Skip to main content

Internet Revolution


In accessing the computer, there are other components to connect the network with other networks, it’s called an internet. Internet is a global communication networks that is open and connects with billions of other computer networks with various types for communication such as telephone, satellite and so on. The internet was introduced in the late 1960s and developed in 1990 marked by the existence of e-mail and web. The development of computer from difficult to become easier tools has introduced Information Era. Before there was the internet, humans had 3 era’s that are Agriculture, Industry and Information. In information era, technology began to develop further by integrating computers with networks. That computers are connected to the networks with internet and also tools who use by humans have become easier and faster with the internet, not only for computers, but also other devices such as smartphones, tablets and PCs are also connected by the internet. People are increasingly easy to socialize with other people around the world with the internet. Examples of sites that require internet are My Space, Facebook, Twitter, Youtube and Google Maps.
The internet has influenced digital technology marked by the presence of images, animation, video and sound, also changing and developing in the phase of information era. Phase in the information era have introduced us to the world of the internet. The first phase is institutional computing  which was introduced in 1950 and the price of components is still very expensive. The second phase called personal computing which has started to connect with other components. Third, interpesonal computing, has added networks to the PCs. Last phase is collaborative computing is the current information era that has connected many devices to the internet network. The emergence of the internet doesn’t through an easy process but through many era’s and phases to develop it into the digital world and make it easier for people nowadays to do some activities in this new era. Even though the work or information we get is getting faster and easier, there are risks that must be faced when using digital technology and information such as threats to privacy, misuse of information for political and economic interests and excessive use of technology. Therefore, we must use the internet in digital technology and information technology correctly and wisely.
Reference:
Hermawan. (2015, April 22). Kenali Pengertian Internet Beserta Fungsi, Fasilitas dan Manfaat Internet. Nesabamedia. Retrieved from https://www.nesabamedia.com/pengertian-fungsi-dan-manfaat-internet-lengkap/

Nama:              Aldias Dayang L. Aura
NIM:               106218011
Mata Kuliah:   Pengantar Teknologi Informasi

Comments

Popular posts from this blog

Artifical Neural Network

Artificial Neural Network  is a computational model based on the structure and functions of biological neural networks. Information that flows through the network affects the  a neural network changes or learns, based on that input and output. So the point is  to create a computational system that could solve problems like a human brain. The Neural Networks was founded by  Warren McCulloch and Walter Pitts in 1943. Then it was upgraded with AI (Artificial Intelligence) in 1975 by Kunijiko Fukushima called Artificial Neural Network (ANN) .   Warren McCulloch and Walter Pitts Today  Neural Networks are important in information age, because help society to solve complex problems in real life condition. They can learn from model the relationships between inputs and outputs that are nonlinear and complex; make generalizations and inferences; reveal hidden relationships, patterns and predictions (such as financial time series data) and varianc...

A Thing called Ransomware

A Thing called Ransomware Ransom malware, or   ransomware , is a type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access. The earliest variants of ransomware were developed in the late 1980s, and payment was to be sent via snail mail. In this day, ransomware authors order that payment be sent via cryptocurrency or credit card. There are several different ways that ransomware can infect your computer. One of the most common methods today is through malicious spam, or  malspam , which is unsolicited email that is used to deliver malware. The email might include booby-trapped attachments, such as PDFs or Word documents. It might also contain links to malicious websites. Malspam uses  social engineering  in order to trick people into opening attachments or clicking on links by appearing as legitimate—whether that’s by seeming to be from a trusted institution or a friend. Cybercriminals...

Categories and Types of Artificial Intelligence

AI has 2 categories namely weak or strong. Weak AI also known as narrow AI. Weak AI is an AI system designed and trained for certain tasks. Weak AI can be a virtual personal assistant, like Apple Siri, Amazon’s Alexa, and Google Home. While strong AI, also known as general artificial intelligence, is an AI system with general human cognitive abilities. When a special task is presented, a strong AI system can find its own solution without human intervention. S trong AI acts more like a brain. It does not classify, but uses clustering and association to process data. In short, it means there isn’t a set answer to your keywords.  Beside that, an assistant professor of integrative biology and computer science engineering at Michigan State University, Arend Hintze, categorizes AI into 4 types, ranging from existing AI systems to AI systems that are still in design. The categories are as follows: Reactive machine. An example is Deep Blue, the IBM chess program that defeated Garr...