CHAPTER1 : INTERNET TECHNOLOGY

Get Started. It's Free
or sign up with your email address
CHAPTER1 : INTERNET TECHNOLOGY by Mind Map: CHAPTER1 : INTERNET TECHNOLOGY

1. DEFINITION

1.1. THE USE OF COMPUTER HADWARE AND SOFTWARE TO STORE,RETRIEVE AND MANIPULATE INFORMATION

2. APPLICATION OF INTERNET TECHNOLOGY

2.1. EDUCATION

2.1.1. LEARNING MANAGEMENT SYSTEM

2.1.2. COMPUTER BASED TRAINING

2.2. GOVERMENT

2.2.1. E-FILING

2.2.2. E-SYARIAH

2.2.3. HRMIS

2.3. HEALTH CARE

2.3.1. MEDLINE

2.3.2. COUNTER REGISTRATION SYSTEM

2.3.3. TELEMEDICINE

2.3.4. TELESURGERY

2.4. PUBLISHING

2.4.1. ONLINE NEWSPAPER

2.4.2. ONLINE MAGAZINE

2.5. FINANCE

2.5.1. FINANCE INVESTMENT SYSTEM

2.5.2. ONLINE BANKING

2.6. TRAVEL

2.6.1. GLOBAL POSITIONING SYSTEM(GPS)

2.6.2. ONLINE RESERVATION SYSTEM

2.6.3. E-TICKETING

2.7. MANUFACTURING

2.7.1. COMPUTER-AIDED DESIGN

2.7.2. COMPUTER-AIDED MANUFACTURING

2.8. SCIENCE

2.8.1. VIRTUAL REALITY

2.8.2. COCHLEAR IMPLANT

2.8.3. HAWK EYE OFFICIATING SYSTEM

3. ADVANTAGES

3.1. SPEED

3.1.1. COMPUTER CAN PROCESS BILIONS OR TRILIONS OF OPERATION IN A SINGLE SECONDS

3.2. RELIABILITY

3.2.1. ELECTRONICS COMPONENTS IN COMPUTER ARE DEPENDABLE AND RELIABLE BECAUSE THEY RARELY BRAKE

3.3. CONSISTENCY

3.3.1. A COMPUTER WITH THE SAME INPUT WILL PRODUCE THE SAME RESULT CONSISTENTLY

3.4. COMMUNICATION

3.4.1. COMPUTER CAN COMMUNICATE WIRELESSLY WITH OTHER COMPUTER

3.5. STORAGE

3.5.1. COMPUTER CAN STORE ENORMOUS AMOUNT OF DATA AND MAKE THIS AVAILABLE FOR PROCESSING ANYTIME NEEDED

4. DISADVANTAGES

4.1. VIOLATION OF PRIVACY

4.1.1. OTHER PERSON MIGHT STEAL OUR PERSONAL AND CONFIDENTIAL RECORD IF THEY WERE NOT PROTECTED PROPERLY

4.2. PUBLIC SAFETY

4.2.1. WE MIGHT BE A VICTIM TO CRIME IF WE ARE EXPOSING OR SHARING OUR PHOTOS,VIDEOS,OR OTHER PERSONAL INFORMATION PUBLICLY

4.3. IMPACT ON LABOUR FORCE

4.3.1. MANY EMPLOYEES MIGHT BE JOBLESS IF THEIR SKILL HAS BEEN REPLACE BY COMPUTER

4.4. HEALTH RISKS

4.4.1. PROLONGED OR IMPROPER USE OF COMPUTER CAN LEAD TO HEALTH INJURIES

4.4.2. BEHAVIORAL HEALTH RISKS ARE COMPUTER ADDICTION AND TECHNOLOGIES OVERLOAD

4.5. IMPACT ON ENVIROMENT

4.5.1. COMPUTER MANUFACTURING PROCESS AND COMPUTER WASTE CAN LEAD TO POLLUTION

5. CATAGORIES OF COMPUTER

5.1. SUPERCOMPUTER

5.1.1. OCCUPY A FULL ROOM OF EQUIPMENT

5.1.2. TENS THOUSANDS OF PROCESSOR

5.1.3. EXTREMELY LARGE STORAGE(3.1 PB)

5.2. MAINFRAME

5.2.1. OCCUPY PARTIAL ROOM OF EQUIPMENT

5.2.2. DOZENS OF PROCESSORS

5.2.3. VERY LARGE AND ADDABLE STORAGE(4B TB)

5.3. PERSONAL COMPUTER

5.3.1. FITS ON A DESK

5.3.2. SINGLE PROCESSOR(1.5-2.5 GHZ)

5.3.3. LARGE(500 GB)

5.4. MOBILE COMPUTER

5.4.1. FITS ON YOUR LAP

5.4.2. FITS IN YOUR HAND

5.5. MOBILE DEVICES

5.5.1. FITS IN YOUR PALMS

5.5.2. FITS IN YOUR POCKET

5.6. EMBEDDED COMPUTER

5.6.1. MINIATURE

5.6.1.1. MOUNTED ON A CIRCUIT BOARD AND THEN INSTALLED IN A MACHINE OR APPLIANCES USING WIRES