0% found this document useful (0 votes)
5 views16 pages

Living in The It Era - Midterm

The document provides an overview of Information and Communication Technology (ICT), its history, and its impact on society, including communication, job opportunities, and education. It outlines the evolution of computers from the Pre-Mechanical Age to the Electronic Age, detailing significant inventions and milestones in computing history. Additionally, it discusses the transition from Web 1.0 to Web 2.0, highlighting the shift towards user-generated content and interactivity on the internet.

Uploaded by

kikostaku
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views16 pages

Living in The It Era - Midterm

The document provides an overview of Information and Communication Technology (ICT), its history, and its impact on society, including communication, job opportunities, and education. It outlines the evolution of computers from the Pre-Mechanical Age to the Electronic Age, detailing significant inventions and milestones in computing history. Additionally, it discusses the transition from Web 1.0 to Web 2.0, highlighting the shift towards user-generated content and interactivity on the internet.

Uploaded by

kikostaku
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

GEC ELEC 1: Living

in the IT Era
BS ECE- 2A | A.Y. 2024 - 2025

Lesson 1: Introduction to Information


and Communication Technology (ICT) History of ICT (Information and
Communication Technology)
What is Information?
 Knowledge acquired from Four Stages of Information Technology
another and can convey to others. Development:
 Facts provided or learned about  Pre-Mechanical Age (3000 B.C. - 1450
something or someone. A.D.)
 Knowledge obtained from o Writing and Alphabets
investigation, communication,  Petroglyphs
study, or instruction.  Cuneiform
o Papers and Pens
Methods for Transfer of Information o Books and Libraries
 Image  Sumerians, Egyptian, Chinese
 Text o The first numbering system is also
 Sound discovered in this age.
 Video  Egyptians and Hindus in India
used the numbering system.
What is Technology?  The numbering system similar
 A combination of two Greek to those we use today is invented
words “techne” which means arts, between 100 and 200 AD.
skills, or craft and “logos” which  Around 875 A.D., the concept of
means word, or speech. zero was developed.
 The application of scientific o The first calculator is also
knowledge for practical purposes discovered during this age.
or applications.  Abacus
o One of the very first
What is Information Technology? information processors.
 A wide range of technologies and  Mechanical Age (1450 – 1840)
systems that are used to store, o The First Information Explosion
retrieve, process and transmit  Johannes/Johann
data for specific use cases. Gutenberg – Invented the
 The use of computer systems or movable metal-type printing
devices to access information. process in 1450.

MIDTERM
 The development of book by the presence or absence of
indexes and the widespread use holes in predefined positions.
of page numbers.  Electronic Age (1941-PRESENT)
o Calculating Machine o Z3: 1941
 Wilhelm Schickard invented  Konrad Zuse – Built the first
the first mechanical calculator in programmable computer called
1623 that can work with six Z3.
digits and can carries digits o Mark I: 1942
across columns.  John von Neumann – Build the
o Pascaline first stored program computer.
 Invented by Blaise o ABC Computer: 1942
Pascal (1642) (made of clock  John Atanasoff and Clifford
gears and levers) that could Berry. Completed the first all-
solve mathematical problems electronic computer called ABC
like addition and subtraction. or Atanasoff-Berry Computer.
o Babbage's Engines Foundation for advances in
 Charles Babbage – invented electronic digital computers.
the difference engine (1821) and ICT
analytical engine (1832). Father  ICT, or information and
of computer. communications technology (or
 Electromechanical Age (1840 – technologies), is the organization and
1940) mechanisms that enable modern
o Morse Code: 1835 computing.
 Samuel Morse – conceived of
his version of an Uses of ICT In Our Daily Lives
Electromagnetic Telegraph  Communication
(Dots and Dashes). o Information communication
o Telephone and Radio: 1876 technology provides the society
 Alexander Graham Bell – with new communication
developed the first working capabilities. People can now
telephone. communicate with others using
o Comptograph: 1885 videos from others of different
 Dorr Felt – invented first parts of the world, instant
adding and subtracting messaging, social media sites like
calculator. face book, twitter which allow
 Comptograph containing a built- people to remain in contact and
in printer. communicate and share
o Punch Card: 1890 information easily and on regular
 Piece of stiff paper that contains basis.
digital information represented  Job Opportunities

MIDTERM
oICT enables organizations to  Creation of New Job Opportunities
operate more efficiently, so
employing staff with ICT skills is Negative Impacts of ICT
vital to the smooth running of any  Job Loss
business. Nowadays, employers  Reduced Personal Interaction
expect their staff to have basic  Reduced Physical Activity
ICT skills. In addition,  Cost is very expensive
Nowadays, finding a job is  Competition
different, you can just use your
smart phone, laptop, desktop or Lesson 2: History of Computer
any gadgets that is available in the Definition of Computer
comfort of your home.  A programmable machine.
 Education  An electronic device that manipulates
o Information and Communications information, or data. It has the ability
Technology (ICT) can impact to store, retrieve, and process data.
student learning when teachers  A machine that manipulates data
are digitally literate and according to a list of instructions
understand how to integrate it into (program).
curriculum.  Any device which aids humans in
 Socializing performing various kinds of
o Social media has changed the computations or calculations.
world. The internet and social
media provide young people with Three principal characteristics of
a range of benefits, and computer:
opportunities to empower  It responds to a specific set of
themselves in a variety of ways. instructions in a well-defined manner.
Young people can maintain social  It can execute a pre-recorded list of
connections and support networks instructions.
that otherwise wouldn't be  It can quickly store and retrieve large
possible and can access more amounts of data.
information than ever before.
History of Computer: Basic Computing
Positive Impacts of ICT Periods
 Increased access to information  Earliest Computers
 Improved access to education (ex. o Originally calculations were
Distance Learning and online tutorials) computed by humans, whose job
 New Tools, New Opportunities title was computers.
 Cost saving Communication o These human computers were
 Improved Information Management typically engaged in the calculation
 Solved and Reduced Security Problems of a mathematical expression.
 Wider People Participation

MIDTERM
o The calculations of this period were o Used primarily for multiplication,
specialized and expensive, division, roots, logarithms,
requiring years of training in Trigonometry.
mathematics. o Not normally used for addition or
o The first use of the word subtraction.
"computer" was recorded in 1613,  Pascaline
referring to a person who carried o Invented by Blaise Pascal in 1642.
out calculations, or computations, o It was its limitation to addition and
and the word continued to be used subtraction.
in that sense until the middle of the o It is too expensive.
20th century.  Stepped Reckoner
 Tally Stick o Invented by Gottfried Wilhelm
o A tally stick was an ancient Leibniz in 1672.
memory aid device to record and o The machine that can add, subtract,
document numbers, quantities, multiply and divide automatically.
or even messages.  Jacquard Loom
 Abacus o The Jacquard loom is a
o An abacus is a mechanical device mechanical loom, invented by
used to aid an individual in Joseph-Marie Jacquard in 1881.
performing mathematical o It is an automatic loom controlled
calculations. by punched cards.
o The abacus was invented in  Arithmometer
Babylonia in 2400 B.C. o A mechanical calculator invented
o The abacus in the form we are most by Thomas de Colmar in 1820.
familiar with was first used in o The first reliable, useful and
China in around 500 B.C. commercially successful
o It used to perform basic arithmetic calculating machine. The machine
operations. could perform the four basic
 Napier's Bone mathematic functions.
o Invented by John Napier in 1614. o The first mass-produced calculating
o Allowed the operator to multiply, machine.
divide, calculate square and cube  Difference and Analytical Engine
roots by moving the rods around o Invented by Charles Babbage in
and placing them in specially 1822 and 1834.
constructed boards. o It is the first mechanical computer.
 Slide Rule o It’s an automatic, mechanical
o Invented by William Oughtred in calculator designed to tabulate
1622. polynomial functions.
o Is based on Napier's ideas about  First Computer Programmer
logarithms. o In 1840, Augusta Ada Byron (also
known as Ada Lovelace) suggests

MIDTERM
to Babbage that he use the binary o ENIAC stands for Electronic
system. Numerical Integrator and
o She writes programs for the Computer.
Analytical Engine. o Developed by John Presper
 Scheutzian Calculation Engine Eckert and John Mauchly.
o Invented by Per Georg Scheutz in o It was the first electronic general-
1843. purpose computer and completed in
o Based on Charles Babbage's 1946.
difference engine.  UNIVAC 1
o The first printing calculator. o UNIVAC 1 stands for UNIVersal
 Tabulating Machine Automatic Computer 1.
o Invented by Herman Hollerith in o The UNIVAC 1 was the first
1890. commercial computer.
o To assist in summarizing o Designed by John Presper Eckert
information and accounting. and John Mauchly.
 Harvard Mark 1  EDVAC
o Also known as IBM Automatic o EDVAC stands for Electronic
Sequence Controlled Calculator Discrete Variable Automatic
(ASCC). Computer.
o Invented by Howard H. Aiken in o Designed by Von Neumann in
1943. The first electromechanical 1952.
computer. o It has a memory to hold both a
 Z1 stored program as well as data.
o The first programmable computer.  Osborne 1
o Created by Konrad Zuse in o The first portable computer.
Germany from 1936 to 1938. o Released in 1981 by the Osborne
o To program the Z1 required that the Computer Corporation.
user insert punch tape into a punch  The First Computer Company
tape reader and all output was also o The first computer company was
generated through punch tape. the Electronic Controls Company.
 Atanasoff - Berry Computer (ABC) o Founded in 1949 by John Presper
o It was the first electronic digital Eckert and John Mauchly.
computing device.
o Invented by Professor John Four Stages of Information Technology
Atanasoff and graduate student Development
Clifford Berry at Iowa State  Pre-Mechanical Age (3000 B.C. -
University between 1939 and 1450 A.D.)
1942.  Mechanical Age (1450 - 1840)
 ENIAC  Electromechanical Age (1840 -
1940)
 Electronic Age (1941 - PRESENT)

MIDTERM
o Much smaller and cheaper
Milestone in Computer History compared to the second-
 First Generation (1946 to 1958) generation computers.
o The first computers used  Fourth Generation (1971 to
vacuum tubes for circuitry and Today)
magnetic drums for memory, o The microprocessor brought the
and were often enormous, taking fourth generation of computers,
up entire rooms. as thousands of integrated
o They were very expensive to circuits were built onto a single
operate and in addition to using silicon chip.
a great deal of electricity, o As these small computers
generated a lot of heat, which became more powerful, they
was often the cause of could be linked together to form
malfunctions. networks, which eventually led
 Second Generation (1959 to 1964) to the development of the
o Transistors replaced vacuum Internet.
tubes and ushered in the second  Fifth Generation (Today to
generation of computers. Future)
o One transistor replaced the o Based on Artificial Intelligence
equivalent of 40 vacuum tubes. (AI).
o Allowing computers to become o Still in development.
smaller, faster, cheaper, more o The use of parallel processing
energy-efficient and more and superconductors is helping
reliable. to make artificial intelligence a
o Still generated a great deal of reality.
heat that can damage the o The goal is to develop devices
computer. that respond to natural language
 Third Generation (1965 to 1970) input and are capable of learning
o The development of the and self-organization.
integrated circuit was the o There are some applications,
hallmark of the third generation such as voice recognition, that
of computers. are being used today.
o Transistors were miniaturized
and placed on silicon chips, Lesson 3: The Web and the Internet
called semiconductors, which The Web
drastically increased the speed  The Web (World Wide Web)
and efficiency of computers. consists of information organized
o It could carry out instructions in into Web pages containing text and
billionths of a second. graphic images.

MIDTERM
 The world wide web is a larger o HTML/Portals.
collection of interconnected o Limited user interaction
documents or content. o Lack of standards
 It contains hypertext links, or
highlighted keywords and images B. Web 2.0 (Read-write interactive web)
that lead to related information.  A term used to describe a new
 A collection of linked Web generation of Web services and
pages that has a common theme or applications with an increasing
focus is called a Web site. emphasis on human collaboration.
 The main page that all of the pages  It is a platform that gives users the
on a particular Web site are possibility (liberty) to control their
organized around and link back to is data.
called the site's home page.  This is about user-generated content
 The World Wide web was invented and the read-write web.
by Timothy John Berners-  People are consuming as well as
Lee also known as TimBL. contributing information
through blogs or sites.
A. Web 1.0 (Read Only Static Web)  Allows the user to interact with the
 The Web It is an old internet that only page known as DYNAMIC PAGE;
allows people to read from the internet. instead of just reading a page, the user
 First stage worldwide linking web may be able to comment or create
pages and hyperlink. a user account.
 Web is use as "information portal".  Dynamic page refers to the web
 It uses table to positions and align pages that are affected by user input or
elements on page. preference.
 Most read only web.  Is focused on the ability for people to
o If focused on company's home collaborate and share information
pages. online via social
o Dividing the world wide web into media, blogging and Web-based
usable directories communities.
o It means web is use as  Example of Web 2.0 are the
"Information Portal" following:
o It started with the simple idea "put o Social Networking - is the use of
content together" Internet-based social media sites to
 Example of Web 1.0 stay connected with friends, family,
o Mp3.com colleagues, customers, or clients.
o Home Page o Social networking can have a
o Directories social purpose, a business
 Disadvantages purpose, or both, through sites
o Read only web such as:
o Page Views o Facebook

MIDTERM
o Pinterest o Video Sharing Sites – a website that
o Twitter lets people upload and share their
o Tumblr video clips with the public at large or
o LinkedIn to invited guests.
o Instagram o Example:
o Google+ o YouTube
o Blogs – is a discussion or o Facebook
informational website published on the o LinkedIn
world wide web consisting of discrete, o Flickr
often informal diary-style text entries o Photobucket
(posts).
o Posts are typically displayed in C. Web 3.0: (Read-write intelligent web)
reverse chronological order, so  Suggested name by John Markoff of
that the most recent post appears the New York Times for the third
first, at the top of the web page. generation of the web.
 In this generation, all the application
o Example: on web or mobile will be upgraded
o WordPress with more features.
o Blogger  It applies same principles as Web 2.0:
o Tumblr two-way interaction.
o Wikis – is a hypertext  Web 3.0 will be more connected,
publication collaboratively edited and open, and intelligent, with semantic
managed by its own audience directly web technologies, distributed
using a web browser. databases, natural language
o A typical wiki contains processing, machine learning,
multiple pages for the subjects or machine reasoning and autonomous
scope of the project and may be agents.
either open to the public or limited  Semantic Web - provides a
to use within an organization for framework that allows data to be
maintaining its internal shared and reuse to deliver web content
knowledge base. specifically targeting the user.
o Example:  It is a web of data.
o Wikipedia  Changing the web into a language
o MediaWiki that can be read and categorized by
o Wikiversity the system rather than humans.
o Workbooks
o Wiktionary Types of Website
o Commons  eCommerce
o Wikiquote  Business Website
o Wikidata  Educational Website
o Wikispecies  Infopreneur Website

MIDTERM
 Entertainment Website professional communications these
 Personal Website would be inappropriate.
 Portfolio Website
 Web Portal Avoid Slang, Acronyms, and Text Talk
 Brochure Website  Communicating effectively in college
 Wiki or Community Forum Website and business environments requires the
 Nonprofit Website use of correct terminology, spelling, and
grammar that can easily be understood.
Lesson 4: The Netiquette and Computer For example, use "your” instead of "ur".
Ethics
What is Netiquette? Avoid "Screaming" in Typed Messages
 Simple stated, it's network etiquette -  Typing an entire message using all
that is the etiquette of cyberspace and capital letters is known as "screaming".
"etiquette" means the forms of required It is distracting and generally frowned
by good breeding or prescribed by upon in professional environments. It is
authority to be required in social or better to draw emphasis to selected
official life. In other words, netiquette words or phrases by: using italic or bold
is a set of rules for behaving properly text; using a different color for text or
online. background color; or denoting emphasis
 Netiquette, or network etiquette, is using special characters
concerned with the "proper" way to (Example: Important).
communicate in an online
environment. Consider the following Proofread Your Messages Before Sending
"rules," adapted from Virginia Shea's Them
the Core Rules of Netiquette,  Proofreading your messages before you
whenever you communicate in the send them is a best practice for effective
virtual world. and efficient communication. Strive to
make your communications concise and
The Golden Rule free of any:
 Even though you may be interacting o Spelling and grammar errors
with a computer screen, you are o Confusing terms or phrases that
communicating with a real person who could be misunderstood
will react to your message. Make a o Errors of omission, such as missing
good impression - treat others with the content or recipients
same respect that you would like to o Errors in accuracy of information
receive and avoid confrontational or
offensive language. To help convey Exercise Good Judgment When Sharing
meaning when creating messages, it is Information With Others Online
sometimes acceptable to include  E-mail and chat messages that you send
appropriate emoticon symbols, such as or receive are considered private and
a smiley face :) However, for should not be forwarded or copied to

MIDTERM
others without gaining the consent of all words. This lets the person know
involved participants. In general, that you are listening and trying to
messages posted to discussion boards understand them.
and social media sites can be read by the o When presenting an opinion or
public. You may never know who might criticism, it is helpful to use phrases
read or share what you post. It is a good that identify to whose point of view
practice to always ask a post's author for you are referring. If the opinion is
permission before sharing a post with yours, you can begin with the
other parties phrase "In my experience."

To protect your privacy and safety, do not


share online any sensitive personal
information such as: Ten Commandments of Computer Ethics
 Your home address or phone number 1. Thou shalt not use a computer to harm
 Personal conversations other people.
 Social plans, such as vacations 2. Thou shalt not interfere with other
 Financial information people's computer work.
 Usernames, passwords, or hints 3. Thou shalt not snoop around in other
 Anything personal that you would not people's computer files.
want shared by others over the Internet 4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear
If the material you share with others false witness.
online came from another source, make 6. Thou shalt not copy or use proprietary
every effort to gain permission from the software for which you have not paid
original author or copyright holder. (without permission).
Copying someone else's work and passing 7. Thou shalt not use other people's
it off as your own is plagiarism. It computer resources without
damages your reputation and could authorization or proper compensation.
subject you to serious academic and legal 8. Thou shalt not appropriate other people's
consequences. intellectual output.
9. Thou shalt think about the social
Respect Diversity in Viewpoints consequences of the program you are
 Be constructive and respectful when writing or the system you are designing.
sharing opinions, beliefs, and 10. Thou shalt always use a computer in
criticisms, or responding to those of ways that ensure consideration and
others in the conversation respect for other humans.
o When sharing a viewpoint that
differs from someone else's, it is a
best practice to first acknowledge
the other person by briefly restating
what he or she said, but in your own

MIDTERM
What is Cyber?  Plagiarism
 It is the Characteristics of the o An act or instance of using or closely
culture of computers, imitating the language and thoughts
information, technology and of another author without
virtual reality. authorization.
 Cybercrime is defined as a crime in  Computer Addiction
which a computer is the object of the o Offline: generally used when
crime (hacking, phishing, spamming speaking about excessive gaming
and child pornography) is used as a behavior, which can be practiced
tool to commit an offense. both offline and online.
 Cybercriminals may use computer o Online: Also known as “Internet
technology to access personal Addiction”, gets more attention in
information, business trade secrets general from scientific research than
or use the internet for exploitative or offline computer addiction, mainly
malicious purposes. because most cases of computer
addiction are related to the excessive
Republic Act No. 10175 Cybercrime use of the Internet.
Prevention Act of 2012 o Virtual Self – The persona you
 A law in the Philippines approved create about yourself virtually.
on September 12,2012 which aims
to address legal issues concerning Criminal Activities
online interactions and internet.  Hacking
o Unauthorized access of or
Republic Act No. 10173 Data Privacy Act interference with computer
of 2012 systems, servers, or other
 An act protecting individual personal information and communication
information. systems
o Unauthorized access to corrupt,
Common Forms of Cybercrimes alter, steal, or destroy electronic
 Copyright data using computers or other
o The exclusive legal right, given to an information and communication
originator or an assignee to print, systems without the computer or
publish, perform, film, or record system owner’s knowledge and
literary, artistic, or musical material, consent.
and to authorize others to do the o The introduction of computer
same. viruses resulting in the corruption,
o Copyright infringement is the alteration, theft, or loss of such
violation, piracy or theft of a data
copyright holder's exclusive rights o Illegal Access
through the unauthorized use of a o Illegal Interception
copyrighted material or work. o Data Interference

MIDTERM
o System Interference attention of the owners and getting
o Misuse of Devices appreciation or a little bounty from
o Infection of IT Systems with the owners.
Malware – if the act is committed  Miscellaneous Hackers
against critical infrastructure of the o Apart from the above well-known
Philippines the, penalty is between classes of hackers, we have the
12-20 years reclusion temporal. following categories of hackers
o Six years up to twelve years of based on what they hack and how
imprisonment also known as they do it.
prison mayor. o Red hat Hackers
o Red hat hackers are again a
Types of Hackers blend of both black hat and
 White Hat Hackers white hat hackers. They are
o White Hat hackers are also known as usually on the level of hacking
Ethical Hackers. They are never government agencies, top-secret
intent to harm a system, rather they information hubs, and generally
try to find out weaknesses in a anything that falls under the
computer or a network system as a category of sensitive
part of penetration testing and information.
vulnerability assessments. o Blue Hat Hackers
 Black Hat Hackers o A blue hat hacker is someone
o Black Hat hackers, also known as outside computer security
crackers, are those who hack to gain consulting firms who is used to
unauthorized access to a system and bug-test a system prior to its
harm its operations or steal sensitive launch. They look for loopholes
information. that can be exploited and try to
o Black Hat hacking is always illegal close these gaps. Microsoft also
because of its bad intent which uses the term Blue Hat to
includes stealing corporate data, represent a series of security
violating privacy, damaging the briefing events.
system, blocking network o Elite Hackers
communication, etc. o This is a social status among
 Grey Hat Hackers hackers, which is used to describe
o Grey hat hackers are a blend of both the most skilled. Newly
black hat and white hat hackers. They discovered exploits will circulate
act without malicious intent but for among these hackers.
their fun, they exploit a security o Script Kiddie
weakness in a computer system or o A script kiddie is a non-expert
network without the owner’s who breaks into computer
permission or knowledge. Their systems by using pre-packaged
intent is to bring the weakness to the automated tools written by others,

MIDTERM
usually with little understanding oWillful engagement, maintenance,
of the underlying concept, hence control, or operation, directly or
the term Kiddie. indirectly of any lascivious
o Neophyte exhibition of sexual organs or
o A neophyte, "n00b", or "newbie" sexual activity with the aid of a
or "Green Hat Hacker" is new to computer system for favor or
hacking or phreaking and has consideration.
almost no knowledge or o There is a discussion on this matter if
experience of the workings of it involves “couples” or “people in
technology and hacking. relationship” who engage in
 Computer-related forgery, fraud cybersex.
and/or identity theft o Penalty at least Php 200,000 and or
o An attempt to obtain sensitive prison mayor
information such as usernames,  Child pornography
passwords, and credit card details o Is a form of child sexual
and (indirectly money), often for exploitation.
malicious reasons. o Unlawful or prohibited acts defined
o Phishing and punishable by Republic Act No.
o Pharming 9775 or the Anti- Child Pornography
o Spam Act of 2009, committed through a
o Maximum of Php 200,000 fine or computer system.
prison mayor o Penalty of 12-20 years of
 Electronic theft imprisonment or reclusion temporal.
o Illegal Downloading  Cyber Defamation
o Obtaining files that you do not have o Is an unprivileged false statement
the right to use from the internet. of fact which tends to harm the
o Digital Piracy reputation of a person or company.
o Practice of illegally copying and o Penalty of 6-12 years of
selling digital music, video, imprisonment or prison mayor.
computer software, etc.
o Copyright Infringement Internet Threats
o Penalty of Php 50,000 – 500, 000 and  Hacking
or prison mayor o Hacking is a term used to describe
 Cyberbullying actions taken by someone to gain
o The use of electronic communication unauthorized access to a computer.
to bully a person, typically by The availability of information
sending a message of an intimidating online on the tools, techniques, and
or threatening nature. malware makes it easier for even
o The Anti-Bullying Act of 2013 (RA non- technical people to undertake
10627) malicious activities.
 Cybersex

MIDTERM
o The process by which cyber o
Spam is one of the more common
criminals gain access to your methods of both sending information
computer. out and collecting it from
 Malware unsuspecting people. The mass
o Malware is one of the more common distribution of unsolicited messages,
ways to infiltrate or damage your advertising or pornography to
computer. Malicious software that addresses which can be easily found
infects your computer, such on the Internet through things like
as computer social networking sites, company
viruses, worms, Trojan websites and personal blogs.
horses, spyware, and adware.  Spyware (Spyware & Adware)
 Pharming o Spyware and adware are often used
o Pharming is a common type of online by third parties to infiltrate your
fraud. A means to point you to a computer.
malicious and illegitimate website by
redirecting the legitimate URL. Even  Trojan Horses
if the URL is entered correctly, it can oA Trojan horse may not be a term
still be redirected to a fake website. you're familiar with, but there's a
 Phishing good chance you or someone you
o Phishing is used most often by cyber know has been affected by one. A
criminals because it's easy to execute malicious program that is disguised
and can produce the results they're as, or embedded within, legitimate
looking for with very little effort. software. It is an executable file that
Fake emails, text messages and will install itself and run
websites created to look like they're automatically once it’s downloaded.
from authentic companies. They're  Viruses
sent by criminals to steal personal o Most people have heard of computer
and financial information from you. viruses, but not many know exactly
This is also known as “spoofing”. what they are or what they do.
 Ransomware Malicious computer programs that
o Ransomware is a type of malware are often sent as an email attachment
that restricts access to your computer or a download with the intent of
or your files and displays a message infecting your computer, as well as
that demands payment in order for the computers of everyone in your
the restriction to be removed. The contact list. Just visiting a site can
two most common means of infection start an automatic download of a
appear to be phishing emails that virus.
contain malicious attachments and  Wi-Fi Eavesdropping
website pop-up advertisements. o WiFi eavesdropping is another
 Spam method used by cyber criminals to
capture personal information. Virtual

MIDTERM
“listening in” on information that's  1986 First" free net" created in Case
shared over an unsecure (not Western Reserve University
encrypted) WiFi network.  1991: US government allowed
 Worms business agencies to connect to
o A worm, unlike a virus, goes to work internet.
on its own without attaching itself to  Now all people can connect to the
files or programs. It lives in your internet and improve their life and
computer memory, doesn't damage work quality.
or alter the hard drive and propagates  The internet support various aspects in
by sending itself to other computers our life.
in a network – whether within a  Vinton Gray Cerf ForMemRS is an
company or the Internet itself. American Internet pioneer and is
recognized as one of "the fathers of the
The Internet Internet", sharing this title
 The Internet or "net" (network of with TCP/IP co-developer Bob
network) is the largest computer Kahn.
network in the world that connects
billions of computer users. B. Major Components of the Internet
 The word internet comes from 1. Servers - is a computer program that
combination between provides service to another computer
"interconnection" and "network". program and it's user.
 Network is a collection of computers o Types of Servers
and devices connected via o Application Server - a program
communication channels and in computer that provides the
transmission media allow to share business logic for an application
resources (hardware, software, data, program.
information). o Web Server - a computer
 Generally, nobody owns the internet. program that serves requested
HTML pages or files.
o Proxy Server - is a software that
A. Brief History of Internet acts as an intermediary between
 ARPA - Advanced Research Project an endpoint device, such as
Agency January 2, 1969 started an computer and another server from
experimental computer network. which a user is requesting.
 Concept - No server, but equal o Mail Server - is an application
importance/participation to every that receives incoming e-mail
computer in the network. Even if, one from local users and remote
or two node destroyed that will now senders and forward outgoing e-
affect the network. mail for delivery.
 In 1982 the word internet started. o File Server - is a computer
responsible for central storage and

MIDTERM
management of data files so that
another computer on the same
network can access them.
o Policy Server - is a security
component of a policy - based
network that provides
authorization services and
facilities tracking and control of
files.
2. IP Address (Internet Protocol) – is a
numerical label assigned to each device.
This provides identity to a network
device.
3. Browser – is an application program
that provides a way to look information
on the web. Example of browsers:

MIDTERM

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy