Saturday, February 12, 2011

Article

ICT-Information Communication Technology

Information and communication technology is an umbrella term that covers all technical ways for processing and communicating information. It is most often used to describe digital technologies including methods for communication, as well as techniques for storing and processing information. The term has gained popularity partially due to the convergence of information technology (IT) and telecom technology.

ICT allows users to participate in a rapidly changing world in which work and other activities are increasingly transformed by access to varied and developing technologies.
Thank you for visiting and supporting information communication technology, where we have gathered together IT articles, videos, and everyday dialogue.  :-)     :-)
ICT is an acronym that stands for Information Communications Tecnology
However, apart from explaining an acronym, there is not a universally accepted defininition of ICT? Why? Because the concepts, methods and applications involved in ICT are constantly evolving on an almost daily basis. Its difficult to keep up with the changes - they happen so fast.
Lets focus on the three words behind ICT:
- INFORMATION
- COMMUNICATIONS
- TECHNOLOGY
A good way to think about ICT is to consider all the uses of digital technology that already exist to help individuals, businesses and organisations use information.
ICT covers any product that will store, retrieve, manipulate, transmit or receive information electronically in a digital form. For example, personal computers, digital television, email, robots.
So ICT is concerned with the storage, retrieval, manipulation, transmission or receipt of digital data. Importantly, it is also concerned with the way these different uses can work with each other.
In business, ICT is often categorised into two broad types of product: -
(1) The traditional computer-based technologies (things you can typically do on a personal computer or using computers at home or at work); and
(2) The more recent, and fast-growing range of digital communication technologies (which allow people and organisations to communicate and share information digitally)
Let's take a brief look at these two categories to demonstrate the kinds of products and ideas that are covered by ICT:
Traditional Computer Based Technologies
These types of ICT include:
Application Use
Standard Office Applications - Main Examples
Word processing
E.g. Microsoft Word: Write letters, reports etc
Spreadsheets
E.g. Microsoft Excel; Analyse financial information; calculations; create forecasting models etc
Database software
E.g. Oracle, Microsoft SQL Server, Access; Managing data in many forms, from basic lists (e.g. customer contacts through to complex material (e.g. catalogue)
Presentation software
E.g. Microsoft PowerPoint; make presentations, either directly using a computer screen or data projector. Publish in digital format via email or over the Internet
Desktop publishing
E.g. Adobe Indesign, Quark Express, Microsoft Publisher; produce newsletters, magazines and other complex documents.
Graphics software
E.g Adobe Photoshop and Illustrator; Macromedia Freehand and Fireworks; create and edit images such as logos, drawings or pictures for use in DTP, web sites or other publications
Specialist Applications - Examples (there are many!)
Accounting package
E.g. Sage, Oracle; Manage an organisation's accounts including revenues/sales, purchases, bank accounts etc. A wide range of systems is available ranging from basic packages suitable for small businesses through to sophisticated ones aimed at multinational companies.
Computer Aided Design Computer Aided Design (CAD) is the use of computers to assist the design process. Specialised CAD programs exist for many types of design: architectural, engineering, electronics, roadways
Customer Relations Management (CRM)
Software that allows businesses to better understand their customers by collecting and analysing data on them such as their product preferences, buying habits etc. Often linked to software applications that run call centres and loyalty cards for example.

Traditional Computer Based Technologies
The C part of ICT refers to the communication of data by electronic means, usually over some distance. This is often achieved via networks of sending and receiving equipment, wires and satellite links.
The technologies involved in communication tend to be complex. You certainly don't need to understand them for your ICT course. However, there are aspects of digital communications that you needs to be aware of. These relate primarily to the types of network and the ways of connecting to the Internet. Let's look at these two briefly (further revision notes provide much more detail to support your study).
Internal networks
Usually referred to as a local area network (LAN), this involves linking a number of hardware items (input and output devices plus computer processing) together within an office or building.
The aim of a LAN is to be able to share hardware facilities such as printers or scanners, software applications and data. This type of network is invaluable in the office environment where colleagues need to have access to common data or programmes.
External networks
Often you need to communicate with someone outside your internal network, in this case you will need to be part of a Wide Area Network (WAN). The Internet is the ultimate WAN - it is a vast network of networks.

ICT in a Broader Context
Your ICT course will almost certainly cover the above examples of ICT in action, perhaps focusing on the use of key applications such as spreadsheets, databases, presentation, graphics and web design software.
It will also consider the following important topics that deal with the way ICT is used and managed in an organisation:
- The nature of information (the "I" in ICT); this covers topics such as the meaning and value of information; how information is controlled; the limitations of ICT; legal considerations
- Management of information - this covers how data is captured, verified and stored for effective use; the manipulation, processing and distribution of information; keeping information secure; designing networks to share information
- Information systems strategy - this considers how ICT can be used within a business or organisation as part of achieving goals and objectives

As you can see, ICT is a broad and fast-changing subject. We hope our free study materials (revision notes, quizzes, presentations etc) will help you master IT!

Activity #2

5 innovative gadgets in 2011

  1. Liquid Image Extreme Summit Series HD Goggles (MSRP $400): Wouldn't it be great to record your actual snowboarding or skiing trip down the slopes? Liquid Image Extreme offers a set of snowboarding goggles that come equipped with an HD camcorder that records footage onto a Micro SD card. The user need only push a button, and a high definition video camera located near the user's forehead turns on and starts recording footage.
  2. Mitsubishi Digital Electronics 92-inch 3D TV (MSRP $5,000-$6,000): 50-inch TV screens were once considered huge, but not anymore. Mitsubishi has introduced a 1080i HD TV that is over 7 and 1/2 feet long. This is the largest TV that the company offers, and it is also 3D capable. However, the 3D glasses that one needs for the TV do not come cheap either: a starter pack from the company, which includes two pairs of active-shutter 3D glasses and an adapter, costs an additional $400. In the case of this 3D TV, cheap plastic (dual-tone) or "passive" 3D glasses simply don't work.
  3. Vizio Theater 3D TV (MSRP $300): For those individuals who don't need a theater-size TV, Vizio offers a 3D TV that starts just under $300 for a 22-inch model. The 3D glasses themselves run $29.99 for one pair or $44.99 for two, and they can also be used in movie theaters.
  4. Nike+ Sportwatch GPS (MSRP $249): Runners typically track their mileage while running as a way to measure their progress. Nike tapped into the runner market back in 2006 by introducing a shoe sensor that transmitted running data and mileage to the user's iPod, but that required owning an iPod. Now, the company is again trying to expand into the running market by offering a stand-alone running watch that also contains a GPS for mileage tracking and route mapping.
  5. Wave Xtion Web/TV Browser (MSRP $199): The Xtion connects to both a PC and a TV, allowing Web browsing on one's TV. While this concept itself is not new, what is new is the fact that the Xtion does not require a user to have any kind of keypad or joystick in order to rapidly surf the Web or even play online games. Hand motions suffice, since the device actually tracks the gestures of the people sitting in front of the TV.


Monday, December 6, 2010

IT104earlyjeansoria

A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.

IT104earlyjeansoria

1.Why has there been a dramatic increase in the number of computer related security incidents in recent years?

ans: 
 for me,,. many incidents happening in the computer security because of the people using a any code.. and many people in the past years that very expert in using a any code of the computer..

2.What are some characteristic of common computer criminals including their objectives.

ans:
Computer crime, or cybercrime, refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime.
1. Netcrime refers, more precisely, to criminal exploitation of the Internet
2.Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.
On the global level, both governments and non-state actors continue to grow in importance, with the ability to engage in such activities as espionage, financial theft, and other cross-border crimes sometimes referred to as cyber warfare.
3.The international legal system is attempting to hold actors accountable for their actions, with In the infancy of the hacker subculture and the computer underground,[3] criminal convictions were rare because there was an informal code of ethics that was followed by white hat hackers.[4] Proponents of hacking claim to be motivated by artistic and political ends, but are often unconcerned about the use of criminal means to achieve them.[5] White hat hackers break past computer security for non-malicious reasons and do no damage, akin to breaking into a house and looking around.[6] They enjoy learning and working with computer systems, and by this experience gain a deeper understanding of electronic security. the International Criminal Court among the few addressing this threat.
3.What actions must be taken in response to a security incidents.

ans:
The types of security incidents likely to affect patient confidentiality are variable.  Data security incidents may take many forms including the following:

·         Theft of equipment holding confidential information – PCs, dicta-phones, case-notes, etc.
·         Unauthorised access to a building or areas containing unsecured confidential information.
·         Access to patient records by an authorised user who has no work requirement to access the records.
·         Authorised access which is misused (staff).
·         Electronic access (hacking) and viruses.
·         Misuse of equipment such as faxes, text messages on mobiles and e-mails.
·         Inadequate disposal of confidential material (paper, PC hard drive, disks/tapes, etc).
·         Car theft / break-ins to on-call staff carrying patient records.
·         Unauthorised access to records away from premises (e.g. laptops and notes when travelling between clinics to home-visits etc).
·         Complaint by a patient, or a member of the public, that confidentiality has been breached.
·         Careless talk.