Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
24 views10 pages

Introduction in ICT Specialization I

Uploaded by

cabaneroella
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views10 pages

Introduction in ICT Specialization I

Uploaded by

cabaneroella
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

INTRO LIZATI

DUCTI ONI
ON WHAT IS ICT?
ICT is an acronym for “information
communications technology”. Information and
Communications Technology (ICT) is technology

INICT
that is used to handle communications
processes such as telecommunications,
broadcast media, intelligent building
management systems, audiovisual processing
and transmission systems, and network-based
control and monitoring functions.

SPECIA
ICT is often used to describe the
convergence of several technologies, and the
use of common transmission lines carrying very
diverse data and communication types and
formats.
WHAT IS A COMPUTER? 4. Accurate results, which depend on the accuracy of data
input.

5. Reducing human role, particularly in mechanically run


factories.
 A computer is a machine which can manipulate digitized data
for a particular outcome based on a program that provides it a 6. Quick processing of arithmetic and logic operations.
set of instructions.
7. Continuous and persistent workability.
 "Computer" is a word derived from "Compute" which means to
calculate. 8. A lot of available software and applicable programs that
facilitate computer accessibility without need to study
 "Computer" is defined as an electronic computing device, computer science.
characterized by high speed and accuracy.
9. Prompt decision making to find proper and at most,
 Computer is a calculating device, which receives input from solutions for specific questions.
the user, analyses the input by applying a pre-defined set of
instructions to produce output. 10. Communicability through computer networks with other
computers to exchange data and information.
 A computer is also called as a data processor, because it can
receive, store, process and retrieve any kind of data.
PARTS OF COMPUTER
 Computers are used for many business productivity and
recreational tasks. MONITOR KEYBOARD
 Computers are also used to access Internet networks for COMPUTER CASE
communication and collaboration purposes.
PROCESSOR MOTHERBOARD
CHARACTERISCTICS OF COMPUTER MOUSE
A computer has the following characteristics:
PRINTER SPEAKER POWER
1. Quick performance.
SUPPLY
2. Quick data input and information retrieval.
GPU HARD DISK
3. Ability to store data.
DIFFERENT COMPUTER The machines were using new high-level languages such as
FORTRAN.

GENERATIONS THIRD GENERATION


FIRST GENERATION It emerged in 1960s.

It emerged in the 1940’s and mid-1950’s. It used small scale integrated circuits, followed by medium
scale integrated circuits, resulting in small size and high
The machines used magnetic drums for internal storage and memory capacity and accurate performance.
magnetic tape for external storage.
The machines distinguished high performance speed.
The machines were relatively slow.
It resulted in emergence of microcomputers and
The computers were huge in size. multiprocessors.

The machines experienced system failure due to high It developed operating systems to improve effectiveness and
temperature produced by vacuums. performance, such as multiprogramming system.

The computers had very limited memory capacity. The era of emergence of new and high-level languages such as
Basic and Pascal.
It used machine language in programming.
The period of improvement of input and output devices.
It used punched cards to store data.
FOURTH GENERATION
SECOND GENERATION
It emerged in 1970s and 1980s.
It emerged in mid-1950 and 1960’s.
The machines used semiconductors to develop large scale
It was built on Transistors and small sized circuits with high integrated circuit and very large-scale integrated circuits
operating efficiency. called microprocessors.

The machines were using magnetic circuits for memory. The computers had very high-speed performance.

The machines were using Hard disk for every storing and The period of emergence of Personal Computers and
retrieval of data. microcomputers.
The time of emergence of new operating systems such as Real salaries and wages, and storage operation in
time systems. factories.
b) Analogue computers are electronic devices that
The beginning of the use of Floppy disks. work on wave’s principle and is used
specifically to measure continuous flow of data.
FIFTH GENERATION c) Hybrid Computers are devices that incorporate
the qualities of the previous two types (digital
It emerged in 2013 - 2014. and analogue) and are used in scientific fields
in processing necessary data from both kinds.
Artificial Intelligence started.
3. THE PURPOSES
Natural language - Natural language processing (NLP) is a a) General Purpose Computers are designed for
field of computer science, artificial intelligence, and linguistics multipurpose functions such as processing
concerned with the interactions between computers and human salaries and wages, and storage operation in
(natural) languages. factories and etc.
b) Special Purpose Computers are designed for
specific functions such as early alarm device
CLASSIFICATIONS OF and computers used in industrial operations.

COMPUTER CARE AND APPROPRIATE


Computers can be classified according to these three
categories:
USE OF COMPUTER
Computer maintenance is essential for proper computer
1. THE ABILITY OF STORAGE AND
operation and for extending the life of your computer. Computers are
PERFORMANCE EFFICIENCY:
expensive, and with all big purchases you probably want to protect
your investment. If your computer seems to be running slower than
a) Super Computer
usual, crashes unexpectedly, or is otherwise unstable, you may need
the following basic maintenance issues:
b) Mainframe Computers

c) Minicomputers 1. MAINTAINING CURRENT ANTI-VIRUS


SOFTWARE
d) Microcomputers
The most important step in maintaining your computer's
2. THE OPERATING METHOD: performance is keeping your anti-virus software up-to-date
a) General Purpose Computers are designed for and frequently scanning your computer for viruses at least
multipurpose functions such as processing once a week to help ensure the safety of your computer.
2. MAINTAINING CURRENT MALWARE Unplug the keyboard from the USB or PS/2 port.
PROTECTION SOFTWARE
If the keyboard is plugged into the PS/2 port, you will
Malware is any type of software that is designed to need to shut down the computer before unplugging it.
damage your computer or gain unauthorized access to your
personal information. It includes viruses, worms, Trojan Turn the keyboard upside down, and gently shake it to
horses, spyware, and other types. remove dirt and dust.

Use a can of compressed air to clean between the keys.


3. INSTALLING OPERATING SYSTEM UPDATES
Moisten a cotton cloth or paper towel with rubbing
It is also important to install the latest operating system
alcohol, and use it to clean the tops of the keys. Do not
updates, as recommended by the developer of your operating
pour alcohol (or any other liquid) directly onto the
system.
keys.

Reconnect the keyboard to the computer once it is dry.


If you are connecting it to a PS/2 port, you will need to
4. DISK CLEANUP connect it before turning the computer on.
The Disk Cleanup searches your computer for files that
you do not need, such as files in the recycle bin and temporary
Internet files.

5. DISK DEFRAGMENTER B. CLEANING THE MOUSE


When your computer saves files, it splits them up and The following steps are basic cleaning tips that will help keep
stores them in different physical places on your hard drive. your mouse clean.

6. DATA BACK-UPS Unplug the mouse from the USB or PS/2 port.

Backing up your data is an efficient way to manage all Moisten a cotton cloth with rubbing alcohol. Use the
your important computer files by using different storage cotton cloth to clean the top and bottom of the mouse.
devices.
For a mechanical mouse, remove the tracking ball by
OTHER MAINTENANCE: turning the ball-covering in a counterclockwise
motion. Then clean the tracking ball and the inside of
A. CLEANING THE KEYBOARD the mouse with a cotton cloth moistened with rubbing
alcohol.
All the parts must be dry before reassembling and
reconnecting the mouse. If the mouse is connected to a DATA HANDLING AND FILE
PS/2 port then connect it before turning the computer
on. MANAGEMENT
C. CLEANING THE MONITOR There is a subtle difference between data and information.

Follow the steps below on how to safely clean the monitor: DATA INFORMATION
MEANING Data is raw, When data is processed,
Turn off the computer. unorganized facts that organized, structured or
need to be processed. presented in a given
Unplug the monitor from the power. If you are using a Data can be something context so as to make it
laptop, unplug the laptop. simple and seemingly useful, it is called
random and useless information.
Use a soft, clean cloth moistened with water to wipe the until it is organized
screen clean. EXAMPLE Each student's test The average score of a
score is one piece of class or of the entire
Do not spray any liquids directly onto the screen. data. school is information that
can be derived from the
D. KEEP IT COOL given data.
ETYMOLOGY "Data" comes from a "Information" is an older
Airflow must not be restricted around the computer. singular Latin word, word that dates back to
datum, which originally the 1300s and has Old
Avoid stacking papers, books, or other items around meant "something French and Middle
the computer. given." Its early usage English origins. It has
dates back to the 1600s. always been referred to
The computer must be positioned where the case is not Over time "data" has as "the act of informing,”
against the back side of the desk. become the plural of usually in regard to
datum. education, instruction, or
other knowledge
communication.
E. BATTERY CARE TAKING

Particular care of the computer laptop battery can help


ensure the longest possible life.
DIFFERENT TYPES OF
Check the owner’s manual for specific instructions on
DATA
optimizing battery life, its safe storage and disposal.
1) NUMBERS For example, "1a2b3c" is a short string of
alphanumeric characters.
Integers or Whole Numbers - In more common
parlance, whole number; a number that has no 5) ARRAY
fractional part. A numeric value, for example, 1 and
1234 are examples of integers. (e.g., 0,1,2,3,123123, An array is a list of data.
12)
It is also known as structures which is a collection of
Real Numbers - called doubles, floating-point or floats. named data referring to a single entry.
These are numbers represented with a decimal point. A
number with a decimal point. For example, 1.1, 5.0, "an array of _WHAT_" (where WHAT is a DATA
3.1419, -1234234.01, 0.0000001). TYPE). Several array examples: student grades = [97,
78, 88, 93, 89]; % an array of integers student name =
2) BOOLEANS (TRUE OR FALSE) ['j','i','m']; % an array of characters (also known as a
string) student name = 'jim'; % the same array of
Booleans were named after the famous Mathematician characters using a shortcut.
George Boole.
INFORMATION CAN ALSO BE CLASSIFIED AS
An example is the status of “I am learning vs. I am FOLLOWS:
NOT learning.” Many math operations give us Boolean
answers, such as "not equal"(e.g.,"5 ~= 10"), "less 1) Spatial - Information that deals with location, position
than" (e.g., 5 < 10), and "greater than" (e.g., 5 > 10).
and space.
A Boolean consists of operators such as AND, OR,
NOT, and XOR. 2) Chronological - Information that deals with time,
sequence and period.
3) CHARACTERS
3) Conceptual - Information that deals with relationships
A character is a single visual object used to represent and categorizations.
text, numbers, or symbols. For example, the letter "A"
is a single character. 4) Quantitative - Information that deals with amount and
comparison.
4) ALPHANUMERIC

Alphanumeric is a description of content that is both STORAGE DEVICES


letters and numbers.
Storage Devices can be categorized as primary, secondary,
tertiary removable or offline storage and online storage.
that is not under the control of a processing
unit.

EXAMPLES: FLOPPY DISK, ZIP DISK


1) PRIMARY STORAGE

Also known as main memory. Main memory is


directly or indirectly connected to the central
processing unit via a memory bus. The CPU
continuously reads instructions stored there and 5) ONLINE STORAGE
executes them as required.
Is a data storage online where the user has to
EXAMPLES: RAM & ROM pay a monthly fee to an online data storage
company and in exchange is given a certain
2) SECONDARY STORAGE amount of storage space where the user can
upload his documents and files.
It is not directly accessible by the CPU. The
computer usually uses its input/output channels
to access secondary storage and transfer the DATA SECURITY
desired data using intermediate area in
primary storage. Data security refers to protective digital privacy measures that
are applied to prevent unauthorized access to computers,
EXAMPLE: HARD DISK DRIVE databases and websites.

3) TERTIARY STORAGE Data security also protects data from corruption.

It is typically involving a robotic mechanism Data security is the main priority for organizations of any size
which will mount (insert) and dismount and genre.
removable mass storage media into a storage
device. Data security is also known as information security (IS) or
computer security. Data protection attempts to ensure the
EXAMPLES: MAGNETIC TAPE, OPTICAL security of computer-processed data from unauthorized access,
DISC from destructive user actions, and from computer failure.

Different threats to data security: Advanced Persistent Threat


4) REMOVABLE (OFFLINE) STORAGE
(APT); Adware; Anonymizing proxies; Backdoor Trojan; Boot
sector; etc.
Also known as disconnected storage. This is
computer data storage on a medium or a device
ELECTRONIC FILE Use descriptive folders to identify files and keep
file names short. Doing these methods makes it easier

MANAGEMENT for file and folder identification and location

5) FILE MANAGEMENT TIP # 5


File Management is the most important concept in learning any
application. It will allow you to create, select, copy, move, and rename Use Shortcuts for usually opened files and folders
files and folders in your computer. File Management has three for quick and easy access. You can do this by locating
fundamental aspects: first the file or folder then right click on it and select
Send to > Desktop (create shortcut).
how files and folders are named,

how nested folders are arranged

how files are handled in the folders.


6) FILE MANAGEMENT TIP # 6
TIPS IN FILE MANAGEMENT
Consider storing your documents online.
1) FILE MANAGEMENT TIP # 1 Microsoft and other providers like Dropbox and Box
provide online storage for all your documents and can
Use the Windows Explorer Libraries to organize be accessed online anywhere.
your files. Store like with like which means all
documents together, pictures, music and videos in their
own folders.
SUBMITTED BY:
2) FILE MANAGEMENT TIP # 2 ELLA T. CABAÑERO
Separate your working files from your personal BTLED-HE 1A
files. Create a folder for each. This will be very helpful
especially when doing updating and back up of files.
SUBMITTED TO:
3) FILE MANAGEMENT TIP # 3 CLARISA M. ALCOBER
LPT INSTRUCTOR
From your Work and Personal folders, you can
create folders which would now contain the files
pertinent to the folder. This ensures easy searching.

4) FILE MANAGEMENT TIP # 4


why we have to really take good care of our computer.
Computer has always been an integral part of our life
especially those people who have jobs, and for
students like me. We use computer in different ways,
one is in processing data to make it into an
information, that is why one of the lessons that is
discuss also in this subject is the data handling and
file management. Second storage, computer serves as
storage for our important files but we have different
storage devices that can help secure our important
files, and it is categorized as primary, secondary,
tertiary removable or offline storage and online
storage, through this device we can retrieve our files.
Once we indulge ourselves in computer we have to
remember to always protect our personal privacy,
because there are a lot of threats to your privacy, we
have the hackers, trojans, viruses that can threaten
our privacy and can cause for our computer to work
REFLECTION slowly. We have to secure our files, especially those
that are very confidential. As a user we have to be
ICT or Information Communication responsible, because bad people are lurking
Technology has always been my favorite subject ever everywhere, always let your guard up, we always have
since I was in high school. Empowerment Technology to remember to “think before we, click.”
is one of my subject way back when I was in senior
high, it introduces me to this interesting, exciting and
interactive world of ICT. And now here in college I
meet this subject again, Introduction in ICT
Specialization, and from the very beginning I already
know that this subject will be my favorite again. And I
am right because I learned a lot of things, from the
basic parts of computer including its function, to the
different generations of computer, which I found
really interesting because this only shows how
creative our mind is, up to the different classification
of computer. In addition, in this subject I also learned
about the appropriate or proper way, or care that we
need to do to prolong the life of our computer,
because we all know that computer is expensive that is

You might also like