Full Transcript

**What is ICT ?** - ICT stands for **Information** **and** **Communication Technology**. It refers to technologies that provide access to information through telecommunications. - This includes the internet, **wireless networks**, **cell phones**, and other communication mediums....

**What is ICT ?** - ICT stands for **Information** **and** **Communication Technology**. It refers to technologies that provide access to information through telecommunications. - This includes the internet, **wireless networks**, **cell phones**, and other communication mediums. - **Computer** programming is the software development , where professionals write , test and maintain code to create software applications and systems. - **Programmers** professionals who write and test code to enable applications and software programs to run successfully on a computer in order to create instructions for the machine to follow. **What do Computer Programmers do?** - **Writing and testing code for new programs**. Computer programmers work closely with web and software developers to write code for new mobile applications or computer programs. - **Updating existing programs**. Programmers also create and install updates for existing software programs. An update might include a bug fix, or enhanced functionality to improve the user experience. - **Identifying and correcting coding errors**. On a daily basis, computer programmers might assist in troubleshooting parts of a website or computer program that are not functioning correctly - **Rewriting programs for different operating systems**. Often, programmers have to rewrite code in different languages, so that programs and applications can be compatible with different operating systems. - **Secure programs against cybersecurity threats**. Many computer programmers work in the cybersecurity field, helping to identify malicious software and fix software that could be vulnerable to potential hacks. **What do Computer Programmers do?** - Writing and testing code for new programs. - Updating existing programs. - Identifying and correcting coding errors. - Rewriting programs for different operating systems. - Secure programs against cybersecurity threats. **PROGRAMMER / WEB DEVELOPER /GAME DEVELOPER** **Web developers** specialize in creating interactive web experiences, while **game developers** focus on designing and programming video games. - The salary range for computer programmers varies based on experience and location. Entry-level positions typically start at around PHP **2,500,000** to PHP **3,500,000** per year, mid-level positions range from PHP **3,500,000** to PHP **5,000,000**, while senior-level roles can exceed PHP **5,000,000** annually. **ANIMATOR /ILLUSTRATOR/ GRAPHIC DESIGNER** - **Visual arts** professionals are responsible for creating visually captivating content across various media platforms. **Animators** use techniques like **2D** or **3D animation**, motion graphics, and special effects to bring characters and environments to life in movies, TV shows, video games, and advertisements. - **Graphic designers** focus on visual communication, designing logos, branding materials, user interfaces, and marketing collateral to enhance brand identity and user experience. and marketing collateral to enhance brand identity and user experience - The salary range for an Animator/Illustrator/Graphic Designer in the Philippines typically spans from PHP **20,000** to PHP **60,000** per month, depending on experience and expertise. - Entry-level positions usually start around PHP **20,000** to PHP **30,000**, while experienced professionals can earn between PHP **40,000** to PHP **60,000** or more. Salaries may vary based on the employer, location, and specific industry demands. **COMPUTER SYSTEM SERVICING --COMPUTER/NETWORK TECHNICIAN** - **Computer System Servicing** The process of maintaining and supporting computer systems is referred to as computer systems servicing. It includes setting up, adjusting, debugging, and maintaining networks and computer systems. **COMPUTER SYSTEM SERVICING** **Installation** - Setting up computer hardware and software. - Installing operating systems and applications. - Configuring network settings and connections. **Maintenance** - Performing regular hardware and software updates. - Cleaning internal components to prevent dust buildup. Checking and ensuring proper ventilation and cooling **Troubleshooting** - Diagnosing and resolving hardware and software issues. - Identifying network connectivity problems. - Repairing or replacing faulty components. **Upgrading** - Adding new hardware components like RAM, hard drives, or graphics cards. - Updating software to the latest versions. - Enhancing system performance and compatibility. **Backup and Recovery**: - Creating backups of important data. - Implementing data recovery solutions. - Restoring systems to previous states in case of failure. **Security** - Installing and updating antivirus software. - Configuring firewalls and security settings. - Ensuring data protection and privacy. **Support**: - Providing technical support to users. - Offering guidance and training on system usage. - Assisting with software installations and configurations. **Documentation** - Maintaining records of system configurations. - Documenting troubleshooting steps and solutions. - Keeping track of maintenance schedules and upgrades. **COMPUTER SYSTEM SERVICING FUNCTIONS** - **Installation** - **Maintenance** - **Troubleshooting** - **Upgrading** - **Backup and Recovery** - **Security** - **Support** - **Documentation** **COMPUTER/NETWORK TECHNICIAN** - Computer/Network technician -is responsible for installing,maintaining, and troubleshooting computer systems, networks, and related equipment. - Computer/Network technician - examine, test, diagnose, and assess current network systems, including servers, cloud networks, wide area networks (WAN), local area networks (LAN), and other data communications networks **COMPUTER/NETWORK TECHNICIAN** **Hardware Installation and Configuration**: - Setting up and configuring computer hardware. - Installing peripherals such as printers, scanners, and other devices. - Assembling and disassembling computer systems. **Software Installation and Updates**: - Installing operating systems and application software. - Applying software updates and patches. - Configuring software settings for optimal performance. **Network Setup and Maintenance** - Configuring and managing network equipment such as routers, switches, and firewalls. - Setting up wired and wireless networks. - Monitoring network performance and troubleshooting connectivity issues. **System Maintenance and Repairs**: - Performing routine maintenance on computer systems and networks. - Diagnosing and fixing hardware and software issues. - Replacing faulty hardware components and upgrading systems. **Data Backup and Recovery**: - Implementing data backup solutions. - Recovering lost or corrupted data. - Ensuring data integrity and security during backup and recovery processes. **Security Management**: - Installing and configuring antivirus software and other security tools. - Monitoring systems for security breaches and vulnerabilities. - Implementing security policies and procedures. - Providing technical assistance to end-users. - Resolving technical issues through phone, email, or in-person support. - Offering training and guidance on software and hardware usage. - Maintaining records of system configurations, maintenance, and repairs. - Documenting technical issues and their resolutions. - Reporting on system performance and suggesting improvements. **Network Monitoring and Optimization**: - Monitoring network traffic and performance. - Identifying and resolving network bottlenecks. - Optimizing network configurations for better efficiency. **Collaboration and Communication**: - Working with other IT staff and departments to resolve technical issues. - Communicating technical information to non-technical users. - Collaborating on IT projects and system upgrades. **COMPUTER/NETWORK TECHNICIAN** - **Hardware Installation and Configuration**: - **Software Installation and Updates**: - **Network Setup and Maintenance**: - **System Maintenance and Repairs**: - **Data Backup and Recovery**: - **Security Management**: - **Technical Support**: - **Documentation and Reporting**: - **Network Monitoring and Optimization**: - **Collaboration and Communication**: - **Focus**: Primarily on maintaining, troubleshooting, and repairing computer hardware systems. - **Tasks**: It includes tasks like installing hardware components, updating firmware, and ensuring the proper functioning of computer systems. - **Specialization**: This is more specialized towards hardware and may involve working with different types of systems such as desktops, laptops, servers, and other hardware. - **Focus**: A broader role that may encompass both hardware and software issues. - **Tasks**: A computer technician may handle tasks like installing and maintaining software, troubleshooting operating systems, setting up networks, and providing technical support for both hardware and software issues. - **Specialization**: They may have a wide range of skills and can work on **both hardware repairs and software issues**, depending on their expertise. - ***[Telecommunication]*** Transfer data globally in the forms of text, voice, audio, or video are referred to as telecoms companies. - ***[Inbound Call Center Agents]*** handle incoming customer calls, providing assistance with inquiries, troubleshooting issues, processing orders, and offering product or service information. - *[**Outbound Call** **Center Agents** ]*make outgoing calls to potential or existing customers to promote products, conduct surveys, collect information, or follow up on previous interactions. - **Superapps, the ICT supertrend** Asia, particularly China, is the origin of this idea. These are applications that combine a lot of services so users can have access to a single application that does everything. The services include a dedicated messaging area and a bank transfer area. As they boost their competitiveness and foster customer loyalty, they are becoming more and more well-known among businesses. - **Explosion of the metaverse in the business world** With the creation of virtual spaces that can blur physical barriers, the virtual world hopes to realize its great potential and excel in important fields like the potential to change the way people live, work, and shop. - **Digital twins** Not only can this technology create sets of digital duplicates of spaces, elements, and systems to manage errors, save costs, and produce more accurate products. - **MedTech, the revolution in medicine** The convergence of IoT and MedTech represents a significant chance to leverage digital technologies like virtual care, RPA, AI, and others to overcome obstacles and settle disputes in the modern healthcare industry - **Artificial Intelligence and Cybersecurity** The primary goal of this technology is to increase data security on smart networks; therefore, businesses should prioritize optimizing smart device security capabilities. - **Blockchain, one of the most secure ICT trends** guarantees that the integrity of data is maintained while doing away with single control over information and party middlemen. To enable the automation of transactions and communications, the data are thus stored in a highly secure and encrypted manner, thereby providing an unquestionable boost to digital identity. **Issues in Information and Communications Technology (ICT)** - **Cybersecurity threats:** With the increasing reliance on digital systems and the internet, cybersecurity threats such as hacking, malware, phishing, and cyber attacks have become a significant concern for individuals, businesses, and governments. Protecting sensitive data and critical infrastructure from cyber threats is a top priority**.** - **Data privacy and regulation:** The collection, storage, and use of personal data by companies and organizations have raised concerns about data privacy. - **Artificial Intelligence (AI) and automation:** The rapid development of AI and automation technologies has raised concerns about job displacement, algorithmic bias, and ethical implications. - **Slow Internet Connections:** Causes like network congestion, distance from server, outdated hardware or software - **Viruses:** Different types like trojans, worms, ransomware that can corrupt data, steal info. How they spread through downloads, emails, networks. **Qualities of Successful Entrepreneurs in the Field of ICT** 1. ***Creativity:* Successful entrepreneurs are good at thinking of new and different ideas to solve problems and make their business stand out.** 2. ***Professionalism:* Entrepreneurs act in a mature and responsible way, like following rules, being honest, and treating others with respect.** 3. ***Risk-taking:* Being an entrepreneur means being brave and willing to take chances, even if it might not work out, to make progress and grow their business.** 4. ***Passion:* Successful entrepreneurs have a strong love for what they do, which keeps them motivated and excited about their work every day.** 5. ***Planning:* Entrepreneurs set goals and make plans to reach those goals, helping them stay organized and focused on what they want to achieve.** 6. ***Knowledge:* Entrepreneurs are always curious and eager to learn new things, whether it\'s about their business, industry trends, or the world around them.** 7. ***Social Skills:* Entrepreneurs are good at communicating with others, making friends, and working well in teams to achieve common goals.** 8. ***Open-mindedness:* Successful entrepreneurs are open to new ideas, willing to learn from others, and not afraid to make mistakes because they see them as opportunities to grow and improve.** 9. ***Empathy:* Entrepreneurs care about how others feel and try to understand different perspectives, which helps them build strong relationships with customers, employees, and partners.** 10. ***Value Customers:* Successful entrepreneurs focus on providing excellent products or services that meet the needs of their customers, making sure they are happy and satisfied with what they offer.** - **A *hazard* is anything that could hurt you or someone else. Examples of workplace hazards include:** ** frayed electrical cords (could result in electrical shock)** ** boxes stacked precariously (they could fall on someone)** ** noisy machinery (could result in damage to your hearing)** - ***Risk* is the possibility that a hazard will harm someone.** **Hazards in ICT Environments** **1. Physical Hazards- cables running across the floor, slippery floor.** ***2. Mechanical Hazards-* computer chassis,** ***3. Chemical Hazards-* display cleaning chemicals, keyboard cleaning chemicals, compressed gas dirt and dust removers, and many cleaning solvents.** ***4. Electric Shock Hazard-* Inside computers and electronic equipment** ***5.CRT Monitor High Voltage Hazard-* open CRT monitors** **5s in Organizing ICT Environments:** ***1. Seiri -* Sorting/Putting things in order (Remove/discard what is not needed so that there are fewer hazards and less clutter to interfere with work. Only keep what is needed.)** ***2. Seiton -* Orderliness/Proper Arrangement (Place things in such a way that they can be easily reached whenever they are needed. There must be a place for everything, and everything must be in its place.\")** ***3. Seiso -* Clean/cleanliness. (Keep workplace and things clean and polished; no trash or dirt in the workplace)** ***4. Seiketsu -* Standardize/Purity (Maintain cleanliness after cleaning, consistently- perpetual cleaning. Such cleaning is part of everyone's work.)** ***5. Shitsuke -* Sustaining/discipline/commitment (Maintain standards and keep the facility in safe and efficient order day after day, year after year.)** **Benefits of 5S Methodology:** **The 5S methodology provides numerous benefits to organizations that adopt it. Some of the benefits include:** **1. Improved productivity** **2. Reduced waste** **3. Enhanced safety** **4. Increased employee satisfaction** **5. Improved customer satisfaction** **The 3 Major Objectives of Following Safety Guidelines** - **Protect people from injury.** - **Protect equipment from damage.** - **Protect the environment from contamination.** **Safety Precautions when working in the Computer Laboratory:** 1. **Always ground or discharge yourself before touching any part of the computer.** 2. **Do not work alone so that there is someone who can take care of you in case of accident or emergency.** 3. **Be careful with the tools that may cause a short circuit.** 4. **Always pull the cable connector on the handle and not hold on the cable itself.** 5. **Use only rubber shoes when standing on the ground or on a concrete floor.** 6. **Make sure that the pins are properly aligned when connecting a cable connector.** 7. **Always power off and unplug the computer before working on it.** 8. **Take away any liquid such as mineral water or soft drinks near your working area or near computers.** 9. **Contingency measures during workplace accidents, fire, and other emergencies are recognized.** 10. **Personal protective equipment is correctly used in accordance with organization procedures and practice.** 11. **Hazard/risks in the workplace and their corresponding indicators are identified to minimize or eliminate risk to co‐workers, workplace, and environment.** 12. **Take necessary precautions to protect the component of the computer from damage caused by Electrostatic Discharge (ESD).** 13. **Hold the components by the edges and do not touch the ICs.** 14. **Read and follow instructions in the manual carefully.** 15. **Do not use excessive force if things do not quite slip into place.** **Fire Safety Guidelines** - **Know the location of fire extinguishers, how to use them, and which to use for electrical fires and for combustible fires.** - **Find an escape route in case a fire gets out of control.** - **Know how to contact emergency services quickly.** - **Keep the workspace clean.** - **Keep most solvents in a separate area.**

Use Quizgecko on...
Browser
Browser