Empowerment Technology 12 - Introduction to ICT - PDF

Summary

This document is an introduction to Information and Communication Technology (ICT). It covers various aspects of ICT, including its components, uses in different sectors like education and business, online safety, and emerging technologies. The document also discusses relevant topics such as cyberbullying, sexting, and internet risks to help students understand the digital world and its implications.

Full Transcript

EMPOWERMENT TECHNOLOGY 12 Chapter 1 Introduction to ict (INFORMATION AND COMMUNICATION TECHNOLOGY) I can… compare and contrast the nuances of varied online platforms, sites, and content to best achieve specific class objectives or address situational challenges; apply online safety, securi...

EMPOWERMENT TECHNOLOGY 12 Chapter 1 Introduction to ict (INFORMATION AND COMMUNICATION TECHNOLOGY) I can… compare and contrast the nuances of varied online platforms, sites, and content to best achieve specific class objectives or address situational challenges; apply online safety, security, ethics, and etiquette standards and practice in the use of ICT’s as it would relate to their specific professional tracks; and use the Internet as a tool for credible research and information gathering to best achieve specific class objectives or address situational Are You a Digital native? LET’S TEST! 1. How many times have you checked your phone this morning? 2. How many status updates have you posted in Facebook or Twitter today? 3. Did you use the Internet for an hour after you woke up this morning? 4. Do you follow a celebrity via his/her social media account? What is ICT? The term information and communication technology (ICT) collectively refers to the technologies, both hardware and software, that enables human to communicate with one another. What is ICT? It includes the use of computers, radio, television, cellular or mobile phones, network hardware and software, internet connections, satellite systems, and application needed for video conferencing and distance learning in the field of education. Uses of ICT education Business Government medicine Banking & finances entertainment transportation Ict in the Philippines 119 MILLION MOBILE PHONE SUBSCRIPTIONS 47 MILLION ACTIVE FACEBOOK ACCOUNTS 3.2 HOURS TIME SPENT ONLINE ON MOBILE 5.2 HOURS TIME SPENT ONLINE ON DESKTOP/ TABLET Ict in the Philippines The Philippines is the fastest growing app market in Southeast Asia and the highest digital population in the world. The top online activities are social media, videos, online mobile games, location-based search and online shopping. Staying connected with loved ones, friends, and relatives is a fundamental need for Filipinos. Ict in the Philippines Philippines is dub as the ‘’ICT Hub of Asia” because of huge growth of ICT- related jobs, one of which is BPO, Business Process Outsourcing, or call centers. EMERGING TECHNOLOGIES ARTIFICIAL INTELLIGENCE (AI) The branch of computer science focused with making computers work and act like humans. Robotics The field of computer science and engineering concerned with creating devices that can move and react to sensory input. Biometrics It is a technology used to measure and analyze human body characteristics such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns, etc. Quantum cryptography It is the science of encoding and decoding information or messages which depends on physics, not mathematics. It is used for information privacy and security. Computer assisted translation It is the use of computers to assist in the translations of one or more natural languages into another or others, and vice versa. 3d imaging and holography It is a photographic technique that uses light to project objects in a way that appears three dimensional. 3d imaging and holography Virtual Reality It is the term used to describe a three-dimensional computer- generated environment that can be explored and interacted by a person. Common online platforms Social media It is an application and website where users can communicate, create and share content, and participate in online communities. E-commerce It is a collection of software technologies that allows merchants to create a storefront on the internet. Online learning platform It is an incorporated set of interactive online services that provides the teachers, learners, parents and others involved in education sector with a wide range of tools and resources to support and enhance the delivery management of education through internet. Online video platform It is a service providing end-to- end tools used to create, customize, publish, and manage videos online. Online safety security ethics and netiquette Online safety It refers to the practices and precautions that should be observed when using the internet to ensure that the users as well as their computers and personal information are safe from crimes associated with using the internet. Internet safety It refers to the online security or safety of people and their information when using internet. Internet risk 1. Cyber Bullying It happens when someone intentionally abused, harassed, and mistreated by other person using electronic communication. 2. Sexting It is the act of sending sexually explicit text messages, images, and videos. 3. Cyber stalking It is a criminal practice where electronic communication is used to stalk or harass individual or group. 4. Identity theft It is a crime of stealing personal information for the purpose of assuming that person’s name or identity to make any form of transactions. Internet threats 1. MAlware Malicious software is any program or file that is harmful to a computer user. Types of Malware Worms Virus Trojan Virus It is a malicious program designed to replicate itself and transfer from one computer to another (internet, local networks, FDs, CDs, etc.) worms It refers to a malicious program that copy’s itself and spreads to other computers. Ex. I LOVE YOU virus Onel De Guzman 24 years old at that time Studied at AMA computer college in Manila Creator of “I LOVE YOU” virus/ worms trojan It is the malicious program accepted by the user as it disguises as a legitimate program but takes control of the user’s computer. spyware It is a malicious program that gathers information from the victim’s computer and sends it back to the hacker. adware It is an unwanted advertisement that will pop-up several times on victim’s computer then behave abnormally and tedious to close them. ransomware It is a ransom virus that blocks the user from accessing the programs or files and demands to pay the ransom through online method for the removal of the virus. 2. spam It is also known as junk email or unwanted email send by advertiser or bot. It canbe used to send malware. 3. phishing It is cyber attack method using deceptive emails and websites to acquiresensitive personal information. Cybercrime It is a crime in which computer is used as object and tool in committing a crime such hacking, phishing, spamming, child pornography, libel, hate crimes, identity thief, and others. Republic Act 10627 Anti-Bullying Act of 2013 Republic Act 10627, or the Anti-Bullying Act (the “Act”), aims to protect children enrolled in kindergarten, elementary, and secondary schools and learning centers (collectively, “Schools”) from being bullied. Republic Act 10175 or Cybercrime Prevention Act of 2012 This law protects the individuals from various unwanted online cyber acts that may harm or evade one’s privacy or integrity. TIPS ON HOW TO BE SAFE ONLINE ! netiquette Netiquette are the guidelines of acceptable behavior of the person while using the internet resources. Ten rules of netiquette 1. Remember the human. 2. Adhere to the same standards of behavior online that you follow in real life. 3. Know where you are in cyberspace. 4. Respect other people's time and bandwidth. 5. Make yourself look good online. Ten rules of netiquette 6. Share expert knowledge. 7. Help keep flame wars under control. 8. Respect other people's privacy. 9. Don't abuse your power. 10. Be forgiving of other people’s mistakes. Online search & Research skills Online search Online search is the process of interactively searching for and retrieving requested information via a computer from databases that are online. Interactive searches became possible in the 1980s with the advent of faster databases and smart terminals.

Use Quizgecko on...
Browser
Browser