Vous êtes sur la page 1sur 5

Generation

First
1940-1956

Component
Vacuum Tubes

Second
1956-1963

Transistor

Third

IC(Intergrated
Circuit)

Fourth

Microprocessor

Fifth
Present and
Beyond

Artificial
Intelligence

Picture

Computer
ENIAC,UNIVAC

COBOL,FORTRAN

IBM,MACINTOSH

1.

2. List the 3 usage of ICT in everyday life.


Education
i.
Find useful
info
ii.
E-learning
iii.
Manage
books
(Library
Automatio
n System)

Banking
i.
Online
banking
ii.
Withdraw
or check
money
iii.
Transfer
money, pay
bill online

Industry
I.
Automoblie
manufacturi
ng using
robotic.
II.
Aerospace
research
using super
computers(
NASA)

E-Commerce
i.
Advertising
ii.
Buying,selling
something on
internet.

3. State the difference between computer ized and non-computerized.


Computerized
a)All transactions are done by
computers.
b)Computers and telecommunications
industry production increased.
c)More interesting and interactive

Non-Computerized
a)Banking was done manually by taking
deposits directly.
b)Production was slow as everything
was done manually.
c)Depends strictly on teachers and

experience in education.

textbokk in education.

4. State the 3 impact of ICT everyday


Positive Impact
a)Faster communication speed
b)Lower communication cost
c)Paperless environment
Negative Impact
a)Social problems
b)Health problems

5) Difference between Ethics and law


- as a guideline to computer users
- computer users are free to follow or
ignore the code of ethics
- Universal, can be applied anywhere,
all over the world.
- to produce ethical computers users
- not following ethics are called
immoral

- as a rule to control computer users


- computer users must follow or ignore
the code of regulations and law
- Depend on country and state where
crime is committed
- to prevent misuse of computer
- not obeying laws are called crime

6) State the need for intelectual property law


Intellectual Property Laws cover Patents, Trademarks, Design, and Copyright.

7) The 4 types of intellectual property are:


a) patents for inventions

b) trademarks for brand identity

c) design for product apperance

d) copyright for materials

8) State the authetication technologies


Authentication is a process where user verifies their identity.Authentication deals
with the problem of determining whether a user should be allowed access to a
particular system.

9) 4 commonly authentication methods:


a) User identification is a unique combination of characters(letter, number or
symbol) that identify specific user.Example:pin number, password
b) Possessed object is an item that you must carry to gain access to computer
facility.Example:ATM card, credit card, smart card.
c) Bionetric device is a device that translates personal characteristics into digital
code that is compared with the digital code stored in the database.
Example:fingerprint reader, iris scaner, hand geometric scanner and signature
verification system.
d) Callback system refers to the checking system that authenticates the user.

10. List the effects of controversial contents(effect on society)


Pornography

Can lead to sexual addiction.


Can develop lower moral values
towards other people.
Can erode good religious,
cultural, behaviors and beliefs.
Can lead to criminal acts such as
exploitation of women.

Slander

Can develop society that


disregards snare:honesty and
truth.
Can lead to bad habits of
spreading rumors and untruth.
Can cause people to have
negative attitudes towards
another people.

11.Describe the process of filtering to control access to controversial contents.


a) Keyboard-Keyword blocking
b) Site-Site blocking
c) Web-Web rating system

Vous aimerez peut-être aussi