of the same for fast and efficient use.
•Database Administrator – Analyses the company information needs, designs, maintains, and
control the company record keeping safe.
•EDP Librarian – Stores, control, and issues data files required for processing computer jobs,
retrieves back-up files from storage files, and maintains records of data files.
23 | P a g e
5 PERIPHERALS
Devices connectable to a computer are referred to as peripherals. The major categories of
peripherals are devices for:
WEEK 5
INPUT DEVICES
Following are some of the important input devices which are used in a computer −
Keyboard
Mouse
Joy Stick
Light pen
Track Ball
Scanner
Graphic Tablet
Microphone
Magnetic Ink Card Reader(MICR)
Optical Character Reader(OCR)
Bar Code Reader
Optical Mark Reader(OMR)
24 | P a g e
Keyboard is the most common and very popular input device which helps to input data
to the computer. The layout of the keyboard is like that of traditional typewriter, although
there are some additional keys provided for performing additional functions.
Keyboards are of two sizes 84 keys or 101/102 keys, but now keyboards with 104 keys
or 108 keys are also available for Windows and Internet.
Generally, it has two buttons called the left and the right button and a wheel is present
between the buttons. A mouse can be used to control the position of the cursor on the
screen, but it cannot be used to enter text into the computer.
Advantages
Easy to use
Not very expensive
Moves the cursor faster than the arrow keys of the keyboard.
Input devices act like the eyes and tears of the computer system. They accept data in a form
that the computer can use and send these data to the computer or processor. Data are usually
25 | P a g e
entered by a user through input devices which include keyboards, mouse, joysticks, and
scanners.
The Keyboard is the primary input device for computer systems. The lay out of the keys
resembles that of a typewriter, but special keys and function keys, among others, have been
included. The computer has many advantages over a typewriter, ever apart from its more
sophisticated software and other applications. The first of this is how easy it makes it to change,
delete or insert any word or phrase. The next is the ability to copy any text fragment and to
move it as a solid object anywhere within a text, or to another text, usually referred to as cut-
and-paste. Touch-typing (not looking to a keyboard using 10 fingers) is a useful skill in
educational contest today. Students can learn touch-typing faster than writing: they can type
faster than they can write; and the results are more attractive and much easier to edit revise.
Another popularly used input device is the mouse. It is a hand-held object that is pushed
around a desktop, is essentially a pointing device that allows the user to do many operations
more quickly that they could with the keyboard alone.
There are other devices to transform information manipulation inside the computer similar to the
mouse. They all act similarly, but the physical movements of a human hand working with them
can be quite different:
A handheld mouse, not lying on the table, can have a small gyroscope inside, and is useful
when something is shown to others on a big screen.
A track pad is a small panel (about 3 by 4 cm) over which can be move by the index finger to
control the cursor.
A trackball is a ball about the size of an egg embedded into a panel, which can be rotated.
A joystick is a smaller lever (as in a car transmission gearshift) used mostly in computer
games.
There are also very small joystick inside some keyboards called trackpoints, which can be
pushed and deflected with the fingers.
Wireless mice that have no moving parts are more reliable and have become more popular.
Among them there are hand held mice that are not place on a table but move in 3D space.
Another type of input is to draw or wright with a pen. The difference between a computer pen or
stylus and ordinary one is that the computer pen o moves over a special surface called
graphical tablet, and the trace of the move can be represented on screen. The computers can
also measure levels of pressure. With appropriate software, a computer can imitate almost all
existing drawing techniques and create some existing new ones. The computer is very useful for
technical drawing – now, mostly part of computer-aided design or CAD.
Touch Screen
Another promising type of device combines seeing with touching, allows the user, for example,
to outline an object on the screen with the finger and then move it to a different position with the
same finger. This is already achieved with touch screens. A finger cannot indicate a very small
26 | P a g e
object on a screen. However, this limitation can be relaxed by using a stylus on the screen (a
kind of pen or pencil designed for this kind of interaction).
Scanner
Are devices that scan visual images or text, and convert them to electronic pulses that can be
processed and displayed by output devices like the screen or printer. Scanners look like copying
machines, but are smaller and usually work more slowly. Instead of producing a paper copy of
an image, a scanner transmits an image in digital form to a connected computer. Scanners can
be used to transform information from a paper source – a text, an image from a book, a
drawing, or a photograph – into digital image.
There are printed pattern of wide and narrow vertical bars that are used to represent numerical
codes in machine readable form, these are called Bar Codes. They are printed on almost all
products in the market and conforms with the Universal Product Code (UPC). It is a format that
lists the product maker’s identification number and a product number. Scanning devices such as
Bar Code Reader translate images of text, drawing, and photos into digital forms.
Optical Character Recognition (OCR) reader senses data using photoelectric device. When
an image is a text (or text combined with graphics) in printed or handwritten form, a software
can be used to transform or convert this text image into a computer text file. This process of
transformation from picture of text is called Optical Character Recognition (OCR). It is used for
printing credit card receipts.
Fax Machine is a device that scans images and sends it as electronic signals over telephone
lines. The image is sent to a receiving fax machine which re-creates the image on the paper.
Voice Input is a new input device that captures data using the normal speaking voice. The
computer digitizes the sound of each system word and stores the digitized data in its memory.
Microphones transform sounds into electric signals for storage or transmission. Information
converted by a microphone into electrical signals can be transmitted via a wired or wireless
channel to other devices.
Sound recording can be done using the computer, which is converted into digital form by the
use of a microphone. In this case, the computer serves as a recorder. Digital recorders to store
sound in digital form using flash cards are becoming increasingly popular. Modern computers
can easily store hours of speech. Music recordings, processed and compressed by computer (in
MP4 format, for example), occupy very little memory. Also during the last few years, software
has been developed that allows a computer to transform human speech into a text file similar to
the conversion of handwriting, this makes Speech Recognition possible.
27 | P a g e
Measurement of the environment like temperature, humidity, acceleration, or magnetic field, can
be input to a computer-linked device called a sensor. A sensor generates an electrical signal
that is then usually transmitted to a computer via an interface more sophisticated sensors can
measure such parameters, store, and display them, even if a sensor is not connected to a
computer. This can be done by individual sensors or by what is called a data logger, a special
device or small box to collect and store data. The content of measurements can then be
transferred to a computer. Very promising in school education is the growing number of sensors
–from those that measure acid rain and heavy metal oxides ratio in potable water to the Global
Positioning System (GPS), which allows anyone to find geographic coordinates and related on
the earth’s surface.
28 | P a g e
WEEK 6
6 THE PROCESSORS
The processors can be likened to then brain of the human body which is responsible for
processing what our eyes see, what our ears hear, and what our skin feels. It accepts data from
input devices. The processor contains the electronic circuitry to manipulate data and helps carry
out instructions or commands, in order to perform various tasks. Data are sometimes sent to
storage or retrieved from storage during processing.
The speed of the microprocessor to perform its tasks is measured in called megahertz (MHz).
Currently, computers run on 2 Gigahertz (GHz) or more. Mega is a unit of measurement that
means million and the term Giga refers to a billion. Many software applications make use of
intensive graphics and large amount of data that require faster CPU speed.
The performance of the microprocessor is dictated mainly by its architecture or the number of
bits of data it can process at any one time. Most personal computers are designed using the
Complex Instruction Set Computing (CISC). The other microprocessor architecture used for
UNIX-based computers is called Reduced Instruction set Computing (RISC).
Microprocessor is a sophisticated and highly complex electronic device that contains the
electronic circuitry necessary to execute stored program instructions. The limits of a computer’
capabilities are determined by its microprocessor. Some of the microprocessor found in today’s
personal computers are:
. 8088, 8086 and Turbo Compatibles. These chips were used in the 1970 personal computers
like Apple II. It has pre-installed software, an operating system called CP/M (Controlled
Processor for Microcomputers). Most of the software available today cannot run with these
microprocessors.
. 80286, 80386, 80486 is used for IBM PC XT’s computers with a conventional memory with the
introduction of DX and SX models. It runs using the DOS (Disk Operating System) with speed of
4.77 MHz, 16 KB of RAM and a floppy disk drive. Sun Microprocessor and the next generation
microprocessors.
Central Processing Unit (CPU). Considered as the brain of the computer system, it controls
and monitors the entire system and performs actual arithmetic and logical operations on data. It
consists of three main units.
29 | P a g e
Control Unit. It direct and coordinated all the activity of the computer including:
Register. These are storage locations internal the processor. CPU instructions operate on these
values directly. On RISC processors, all data must be moved into a register before it can be
load data from RAM, process it, and save the result back out but the fastest operations work
directly with registers. Also, there are registers that are set aside for certain tasks, these
generally include a program counter, stack, and flags. Each register also has a size that
determines the maximum amount of data that can be processed at a time. The register on
Pentium chips, for example, is 32 bits.
Clock. The clock dictates the timing of the microprocessor’s operation by generating precisely
timed electronic pulses that synchronize the function of the microprocessor’s
other components. The clock is the amount of GHZ the processor can handle.
For example, the clock of a Core2Duo is of 2.4GHZ. Overclocking means
increasing the GHZ’s the processor can handle.
Buses. Inside the microprocessor it provides the means for data to travel from various
registers to the central processing unit. Buses are electrical pathways inside the
microprocessor that behave very much like the highways and flyovers in a busy
city.
WEEK 7-8
OUTPUT DEVICES
Output devices display, or show, processed results in a form it can be used or work with,
like a printout or a picture on a screen. It is the end result of what the computer is all about.
The most common output devices are monitor and printers. But there are output devices
used for special tasks such as over-head projectors, plotter, and speakers. Sophisticated
electronic devices are also used as output equipment for engineering, research, and specialized
medicine.
Monitor. Screens or Cathode-Ray Tubes (CRT) show temporary results generated by the
program being run on the computer. It can be classified according to three basic attributes:
color, size and resolution.
30 | P a g e
Color. In most computer applications, the image on the screen is discrete and consists of
millions of picture element called pixels. The color and brightness of each element appears as a
combination of three color called RGB for red (R), green (G), and blue (B), with varying
brightness for each color. In reality, for every particular screen, each of these three basic color
consists of the entire spectrum of light waves. The brightness (intensity) of the three basic color
is coded by a symbol from a finite range. The symbol and the range of old computers were just
one byte (8 bits). Today, colors are usually presented by 3-byte coding (24-bits) representing
millions of color) or 4-byte coding (32-bits) representing billions of color. The latest technology
appears to be able to capture all possible variations in color.
.Size. The size of the monitor is measured in inches and corresponds to the diagonal length
across the screen.
.Resolution. This is measured according to the number of horizontal and vertical pixels, or
picture elements, contained in the screen. A pixel consists of dots that are arranged in a large
matrix and can be turned on or off selectively to display alphabetic and numeric characters as
well as graphic image. It is usually name by acronyms such as SVGA (800x600) and XGA
(1024x768). The ratio of the two factors is 4:3. The resolution is limited by characteristics of the
screen, but mainly by a computer’s power to refresh image quickly, which is needed to make
visualization of the processes adequate and the computer-human interface smooth. XGA is the
most widespread resolution in use today but higher resolution called SXGA and UXGA are
coming. TV screens similar to, or the same as, computer screen used today, offer a slightly
different way of presenting information – partly digital, partly analog. Generally, today’s TVs
produce less detailed images than good computers though the newest TV standards have
image of the same quality as good computer images. This improved definition is called HDTV
(high definition TV). The move to HDTV is accompanied by a trend to change the aspect ratio
(the fraction of screen width to its height) from 3:4 to 9:16 which is the ratio usually seen on
cinema screens.
31 | P a g e
One of the important trends for monitors and projectors is standardization of the digital interface
between computer and the device. The DVI (digital Video Interface) Standard describes the
digital interaction between monitor and computer.
The Printer. A printer transforms screen images into images on paper, so-called hard copy.
Printers are classified according to the means by which images are transferred on paper. They
may either be of impact or non-impact.
Impact Printers. Images are transferred on paper by physically striking the ribbon against the
paper by the Printer hammer. Impact printer rely on dot-matrix and daisy wheel technology.
Dot- matrix printer has vertical rows of needle pins that are individually fired against a
ribbon as it moved across the paper. Each pin produces a single dot as it strikes the paper. It is
the pattern or arrangements of the dots that forms the individual characters. This can print 80-
200 characters per second.
Non-Impact Printers
Electrographic Dot-Matrix Printer is similar to the above printer expect that electricity,
rather than heat is used to produce dots on an electricity sensitive paper.
Ink-Jet Printer are tiny jets of special ink that are fired at a special paper to form
characters made up of individual dots. This printer is exceedingly fast. It can print an entire page
in a second.
Laser Printer uses a beam to produce characters on a ordinary paper similar to the
technology utilized by xerographic copy machines.
Plotter is a typically like a printer but its primary use is for scientific and engineering
applications, since it can print large format images such blue print drawing on large papers.
Synthesizers are specialized type of computers that are designed to generate sound
electronically. It can be used to produce music or noise. Most PC’s have built-in synthesizers for
producing sounds.
32 | P a g e
Headphones or headsets can play in a music in a PC or laptop without disturbing others
within the area.
The LCD (Liquid-crystal display) Project is a type of video projector for displaying
video images or computer data on a screen or other flat surface. It is a modern equivalent of the
slide projector or overhead projector.
Types of Memory
In the computer, the primary storage comes into to types: the Random-Access Memory
(RAM) and Read Only Memory (ROM)
Random-Access Memory. The RAM chip holds data and instructions that the computer use.
The contents can be read and altered or even put new data. Moreover, RAM chip is volatile
which means that its contents disappear when the power is turned off and never come back
even if the computer is turned on again.
Read Only Memory. The contents of the ROM chip cannot be changed by the end-user. Data
can be only read, hence the term read only. ROM chip usually contains instruction and data that
are recorded at the factory. Its chip is non- volatile, meaning its contents do not disappear even
the power is off.
Secondary Storage
The secondary storage is a permanent storage. It holds data programs, and results for
future use. Unlike the primary storage, the secondary storage is physically separated
from the computer. They are actually two classification of secondary storage devices,
depending on the type of materials used. They are the paper and magnetic storage
devices.
33 | P a g e
Magnetic storage devices have replace paper storage devices in recent years because
data retrieval and storage with the magnetic tape are much faster and more reliable
than paper devices. Likewise, magnetic devices can be reuse for long periods of time
and more information can be stored in less physical space.
Magnetic storage devices store data in much the same way as music is recorded on
cassette tapes or stereo records. A magnetic material such as iron oxide or any
magnetic oxide is coated on the base of the storage device, which is usually a metal or
a plastic material.
The Magnetic Tape. A high Speed medium that can serve as input to, or output from a
computer. It is generally 2,400-3,600 feet and long ½ inch wide. It is made of plastic
with iron oxide coating that can me magnetized to represent data.
34 | P a g e
The Magnetic Disk. Magnetic disk come in two kinds, the hard disk or floppy disk (also
called the diskette) which come in a variety of sizes.
The hard disk is a thin metal plate coated with a magnetic oxide. It is found inside the
main part of computers. Hard disks come in various sizes, 8, 5 ¼ and 3 ½ inches. The
hard disk can hold up 1000 gigabytes of memory.
The floppy disk is a thin, circular piece of polyester coater with a magnetic material. It
is encased in thick plastic case for protection. It can be used to transfer data or
programs from one computer to another.
The diskette is the basic input and output medium for microcomputers. There are the
three sizes available in the market. These are 8-inch diameter, 5-inch & ¼ - inch
diameter diskette and 3-inch diameter diskette.
35 | P a g e
• may perform random or sequential processing
Disadvantages of a Magnetic Disk Drive:
• relatively expensive
• sophisticated procedures are required to process disks, thus a relatively small number
of disk drives can be used at given installation
• external and internal labels are required since data are not visibly read
Flash cards are additional memory chips that can easily be inserted into and removed
from the body of current computers. It does not require batteries to keep information
stored. The capacity of one card today is in the range of 10MB to 1GB and access is
fast enough for most applications. Flash cards are widely used in digital cameras and
other applications. They are rapidly replacing discs. Some versions if ROM cards are
used in game consoles where they are also called cartridges.
Optical discs store information on a disc as an optical trace. This principle is exploited
in compact discs (CD), widely used now for storing music. The capacity of a CD-ROM is
approximately 1GB. Access speed may not be fast enough fir sine applications involving
sound or moving pictures. To address this problem, observe the different speeds
marked on CD-drives: 2x, 6x,… 48x… A newer from of CD-ROM is called digital
versatile disc or DVD, which looks similar to a CD and rewritable DVDs have appeared
in recent years.
USB Flask Disk is a small and lightweight flash memory mass storage device that is
rewritable and removable. USB flash drive is generally faster and can hold more data
and reliable to use.
36 | P a g e
WEEK 10-11 FINAL TERM
COMMUNICATIONS
Data Communication Is a process by which electronic data and information are moved
and transmitted from one place to another over land, in the air, and under the sea. It
consists of the Source or the Sender, the Medium and the Receiver are normally
transmitted through computers, telephone lines, satellites, coaxial cable, microwave
links, radio signal, etc.
Data Communication System
The two methods of moving data from source to destination are wire and wireless
transmission. In wire transmission, a signal moves through a wire such as telephone
wire, coaxial cable or frequencies and require different type of receivers. This includes
radio and television broadcasting, microwave, radar, and satellite transmission.
Connectivity. This refers to the ability to which hardware devices can be functionally
linked to other devices through communication lines. It is also considered as networking
of all hardware, software and data bases of connected groups. It permits access to
computers, local area networks, fill serves via Electronic Data Interchange (EDI).
Modem. It stands for MOdulator/DEModulator, a device used to convert computer-
compatible signals to signals suitable for data communication facilities, and vice versa.
Multiplexor. A Down-line Processor also called as controller or concentrator used to
collect the data from several low speed device like workstations and serial printers for
transmission over a single high speed line.
Data PBX. Also known as Data Private Branch Exchange. A switching device similar to
old-time telephone switchboard that electronically connects computers and workstations
for information distribution.
COMPUTER NETWORKS
It is system of interconnected computers, telephones, or other communications devices
that can communicative with one another and share applications and databases.
Local Area Network (LAN). A privately owned communications network that serves as
users within a confined geographical area. In this set-up, one or more computers can
serve as a “server” (the main computer), while the computers connected to it are called
37 | P a g e
workstation or client PCs. The server used as the storehouse for software and data that
are shared by many users who are connected with it through cables or antennae.
• Metropolitan Area Network (MAN). This covers a geographical area the size of city a
suburb. Cellular phones are examples of a MAN.
•Wide Area Network (WAN). It covers a wide geographic area such as a country or a
state. An example of this is the telephone system and the internet.
•Telephone Networks. It make use of inter-connecting telephones either as PBX’s
(Private Branch exchange) or Integrate Service Digital Network (ISDN).
•Broadcast Networks. Networks for radio and television via cable. Electronic
superhighway opens a vast range of choices including video-on-demand,
telecommunications, and interactive multimedia services such as home shopping,
education and videogames.
Basic Network Structure
There are two popular basic network structures that used in our country today, the
client/server and peer-to-peer networks. These two differs in many ways, most
especially in terms of system security, accessing resources, reliability and scalability.
Peer-to-Peer Networks
In its simplest form, a peer-to-peer (P2P) network is created when two or more PCs are
connected and share resources without going through a separate server computer. A
P2P network can be ad hoc connection-a couple of computers connected via a
Universal Serial Bus to transfer files. A P2P network also can be a permanent
infrastructure that links a half-dozen computer in a small office over copper wires. Or a
P2P network can be a network on a much grander scale in which special protocols and
applications set up direct relationships among users over the Internet.
Client/Server Networks
In a client/server environment, a computer functions a central or main computer while
the others functions as clients or workstation. Each and every client PCs on the network
share the processing and storage workload with the main computer also called as
server.
One of the most common usage of this type is in the operation of a relational database
management system (RDBMS) such as Oracle, SQL Server, PostgreSQL and even
MySQL which are installed in the main computer for centralized access of its resources.
Network Hardware
38 | P a g e
Networking Media. Most of our networking systems make use of both wire-based and
wireless media to form a hybrid computer network. Most of the cables or wires used are
called unshielded-twisted-pair (UTP) wire. Each pair of wire consist of insulated or
coated rubberized plastic and is twisted around each other.
The two-cable design made of copper that is used to connect networking devices are
straight-through or cross-over cable. When connecting to similar network devices such
as computer to computer, switch to switch, router to router, or hub to switch and like a
cross-over cable is used.
On the other hand, when connecting to dissimilar networking devices such as
connecting the computer to a switch or hub, and connecting a router to a switch or hub,
a straight-through cable is used.
Another cable used in networking is the fiber-optic cable which unlike the UTP wire
which is made of copper is made of fiber-glass. The signal that passes through it is I the
form of light.
Wireless media user radio signal or infrared signal that travels through the air for
transmitting data.
Switch. The switch is an intelligent hub which has a built-in Internetwork Operating
System (IOS). The IOS Manages the network traffic in a fast and efficient way. It is used
to ease bandwidth shortages and network bottlenecks
Router. It is network device with the most intelligence of any networking devices found
in the network. It is capable of determining and deciding where to transmit the data from
one computer to another and choose the best path in order to deliver the data to
receiver successfully regardless of distance and time. It has a very powerful IOS.
Wireless Access Points (WAP). It is a device that allows wireless devices to connect
to a wired network using WiFi, Bluetooth or related standards. The WAP usually
connects to a router (via a wired network) if its stand lone device or part of router itself.
39 | P a g e
Digital Connections
DSL connection. The Digital Subscriber Line (DSL) is usually use by internet users at
home. It is a family of technologies that provide internet access by transmitting digital
data over the wires of a local telephone network.
In telecommunications marketing, the term DSL is widely understood to mean
Asymmetric Digital Subscribe Line (ADSL), the most commonly installed DSL
technology.DSL service is delivered simultaneously with wired telephone service on the
same telephone line. This is possible because DSL uses higher frequency bands for
data separated by filtering.
Broadband Connections. It is simply described as a network connection that can do.
Some of the broadband connections utilize WAN technologies such as T1, T3,
Integrated Service Digital Network (ISDN), and Asynchronous Transfer Mode (ATM).
Cable Modern Connections. Cable modem service enables cable operators to provide
broadband using the same coaxial cables that deliver pictures and sound to your TV
set.
Most cable modems are external devices that have two connections: one to the cable
wall outlet, the other to a computer. They provide transmission speeds of 1.5 Mbps or
more.
Subscribers can access their cable modem services by simply turning on their
computers, without dialing-up ISP. You can still watch cable TV while using it.
Transmission speeds vary depending on the type of cable modem, cable network, and
traffic load. Speeds are comparable to DSL.
Wireless Connection. Refers to any type of computer network that is not connected by
cables of any kind. It is a method by whice homes, telecommunications networks and
enterprise (business) installations avoid the costly process of introducing cables into a
building, or as a connection between various equipment locations. Wirelees
telecommunications networks are generally implemented and administered using a
transmission system called radio waves. This implemention takes places at the physical
level (layer) of the OSI model network structure.
Uses of Communication
Connectivity and communications enable the users to use the telephone and other
related services such as fax, voice mail, electronic mail, and teleconferencing.
. Fax Machine. Fax stands for facsimile transmission or reproduction that sends
and receives documents over transmission lines to and from other fax machines. Also a
40 | P a g e
fax modem installed in a computer system can send signals directly from the computer
to another computer with a fax modem.
. Voice Mail or V-mail. It works like a telephone answering machine. It digitizes
incoming voice messages and stores them in a recipient”s voice mail box in digitized
from. It then converts the digitized versions back to voice messages when retrieved by
the user.
. Electronic Mail or E-mail. This links the computers by wired or wireless
connections and allows users, through their keyboards, to post messages and to read
responses on their display screens.
. Teleconferencing. Is a meeting among people without traveling. They are linked by
a communications device suck as telephone, television or Computer
The use of internet has rapidly change the configurations of businesses, lifestyle,
Knowledge, research, and learning environment. In the year 2007 there were already
about 1.3 billion users Connected to the internet and approximately connected to 50
million servers. It has become a public tool in information gathering, electronic mail,
advertising, video conferencing and worldwide presence. Internet stands for
INTERnational NETwork. A network or sometimes called Net is a group of computers
and associated facilities that are linked together to enable the sharing of resources
41 | P a g e
among computers. Today the internet is the biggest ever network channel and source of
human information. Over the decade, the Internet has grown exponentially in numbers
of participants and in the amount of information available. Access to Internet is possible,
not only with the average personal computer, but also with simpler equipment called a
network computer, which has an Internet source and connection but computer software
and storage.
WORD WIDE WEB
The WORLD WIDE WEB (www) is based on the concept of Multimedia and Hypertext; a
language that provides single view of information regardless of its location or format.
Hypertext information system enables the user to read and navigate text and visual
information. It can be accessed by using and application called Internet browser. A
browser is used to view and navigate the widely used browsers are Microsoft Internet
Explorer, Mozilla Firefox, Netscape Navigator, and Chrome. Some of the applications of
www are as follows:
INFORMATION SHARING
Users can obtain information suck as product description, research papers, professional
journals, encyclopedia, map, financial market data, etc.
WEB BROWSER
42 | P a g e
The web browser is a type of software application designed and developed to find
hypertext documents on the Web and use to open the document. It provides a
graphical-user-interface (GUI) that enables the web surfer to click the hyperlinked text
and images to jump to other documents or view other information on the Web.
Its primary function is to able to access the information pointed by the Uniform
Resource Locator (URL). The URL is an internet system of addressing to locate where
the information is to be retrieved. The most common scripting languages used to design
and develop a Web page are Hypertext Mark-up Language (HTML) and Javascript. A
set of protocols called as Hypertext Transport Protocol (HTTP) are used by the
computers to connect to the Internet and provide means to communicate with each
other.
Besides HTTP, there is another technology known as FTP (File Transfer Protocol) that
enables the user to send or receive files, images, pictures, MP3s, Videos or software to
any computer connected to Internet.
WEB SERVER
Web server can refer to either the computer (hardware) or the computer application
(software) the helps to deliver Web content that can be accessed through the internet.
Its most common use is to host websites and other uses such as gaming, Data storage
or running enterprise solutions.
WEB SITE
A website. Also written as Web site, web site, or simply site, is a set of related web
pages containing content such as text images, video, audio, etc. A website is hosted on
at least oneweb server, accessible via a network such as the internet or a private LAN
through a URL. All publicity accessible websites collectively constitute the World Wide
Web. Some websites collectively subscription to access some or all their content.
Examples of subscription websites include many business sites, parts of news websites,
academic journal websites, gaming websites, file sharing websites, message boards,
web-based email, social networking websites, and many more.
Electronic Mail (E-Mail)
43 | P a g e
Examples of e-mail address are: [email protected], [email protected],
[email protected]
Internet Service Providers. Connection to the Internet is provided by the ISP. The
Philippines is one of the most number of ISP in the Asia-Pacific Region with users
nearly a million and still growing. DigitelOne and ePLDT are examples of service
providers. Users Subscribe to certain amount depending on the internet using either
Serial Line Internet Protocol or Point-to-Point Protocol (SLIP/PPP) Provides minimal
charge since the connection does not need the use of service provider system.
44 | P a g e
WEEK 12: ELECTRONIC COMMERCE
LEARNING OBJECTIVES:
Understand the key features of the Internet audience, the basic concepts of
consumer behavior and purchasing and how consumers behave online.
Identify and describe basic digital commerce marketing and advertising
strategies and tools.
Identify and describe the main technologies that support online marketing.
Understand the costs and benefits of online marketing communications
E-commerce is doing business on-line through web store fronts. It could be either
selling or buying products. Some of the products traded are books, services, virtual
education, Knowledge-based Products, etc.
The e-commerce bill in the Philippines intends to facilitate the use of modern means of
communication and storage of information such as electronic Data Interchange (EDI) or
e-mail telecopy.
The study of electronic commerce often focuses on security, cryptography, electronic
currency and payment.
The e-commerce has given companies around the world a different way of conducting
business compared to the traditional business transactions. Using large online database
and powerful websites, companies can sell goods, and customer can order it online,
send invoices to customers and receive payment through credit cards or other forms of
electronic payment.
In e-commerce the B2B (business-to-Business) transaction is the most popular
implementation. In this case, the transaction is more of a company to company, not
from the company to customer or consumer, hence B2B
INTERNET AUDIENCE
Keeping your audience’s attention is difficult. Very little content holds their attention and
much less motivates them to engage.
By analyzing and profiling your target audience, you can apply strategies that not only
find the right audience out of the billions of internet users but also get them to engage
you.
45 | P a g e
Additionally, different types of user data will reveal different aspects of your audience.
Demographics provide general user data like age, gender, location, socio-economic
status, marital status, and education level. These characteristics can indicate where
your audience is living, what social media platforms they might prefer, what needs they
might have and more.
Behavioral data shows how users get to your website, what terms they use to find you
and the products or services they’re searching for, if they click on advertisements, what
content they’re interested in (or not interested in), and more.
Know what metrics matter.
Once you understand your online audience, you can begin to target them. Similar to
user data, there is a lot of data you can gather to see if your targeting is effective. To
know what your key metrics are for measuring efficacy, begin by identifying what goals
you want a particular campaign to achieve. Remember, while the final goal may be
“making a sale,” most customer journeys involve multiple touch points before making a
purchase. As such, creating unique content for target audiences at different points in the
decision-making process can shepherd prospects through the sales process.
46 | P a g e
Common key metrics are:
Whether you have an active campaign tracking these metrics or not, it is recommended
to always record them to establish benchmarks for future campaigns.
ONLINE CONSUMER BEHAVIOR
Consumer behavior observes how people choose, use, and discard products and
services, encompassing their emotional, cognitive, and behavioral reactions.
Understanding consumer behavior is key for businesses.
The influence of technology on consumer behavior: Impossible to ignore
New technology has empowered consumers. They have unlimited access to information
and demand products and services when they want. Social media has given consumers
a bigger voice and new channels to communicate with brands and share their opinions
with peers.
As the speed of technology and trends in consumer behavior accelerate, companies
have to evolve quickly. The brands that deliver on consumer demands will thrive, and
those that are slow to react will not survive.
47 | P a g e
With consumers becoming hyper-connected, there is an increasing number of
opportunities to engage new and existing customers. However, companies need to
understand how they can cut through the noise and meet consumer demand.
What Do Businesses Need to Do?
To take advantage of this change in consumer behaviour, it's vital that the brand has a
strong social media and digital presence. That starts with a dynamic digital ecosystem.
Companies need to integrate all marketing channels to deliver a cohesive customer
experience irrespective of the channel used to reach your business.
2. Consumers Use Multiple Devices
In 2019, mobile accounted for 50.44% of total global internet traffic and 77% of total
digital minutes in the US. Along with increased household penetration of tablets and
wearables, consumers use a wide variety of devices to access the internet and
purchase products.
Consumers don't use a single device throughout the buyer's journey. According to a
Google report, 90% of consumers use more than one device to accomplish a single task
online. A shopper looking to purchase a product might start the journey after seeing an
advertisement on television and research products using their smartphone. After
evaluating different products, they might use their laptop to check pricing and complete
the purchase.
Companies need to be there with the right messaging at the right time, whichever
device their customer uses to reach out. Determining how to reach every audience
segment and how digital touchpoints interconnect is the challenge that needs to be
overcome.
3. Customers Have Higher Expectations
48 | P a g e
Content Marketing. Content marketing refers to informational, valuable content like
blog posts, how-to videos, and other instructional materials.
Affiliate marketing utilizes the ever-growing popularity of industry experts and social
media influencers.
Artificial Intelligence (CHATBOT). Artificial Intelligence (AI) refers to the simulation of
human intelligence in machines that are programmed to think like humans ...
Ad Optimization: AI can analyze the performance of different ads and automatically
adjust them to improve results. It can also help with targeting ads.
Affiliate and Influencer Marketing. Working with an affiliate or influencer can help
increase your audience reach by engaging with their existing audience.
Social media marketing. Social media is a great strategy for reaching out to existing
customers, new audiences, and building brand identity.
SEO, or search engine optimization, is about getting your content seen by the right
people.
Video marketing can also take the form of product demonstrations, customer
testimonials or live-streaming events. It can engage viewers, raise brand awareness.
49 | P a g e
The benefits include saving time, limiting potential exposure to germs, and being able to
compare prices while sitting on your couch. However, some items, like produce, can be
lower quality than what you would pick out yourself in-store.
Features like sizing charts, model photos, product videos, and customer reviews make
finding apparel that suits your taste and fit easier. Returns and exchanges are also often
convenient.
Electronics Shopping
With so many consumer electronics now available, online stores provide an excellent
environment for researching and comparing features, prices, and reviews to help make
the right purchasing decisions.
Online-only electronics retailers offer the lowest prices due to lower overhead costs,
while popular marketplace sellers and brand names guarantee quality and warranties.
Easy shipping and fast delivery help seal the deal. Still, some shoppers prefer seeing
and testing devices in person before buying, especially for high-priced or complex
items.
Marketplace Shopping
Online marketplaces like Amazon, eBay, and Etsy connect shoppers directly with third-
party sellers offering a massive assortment of products. In addition to major retail
categories like home goods, baby products, toys, and electronics, you’ll also find niche
items and rare collectibles from smaller businesses and individual entrepreneurs.
Marketplaces provide a trusted platform with robust buyer protection policies, though
scams and counterfeits occasionally slip through. The shopping experience is easy and
fun due to the endless options and competitive prices.
50 | P a g e
CONCLUSION
The variety of ways to shop online continues to grow rapidly. The digital world offers
exciting new consumer options, from utilizing social media marketplaces to personalized
product recommendation engines.
The core reason people love online shopping is convenience. With a few clicks,
shoppers can find exactly what they need and have it delivered directly. As long as
online retailers continue to optimize for speed, selection, and simplicity, internet
commerce will continue to reshape the future of shopping.
51 | P a g e
DIGITAL MARKETING
Digital marketing is the practice of promoting products or services with the help of
digital devices and technology.
In simple words, digital marketing is any form of marketing that occurs online with the
help of mobile, laptop, internet, etc. In addition to digital signage and technology that
may not be connected to the internet. It can range from anything as complex as
automated email marketing initiatives all the way down to the content choices on your
website’s blog.
It reaches a broad spectrum of internet users who spend their time and money
online.
It pins small businesses in top-ranking positions over brick-and-mortar firms with
a meagre advertising budget.
It provides businesses with laser-focused control to ensure target audiences read
their messages.
It allows personal-level marketing to provide comfort and security for customers
to subscribe to the messages and purchase.
It enables tracking ads and communicating with the target audience.
It provides scaling and adaptability for growing businesses to get instant results
and optimize accordingly, reducing lost revenues and wasted ad spend.
It influences the purchase decisions of internet users who look for services,
products, or anything they desire online.
It allows businesses to market to people by various means that show individual
respect.
Digital marketing can be categorized into several types. The 4 most promising and
popular types of digital marketing are -
Content Marketing
Social Media Marketing
Paid Marketing or PPC (pay per click)
Search Engine Marketing
52 | P a g e
What skills do I need for digital marketing?
Here are some top skills that a professional for digital marketing needs:
Communication Skills
Writing Skills
Creativity
SEO Knowledge
Design Knowledge
Here are skills that will make you better at writing copy.
1. Attention to detail
Lack of attention to detail will have a major negative impact on your copy.
Sure, typos and spelling mistakes can be inevitable, especially in long form content like
blog writing, but spotting and fixing these errors is crucial.
Otherwise, you'll hinder your content's credibility, and readers will probably click the
back button right away.
It helps tap into the minds of your target audience and create compelling content that
connects with readers.
Urgency. This is commonly reflected in limited-time sales and offers like upsells once
you have already purchased an item.
Scarcity. You've likely seen "limited stock" - a classic example of scarcity. It can also be
conveyed in other similar ways such as "First X buyers receive Y" and so on.
53 | P a g e
Priming. Priming works by exposing users to short term memory associations that favor
the introduction of a primary offer.
Decoys. Most often seen in pricing, a decoy agent is used to make other offers seem
like a much better value for money. (30 days money back guarantee)
Copywriting formulas help streamline your workflow and write more compelling copy.
These are tried and tested copywriting frameworks designed to hook the audience and
boost productivity.
Let's dissect the Problem Agitate Solution framework to see what it is.
Problem: Identify and acknowledge your reader's pain points. This helps you empathize
with your audience and spark curiosity.
Agitate: Emphasize the problem's gravity. This adds a sense of urgency and causes
readers to react emotionally, getting them invested in your content.
Solution: Explain how your product or service solves the reader's problems. This
prompts readers to convert or keep reading your content.
54 | P a g e
PART IV
Email attachments containing malicious code can be opened, and therefore executed
by unsuspecting users. If those emails are forwarded, the malware can spread
even deeper into an organization, further compromising a network.
File servers, such as those based on common Internet file system (SMB/CIFS) and
network file system (NFS), can enable malware to spread quickly as users
access and download infected files.
File-sharing software can allow malware to replicate itself onto removable media and
then on to computer systems and networks.
Peer to peer (P2P) file sharing can introduce malware by sharing files as seemingly
harmless as music or pictures.
55 | P a g e
How to Prevent Malware:
A variety of security solutions are used to detect and prevent malware. These include
firewalls, next-generation firewalls, network intrusion prevention systems (IPS),
deep packet inspection (DPI) capabilities, unified threat management systems,
antivirus and anti-spam gateways, virtual private networks, content filtering and
data leak prevention systems. In order to prevent malware, all security solutions
should be tested using a wide range of malware-based attacks to ensure they
are working properly.
Cyber Threat Categories
There are many different types of cyber security threats, but they can generally be
broken down into four main categories:
1. Malware
is a type of malicious software that is designed to damage or disable computers and
computer systems. It can spread via email attachments, file-sharing networks,
online advertisements, and infected websites.
2. Phishing
Phishing is a type of online fraud that involves tricks or deception to get victims to reveal
personal information such as credit card numbers, passwords, and account
numbers. Phishing attacks are typically carried out via email but can also occur
through instant messages, social media messages, and text messages.
3. Ransomware
Ransomware is a type of malware that can encrypt or lock files on your computer and
demand a ransom to decrypt them. This type of ransomware attack can be
devastating for businesses, as it can result in the loss of important data or
systems being taken offline.
4. Social engineering
Social engineering is a type of attack that relies on human interaction to trick victims into
revealing information or performing actions that they wouldn’t normally do. These
social engineering attacks can include anything from phony phone calls and
emails to fake websites and social media profiles.
56 | P a g e
15 TECHNOLOGY ENTREPRENEURS
Who are Technology Entrepreneurs?
Technopreneurs, also known as technology entrepreneurs, are the innovators who
weave advancement via their fervor for technology. These individuals, hailing from
diverse backgrounds, share a common thread—a fervor for harnessing technology to
not just build businesses but to reshape industries and create uncharted territories.
Technology entrepreneurs are passionate pioneers, imaginative pioneers, daring risk-
takers, strong in the face of difficulty, and flexible innovators. They understand the
possibilities in technology, look to the future, take calculated risks, overcome obstacles,
and adjust to change, which helps their businesses stay flexible and current in the ever-
changing tech sector.
The Impact & Importance of Technology in Entrepreneurship
In the dynamic landscape of entrepreneurship, technology has become a game-
changer, profoundly impacting how businesses are conceived, developed, and thrive.
The impacts are not just incremental. They are revolutionary, changing the very nature
of entrepreneurial ventures.
1. Technology Lowered the barrier to entry
For would-be entrepreneurs, starting a business is now more convenient and less
expensive thanks to technology. Large upfront expenditures are eliminated by cloud
computing and e-commerce systems like Shopify and WooCommerce. Social media
sites such as Facebook and Instagram allow business owners to interact with possible
clients. the elements that are transforming the virtual world into a thriving market.
2. Technology Leveled the playing field
Technology, particularly cloud computing, has improved the competitive landscape for
businesses of all sizes. It enables small enterprises to compete with larger ones on
price and quality. It bridges the gap between them and fosters healthy competition.
3. Technology Created new opportunities
Technology has revolutionized the gig economy, enabling entrepreneurs to start
businesses on their own terms. Artificial intelligence and blockchain are transforming
traditional industries, enabling entrepreneurs to develop innovative products like
chatbots (BOTCAKE, MANYCHAT) and revolutionizing currency, payment systems,
and digital identities.
57 | P a g e
4. Technology Increased productivity
Technology is boosting entrepreneurs’ productivity through automation tools like CRM
software, streamlining tasks like lead generation and email marketing, and project
management software, facilitating seamless team collaboration and tracking project
progress.
5. Technology Improved decision-making
Technology aids entrepreneurs in making informed decisions through analytics
software, tracking website traffic, social media engagement, and sales data. This data-
driven approach is crucial for marketing strategies and product development, setting
entrepreneurs apart in the competitive entrepreneurial market.
Examples Of Technology in Entrepreneurship
Technology is more than just a tool in the passionate world of entrepreneurship. It
transforms the game of doing business. It forces businesses to new heights. Let’s look
at a few inspiring examples of smart entrepreneurs using technology to steer their
endeavours toward success.
E-commerce Evolution
Entrepreneurs are capitalizing on e-commerce platforms. Examples like Shopify and
WooCommerce revolutionized the way they do business. These platforms enable them
to set up and run online stores with ease. It does away with the requirement for a
physical storefront. Entrepreneurs may effortlessly connect with a worldwide audience
by doing this. Without the limitations of physical stores, they can exhibit their goods or
services.
AI Innovation
Artificial Intelligence (AI) has emerged as a formidable ally for entrepreneurs seeking
innovation. Entrepreneurs are deploying AI to craft cutting-edge products and services,
automate routine tasks, and enhance customer experiences. An illustrative example is
the use of AI in developing chatbots that can adeptly handle customer queries and
provide support, streamlining customer interactions.
FAQS ON TECHNOLOGY IN ENTREPRENEURSHIP
What are technology entrepreneurship examples?
Think about Jeff Bezos, the visionary behind Amazon. He is the massive online
retailer that transformed the retail industry.
58 | P a g e
Elon Musk is a name synonymous with technological prowess. He established
SpaceX, Tesla, and Neuralink. All these companies push the limits of what is
conceivable.
Bill Gates co-founded Microsoft, a tech titan shaping the digital landscape. While
Facebook, the behemoth of social networking, allowed Mark Zuckerberg to unite
people worldwide.
Why is information technology important in entrepreneurship?
59 | P a g e