Sie sind auf Seite 1von 10

ADDITIOAL INSTRUCTIONS:

PLEASE DO YOUR RESEARCH ABOUT THE FOLLOWING:


1. Virtual Private Network
2. Network ID
3. Subnet Mask
4. IP address
5. Host IP address
6. Two Types of Hackers (Criminal Hacker and Ethical Hacker)
7. 13 Signs that Users are being Hacked

Note: You can use any reference book about the Additional Instructions. They
had the same concept….. Again, just read them……
_________________________________________________________________________________________________

PART I. THE HISTORY OF INFORMATION TECHNOLOGY


2500 BC THE ABACUS
Abacus is the first known calculating machine used for counting. A calculating tool for performing arithmetic processes. The user
of an abacus is called an abacist. It is made of beads and rods. It is mainly used for addition, subtraction, multiplication and division.
Abacus is a Latin word that has its origins in the Greek words abax or abakon (meaning "table" or "tablet") which in turn, possibly
originated from the Semitic word abq, meaning "sand". The abacus is one of many types of counting devices which are used to
count large numbers.

Why does the abacus exist?

It is difficult to imagine counting without numbers, but there was a time when written numbers did not exist. The earliest counting
device was the human hand and its fingers, capable of counting up to 10 things; toes were also used to count in tropical cultures.
Then, as even larger quantities (greater than ten fingers and toes could represent) were counted, various natural items like pebbles,
sea shells and twigs were used to help keep count.

Merchants who traded goods needed a way to keep count (inventory) of the goods they bought and sold. Various portable counting
devices were invented to keep tallies. The abacus is one of many counting devices invented to help count large numbers. When the
Hindu-Arabic number system came into use, abaci were adapted to use place-value counting.

Abaci evolved into electro-mechanical calculators, pocket slide-rules, electronic calculators and now abstract representations of
calculators or simulations on smartphones.

What is the difference between a counting board and an abacus?

It is important to distinguish the early abacuses (or abaci) known as counting boards from the modern abaci. The counting board is
a piece of wood, stone or metal with carved grooves or painted lines between which beads, pebbles or metal discs were moved.
The abacus is a device, usually of wood (romans made them out of metal and they are made of plastic in modern times), having a
frame that holds rods with freely-sliding beads mounted on them.

Both the abacus and the counting board are mechanical aids used for counting; they are not calculators in the sense we use the
word today. The person operating the abacus performs calculations in their head and uses the abacus as a physical aid to keep track
of the sums, the carrys, etc.

What did the first counting board look like?

The earliest counting boards are forever lost because they were constructed of perishable materials like wood.Educated guesses
can be made about the construction of counting boards based on early writings of Plutarch and others.

Used in outdoor markets of those times, the simplest counting board involved drawing lines in the sand with ones fingers or with
a stylus, and placing pebbles between those lines as place-holders representing numbers (the spaces between the lines would
represent the units 10s, 100s, etc.); two pebbles inthe 10s column would indicate 20. Affluent merchants could afford small wooden
tables having raised borders that were filled with sand (usually colored blue or green). A benefit of these counting boards on tables,
was that they could be moved without disturbing the calculation— the table could be picked up and carried indoors.

With the need for portable devices, wooden boards with grooves carved into the surface were then created and wooden markers
(small discs) were used as place-holders. The wooden boards then gave way to even more durable materials like marble and
metal (bronze) used with stone or metal markers.
1614 ADNAPIER’S BONES
Napier’s Bones was invented by John Napier, a
Scottish Mathematician. A set of bones
consisted of 9 rods, 1 for each digit 1 through 9
and a constant rod for the digit ‘0’.

John Napier Invents Logarithms, Napier's Bones& the


Lightning Calculating Device (1614 – 1617)
John Napier's father, Archibald Napier, was an important

man in late 16th century Scotland. His family had owned the
Merchiston estate from the 1430s when one of his ancestors
acquired the estate, becoming the first Napare of Merchiston. (We shall comment shortly on the different spellings of Napier's
name.) The family also owned estates at Lennox and at Menteith and a residence at Gartness. Archibald Napier married Janet
Bothwell, the sister of the Bishop of Orkney, in 1549 when he was only 15 years old. Their son John Napier was born the following
year. Archibald Napier was a justice-depute and was knighted in 1565. He was appointed Master of the Mint in 1582.

1633 ADTHE SLIDE RULE


It was invented by William Oughtred. The Slide
Rule is embodied by the two sets of scales that
are joined together with a marginal space
between them.

The slide rule, also known colloquially in the United


States as a slipstick, is a mechanical analog computer. ...
The Reverend William Oughtred and others developed the
slide rule in the 17th century based on the emerging work on
logarithms by John Napier. 1574 - 1660
John Napier dramatically advances the understanding of number relationships in 1614 with his invention of logarithms. Since
logarithms are the foundation on which the slide rule is built, its history rightly begins with him. His early concept of simplifying
mathematical calculations through logarithms makes possible the slide rule as we know it today.

The ability of logarithms to decompose any number into two parts a base and an exponent allows the products and dividends of
large numbers to be determined by addition and subtraction. Also, using base (rather than the common base 10) opens the way for
tremendous advances in engineering and science, induding the differential calculus.

Napier himself contributes Napier’s Bones in 1617, calculating sticks based on the geologia (lattice) multiplication method. In
1620 Edmund Gunter of London makes a straight logarithmic scale and performs multiplication and division on it with the use of a
set of dividers, or calipers.

In about 1622 William Oughtred, an Anglican minister ... today recognized as the inventor of the slide rule ... places two such scales
side by side and slides them to read the distance relationships, thus multiplying and dividing directly. He also develops a circular
slide rule.

1642 AD THE ROTATING WHEEL CALCULATOR


It was first developed by a French Philosopher,
Blaise Pascal. It consists of gears and levers. This
is a predecessor to today’s electronic calculator.

The Rotating Wheel Calculator was developed by a french


philosopher, blasiepascal, using simple components such as
gears and levers. This is a predecessor to today's electronic
calculator. He was inspired by the computation work of this
father's job and devised the model. He was only 19 years old,
when he devised this model.
1623 - 1662
Blaise Pascal was France’s most celebrated mathematician and physicist and religious philosopher. He was a child prodigy who was
educated by his father. He worked on conic sections and projective geometry and he laid the foundations for the theory of
probability. In 1642, at the age of 18, Pascal invented and build the first digital calculator as a means of helping his father perform
tedious tax accounting. Pascal’s father was the tax collector for the township of Rouen.

The device was called Pascal’s calculator or the Pascaline or the Arithmetique. Pascal continued to make improvements to his design
through the next decade and built fifty Pascaline machines in total.

1822 ADTHE DIFFERENCE ENGINE


The Father of Today’s Computer.

Babbage is called the Father of Today’s Computer.


It was built by Charles Babbage, British Mathematician
and Engineer.

Charles Babbage (1791-1871), computer pioneer, designed


the first automatic computing engines. He invented
computers but failed to build them. The first complete
Babbage Engine was completed in London in 2002, 153
years after it was designed. Difference Engine No. 2,
built faithfully to the original drawings, consists of 8,000
parts, weighs five tons, and measures 11 feet long.

We invite you to learn more about this extraordinary object, its designer Charles Babbage and the team of people who undertook
to build it. Discover the wonder of a future already passed. A sight no Victorian ever saw.

1890 ADHOLLERITH TABULATING MACHINE


It was developed by Herman Hollerith. It was designed by using
punched cards. On this day in 1888, the groundbreaking
tabulator machine was installed in a government office for the
first time.

In 1890, the U.S. Government had a problem. With the nation’s


population growing rapidly, hand-counting the results was
proving impractical—the 1880 census took a full 7 years to
tabulate. Policymakers worried that the 1890 census wouldn’t
even be counted by 1900, making reapportionment of
congressional seats—as required by the Constitution—impossible.
1860 - 1929
Enter the Buffalo, New York, native Herman Hollerith. The engineer was pondering this very problem in the early 1880s when, on
a train, his eyes fell upon a conductor’s punch card. Hollerith’s work over the next decade eventually led to the groundbreaking
invention of the punch card tabulating machine, installed in a federal government office for the very first time on this day in 1888.

“Hollerith had actually worked on the census of 1880, and he was really intrigued by the notion of trying to automate the process,”
says Peggy Kidwell, curator of computing history at the American History Museum, which is home to an early version of Hollerith’s
device. He began by experimenting with paper rolls that were punched with holes to represent information, but eventually settled
on punch cards, which were more durable and could be fed through a counting machine more easily.

PART II. THE GENERATION OF COMPUTERS

First Generation 1940 – 1956 VACUUM TUBE


It is used by Vacuum Tubes for circuitry and magnetic drums for memory.
Physically, First Generation computers were very large. Machines with hundreds of thousands of vacuum tubes were built, taking
up space of several floors in big buildings. They weighed about 30 tons.
• There were limited storage capacity
• Were having very low speed
• Language used were symbolic
• Were very huge in size
• The main problem was of over heating
• It can solve only one problem at a time

These early computers used vacuum tubes as circuitry and magnetic drums for memory. As a result they were enormous, literally
taking up entire rooms and costing a fortune to run. These were inefficient materials which generated a lot of heat, sucked huge
electricity and subsequently generated a lot of heat which caused ongoing breakdowns.

These first generation computers relied on ‘machine language’ (which is the most basic programming language that can be
understood by computers). These computers were limited to solving one problem at a time. Input was based on punched cards and
paper tape. Output came out on print-outs. The two notable machines of this era were the UNIVAC and ENIAC machines – the
UNIVAC is the first every commercial computer which was purchased in 1951 by a business – the US Census Bureau.

2nd
Generation 1956 – 1963 TRANSISTORS
The Second Generation of computers replaced vacuum tubes by Transistors.
Transistors used punched cards for Input and printout for Output.
 It may increased storage capacity
 Transistors replaced from vacuum tubes
 Computer programmed in high level of language
 Programming languages developed
 Programmers could specify instructions in words
 Made it possible to develop software
 In 1961, COBOL was developed
 Examples of 2nd generation:
 IBM-700/1401
 ATLAS
 ICL 1901

The replacement of vacuum tubes by transistors saw the advent of the second generation of computing. Although first invented in
1947, transistors weren’t used significantly in computers until the end of the 1950s. They were a big improvement over the vacuum
tube, despite still subjecting computers to damaging levels of heat. However they were hugely superior to the vacuum tubes,
making computers smaller, faster, cheaper and less heavy on electricity use. They still relied on punched card for input/printouts.

The language evolved from cryptic binary language to symbolic (‘assembly’) languages. This meant programmers could create
instructions in words. About the same time high level programming languages were being developed (early versions of COBOL and
FORTRAN). Transistor-driven machines were the first computers to store instructions into their memories – moving from magnetic
drum to magnetic core ‘technology’. The early versions of these machines were developed for the atomic energy industry.

3rd
Generation1964 – 1971INTEGRATED CIRCUITS
Transistors were made smaller in size and placed on Silicon Chips.

JACK ST. CLAIR KILBY


(November 8, 1923 – June 20, 2005)
Invented the first Integrated Circuit

Initiated by: JACK KILBY &ROBERTNOYCE


Data Storage: Microchips
 It increased the speed and efficiency of computers
 It can solve many problems at a time
 Better storage devices(tapes)
 Improved input, output device
 Faster than the previous generation computers
 Concept of multi programming was used
 Used Operating Systems
 Examples of 3rd generation:
 IBM/360/370
 NCR 395
 Burroughs B6500

By this phase, transistors were now being miniaturised and put on silicon chips (called semiconductors). This led to a massive
increase in speed and efficiency of these machines. These were the first computers where users interacted using keyboards and
monitors which interfaced with an operating system, a significant leap up from the punch cards and printouts. This enabled these
machines to run several applications at once using a central program which functioned to monitor memory.

As a result of these advances which again made machines cheaper and smaller, a new mass market of users emerged during the
‘60s.

4th Generation 1971 – Present MICROPROCESSOR


Thousands of Integrated circuits were built onto a single Silicon chips. As these
small computers became more powerful, they could be linked together to form
network, which eventually led to the development of the internet.

This revolution can be summed in one word: Intel. The chip-maker developed the Intel 4004 chip in 1971, which positioned all
computer components (CPU, memory, input/output controls) onto a single chip. What filled a room in the 1940s now fit in the palm
of the hand. The Intel chip housed thousands of integrated circuits. The year 1981 saw the first ever computer (IBM) specifically
designed for home use and 1984 saw the MacIntosh introduced by Apple. Microprocessors even moved beyond the realm of
computers and into an increasing number of everyday products.

The increased power of these small computers meant they could be linked, creating networks. Which ultimately led to the
development, birth and rapid evolution of the Internet. Other major advances during this period have been the Graphical user
interface (GUI), the mouse and more recently the astounding advances in lap-top capability and hand-held devices.

5th Generation Present – Beyond ARTIFICIAL INTELLIGENCE


Computer devices with artificial intelligence are still in development, but some of these technologies are beginning to emerge and
be used such as voice recognition.

AI is a reality made possible by using parallel processing and superconductors. Leaning to the future, computers will be radically
transformed again by quantum computation, molecular and nano technology.
The essence of fifth generation will be using these technologies to ultimately create machines which can process and respond to
natural language, and have capability to learn and organise themselves.

PART III. THE CONCEPTS OF INFORMATION TECHNOLOGY


Information technology refers to the creation, gathering, processing, storage, presentation and dissemination of information and
also the processes and devices that enable all this to be done. Information technology is affecting us as individual and as a society.

Information is a resource which has no value until it is extracted, processed and utilized. Information technology deals with
information system, data storage, access, retrieval, analysis and intelligent decision making. Information technology refers to the
creation, gathering, processing, storage, presentation and dissemination of information and also the processes and devices that
enable all this to be done.
Information technology is affecting us as individual and as a society. Information technology stands firmly on hardware and
software of a computer and telecommunication infrastructure.

In our daily lives we are spending more and more time online using smartphones and tables. A lot of us cannot imagine our lives
without the use of smartphones and online facilities such as:
• Having access to the latest news bulletins
• Speaking with people in real-time
• Video chatting
• Using google maps for directions
• eLearning
• eBanking
• eCommerce
• eGovernment
• Social Networking

E-LEARNING
eLearning is the use of a computer and the internet to complete a course or learn a new skill.E-learning theory describes the
cognitive science principles of effective multimedia learning using electronic educational technology. Cognitive research and theory
suggest that the selection of appropriate concurrent multimedia modalities may enhance learning, as may application of several
other principles.

Advantages:
• You can study at home
• You can study in your own time
• You can use mobile technology
• It can cheaper
• Available in 24 hours
Disadvantages:
• You must be focused as otherwise you will be distracted
• You need to be motivated to learn
• You don’t have the support of your peers and instructors

E-COMMERCE
E-commerce (electronic commerce or EC) is the buying and selling of goods and services, or the transmitting of funds or data, over
an electronic network, primarily the internet. These business transactions occur either as business-to-business, business-to-
consumer, consumer-to-consumer or consumer-to-business. The terms e-commerce and e-business are often used
interchangeably. The term e-tail is also sometimes used in reference to transactional processes for online shopping.

The benefits of e-commerce include its around-the-clock availability, the speed of access, the wide availability of goods and services
for the consumer, easy accessibility, and international reach. Its perceived downsides include sometimes-limited customer service,
consumers not being able to see or touch a product prior to purchase, and the necessitated wait time for product shipping.

Advantages:
• You can do it from the comfort of your own home
• Online shops are open 24 hours
• You have a greater choice of shops and products
• A wider variety of products available
Disadvantages:
• You must wait for delivery
• You cannot try before you buy
• Giving your credit card details over a non-secure connection means that these details can be stolen
• It could take longer to get your money back

E-GOVERNMENT
eGovernment is the use of information and communication technologies (ICTs) to improve the activities of public sector
organizations.Some definitions restrict e-government to Internet-enabled applications only, or only to interactions between
government and outside groups. Here, we do not - all digital ICTs are included; all public sector activities are included.

In our definition, then, governments have been practising e-government for more than 50 years: using that first mainframe in the
Statistics Office was "e-government". We just didn't give it that name 50 years ago.

Improving Government Processes: eAdministration

eGovernment initiatives within this domain deal particularly with improving the internal workings of the public sector. They
include:

 Cutting process costs : improving the input:output ratio by cutting financial costs and/or time costs.
 Managing process performance : planning, monitoring and controlling the performance of process resources (human,
financial and other).
 Making strategic connections in government : connecting arms, agencies, levels and data stores of government to
strengthen capacity to investigate, develop and implement the strategy and policy that guides government processes.
 Creating empowerment : transferring power, authority and resources for processes from their existing locus to new
locations.
Connecting Citizens: eCitizens and eServices

Such initiatives deal particularly with the relationship between government and citizens: either as voters/stakeholders from whom
the public sector should derive its legitimacy, or as customers who consume public services. These initiatives may well incorporate
the process improvements identified in section B1. However, they also include a broader remit:

 Talking to citizens : providing citizens with details of public sector activities. This mainly relates to certain types of
accountability: making public servants more accountable for their decisions and actions.
 Listening to citizens : increasing the input of citizens into public sector decisions and actions. This could be flagged as either
democratisation or participation.
 Improving public services : improving the services delivered to members of the public along dimensions such as quality,
convenience and cost.

Building External Interactions: eSociety

Such initiatives deal particularly with the relationship between public agencies and other institutions - other public agencies, private
sector companies, non-profit and community organisations. As with citizen connections, these initiatives may well incorporate the
process improvements identified in section. However, they also include a broader remit:

 Working better with business : improving the interaction between government and business. This includes digitising regulation
of, procurement from, and services to, business to improve quality, convenience and cost.
 Developing communities : building the social and economic capacities and capital of local communities.
 Building partnerships : creating organizational groupings to achieve economic and social objectives. The public sector is almost
always one of the partners, though occasionally it acts only as a facilitator for others.

How Do I Spell "eGovernment"?

There are many variations. The forms we try to stick to here are:

 CAPITALS: "eGOVERNMENT"
 Titles/Start of Sentences: "eGovernment"
 lower case: "e-government"

Advantages:
• You have access to information in 24hours
• You can pay your motor tax online
• You can apply for social welfare online
• You can download forms relating to the government online
Disadvantages:
• No Face to face contact
• Not comfortable to be disclosing personal information online

SOCIAL NETWORKING
Social Networkingis a way of using your computer to talk to other people, share pictures, videos, message each other or post
information.

A social network is a social structure made up of a set of social actors (such as individuals or organizations), sets of dyadic ties, and
other social interactions between actors. The social network perspective provides a set of methods for analyzing the structure of
whole social entities as well as a variety of theories explaining the patterns observed in these structures. The study of these
structures uses social network analysis to identify local and global patterns, locate influential entities, and examine network
dynamics.

The social network is a theoreticalconstruct useful in the social sciences to study relationships between individuals, groups,
organizations, or even entire societies (social units, see differentiation). The term is used to describe a social structure determined
by such interactions. The ties through which any given social unit connects represent the convergence of the various social contacts
of that unit. This theoretical approach is, necessarily, relational. An axiom of the social network approach to understanding social
interaction is that social phenomena should be primarily conceived and investigated through the properties of relations between
and within units, instead of the properties of these units themselves. Thus, one common criticism of social network theory is that
individual agency is often ignored although this may not be the case in practice. Precisely because many different types of relations,
singular or in combination, form these network configurations, network analytics are useful to a broad range of research
enterprises. In social science, these fields of study include, but are not limited to anthropology, biology, communication studies,
economics, geography, information science, organizational studies, social psychology, sociology, and sociolinguistics.

Advantages:
• We can make new friends
• We can share information
• We can keep in touch with relatives/friends that are abroad
• It is free to use
• Business can use it to promote
Disadvantages:
• Young people can be groomed
• Are you sure of who you are speaking to
• Privacy is not guaranteed
• It is addictive

COMPUTERS

A Computer is an electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data. A
computer carries out four functions:
a) Accepts data – input
b) Processes data – processing
c) Produces out – output
d) Stores results - storage

(2)TWO TYPES OF COMPUTERS


1. Personal Computer
PC is short for personal computer or IBM PC. The first personal computer produced by IBM was called the PC, and increasingly the
term PC came to mean IBM or IBM-compatible personal computers, to the exclusion of other types of personal computers, such as
Macintoshes.

In recent years, the term PC has become more and more difficult to pin down. In general, though, it applies to any personal
computer based on an Intel microprocessor, or on an Intel-compatiblemicroprocessor.
For nearly every other component, including the operating system, there are several options, all of which fall under the rubric of
PC.

A personal computer (PC) may also refer to any small, relatively inexpensive computer designed for an individual user. In price,
personal computers range anywhere from a few hundred dollars to thousands of dollars. All are based on the microprocessor
technology that enables manufacturers to put an entire CPU on one chip.

2. Network Computer
A computer network, or data network, is a digital telecommunications network which allows nodes to share resources. In computer
networks, networked computing devices exchange data with each other using a data link. The connections between nodes are
established using either cable media or wireless media.

A network computer (NC) is a concept from Oracle and Sun Microsystems that describes a low-cost personal computer for business
networks that, like the NetPC, would be configured with only essential equipment (including CD-ROM players, diskette drives or
expansion slots) and managed centrally. Any new software would be downloaded. Unlike the NetPC, the network computer could
be based on microprocessors other than Intel's and might include a Java-base operating system rather than Windows.

HARDWARE AND SOFTWARE


Hardware refers to the physical parts of the computer such as: monitor, keyboard, mouse, system unit or any peripheral device.

In information technology, hardware is the physical aspect of computers, telecommunications, and other devices. The term arose
as a way to distinguish the "box" and the electronic circuitry and components of a computer from the program you put in it to make
it do things. The program came to be known as the software.

Whereas Software gives hardware instructions to carry out a task. To put it simply it is all the programs that we the users interact
with such as: Microsoft Windows, Internet Explorer, Google Chrome, etc….
Software is a general term for the various kinds of programs used to operate computers and related devices. (The term hardware
describes the physical aspects of computers and related devices.)

Microsoft Office
Application
Software
Google Chrome
Software

Microsoft
Windows
System Software

Apple IOS

System Software comes pre-installed from the manufacturer and enables the user to interact with the hardware. Without this
software the end user would not be able to use a computer unless they had computer language knowledge.System software is a
type of computer program that is designed to run a computer's hardware and application programs. If we think of the computer
system as a layered model, the system software is the interface between the hardware and user applications. ... The OS manages
all the other programs in a computer.

Application Software allows the user to carry out a task such as: playing games, typing up a letter, searching on the internet, etc..An
application is any program, or group of programs, that is designed for the end user. Applications software (also called end-user
programs) include such things as database programs, word processors, Web browsers and spreadsheets.

CLOUD STORAGE
From a user’s point of view cloud storage is anything that backs up and syncs data that’s
accessible on multiple devices can be said to be a cloud service. It is the desire for anything,
anywhere, anytime, that has led to the creation of cloud storage.

Cloud storage is a cloud computing model in which data is stored on remote servers accessed from the internet, or "cloud." It is
maintained, operated and managed by a cloud storage service provider on a storage servers that are built on virtualization
techniques.

Cloud storage is a service model in which data is maintained, managed, backed up remotely and made available to users over a
network (typically the Internet).

THE INTERNET
The Internet, sometimes called simply “the Net”, is a worldwide system of computer networks. It is a network of networks in which
users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to
users at other computers.

A means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers. When two
computers are connected over the Internet, they can send and receive all kinds of information such as text, graphics, voice, video,
and computer programs.

No one owns Internet, although several organizations the world over collaborate in its functioning and development. The high-
speed, fiber-optic cables (called backbones) through which the bulk of the Internet data travels are owned by telephone companies
in their respective countries.

The Internet grew out of the Advanced Research Projects Agency's Wide Area Network (then called ARPANET) established by the
US Department Of Defense in 1960s for collaboration in military research among business and government laboratories.

WORLD WIDE WEB


Tim Berners Lee invented the World Wide Web in 1989, about 20 years after the first connection was
established over what is today known as the Internet.

Sir Timothy John Berners-Lee OM KBE FRS FREng FRSA FBCS, also known as TimBL, is an English engineer
and computer scientist, best known as the inventor of the World Wide Web. Wikipedia
Born: 8 June 1955 (age 62), London, United Kingdom
Awards: Order of the British Empire, Royal Medal, Turing Award, MORE
Education: The Queen's College, Oxford (1973–1976), Emanuel School (1969–1973), Sheen Mount Primary
School
Spouse: Rosemary Leith (m. 2014), Nancy Carlson (m. 1990–2011)

The inventor of theWorld Wide Web and one of Time Magazine’s ‘100 MostImportantPeople of the 20th Century’, Sir Tim Berners-
Lee is a scientist and academicwhosevisionary and innovativework has transformedalmosteveryaspect of ourlives.

Sir Tim Berners-Lee invented the World Wide Web in 1989.


He is the Director of the World Wide Web Consortium (W3C), a Web standards organization founded in 1994 which develops
interoperable technologies (specifications, guidelines, software, and tools) to lead the Web to its full potential. He is a Director of
the World Wide Web Foundation which was launched in 2009 to coordinate efforts to further the potential of the Web to benefit
humanity.
A graduate of Oxford University, Sir Tim invented the Web while at CERN, the European Particle Physics Laboratory, in 1989. He
wrote the first web client and server in 1990. His specifications of URIs, HTTP and HTML were refined as Web technology spread.
He is the 3Com Founders Professor of Engineering in the School of Engineering with a joint appointment in the Department of
Electrical Engineering and Computer Science at the Laboratory for Computer Science and Artificial Intelligence ( CSAIL) at the
Massachusetts Institute of Technology (MIT) where he co-leads the Decentralized Information Group (DIG). He is also a Professor
in the Computer Science Department at the University of Oxford, UK. He is President of and founded the Open Data Institute in
London.

In 2011 he was named to the Board of Trustees of the Ford Foundation, a globally oriented private foundation with the mission of
advancing human welfare. He is President of London's Open Data Institute.

In 2001 he became a Fellow of the Royal Society. He has been the recipient of several international awards including the Japan
Prize, the Prince of Asturias Foundation Prize, the Millennium Technology Prize and Germany's Die Quadriga award. In 2004 he was
knighted by H.M. Queen Elizabeth and in 2007 he was awarded the Order of Merit. In 2009 he was elected a foreign associate of
the National Academy of Sciences. He is the author of "Weaving the Web".

On March 18 2013, Sir Tim, along with Vinton Cerf, Robert Kahn, Louis Pouzin and Marc Andreesen, was awarded the Queen
Elizabeth Prize for Engineering for "ground-breaking innovation in engineering that has been of global benefit to humanity."
Sir Tim has promoted open government data globally and spend time fighting for rights such as net neutrality, privacy and the
openness of the Web.

On 4 April 2017, Sir Tim was awarded the ACM A.M. Turing Prize for inventing the World Wide Web, the first web browser, and the
fundamental protocols and algorithms allowing the Web to scale. The Turing Prize, called the "Nobel Prize of Computing" is
considered one of the most prestigious awards in Computer Science.

SEARCH ENGINE
Internet search engines are special sites on the Web that are designed to help people find information stored on other sites. There
are differences in the ways various search engines work, but they all perform three basic tasks:
• They search the Internet based on important words
• They Keep an index of the words they find, and where they find them
This allow users to look for words or combinations of words found in that index

EMAIL
Electronic mail is a way of sending and receiving mail online. Firstly, you need to register for a free email address and then you are
assigned a unique address like the one above.

PASSWORD PROTECTION
Password protection is a security process that protects information accessible via computers that needs to be protected from
certain users. Password protection allows only those with an authorized password to gain access to certain information.

Passwords are used commonly to gain entry to networks and into various Internet accounts in order to authenticate the user
accessing the website. Password protection policies should be in place at organizations so that personnel know how to create a
password, how to store their password and how often to change it.

A Password is a way to prove your identity when logging into a computer or a secure website. Passwords:
• Help protect your private information
• Stops others from access your account/s
• Stops hackers Use of Good PASSWORD
Passwords should be: Passwords should:
• Hard for others to guess • Contain different characters such as symbols, and
• Easy for you to remember numbers
• Not the same as other passwords you use • Uppercase and lowercase letters
Passwords should NOT contain:
• Date of birth
• Place of names
• People’s names

WHAT IS COMPUTER VIRUS


A computer virus is a program created intentionally to cause disruption and serious damage.A computer virus is a type of
malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and
inserting its own code. Infected computer programs can include, as well, data files, or the "boot" sector of the hard drive.

A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in
the same way that viruses cannot reproduce without a host cell, computer viruses…

A computer virus is a malicious software program loaded onto a user's computer without the user's knowledge and performs
malicious actions. Description: The term 'computer virus' was first formally defined by Fred Cohen in 1983. Computer viruses never
occur naturally. They are always induced by people.

There are many ways that your computer can get a virus such as: There are different types of viruses:
• Opening email attachments from unknown source • Email
• Downloading music, videos, etc… • Trojan Horse
• Worms
• Visiting illegal websites

ANTI-VIRUS SOFTWARE
Antivirus Software if it is installed will search your computer for any viruses and remove them. Antivirus software is also used to
detect any viruses coming into your system and block any potential threats.

Antivirus or anti-virus software, sometimes known as anti-malware software, is computer software used to prevent, detect and
remove malicious software.

Anti-virus software is a program or set of programs that are designed to prevent, search for, detect, and remove software viruses,
and other malicious software like worms, trojans, adware, and more.

These tools are critical for users to have installed and up-to-date because a computer without anti-virus software installed will be
infected within minutes of connecting to the internet. The bombardment is constant, with anti-virus companies update their
detection tools constantly to deal with the more than 60,000 new pieces of malware created daily.

There are several different companies that build and offer anti-virus software and what each offers can vary but all perform some
basic functions:
• Scan specific files or directories for any malware or known malicious patterns
• Allow you to schedule scans to automatically run for you
• Allow you to initiate a scan of a specific file or of your computer, or of a CD or flash drive at any time.
• Remove any malicious code detected –sometimes you will be notified of an infection and asked if you want to clean the
file, other programs will automatically do this behind the scenes.
• Show you the ‘health’ of your computer
• Always be sure you have the best, up-to-date security software installed to protect your computers, laptops, tablets and
smartphones.

Why Study Information Technology?


• You are the most connected society of all time
• Information technology touches almost every aspect of modern life
• Informed users make better choices
• The IT offers many career opportunities
• Even if you do not work in IT your company or organization will have IT projects and operations

Ubiquitous Computing
• ”Computing is made to appear anywhere at any time”
• Most people in developed countries now have multiple computer device such as:
• Cell phone, table, wearable device, desktop, embedded systems, echo dot “Alexa”, etc….
• Systems are at work 24x7x365(days a year)
• All smart devices are everywhere
• Younger generation has developed a lifestyle around these devices

The Market for IT Systems


• As of 2016 there are over 2 Billion smartphones in use worldwide
• As of 2013 80% of households in abroad had a personal computer
• Google, Apple and Microsoft are the top three of the valued companies in the world
• IT Services and software development make up a large portion of our economy

IT Career Opportunities
• The demand for software developers and IT operations personnel remains high
• In many areas of the world there is a shortage of IT personnel and filling jobs is difficult
• Pay for IT work remains relatively high
• Computer programmers made an average salary of 60,000-more in 2015
• Demand for new technologies such as Cloud Computing and Mobile Developers is also strong

Be an Informed User
• Informed users make better decisions
• All companies and organization have IT systems and operations
• The world is changing rapidly such as:
• News outlets and the way information is changing rapidly due to technology changes
• Remote workplaces are becoming more common place
• New computer devices are being introduced at a rapid pace
Summary
• The IT business is growing at a rapid pace and presents great opportunities for IT personnel worldwide
• Technology is changing constantly and new products and services are being introduced daily
• Being an informed user is a MUST in today’s rapidly changing world…!

******

Das könnte Ihnen auch gefallen