AQA ICT A2 Level © Nelson Thornes 2009 Section 10 Future developments 1 Section 10: Future developments ICT in the 21 st Century.

Slides:



Advertisements
Similar presentations
WIRELESS AND MOBILE TECHNOLOGIES TO FACILITATE PERSONALISED FLEXIBLE LEARNING IN CONSTRUCTION Raju Pathmeswaran, Vian Ahmed & Ghassan Aouad
Advertisements

Intermediate 2 Computing
Chapter 1:Introduction to the world of computers
From Voice on the Net to Real Time Communications Jawad Khaki Vice President Windows Networking & Communications Microsoft Corporation.
?  Able to explain the 6 key functions of system software  Able to explain each using a suitable example  Identify three different system software.
Professor Nigel Linge Computer Networking and Telecommunications Research Group University of Salford.
BLUETOOTH. INTRODUCTION A look around at the moment! Keyboard connected to the computer, as well as a printer, mouse, monitor and so on. What (literally)
PRODUCT FOCUS 6/9/14 – 6/20/14 INTRODUCTION Our Product Focus for the next two weeks is Microsoft Windows 8.1. Windows 8 was released in the Fall of.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Overview & Scrutiny Committee Portfolio Holder Update Customer Access Councillor Simon Tobin 19 th March 2009.
King ‧ Fanny ‧ Conrad ‧ Gordon 10.) List all the electrical devices in your home that are, or could be, operated with remote devices. Try and come up with.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Life in the Information Age
Lack of Security in Hotspots/Wi Fi Areas Yin Wai ISM 158 4/27/10.
operational description The CNN NewsApp is a mobile application that delivers news directly to any Android device running the application. It retrieves.
Nadine Malone. Blogs A Blog is a website where entries are written in chronological order and commonly displayed in reverse chronological order. "Blog"
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Computer Networks IGCSE ICT Section 4.
Back to Start 1 of 10 Connect with a Mobile Device You can use your company’s Windows SBS computer network to extend your connectivity by using mobile.
1 of 13 Back to Start Working Remotely Your company’s Windows SBS computer network makes it easy for you and your coworkers to work remotely—and to stay.
SELECTING TABLETS FOR ENTERPRISE USE TABLET COMPUTER SELECTION.
Development in Mobile Technologies Mobile Technology is a collective term used to describe the various types of cellular communication technology.
The Internet. What is the internet? a vast network designed to transfer data from one computer to another.
Cellular Networks How do Mobile & Satellite Phones work? What can we do with them?
AS ICT.  A portable communication device is a pocket sized device that is carried around by an individual  They typically have a display screen with.
1 AQA ICT AS Level © Nelson Thornes 2008 Application Software.
For CCRI Students.
Methods of communication
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Telesoft Partners Individuals in a Smart Device World October, 2004 Dave Nagel Chief Executive Officer.
1 AQA ICT AS Level © Nelson Thornes 2008 Operating Systems What are they and why do we need them?
The role of communication systems in our lives today By Phil and Kieran.
Living in a Digital World GCSE ICT Unit 1. What are we going to study?
The Internet When was it created and why?. What Is the Internet? A network of computer networks. It connects networks all over the world through the use.
1 The Horizon Report on 21 st century tools in teaching and learning: what does it mean for us? Jill Abell.
Hacking and International Investigations Presented By: Nenette Day Harvard University Extension School.
COMPUTER PLATFORMS 1 Computer Platforms Week 3 Types of computers.
Definition E-Commerce is… using the Internet to assist in trading goods and service – Electronic Business Level Playing Field is… all people and companies.
Section 4.2 AQA Computing A2 © Nelson Thornes 2009 Types of Operating System Unit 3 Section 4.1.
What makes a good interactive resume? Click for detailed information Multimedia Navigation Communication.
GCE in Applied ICT (CCEA) Images used in the presentation feature work produced by year 13 and 14 students.
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
Tero Holappa Business Manager Convergence Products Multimedia Nokia Data-oriented convergence with Wi-Fi-optimized devices
S. Hashem - Nov Towards A “Safer” Internet for Our Children Dr. Sherif Hashem Executive Vice President IT Industry Development Agency
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Real Time Communications: An Enterprise View Rodger M. Will Ford Motor Company Wednesday, April 21, 2004.
Mobile Phone Based Environment Control/Security System Christopher Carroll B.E. Electronic and Computer Engineering.
Standards and Protocols Slide show for WiFi Characteristics of a wireless local network. It was named after a group of people who invented. The.
For Wi-Fi The is internationally describing characteristics of a wireless local network. It was named after a group of people who invented.
A Guide to Your Volunteer Connection Account. Access Volunteer Connection Visit or navigate to Volunteer Connection.
Module 2.1 Communication and networks in modern society Theme 2: Let’s communicate!
Mobility at QUT 2011 CRICOS No J Rod Swile.
Communications & Networks National 4 & 5 Computing Science.
Higher Computing Networking. Networking – Local Area Networks.
The Personal Server Changing the Way We Think About Ubiquitous Computing Roy Want, et al. / Intel Research UBICOMP 2002 Nov Seungjae Lee
1 Thrust 5: Secure Wireless Networking Technologies For future generation wireless packet networks, two most important aspects need to be addressed: QoS.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Networking Computers Types of Network. Learning Objectives: By the end of this topic you should be able to: compare the characteristics of a local area.
Chapter 16 – Technological Development Technological Development Employees, managers and organisations, as well as the population in general, take for.
The types of computers and their functionalities.
1 AQA ICT AS Level © Nelson Thornes 2008 Operating Systems What are they and why do we need them?
Section 13 Activities. Activity 1 Complete the following table with possible reasons why ICT security might be compromised Security BreachPossible reason.
MC-Quiz: Chapter 9 Communications and Networks Discovering Computers 2010.
Mobile Medical Library Informatio Medicata 2005 Budapest Pirjo Rajakiili National Library of Health Sciences – Terkko.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
NTC 362 Week 2 DQ 5 Wireless security today must go beyond computers, as Bluetooth is available in many devices. What can you do to help protect your Bluetooth.
European Computer Driving Licence
Home and personal communication systems
Roadrunner Technical Support
A Glimpse of What Lies Ahead for the Cyber Insurance Market
Presentation transcript:

AQA ICT A2 Level © Nelson Thornes 2009 Section 10 Future developments 1 Section 10: Future developments ICT in the 21 st Century

AQA ICT A2 Level © Nelson Thornes 2009 Section 10 Future developments 2 Processing Power The processing power of computers is measured in flops (floating point operations), and is constantly improving. Supercomputers are the most powerful computers in the world. In June 2008, the world’s first petaflop computer was produced. It is called Roadrunner and was built for the US department of energy. Follow this link to a web site dedicated to supercomputers.link Click here to access a NOAA news article about climate and weather computers.here

AQA ICT A2 Level © Nelson Thornes 2009 Section 10 Future developments 3 Portability The demand for mobile computing has increased. Small devices have become much more powerful, but there is still a need for the user to interface with the system. Tiny screens and keyboards are not easy to use for large documents. This site This site is dedicated to UMPCs (ultra-mobile PCs).

AQA ICT A2 Level © Nelson Thornes 2009 Section 10 Future developments 4 Convergence Think about modern mobile devices and then try to think back ten, or even five, years. Make a list of all the devices a person would have to carry to provide the functionality delivered by a cutting edge phone. Click here to find out more.here

AQA ICT A2 Level © Nelson Thornes 2009 Section 10 Future developments 5 Connectivity Broadband has brought about huge increases in data transfer rates and there is a constant pressure to increase them further. Wireless connectivity using technologies such as Wifi and Bluetooth is allowing people to connect on the move. People are communicating more through , SMS and VOIP through both mobile devices and home and workplace computers.

AQA ICT A2 Level © Nelson Thornes 2009 Section 10 Future developments 6 Cyber crime The 2006 Parliamentary Office of Science and Technology report concluded that: ‘Computers are increasingly being targeted by criminals or used as tools to commit old and new types of crime.’ ‘Legislative change to address the increase in and diversity of computer crime is in progress. However, policing computer crime is resource- intensive, complex and requires support from a number of organisations.’ ‘There are several technologies available to improve computer security but their effectiveness may be limited without user awareness and education.’ ‘Responsibility for securing computers against crime largely rests with the user (individual or organisation), although there is debate over whether the government and industry should do more to protect users.’ For the full report, follow this link.link