ICT Review For The Final Exam
ICT Review For The Final Exam
ICT Review For The Final Exam
)exam (AASU
عمل الطالب :عبدالرحمن محمد
بمساعدة من مشرفين قروب طلبة عبدهللا السالم
1
WEEK 1
What is information technology?
Information technology: The set of techniques used in processing and
retrieving Information
Examples:
o Social media tools
2
Computer Literacy:
Computer Literacy: Understanding computer terminology and staying updated with
technological advancement.
Computer Functions:
Computer Functions: A Computer is a data processing device that converts data into
information.
Basic functions of computers:
1. Processing: Manipulates, calculates, or organizes that data into information
2. Input: Gathers data or allows users to enter data
3. Output: Displays data and information in a form suitable for the user
4. Storage: Saves data and information
Data Processing
Data: Raw unorganized collection of facts
Information: Data that has been organized or presented in a meaningful fashion
Computer Language
Binary language: The language computers use to process data into information.
- Consists of two digits
- Byte: 8 bits
Integrated circuits
Integrated circuits (or chips): are tiny regions of semiconductor material that support a
huge number of transistors.
Processing of bits and bytes
Hardware: is any part of the computer you can physically touch
Software: is the set of computer programs that enables the hardware to perform different
tasks
Operating system (OS): The program that controls how your computer functions (common
type of software)
Processing Devices
Central Processing Unit (CPU): Brain of the computer which contains billions of circuits
Memory:
1- RAM (Volatile): Stores programs and data that the computer is currently using
2- ROM (Non-volatile): Holds all the instructions needed to start up the device when
powered on
Motherboard: Connects all the hardware in the computer
Input Devices
input Devices :A device used to enter data and instructions.
Output Devices
Output Devices :device that sends processed data and information out of a computer in the
form of text, pictures (graphics), sounds (audio), or video.
Storage Devices
3
local Storage Devices:-
Hard drive (HDD): Non-volatile Permanent storage of software and data
Internal hard drive: Resides within the desktop or laptop system unit.
External hard drives: reside outside the system unit and connect to the computer via a port.
Solid-state drive (SSD): runs with no noise, emits little heat, and requires little power.
Portable Storage Options:
Flash drive: Up to 4TB storage capacity
Flash memory card: Transfer data between computers and digital cameras, smartphones,
tablets, video cameras, and printers
Smartphone Storage Devices:-
1. Memory chips
2. Micro SD flash cards (external) (not in all phone models): Allow adding additional
memory to the phone.
3. Cloud Storage: keeps your files on the cloud rather than on your device, Requires
installation of software or an app on your device.
Examples: Google Drive, Microsoft OneDrive, and Dropbox
Types of Computers
Portable Computers : -
1. Cell Phone 2. Tablets
3. Laptops
Laptops variants:
2-in-1 PCs: laptop computer that can convert into a tablet-like device
Ultrabooks: Full-featured computers that focus on offering a very thin, lightweight
computing solution
Chromebook: Uses the Google Chrome OS and is designed to be connected to the Internet
always
Stationary Computers
1- Desktop Computers: Intended for use at a single location, Consist of a system unit
2- All-in-one Computers: Computers house the computer’s processor and memory in
the monitor
Super Computers: Fastest computers, Analyse significant amount of data and numbers
Mainframes: Process and store business transaction
Servers: Computer chip that resides in another device, such as your car, a drone in your
home.
4
WEEK 2
Ethics
Ethics: The study of the general nature of morals and of the specific moral choices
individuals make.
True or false
- Ethics can be defined as the rules of conduct presented in a religion (FALSE)
- Ethics are defined as accepted ideas of right and wrong (FALSE)
Ethical Challenges in IT
1. Intellectual Property: Work that is the result of someone’s creativity and knowledge
that is protected by copyright law and documented by copyrights, patents, and
trademarks
Why Intellectual Property is important ? With increased use of electronic media,
challenges to enforcing copyright laws have increased
2. Privacy
Intelligent personal agents are constantly listening to their users and combing through
your data to help determine your needs
Social media sites: User’s privacy settings will allow these sites to have information they are
not legally allowed to have
3. Social Justice
(Example 1) Predictive policing : Gathering data from different sources, analysing it, and
then using the results to prevent future crime
(Example 2) Military and government secrets: WikiLeaks (wikileaks.org) makes private
and secret documents available for viewing on its site
4. Liability :Traditional manufacturing makes it relatively easy to enforce safety laws
(Example ) A person uses 3D scanner to scan an existing object. Then, the person uses
design software to create their own plan for how to print the object. If the object is patented,
this would be a violation of the law
-Products are subjected to safety testing prior to being sold to the public and must conform to
legal safety guidelines.
Who is responsible for the injuries? You? The manufacturer of the printer? The owner of the
printer? The manufacturer of the raw materials used to make the helmet? The creator of the
flawed design plans? The person who decided to use an untested product ) your friend)?
5. Censorship
India: Ranked as first country whose government most often cuts off access to the Internet
for its citizens
China: has imposed censorship on Google search engines to prevent any Chinese person
from accessing websites and accounts against the Chinese government
5
6. Social Activism
Hacktivism : Using computers and computer networks in a subversive (troublemaking) way
to promote an agenda.
Nowadays, attacks are usually carried out by groups of hackers or computer scientists
Forms of Hacktivism:
1. Denial-of-service attack : Websites are bombarded with requests for information
until they are overwhelmed, and legitimate users can’t access the site
2. Cyberterrorism : embarrass or harass a company by penetrating its computer
networks and stealing (and often publishing) sensitive information.
6
Week 3
Software : A set of instructions that tells the computer what to do
How is software created?
1. Proprietary (or commercial) software: Created by companies for profit and then sold to
you
2. Open-source software: Available free of charge and with few licensing and copyright
restriction
Types of software:
- Application software - System software
Application software :The software you use to do tasks at home, school, and work
Software distribution :
1. Local installation:- Paying a one-time fee for either an electronic download or a disc
of the software, Software can be run anytime ( no internet connection required)
-After the fees are paid, the software will become available for download on the
computer
Examples: Adobe Creative Cloud, Microsoft Office 365
How do databases ensure that data is accurate? Data integrity ( accurate and reliable)
Database administrator: An IT professional who is responsible for designing, constructing,
and maintaining databases
7
Types of databases
2. Relational Databases: Operates by organizing data into various tables based on logical
groupings
Relationship: A link between tables that defines how the data is related
Relationships types:
- One to many relationship: A record appearing only once in one table while having
the capability of appearing many times in a related table
- One to one relationship: For each record in a table, there is only one corresponding
record in a related table
- Many to many relationship: Multiple records in one table being related to multiple
records in a second table and vice versa.
3. Object-oriented database : It handles unstructured data, such as audio clips, video clips,
pictures, and extremely large documents better
Database management system (DBMS): A software that allows a computer to perform
database functions
DBMS Operations:
1. Storing and defining data
2. Viewing, adding, deleting, and modifying data
3. Querying (extracting) data
4. Outputting data
Defining data
How are data organized in a relational database?
1. Fields : Displayed in columns
- Each field is identified by a field name
2. Records: A group of related fields (rows)
3. Tables: A group of related records
Storing data
Input forms: Used to control how new data is entered into a database
Structured Query Language (SQL)
8
To extract records from a database, you use a query language
examples of popular databases that use SQL:-
- Oracle, Microsoft SQL Server and MySQL
2. Making a plan
3. Coding
4. Debugging
9
Week 4
System software : Software that helps run the computer and coordinate instructions between
application software and the computer’s hardware devices
Types of system software:
- Operating system (Windows and macOS)
- Utility programs: Programs in the operating system that help manage system resources
3. Software Application Coordination: Every computer program needs to interact with the
CPU by using computer code
Network :Two or more computers that are connected by software and hardware to
communicate with each other
Advantages of networks
1) Sharing an Internet connection
2) Sharing printers and other peripherals
4) Sharing files
5) Online gaming and home entertainment
6) Common communications
Types of networks
- A personal area network (PAN) , Local area network (LAN) , Home area network (HAN),
Metropolitan area network (MAN ) , Wide area network (WAN)
10
Network Components
Transmission media: A radio waves or physical system (cable) allow the nodes to
communicate with each other
Wired transmission media:
- Unshielded twisted-pair (UTP) cable
- Coaxial cable
- Fiber-optic cable
Wireless (or Wi-Fi) networks: do not require physical cables and uses radio waves to
connect computing devices to other devices and to the Internet
Network navigation device: A device that moves data signals around the network
A router : transfers packets of data between two or more networks
Artificial Intelligence (AI): A computer science branch that focuses on creating computer
systems able to perform tasks that are usually associated with human intelligence
Intelligence: The ability to acquire and apply knowledge and skills
Natural language processing (NLP): An AI field that uses software to analyse, understand,
and generate human languages naturally
Perception: AI systems have senses just as humans do
Knowledge representation: AI systems need to build knowledge bases to solve problems
11
Week 5
What is Digital Literacy?
Digital Literacy : the ability to utilize information technology tools effectively to find,
evaluate, and communicate information
Internet and Computing Core Certification (IC3) : Digital Literacy program is simply the
best way to ensure that students and employees are prepared to succeed in a technology-based
world
Finding information: is one of the most important skills you need as student, researcher, or
employee
Web search engines and e-libraries : are tools for locating information on the Internet and
the World Wide Web
1) The Internet was developed by US Department of Defense (in the late 1950s)
2) The web was established by Tim Berners-Lee (in1991)
Accuracy: One of the ways to check the correctness is by comparing multiple resources
Authority: You can check the authority by asking questions such as, is the website official?
Is the author expert? Who can edit the content?
12
Week 7-9
Online content generation : Any information that is produced , saved , and
shared digitally is referred to as digital content
Blogging: It is a periodical journal or personal log that any user can create on the world
wide web.
- There are millions of blogs available within reach that are usually written by a single
author.
- The most recent entry in the blog is almost always shown at the very top of the page.
Benefits of Blogging:
- Accessible from anywhere with a browser.
- Can be integrated into mobile applications.
- No character limit restrictions
- Collaborative-friendly and can have multiple authors for each entry
- Posts or entries can be monetized to generate income
Drawbacks of blogging:
1. spam-blogs , a journal with stolen content or fake articles with the aim of increasing
viewers and search engine rankings.
2. It is harder to reach compared to regular social media platforms therefore, it’s hard to
Make profits
Types of blogs
1- Regular blogs / Weblogs : They are mainly textbased and include images, audio or
videos.
2- Vlogs/ Video logs: They mainly use videos as its primary content; however it can also
include images and text.
3- Microblogs : Blogging can take a smaller form, There are text restrictions and
character count limitations.
Audience restrictions (Public or Private)
4- Podcast : it contains visual information and prerecorded series of audio or video files
that are made available to users over the internet.
A user can be subscribed to any podcast for free or for a specific fee.
Question !
Podcasts are downloaded to a device using an
“Aggregator” that utilizes the Really Simple Syndication (RSS) format.
5- Webcast : Is usually a live broadcast of audio or video content over the internet.
Webcast features :-
- Online audiences can interact with each other
- Online audiences can interact with the host and their guest during the live broadcast.
- It can be archived so users can view it later.
Multimedia:-
- Multimedia is the use of various mediums of expression or communication at once.
- Media can be transformed from one form to the other
Multimedia features:-
- Allowing precise production
- easier production
- greater capabilities.
13
Digital Videos
A series of moving visual images, with or without audio, stored as digital data
containing a series of numbers representing both the color and brightness of millions of
points.
Internet (youtube) and television
Recording Digital Videos
- We can record digital videos by use of both computer applications and the necessary
hardware
Webcams (integrated into laptops) also work as inexpensive devices for creating digital
video.
webcam
14
External devices: view content from your device or stream content from the Internet
wirelessly.
Protecting your work
Advantages and drawbacks of licenses
Advantages :
- People wont constantly send you permission requests to use your work saving you time
- The license explains how your work can be used and the instructions are easy to follow
Disadvantages
1. Opponents complain that the licenses have affected their livelihoods. professional
photographers might have a tougher time selling their work because of the photos
with licenses that permit free commercial use
2. Making a mistake and selecting the wrong license for your work.If you later find out
that the work is valuable, and your previously selected license allows commercial use,
then you’re out of luck.
Attribution (by) Require that others who use your work in any way must
give you credit the way you request, but not in a way that suggests you
endorse them or their use.
ShareAlike (sa) You let others copy, distribute, display, perform, and
modify your work, as long as they distribute any modified work on the
same terms.
Noncommercial (nc) -You let others copy, distribute, display, perform, and
modify and use your work for any purpose other than commercially unless
they get your permission first.
NoDerivatives (nd) : You let others copy, distribute, display and perform
only original copies of your work. If they want
Web Development
- A document that will be presented on the web must be written using special symbols
called tags.
Tags control how a web browser will display the text, images, and other content tagged in
Hypertext Markup Language (HTML).
Adobe Dreamweaver presents web page designers with an interface that’s similar to a
word processing program.
Adobe Dreamweaver features
- Web designers can quickly insert text, images, and hyperlinks.
15
- the program automatically inserts the corresponding HTML tags.
No-Code Web development
Advantages and drawbacks of zero-code websites
Advantages Disadvantages
16
Week 10
Artificial Intelligence (AI)
AI in Retail:
Recommendation engines are AI systems that process enormous amounts of data in order to
assist people in finding things they may enjoy but are unlikely to find on their own.
- The recommendation lists is used by customers for about 35% of Amazon's sales.
Data Mining helps retail businesses gather data from register terminals to determine which
products are selling on a given day and location.
This helps managers figure out when to replace stock or to adjust prices for products to sell
well.
AI in Banking
-Banks and credit card processors employ AI systems to examine vast amounts of transaction
data to detect fraud.
-Banks employ software to analyze consumer purchasing habits, credit scores, and
debt repayment to determine the risk of granting loans to them
-Using AI assessed credit risk might help an institution cut loan losses by 25%,
according to MIT researchers.
AI in Transportation
Just 5% of a car's life is spent in motion
Self-driving automobiles and truck would improve vehicle utilization and boost safety
AI in Robotics
In industrial environments, several robots are used for risky or repetitive work.
Designs that imitate how people move and hold objects have been created, resulting in robots
known as embodied agents that behave and appear like people
AI in Education
Intelligent personal assistants promotes learning in education, online language teachers
converse with pupils, correcting their grammar and suggesting alternative words to broaden
their vocabulary.(Plagiarism detection tools like Turnitin to detect matches in texts)
AI in Medicine: AI software is now being used to search through data on millions of patient
visits and treatments provided by thousands of physicians for doctors to quickly diagnose
patients
prosthetic devices :To aid in the fitting of prosthetics, sensors and AI are being utilized to
determine how soft or stiff the patient's residual tissue is
AI in Law Enforcement: proprietary police enforcement databases can be examined for
commonalities between crimes using Al-powered software. In order to combat contemporary
crime
AI in Psychology: AI systems helps sufferers of mental disorders such as autism how?
improve their interpersonal skills such as eye contact and social cue recognition.
The MACH (My Automated Conversion coach) is a computer program that creates a
virtual person for use in situations such as job interviews, it reacts to the user's movement and
speech
Affective computing is the process of creating computers that can mimic and recognize
human emotions.
Productivity Tools
Word processing
Microsoft Word is the most popular word processing program.
Microsoft word features :
Spelling and grammar checking
Thesaurus
17
language translator
Spreadsheets
Each cell can contain :
-Text
-Values and dates
-Formulas
-Functions
Presentation
Microsoft Powerpoint It's a software that can help speakers create high-quality
presentational slideshows
Presentation software can allow :
-Adding embedded videos
-Applying visual effects
-Setting up Transitions
-Adding Voice and Video
Database Software
Fields: The smallest unit storing a single piece of
Information
Records: An instance of related fields
Tables: A group of related records
Forms: A user interface that can store or display data
Reports: A document summarizing data stored within a database
Note-Taking SoftwareThis is a software that is primarily used for taking notes and
organizational purposes.
You can use this software to do a range of tasks that include:
-Research
Brainstorming
Collaboration
Organizing information
One-Note by Microsoft is a popular example
Personal Information Manager Software
Personal Information Managers (PIM) help manage e-mail, contacts, calendars, and tasks
in one place
Outlook by Microsoft is one of the most popular PIM programs used today
Productivity Software Features
Most productivity software contain tools allowing its users to use it more efficiently such as :
Wizards: Walks the user through steps necessary to complete a task. Within every step a user
is asked questions, and based on their answers a portion of the task is completed.
templates: it is a predesigned form that provides the basic structure for a particular kind of
document
Macros: a small program that groups a series of commands so that they will run in one go.
They are used to automate a routine task to save time and increase efficiency.
Personal Financial Software
Financial Planning Software (FPS) helps you manage your daily finances at home or within
your business. It helps push down the costs
Tax Preparation Software
Tax preparation software (TPS) helps you prepare your taxes on your own which drives down
the costs associated with hiring a taxation accountant
18
Enhancing Productivity in Businesses
Accounting software: helps small business owners manage their finances more efficiently
Desktop publishing software (DTP): Helps professionals design books and other
publications that require complex layouts.
Web authoring software: Allows even novices to design interactive webpage without direct
programing knowledge.
Project management : creates scheduling charts to plan and track specific tasks and to
coordinate resourses
Customer relationship management : stores sales and client contact information in one
central database
Enterprise resource planning : controls many operations and processing functions such as
biling , production, inventory management
E-commerce : facilitates website creation , shopping cart setup, and credit card processing
services
Computer - Aided Design : creates automated designs, technical drawings and 3D model
visualizations
vertical market : Addresses the needs of businesses in a specific industry or market such as
the real estate, banking and automotive industries
19
Week 11
What is social media? Websites or apps that allow users to create and share content to
participate in social networking with others.
Social Networking –More to it : LinkedIn
Why linkedIn? Finding business opportunities , Finding jobs, Extending one’s professional
network
Why linkedIn for business owner ?
- Seeking Clients for your business.
- Finding emplyees for your business
- Businesses use them for marketing and communicating directly with their customers.
20
- A communication theorist called Marshall McLuhan, in 1962, coined the term “global
village”
Online Interaction
Examples:-
Social Networking web 2.0 technology
- lets you build an online networks of friends
- lets you share media content
Project collaboration and file sharing
- Web-based document products such as Google Docs
- Screen sharing
- Project management
Blogs:
-Written by a single author
-May include images, audio, and video
Podcast :Audio/video files delivered via RSS
-Can download and view content on portable media player
-Platforms to host and share images, videos, and music
: االيميلE-mail
-Most common form of online communication
-Asynchronous (not having to be done at the same time)
-Real-time communication
-Requires Internet connection
-Used with individuals or groups
Texting:
-Needs cellular network
-Uses Short Messaging
-Service (SMS) for text messages
Netiquette or Internet etiquette : is a set of guidelines for appropriate behaviour on
the Internet, including e-mail.
-Written communication is expected to be correct in terms of spelling, punctuation, and
grammar.
-Using all caps is considered rude. It is like shouting at the recipient. Use Standard
Capitalization.
Where are you I did not see you Emoticons/Emojis help to convey the fellings
E-mail Etiquette
1. Use CC and BCC sparingly
2. Include a useful subject line
3. Use spell checker
21
4. Avoid abbreviations like LOL and btw
Threats: Social Engineering
What? It is any technique that uses social skills to generate human interaction that entices
individuals
to reveal sensitive information
Social Engineering: How does it work?
Pretexting : Involves creating a scenario that sounds legitimate enough that someone will
trust you.
Phishing: lures Internet users to reveal personal information such as credit card numbers, or
passwords that could lead to identity theft.
Pharming occurs when malicious code is planted on your computer, either by viruses or by
you visiting malicious websites
Avoid Phishing and Pharming Scams
- Never reply to any e-mail asking you for personal information.
- Don’t click on a link in an e-mail to go to a website. Instead, type the website address
in the
browser.
- Never give personal information over the Internet unless you know the site is secure
Use, and constantly update, an Internet security
software.
22
Week 12
Automation : What ؟It is the application of machines to tasks once performed manually
by human.
Main Purposes (with Examples):
1- Processing
Applying equations on input data of a spreadsheet
Welding by robotic arms in factories
2- transfer and processing
Transferring content to an output device, such as a printer
Automation Impacts :
Generally: Replacement of human workers
In manufacturing
- limiting the occupational hazards
- Allows for fast, accurate, measurable, and highly controllable operations
In Paper-Replacement
- Transparency
- save the employees time for value tasks
In resources consumption mechanisms
-
Promotes energy conservation and utilizes resources effectively
Automation History
Stone tools: Magnify human strength (Human Intervention required)
Automation Requirements
1- Power source
- Electricity (usually)
23
2- Feedback control:
-The system has a pre-defined goal and can measure its current progress to either
stabilize or modify state to reach
-Example: Car Cruise system
3- Machine Programming
- Commands stored on the ROM of the controller, executed by system
Automation Examples
- Kuwait ID app & Sahel
- robotic arm
- Government transactions made easy
E-commerce types:
1- Business-to-Consumer )B2C )
The business can be completely online. (e.g. Tatayab) or have stores both physical and online
(e.g. X-cite Alghanim).
2- Business-to-Business (B2B)
Both sides of the transaction are business entities or companies (MABROOK co Hotels
Supplies)
3- Consumer-to-Consumer(C2C)
Consumers sell to each other through sites ( OpenSooq)
E-commerce Business Models & Trends
Social commerce: uses social networks to assist with ratings and reviews in marketing and
purchasing (e.g yelp)
2- Group Buying
- Services providing deal-of-the-day, discounted
deals (Sheeel)
- instead of direct profit Businesses gain marketing
3- Individual Customization
Consumers buy items like t-shirts with customized graphics (Zazzle)
M-commerce (Mobile Commerce)
(What?) Conducting commercial transactions through a smartphone, tablet, or other mobile
device.
Digital Payment systems like MyFatoorah, Apple Pay
Place food orders for in-store pick-up or delivery like KFC Kuwait
- Bank and Investment applications
Online Shopping Safeguards
-Don't shop on public Wi-Fi networks, as they may contain spyware.
24
-Use a credit card, not a debit card, to protect transactions, or use a third-party payer such as
PayPal or Apple Pay.
-Create a strong password for all online accounts
Educational Online Platforms
Learning Destination Sites (LDS): Access a variety of courses and learning materials online
in an organized fashion.
Learning Management Systems (Course Management Systems): Portals for educators to
manage the material, communication, and resources for their students
Learning Management Ecosystems: Combining LDS and LMS to offer a customized
solution for exclusively members of an enterprise or a major institution.
Examples of Educational Software
test preparation: Designed to improve your performance on standardized test
simulation: Allows you to experience a real situation through a virtual environment.
Instructional: Designed to teach you almost anything from playing a musical instrument to
leaming a language or cooking
Health and fitness: Helps monitor physical activity, diet, and general health status.
Home design/improvement: Provides 2D or 3D templates and images to let you better
visualize indoor and outdoor remodelling projects and landscaping ideas.
Brain training: Features games and activities to exercise your brain to improve your
memory, processing speed, attention, and multitasking capabilities.
Course management: Web-based software system that creates a virtual learning experience,
including course materials, tests.
genalogy: Helps chart the relationships between family members through multiple
generations
Tools For Distance-based Education
Videos: Whether via the learning management system or any video streaming or video-
sharing platform
One-to-one learning: online platforms for instructors to offer one-on-one sessions or series
of classes to learners.
Group learning: virtual classrooms, possibly aided with pre-recorded videos and reading
materials.
25
Week 13
Some key areas of IT innovation:
- Artificial Intelligence (AI): AI involves creating algorithms and systems that can
perform tasks that typically require human intelligence
- Internet of Things (IoT): IoT connects devices to the internet, allowing them to collect
and exchange data.
examples of IoT innovations: Smart homes, industrial automation, and wearable devices
5G Technology: The fifth generation of mobile networks offers faster data speeds and
reduced latency.
Cybersecurity Innovations: Develop technologies to protect digital systems from cyber
threats and include advanced threat detection, secure authentication methods, and encryption
technologies.
IT-based business ideas:
1- Web Development
- Offer custom website development services for individuals and businesses.
- Specialize in e-commerce website development.
- Create and sell website templates.
2- Mobile App Development
- Develop mobile apps for iOS and Android platforms.
- Offer app maintenance and support services.
3- E-learning Platform
- Develop an online learning platform.
- Offer a platform for others to sell their courses.
4- Artificial Intelligence (AI) Solutions
- Develop AI-powered applications for businesses
- Provide solutions for automating processes and improving efficiency.
6- Game Development
- Create and sell mobile or computer games.
- Provide game development services to other companies
IT-based entrepreneurship
General areas of IT-based entrepreneurship:
o Software Development Services.
o Digital Marketing Agency
o Cybersecurity Consulting Firm
26
What is digitization?
Digitization: the diffusion of information and communication technologies that can bring
about both positive and negative effects.
Smart Homes: devices and appliances are automated or controlled by apps installed on your
smartphone or tablet thanks to the power and availability of strong wireless.
networks and Bluetooth.
Smart cities: It is an innovative city that uses information and communication technologies
and other means to improve quality of life concerning economic, social, and environmental
aspects.
Solutions that make a city "smart”.
Internet of Things (IoT): It involves analyzing and sharing data using dedicated sensors,
gateways, and cloud technologies.
such as:
- Smart Traffic Management: IoT sensors in traffic lights and on roads to optimize
traffic flow
- Smart Waste Management: Bins equipped with sensors to optimize waste collection
schedules
- Environmental Monitoring: Sensors to measure air and water quality in real-time
- Renewable Energy: Developing green energy allows cities to use less resources and
reduce their carbon footprint
- Smart Transportations: Vehicles are connected to traffic monitoring systems in smart
cities to build optimal routes.
- Enhanced Connectivity: A smart city's elements generate vast data that must be stored,
processed, and analysed in real-time
How Can Society Benefit from Smart Cities?
o Improve air quality, Ease traffic and congestion
o Improve civil services efficiency
o Improve healthcare
o Provide more economic opportunities
27