What are the 4 types of ICT?
Information and communication technology is used to provide internet uses in our life with the electronic gadgets and devices to uses on the internet connection and provide the service option to control the devices through the internet service with the Smartphone and remote sensing gadgets to give a command to perform an action on the particular place to the provide to the user depends on the uses of devices and perform a task for the end.
ICT includes the virtual world to connect with the real world in the graphics form of visual arts and feels real through electronic gadgets or devices.
ICT includes the different types of devices that are used to provide the communication system using the devices such as:- the application software for communication systems is used to take input devices and provide the output data through the output hardware resource on the computer system.
Introduction to the topic of computer related and the topic is related to the computer application and information technology is following below here:
What are the 4 types of ICT?
Let's discuss the topic related to the computer system and the information technology topic is "What are the 4 types of ICT?" explanation following below here:
What are the 4 types of ICT?
There are some points on the computer system and ICT related to the topic of "What are the 4 types of ICT?" following below here:
- The user can control and operate the device through the internet
- Information can be shared on the computer through internet
- The database can be accessed from the internet database
- The social media account can be secure from the security layer on website
Let's discuss the points listed above about the computer system and ICT related to the topic of "What are the 4 types of ICT?" explanation following below here:
The user can control and operate the device through the internet
Users can control the devices and operate them through the internet service on the Smartphone or remote sensing gadgets or devices.
The remote sensing device is a type of device that is a smart device and it is only for controlling other devices such as tablets with no feature of calling system.
It is only used for remote sensing through network devices and operating the analog devices at home such as fan, air conditioner, television and its applications, room light etc.
The user can control the devices through the Smartphone with the help of application software to operate the devices and provide the service and perform the task at home.
The device which is used to connect the device that is used to provide the output data on the hardware resources to the end user on the computer system.
Information can be shared on the computer through internet
Information can be shared on the computer system through internet service with the device that performs a specific task such as sending input data and it is only connected to the signals through a network device and sends the input data to the computer system.
The internet service is also needed to connect with the computer system through the network device and provide the internet service on the computer system to receive the input data through the network device between the computer system and input device.
The information can be shared using the video data through the camera input on the computer system to connect to another computer system for making a video conferencing system to communicate to the user or many to one or many to many users can connect with the video conferencing system through the internet service.
The device such as microphone can provide the voice data to the computer system and the user can share their voice through the microphone input device to the connected user on the web application, website depends on the types of method with their user ID to connect with the user who sends the voices data to the user who received the voice message using the internet service available on the computer system.
The database can be accessed from the internet database
The design interface for operating the database system to manage the data that are available on the cloud database model. It is accessed through the internet service on the computer system or smartphone device.
The database is available on the internet service and the user has an account on the website portal to access the database which is a personal and sensitive database also saved on the memory space provided by the service provider of cloud database to the client user on through the internet service.
The cloud database is also used for providing the other types of website that are provided the service on the internet and the admin uses the cloud database service to connect with the website for client users such as information sharing websites or blogs.
Databases can be shared through the network model which is known as a distributed database method to distribute the data for safety purposes when the network device is lost or damaged through the specific conditions and the database can be lost then the distributed database can retrieve the lost data to the particular system on the network model for the client user can be retrieved their lost data due to the advantage of distributed database on the internet.
The social media account can be secure from the security layer on website
The social media accounts can be secured from the security layer on the website that means the security layer included the username and password with login button for processing the username and password verification and it can passed the security layer when the user typed the correct information of username and password on the design interface form in the textbox.
These types of input values process the verification system on the security interface by the database programming language from the relational database model. The relational database provides the query language of data control to provide the verification process on the security model of websites of social media.
The object level of security is used to include the different resources of ICT such as:- scanner for finger pattern, eye scan resource, voice recognition for security system to matches the object based files which the user has been saved previous for match the data during the verification process then the security model allows to access the authority or an account on the organisation website, web application software to access the account and verify the user is genuine and right to access who has been registered on the organization. The user can access the account after the verification process of the object database file and provide the verification system on the site and web app.

Comments
Post a Comment