SlideShare a Scribd company logo
1 of 2
Describe the principal technologies that have shaped contemporary telecommunications systems.
Compare Web 2.0 and Web 3.0. It has been said that within the next few years, smartphones will
become the single most important digital device we own. Discuss the implications of this
statement.
Solution
Describe the principal technologies that have shaped contemporary telecommunications
systems.
Current networks have been influenced by the ascent of client-server computing, the use of
packet switching, and the adoption of Transmission Control Protocol-Internet Protocol as a
universal communications standard for linking disparate networks and computers, including the
Internet. Protocol provides a mutual set of guidelines that enable communication among
numerous components in a telecommunications network.
Compare Web 2.0 and Web 3.0. It has been said that within the next few years,
smartphones will become the single most important digital device we own. Discuss the
implications of this statement
Web2.0 refers to second-generation interactive Internet based services that enable people to
collaborate, share information, and create new services online. Web2.0 is distinguished by
technologies and services like cloud computing, software mashups and widgets, blogs, RSS, and
wikis. These software applications run on the Web itself instead of the desktop and bring the
vision of Web-based computing closer to realization. Web2.0 tools and services have fueled the
creation of social networks and other online communities where people can interact with one
another in the manner of their choosing.
Web3.0 focuses on developing techniques to make searching Web pages more productive and
meaningful for ordinary people. Web3.0 is the promise of a future Web where all digital
information and all contacts can be woven together into a single meaningful experience.
Sometimes referred to as the semantic Web, Web3.0 intends to add a layer of meaning a top the
existing Web to reduce the amount of human involvement in searching for and processing Web
information. It also focuses on ways to make the Web more
Describe the principal technologies that have shaped contemporary tele.docx

More Related Content

Similar to Describe the principal technologies that have shaped contemporary tele.docx

Web 2.0 for telcos
Web 2.0 for telcosWeb 2.0 for telcos
Web 2.0 for telcosPavan K
 
8 Main features that define Web 3.0 - Web Synergies
8 Main features that define Web 3.0 - Web Synergies8 Main features that define Web 3.0 - Web Synergies
8 Main features that define Web 3.0 - Web SynergiesTharun Bangari
 
Empowerment Technology Lesson 1 - ICT in its current state
Empowerment Technology Lesson 1 - ICT in its current stateEmpowerment Technology Lesson 1 - ICT in its current state
Empowerment Technology Lesson 1 - ICT in its current stateNereJaneDMarfil
 
A Comprehensive Guide to Web 3.0 Development Companies.
A Comprehensive Guide to Web 3.0 Development Companies.A Comprehensive Guide to Web 3.0 Development Companies.
A Comprehensive Guide to Web 3.0 Development Companies.Techugo
 
Report file on Web technology(html5 and css3)
Report file on Web technology(html5 and css3)Report file on Web technology(html5 and css3)
Report file on Web technology(html5 and css3)PCG Solution
 
Information Technology for Facilities Management
Information Technology for Facilities ManagementInformation Technology for Facilities Management
Information Technology for Facilities ManagementOmer Dawelbeit
 
Presentation
PresentationPresentation
PresentationKenJYXin
 
Presentation Ken And Mat
Presentation Ken And MatPresentation Ken And Mat
Presentation Ken And MatMathew Cooper
 
web 3.0 (2).pptx
web 3.0 (2).pptxweb 3.0 (2).pptx
web 3.0 (2).pptxarchathidi
 
Web 3.0 Development Trends Decentralization Innovations on the Horizon.pdf
Web 3.0 Development Trends Decentralization Innovations on the Horizon.pdfWeb 3.0 Development Trends Decentralization Innovations on the Horizon.pdf
Web 3.0 Development Trends Decentralization Innovations on the Horizon.pdfProlitus Technologies
 
Generations of web 1.0, 2.0 and 3.0
Generations of web 1.0, 2.0 and 3.0Generations of web 1.0, 2.0 and 3.0
Generations of web 1.0, 2.0 and 3.0ShamsReza2
 
The Development Of Web 3
The Development Of Web 3The Development Of Web 3
The Development Of Web 3Marnusharris
 
Leveraging The Web 2.0 Movement, Dion Hinchliffe
Leveraging The Web 2.0 Movement, Dion HinchliffeLeveraging The Web 2.0 Movement, Dion Hinchliffe
Leveraging The Web 2.0 Movement, Dion HinchliffeGiuliano Prati
 
Cavalcare l'onda del Web 2.0 - Dion Hinchcliffe
Cavalcare l'onda del Web 2.0 - Dion HinchcliffeCavalcare l'onda del Web 2.0 - Dion Hinchcliffe
Cavalcare l'onda del Web 2.0 - Dion HinchcliffeTommaso Sorchiotti
 
Modern computer network technology
Modern computer network technologyModern computer network technology
Modern computer network technologyMH Shihab
 

Similar to Describe the principal technologies that have shaped contemporary tele.docx (20)

Web 3.0
Web 3.0Web 3.0
Web 3.0
 
Web 2.0 for telcos
Web 2.0 for telcosWeb 2.0 for telcos
Web 2.0 for telcos
 
8 Main features that define Web 3.0 - Web Synergies
8 Main features that define Web 3.0 - Web Synergies8 Main features that define Web 3.0 - Web Synergies
8 Main features that define Web 3.0 - Web Synergies
 
Empowerment Technology Lesson 1 - ICT in its current state
Empowerment Technology Lesson 1 - ICT in its current stateEmpowerment Technology Lesson 1 - ICT in its current state
Empowerment Technology Lesson 1 - ICT in its current state
 
A Comprehensive Guide to Web 3.0 Development Companies.
A Comprehensive Guide to Web 3.0 Development Companies.A Comprehensive Guide to Web 3.0 Development Companies.
A Comprehensive Guide to Web 3.0 Development Companies.
 
Report file on Web technology(html5 and css3)
Report file on Web technology(html5 and css3)Report file on Web technology(html5 and css3)
Report file on Web technology(html5 and css3)
 
Ppt template (1)
Ppt template (1)Ppt template (1)
Ppt template (1)
 
Information Technology for Facilities Management
Information Technology for Facilities ManagementInformation Technology for Facilities Management
Information Technology for Facilities Management
 
Presentation
PresentationPresentation
Presentation
 
Presentation Ken And Mat
Presentation Ken And MatPresentation Ken And Mat
Presentation Ken And Mat
 
web 3.0 (2).pptx
web 3.0 (2).pptxweb 3.0 (2).pptx
web 3.0 (2).pptx
 
Web 3.0.pptx
Web 3.0.pptxWeb 3.0.pptx
Web 3.0.pptx
 
Web 3.0 Development Trends Decentralization Innovations on the Horizon.pdf
Web 3.0 Development Trends Decentralization Innovations on the Horizon.pdfWeb 3.0 Development Trends Decentralization Innovations on the Horizon.pdf
Web 3.0 Development Trends Decentralization Innovations on the Horizon.pdf
 
Web02
Web02Web02
Web02
 
Web 2 0
Web 2 0Web 2 0
Web 2 0
 
Generations of web 1.0, 2.0 and 3.0
Generations of web 1.0, 2.0 and 3.0Generations of web 1.0, 2.0 and 3.0
Generations of web 1.0, 2.0 and 3.0
 
The Development Of Web 3
The Development Of Web 3The Development Of Web 3
The Development Of Web 3
 
Leveraging The Web 2.0 Movement, Dion Hinchliffe
Leveraging The Web 2.0 Movement, Dion HinchliffeLeveraging The Web 2.0 Movement, Dion Hinchliffe
Leveraging The Web 2.0 Movement, Dion Hinchliffe
 
Cavalcare l'onda del Web 2.0 - Dion Hinchcliffe
Cavalcare l'onda del Web 2.0 - Dion HinchcliffeCavalcare l'onda del Web 2.0 - Dion Hinchcliffe
Cavalcare l'onda del Web 2.0 - Dion Hinchcliffe
 
Modern computer network technology
Modern computer network technologyModern computer network technology
Modern computer network technology
 

More from earleanp

Create your own variant of both a hiring and a termination policy rela.docx
Create your own variant of both a hiring and a termination policy rela.docxCreate your own variant of both a hiring and a termination policy rela.docx
Create your own variant of both a hiring and a termination policy rela.docxearleanp
 
Determine the valuation of long-term liabilities- Donald Lennon is the.docx
Determine the valuation of long-term liabilities- Donald Lennon is the.docxDetermine the valuation of long-term liabilities- Donald Lennon is the.docx
Determine the valuation of long-term liabilities- Donald Lennon is the.docxearleanp
 
Describe three of the following attack types in the Operation Security.docx
Describe three of the following attack types in the Operation Security.docxDescribe three of the following attack types in the Operation Security.docx
Describe three of the following attack types in the Operation Security.docxearleanp
 
Describes the concept of ADTS and illustrates the concept with three o.docx
Describes the concept of ADTS and illustrates the concept with three o.docxDescribes the concept of ADTS and illustrates the concept with three o.docx
Describes the concept of ADTS and illustrates the concept with three o.docxearleanp
 
Describe- manage- and install Active Directory replication- federation.docx
Describe- manage- and install Active Directory replication- federation.docxDescribe- manage- and install Active Directory replication- federation.docx
Describe- manage- and install Active Directory replication- federation.docxearleanp
 
Describe the process to start and restart apache on CENTOS command lin.docx
Describe the process to start and restart apache on CENTOS command lin.docxDescribe the process to start and restart apache on CENTOS command lin.docx
Describe the process to start and restart apache on CENTOS command lin.docxearleanp
 
Describe- in your own words- the mechanism for establishing a HTTPS co.docx
Describe- in your own words- the mechanism for establishing a HTTPS co.docxDescribe- in your own words- the mechanism for establishing a HTTPS co.docx
Describe- in your own words- the mechanism for establishing a HTTPS co.docxearleanp
 
Describe the process of creating and exporting a schedule report for t.docx
Describe the process of creating and exporting a schedule report for t.docxDescribe the process of creating and exporting a schedule report for t.docx
Describe the process of creating and exporting a schedule report for t.docxearleanp
 
Describe the typical duties of a security manager that are strictly ma.docx
Describe the typical duties of a security manager that are strictly ma.docxDescribe the typical duties of a security manager that are strictly ma.docx
Describe the typical duties of a security manager that are strictly ma.docxearleanp
 
Describe the four categories of international airports in the federal.docx
Describe the four categories of international airports in the federal.docxDescribe the four categories of international airports in the federal.docx
Describe the four categories of international airports in the federal.docxearleanp
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxearleanp
 
Describe the different metrics that BGP can use in building a routing.docx
Describe the different metrics that BGP can use in building a routing.docxDescribe the different metrics that BGP can use in building a routing.docx
Describe the different metrics that BGP can use in building a routing.docxearleanp
 
Describe the ethnic city and the benefit of ethnic communiti- (-I need.docx
Describe the ethnic city and the benefit of ethnic communiti- (-I need.docxDescribe the ethnic city and the benefit of ethnic communiti- (-I need.docx
Describe the ethnic city and the benefit of ethnic communiti- (-I need.docxearleanp
 
Describe the different types of qualitative analysis and indicate whic.docx
Describe the different types of qualitative analysis and indicate whic.docxDescribe the different types of qualitative analysis and indicate whic.docx
Describe the different types of qualitative analysis and indicate whic.docxearleanp
 
Describe neo-evolution- What is it and what are its primary tenets- Pr.docx
Describe neo-evolution- What is it and what are its primary tenets- Pr.docxDescribe neo-evolution- What is it and what are its primary tenets- Pr.docx
Describe neo-evolution- What is it and what are its primary tenets- Pr.docxearleanp
 
Describe ip protocol security pros and cons-SolutionIP Protocol Securi.docx
Describe ip protocol security pros and cons-SolutionIP Protocol Securi.docxDescribe ip protocol security pros and cons-SolutionIP Protocol Securi.docx
Describe ip protocol security pros and cons-SolutionIP Protocol Securi.docxearleanp
 
Describe core competencies and their relationship to operations manage.docx
Describe core competencies and their relationship to operations manage.docxDescribe core competencies and their relationship to operations manage.docx
Describe core competencies and their relationship to operations manage.docxearleanp
 
Describe in detail a man-in-the-middle attack on the Diffie-Hellman ke.docx
Describe in detail a man-in-the-middle attack on the Diffie-Hellman ke.docxDescribe in detail a man-in-the-middle attack on the Diffie-Hellman ke.docx
Describe in detail a man-in-the-middle attack on the Diffie-Hellman ke.docxearleanp
 
Describe events that led to the signing of the Homeland Security Act 2.docx
Describe events that led to the signing of the Homeland Security Act 2.docxDescribe events that led to the signing of the Homeland Security Act 2.docx
Describe events that led to the signing of the Homeland Security Act 2.docxearleanp
 
Describe an experiment that disproved the theory of classical mechanic.docx
Describe an experiment that disproved the theory of classical mechanic.docxDescribe an experiment that disproved the theory of classical mechanic.docx
Describe an experiment that disproved the theory of classical mechanic.docxearleanp
 

More from earleanp (20)

Create your own variant of both a hiring and a termination policy rela.docx
Create your own variant of both a hiring and a termination policy rela.docxCreate your own variant of both a hiring and a termination policy rela.docx
Create your own variant of both a hiring and a termination policy rela.docx
 
Determine the valuation of long-term liabilities- Donald Lennon is the.docx
Determine the valuation of long-term liabilities- Donald Lennon is the.docxDetermine the valuation of long-term liabilities- Donald Lennon is the.docx
Determine the valuation of long-term liabilities- Donald Lennon is the.docx
 
Describe three of the following attack types in the Operation Security.docx
Describe three of the following attack types in the Operation Security.docxDescribe three of the following attack types in the Operation Security.docx
Describe three of the following attack types in the Operation Security.docx
 
Describes the concept of ADTS and illustrates the concept with three o.docx
Describes the concept of ADTS and illustrates the concept with three o.docxDescribes the concept of ADTS and illustrates the concept with three o.docx
Describes the concept of ADTS and illustrates the concept with three o.docx
 
Describe- manage- and install Active Directory replication- federation.docx
Describe- manage- and install Active Directory replication- federation.docxDescribe- manage- and install Active Directory replication- federation.docx
Describe- manage- and install Active Directory replication- federation.docx
 
Describe the process to start and restart apache on CENTOS command lin.docx
Describe the process to start and restart apache on CENTOS command lin.docxDescribe the process to start and restart apache on CENTOS command lin.docx
Describe the process to start and restart apache on CENTOS command lin.docx
 
Describe- in your own words- the mechanism for establishing a HTTPS co.docx
Describe- in your own words- the mechanism for establishing a HTTPS co.docxDescribe- in your own words- the mechanism for establishing a HTTPS co.docx
Describe- in your own words- the mechanism for establishing a HTTPS co.docx
 
Describe the process of creating and exporting a schedule report for t.docx
Describe the process of creating and exporting a schedule report for t.docxDescribe the process of creating and exporting a schedule report for t.docx
Describe the process of creating and exporting a schedule report for t.docx
 
Describe the typical duties of a security manager that are strictly ma.docx
Describe the typical duties of a security manager that are strictly ma.docxDescribe the typical duties of a security manager that are strictly ma.docx
Describe the typical duties of a security manager that are strictly ma.docx
 
Describe the four categories of international airports in the federal.docx
Describe the four categories of international airports in the federal.docxDescribe the four categories of international airports in the federal.docx
Describe the four categories of international airports in the federal.docx
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docx
 
Describe the different metrics that BGP can use in building a routing.docx
Describe the different metrics that BGP can use in building a routing.docxDescribe the different metrics that BGP can use in building a routing.docx
Describe the different metrics that BGP can use in building a routing.docx
 
Describe the ethnic city and the benefit of ethnic communiti- (-I need.docx
Describe the ethnic city and the benefit of ethnic communiti- (-I need.docxDescribe the ethnic city and the benefit of ethnic communiti- (-I need.docx
Describe the ethnic city and the benefit of ethnic communiti- (-I need.docx
 
Describe the different types of qualitative analysis and indicate whic.docx
Describe the different types of qualitative analysis and indicate whic.docxDescribe the different types of qualitative analysis and indicate whic.docx
Describe the different types of qualitative analysis and indicate whic.docx
 
Describe neo-evolution- What is it and what are its primary tenets- Pr.docx
Describe neo-evolution- What is it and what are its primary tenets- Pr.docxDescribe neo-evolution- What is it and what are its primary tenets- Pr.docx
Describe neo-evolution- What is it and what are its primary tenets- Pr.docx
 
Describe ip protocol security pros and cons-SolutionIP Protocol Securi.docx
Describe ip protocol security pros and cons-SolutionIP Protocol Securi.docxDescribe ip protocol security pros and cons-SolutionIP Protocol Securi.docx
Describe ip protocol security pros and cons-SolutionIP Protocol Securi.docx
 
Describe core competencies and their relationship to operations manage.docx
Describe core competencies and their relationship to operations manage.docxDescribe core competencies and their relationship to operations manage.docx
Describe core competencies and their relationship to operations manage.docx
 
Describe in detail a man-in-the-middle attack on the Diffie-Hellman ke.docx
Describe in detail a man-in-the-middle attack on the Diffie-Hellman ke.docxDescribe in detail a man-in-the-middle attack on the Diffie-Hellman ke.docx
Describe in detail a man-in-the-middle attack on the Diffie-Hellman ke.docx
 
Describe events that led to the signing of the Homeland Security Act 2.docx
Describe events that led to the signing of the Homeland Security Act 2.docxDescribe events that led to the signing of the Homeland Security Act 2.docx
Describe events that led to the signing of the Homeland Security Act 2.docx
 
Describe an experiment that disproved the theory of classical mechanic.docx
Describe an experiment that disproved the theory of classical mechanic.docxDescribe an experiment that disproved the theory of classical mechanic.docx
Describe an experiment that disproved the theory of classical mechanic.docx
 

Recently uploaded

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 

Recently uploaded (20)

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 

Describe the principal technologies that have shaped contemporary tele.docx

  • 1. Describe the principal technologies that have shaped contemporary telecommunications systems. Compare Web 2.0 and Web 3.0. It has been said that within the next few years, smartphones will become the single most important digital device we own. Discuss the implications of this statement. Solution Describe the principal technologies that have shaped contemporary telecommunications systems. Current networks have been influenced by the ascent of client-server computing, the use of packet switching, and the adoption of Transmission Control Protocol-Internet Protocol as a universal communications standard for linking disparate networks and computers, including the Internet. Protocol provides a mutual set of guidelines that enable communication among numerous components in a telecommunications network. Compare Web 2.0 and Web 3.0. It has been said that within the next few years, smartphones will become the single most important digital device we own. Discuss the implications of this statement Web2.0 refers to second-generation interactive Internet based services that enable people to collaborate, share information, and create new services online. Web2.0 is distinguished by technologies and services like cloud computing, software mashups and widgets, blogs, RSS, and wikis. These software applications run on the Web itself instead of the desktop and bring the vision of Web-based computing closer to realization. Web2.0 tools and services have fueled the creation of social networks and other online communities where people can interact with one another in the manner of their choosing. Web3.0 focuses on developing techniques to make searching Web pages more productive and meaningful for ordinary people. Web3.0 is the promise of a future Web where all digital information and all contacts can be woven together into a single meaningful experience. Sometimes referred to as the semantic Web, Web3.0 intends to add a layer of meaning a top the existing Web to reduce the amount of human involvement in searching for and processing Web information. It also focuses on ways to make the Web more