Introduction to ICT Specialization 1 PDF

Document Details

UncomplicatedLion

Uploaded by UncomplicatedLion

Nueva Vizcaya State University

Tags

ICT computer science computer technology

Summary

This document is an introduction to ICT Specialization 1, focusing on the evolution, impact, and applications of information and communications technology. It provides an overview, discusses computer history, describes different generations of computers, and explores various software applications, encompassing their uses in the education, home, business, and communication sectors.

Full Transcript

**College: COLLEGE OF TEACHER EDUCATION** **Campus : BAMBANG CAMPUS** **DEGREE PROGRAM** **BTLED** **COURSE NO.** **TLED 4** **SPECIALIZATION** **2 HE** **COURSE TITLE** **INTRODUCTION TO ICT SPECIALIZATION 1** **YEAR LEVEL** **2** **TIME FRAME** **51 HRS** **WK NO.** **2-18** **IM N...

**College: COLLEGE OF TEACHER EDUCATION** **Campus : BAMBANG CAMPUS** **DEGREE PROGRAM** **BTLED** **COURSE NO.** **TLED 4** **SPECIALIZATION** **2 HE** **COURSE TITLE** **INTRODUCTION TO ICT SPECIALIZATION 1** **YEAR LEVEL** **2** **TIME FRAME** **51 HRS** **WK NO.** **2-18** **IM NO.** **1** I. **UNIT TITLE/CHAPTER TITLE** INTRO TO ICT SPECIALIZATION PART 1 II. **LESSON TITLES** LESSON 1 Introduction to ICT LESSON 2 Evolution of Computers LESSON 3 Usage of ICT in Daily Life LESSON 4 Computerized and Non-computerized Systems LESSON 5 The Impact of ICT on Society LESSON 6 Computer Ethics LESSON 7 Difference Between Ethics and Law LESSON 8 Intellectual Property Rights LESSON 9 Privacy and Computer Usage LESSON 10 Authentication LESSON 11 Verification LESSON 13 The Process of Internet Filtering LESSON 14 Cyber Law LESSON 15 Computer Crimes LESSON 16 Computer Security LESSON 17 Introduction Computer Threats LESSON 18 Security Measures LESSON 19 Relationship between Security Threats and Security Measures LESSON 20 Security Procedure LESSON 21 Computer Application in the Society LESSON 22 Computer Users III. **LESSON OVERVIEW** IV. **DESIRED LEARNING OUTCOMES** 1. Use ICT to develop 21^st^ century skills, information, media and technology skills, learning and innovation skills. Life and career skills, effective communication skills. 2. Develop project/problem based collaborative plans and activities using technology plans and activities using technology tools. 3. Use open-ended tools (such as word processing, spreadsheets presentation software, and authoring tools) in subject specific application 4. Produce learning resources using technology tools in various subject areas 5. Evaluate the relevance and appropriateness of digital and non-digital resources based on the learning context V. **LESSON CONTENT** **.**LESSON 1 WHAT IS ICT? ============ INFORMATION =========== COMMUNICATION ============= ![](media/image7.jpeg) ![](media/image9.jpeg)TECHNOLOGY ================================ Aiding Communication -------------------- Spreading Information --------------------- TECHNOLOGY TIMELINE =================== -- -- -- -- -- -- -- -- -- -- COMPUTER GENERATIONS ==================== ![](media/image38.jpeg)![](media/image40.png) Hardware Technology ------------------- New invention of hardware were needed with the new computer technology. -- -- -- -- - the vacuum tubes generated a great deal of heat causing many problems in temperature regulation and climate control - the tubes also burnt out frequently - people operating the computer did not know that the problem was in the programming machine - the second generation computer scientists invented something new due to lots of problem created by vacuum tubes SECOND GENERATION (1956-1963) ============================= - transistors were smaller than vacuum tubes - they needed no warm up time - consumed less energy - generated much less heat - faster and more reliable ![](media/image47.png)THIRD GENERATION (1964-1971) ================================================== Advantages ---------- - Silicone chips were reliable, compact and cheaper. - Sold hardware and software separately which created the software industry. - customer service industry flourished (reservation and credit checks) FOURTH GENERATION (1971-PRESENT) ================================ - Apple Macintosh - IBM - DELL - ACER ![](media/image51.jpeg)![](media/image53.jpeg) Advantages ---------- - Computers became 100 times smaller than ENIAC (Electronic Numerical Integrator and Computer) the first computer - Gain in speed, reliability and storage capacity - Personal and software industry boomed FIFTH GENERATION (PRESENT & BEYOND) =================================== - silicone chips - processor - robotics - virtual reality - intelligent systems - programs which translate languages NEW ERA COMPUTER ================ - Super Computers \* Mainframe Computers - Mini Computers \* Personal Computers - Mobile Computers ![](media/image60.jpeg) LESSON 3 ======== +-----------------------------------+-----------------------------------+ | Teachers | | +===================================+===================================+ | Students | | +-----------------------------------+-----------------------------------+ | | | +-----------------------------------+-----------------------------------+ | | | +-----------------------------------+-----------------------------------+ BANKING ======= ![](media/image71.jpeg) - Automated Teller Machine (ATM) - Cheque Deposit - Electronic Fund Tranfer - Direct Deposit - Pay by phone system - Personal computer banking/ internet banking -- -- -- -- INDUSTRY ======== -- -- -- -- ![](media/image79.jpeg)OMMERCE ============================== -- -- -- -- -- -- -- -- OTHER SECTOR ============ ![](media/image85.jpeg)EDUCATION ================================ - education is the science of teaching and learning of specific skills - it also imparts knowledge, good judgement and wisdom BANKING SYSTEM ============== BANKING BEFORE ICT ================== - banking was done manually by taking deposits directly - transactions can only be made during working hours - takes time to approve any loan applications ![](media/image87.jpeg)BANKING WITH ICT ======================================= - all transactions are done by computers - transaction can be done at anytime and place - online services, phone banking system, credit cards are available INDUSTRY ======== ![](media/image89.jpeg)INDUSTRY WITH ICT ======================================== COMMERCE ======== COMMERCE BEFORE ICT =================== - Trading was made using the barter system and it was then later developed into currency. - Advertisement was in the form of word of mouth, billboards and printed flyers. - ![](media/image91.jpeg)Trading globally was extremely slow, late and expensive. Traders had to find ways to market local products in the global market. COMMERCE WITH ICT ================= LESSON 5 ======== LOWER COMMUNICATION COST ======================== RELIABLE MODE OF COMMUNICATION ============================== ![](media/image95.jpeg)EFFECTIVE SHARING OF INFORMATION ======================================================= PAPERLESS ENVIRONMENT ===================== BORDERLESS COMMUNICATION ======================== ![](media/image97.jpeg) SOCIAL PROBLEMS =============== - fraud - identity theft - Pornography - Hacking HEALTH PROBLEMS =============== ![](media/image99.jpeg) LESSON 6 COMPUTER ETHIC S ========================= THE TEN COMMANDMENTS OF COMPUTER ETHIC S ======================================== 1. You shall not use a computer to harm other people. 2. You shall not interfere with other people\'s computer work. 3. You shall not snoop around in other people\'s computer files. 4. You shall not use a computer to steal. 5. You shall not use a computer to bear false witness. 6. You shall not copy or use proprietary software for which you have not paid. 7. You shall not use other people\'s computer resources without authorisation or proper compensation. 8. You shall not appropriate other people\'s intellectual output. 9. You shall think about the social consequences of the program you are writing or the system you are designing. 10. You shall always use a computer in ways that ensure consideration and respect for your fellow humans. GUIDELINES ON THE E-MAIL AND INTERNET USAGE =========================================== - use only individual e-mail address to forward individual opinion - keep the identity name and password a secret to avoid the misuse of your e-mail without your knowledge - e-mail must be active to promptly reply the necessary actions needed for any matters - ensure the total mail kept in the box is within the computer storage capacity - scan files regularly to avoid the transmission of virus from one computer to another - do not send e-mails that contain classified information which can be used to tarnish other people or country - choose a suitable time to search the Internet to save access time and cost - beware of prohibited sites which could affect one\'s moral, organisation or nation - print only relevant documents that you think can be used in future to save cost UNETHICAL COMPUTER CODE OF CONDUCTS =================================== - modifying certain information on the Internet, affecting the accuracy of the information - selling information to other parties without the owner*'*s permission - using information without authorization - involvement in stealing software - invasion of privacy ETHICAL COMPUTER CODE OF CONDUCTS ================================= - sending warning about viruses to other computer users - asking permission before sending any business advertisements to others - using information with authorization LESSON 7 ======== DEFINITION OF LAW ================= WHY DO WE NEED ETHICS AND LAW IN COMPUTING? =========================================== - Respecting Ownership - Respecting Privacy - Respecting Property RESPECTING OWNERSHIP ==================== RESPECTING PRIVACY AND CONFIDENTIALITY ====================================== RESPECTING PROPERTY =================== SIMILARITIES BETWEEN ETHIC S AND LAW ==================================== - to guide user from misusing computers - to create a healthy computer society, so that computers are used to contribute to a better life - to prevent any crime DIFFERENCES BETWEEN ETHICS AND LAWS =================================== -- -- -- -- -- -- -- -- **UNETHICAL VS. LAW BREAKING CONDUCTS** - using the office computer to do personal things - reading your friend*'*s e-mail without his or her permission - plagiarising and using materials from the Internet for your class assignment without giving credit to the original author. - sending a computer virus via e-mail - hacking into your school*'*s database to change your examination results. - selling pirated software in a night market LESSON 8 ======== INTELLECTUAL PROPERTY LAW ========================= INVENTIONS PROTECTED BY INTELLECTUAL PROPERTY LAWS ================================================== - Trademarks - Service marks - Trade/company names - Domain names - Geographical indications - Copyrights - Patents INTELLECTUAL PROPERTY PROTECTION ================================ - Patents for inventions - Trademarks for brand identity - Design for product appearance - Copyright for material Patents for inventions ---------------------- Trademarks for brand identity ----------------------------- Design for product appearance ----------------------------- Copyright for material ---------------------- LESSON 9 ======== WAYS COMPUTER TECHNOLOGY TH REATEN OUR PRIVACY ============================================== - Cookies - Electronic profile - Spyware Cookies ------- - ![](media/image103.jpeg)are used to identify users by web casting, e-commerce and other web applications - contain user information and are saved in the computer hard disk - are used by some websites to store passwords and track how regularly we visit a website, that*'*s how we become potential targets for web advertisers - enable web sites to collect information about your online activities and store them for future Electronic profile ------------------ - electronic profile is the combining of data in a database that can be sold to the Internet by the company to the interested parties. - this database is in a form such as magazine subscription or product warranty cards that had been filled by online subscribers. - the information in electronic profile includes ![](media/image105.jpeg)Spyware ------------------------------- - refers to a program that collects user information without the user*'*s knowledge. - can enter computers, sneaking in like a virus. - is a result of installing new programs. - communicates information it collects to some outside source while we are online. WHY DO WE NEED PRIVACY? ======================= CAN PRIVACY BE PROTECTED? ========================= Privacy law ----------- - Security Services to review the security policy - Security Management to protect the resources - Security Mechanism to implement the required security services - Security Objects, the important entities within the system environment Utilities software ------------------ LESSON 10 AUTHENTICATIONS ========================= AUTHENTICATION ============== ![](media/image107.png) Verification verify the validity of the ID ------------------------------------------ BIOMETRIC DEVICES ================= ![](media/image115.jpeg)Facial Recognition ========================================== Hand Geometry Scanning ====================== ![](media/image117.jpeg)Iris Scanning ===================================== Retinal Scanning ================ Voice Recognition ================= ![](media/image120.jpeg)Signature Verification System ===================================================== CALLBACK SYSTEM =============== WHY IS AUTHENTICATION IMPORTANT? ================================ LESSON 11 VERIFICATIONS ======================= METHODS OF VERIFICATION ======================= USER IDENTIFICATION =================== - ![](media/image123.jpeg)Key in the user name to log-in to a system and the system will verify whether the user is valid or invalid user Show the exam slip to verify that you are the valid candidate for the exam. - show a passport before departure. PROCESSED OBJECT ================ - the policeman will check on the driver*'*s license to - employees have to swipe their security card to enter the building - buy blouses at the mall using a credit card LESSON 12 CONTROVERSIAL CONTENT =============================== ISSUES ON CONTROVERSIAL CONTENTS ================================ PORNOGRAPHY =========== ![](media/image126.jpeg) DEFINITION OF PORNOGRAPHY ========================= SLANDER ======= IMPACTS ON MALAYSIAN SOCIETY ============================ - can lead to criminal acts such as exploitation of women and children - can lead to sexual addiction or perversion - can develop low moral value towards other men, women or children - can erode good religious, cultural and social beliefs and behaviour - can develop into a society that disregards honesty and truth - can develop bad habit of spreading untruths and rumours - can lead to unnecessary argument - can cause people to have negative attitudes towards another person LESSON 13 ========= What is Internet filtering? --------------------------- CONTROLLING ACCESS TO THE INTERNET ================================== - keyword blocking - site blocking - web rating systems KEYWORD BLOCKING ================ SITE BLOCKING ============= - software company maintains a list of *'*dubious Internet sites*'* - the software prevents access to any sites on this list - *'*denial lists*'* regularly updated - some software provides control over what categories of information you block - Who decides what goes on the *'*denial list*'* and what criteria are they using? - can you keep track of the whole of the Internet? - filters can use both site blocking and word blocking WEB RATING SYSTEMS ================== - ratings done either by the web page author or by the independent bureau. - browsers set to only accept pages with certain levels of ratings. LESSON 14 CYBER LAW =================== NEEDS FOR CYBER LAW =================== ![](media/image131.png) THE CYBER LAW ACTS IN MALAYSIA ============================== - Digital Signature Act 1997 - Computer Crimes Act 1997 - Telemedicine Act 1997 - Communications and Multimedia Act 1998 - Private Data Protection Bill - Electronic Government Activities Bill - Electronic Transactions Bill DIGITAL SIGNA TURE ACT 1997 =========================== ![](media/image136.jpeg)COMPUTER CRIMES ACT 1997 ================================================ TELEMEDICINE ACT 1997 ===================== COMMUNICATIONS AND MULTIMEDIA ACT 1998 ====================================== LESSON 15 COMPUTER CRIMES ========================= COMPUTER FRAUD ============== COPYRIGHT INFRINGEMENT ====================== ![](media/image142.jpeg)COMPUTER THEFT ====================================== - transfer of payments to the wrong accounts - tap into data transmission lines on database at no cost - divert goods to the wrong destination COMPUTER ATTACK =============== - physical attack that disrupt the computer facility or its transmission lines. - an electronic attack that uses the power of electromagnetic energy to overload computer circuitry. - a computer network attack that uses a malicious code to exploit a weakness in software, or in the computer security practices of a computer user LESSON 16 COMPUTER SECURITY =========================== ![](media/image144.jpeg)TYPES OF COMPUTER SECUR ITY =================================================== a. hardware security b. software security/data security c. network security HARDWARE SECURITY ================= b. ![](media/image146.jpeg)**SOFTWARE AND DATA SECURITY** Software and data security refers to the security measures used to protect the software and the loss of data files. NETWORK SECURITY ================ PERSONAL COMPUTER SECURITY CHECKLIST ==================================== - Do not eat, drink or smoke near the computer - Do not place the computer near open windows or doors - Do not subject the computer to extreme temperatures - Clean the equipment regularly - Place a cable lock on the computer - Use a surge protector - Store disks properly in a locked container - Maintain backup copies of all files - Stores copies of critical files off sites - Scan a floppy disk before you open it - Do not open any unknown email received LESSON 17 ========= MALICIOUS CODE ============== ![](media/image149.jpeg) a. VIRUS ===== - a program that can pass on the malicious code to other programs by modifying them - attaches itself to the program, usually files with.doc,.xls and.exe extensions - destroys or co-exists with the program - can overtake the entire computing system and spread to other systems b. TROJAN HORSE ============ - ![](media/image151.jpeg)a program which can perform useful and unexpected action - must be installed by users or intruders before it can affect the system*'*s assets - an example of a Trojan horse is the login script that requests for users*'* login ID and password - the information is then used for malicious purposes c. LOGIC BOMB ========== - logic bomb is a malicious code that goes off when a specific condition occurs. - an example of a logic bomb is the time bomb - it goes off and causes threats at a specified time or date e. ![](media/image153.jpeg)TRAPDOOR OR BACKDOOR ============================================ - a feature in a program that allows someone to access the program with special privileges f. WORM ==== - a program that copies and spreads itself through a network Primary Differences Between Worms And viruses --------------------------------------------- -- -- -- -- NATURAL AND ENVIRONMENTA L THREATS ================================== - Flood - Fire - Earthquakes, storms and tornados - Excessive Heat - Inadequate Power Supply THEFT ===== 1. Computer is used to steal money, goods, information and resources. 2. Stealing of computer, especially notebook and PDAs. 1. ![](media/image157.jpeg)prevent access by using locks, smart-card or password 2. prevent portability by restricting the hardware from being moved 3. detect and guard all exits and record any hardware transported LESSON 18 SECURITY MEASURES =========================== DATA BACKUP =========== ![](media/image160.jpeg)CRYPTOGRAPHY ==================================== ANTIVIRUS ========= IDENTIFYING VIRUS ================= -- -- -- -- ANTI-SPYWARE ============ - Spybot Search and Destroy - Ad-aware - Spyware Blaster ![](media/image163.jpeg)FIREWALL ================================ HUMAN ASPECTS OF SECURITY MEASURES ================================== ![](media/image166.jpeg) LESSON 19 ========= SECURITY THREATS ================ MALICIOUS CODE THREATS VS. ANTIVIRUS AND ANTI- SPYWARE ====================================================== - limiting connectivity - allowing only authorised media for loading data and software - enforcing mandatory access controls - blocking the virus from the computer program HACKING VS. FIREWALL ==================== NATURAL DISASTER VS. DATA BACKUP ================================ - flood - fire - earthquakes - storms - tornados ![](media/image169.jpeg)THEFT VS. HUMAN ASPECTS =============================================== - can be used to steal money, goods, information and computer resources - the actual stealing of computers, especially notebooks and PDAs - prevent access by using locks, smart-card or password - prevent portability by restricting the hardware from being moved - detect and guard all exits and record any hardware transported BE SUSPICIOUS OF ALL RESULTS ============================ LESSON 20 ========= **SECURITY PROCEDURES** DATA PROTECTION =============== - make backup files - detect the virus and clean the computer - ![](media/image172.png)warn others on virus attacks BACKUP FILES ============ - keeping the duplicated files in external storage such as in the floppy disk and thumb drive - do backup frequently DETECT VIRUS AND DO CLEANUP =========================== 3. ![](media/image174.png)**WARN OTHERS ON VIRUS ATTACK** We can warn others on virus attacks or new viruses by sending e-mails to them. ETECTING ILLEGAL ACCESS TO SYSTEMS ================================== TCPWRAPPERS =========== TRIPWIRE ======== PREVENTING ILLEGAL ACCESS TO SYSTEMS ==================================== 1. Run anlpassword to make password cracking difficult. 2. Run tcpwrappers to check if the name for an ip address can be provided by DNC 3. Use a callback system to prevent unauthorised use of stolen passwords. ![](media/image178.jpeg)PREVENTING ILLEGAL ROOT ACC ESS ======================================================= PATCH ===== LESSON 21 ========= ![](media/image180.jpeg) SOFTWARE APPLICATIONS ===================== -- -- -- -- SOFTWARE APPLICATIONS PACKAGES ============================== -- -- -- -- COMPUTERS FOR HIGHER EDUCA TION =============================== BUSINESS ======== ![](media/image183.jpeg)COMPUTERS IN BANKING ============================================ INDUSTRY ======== GRAPHICS AND MULTIMEDIA ======================= COMMUNICATION ============= - check information on taxes ([www.hasil.org.my]) - apply for permits and licenses ([www.jpj.gov.my]) - check for MyKad ([www.jpn.gov.my]) - pay parking tickets and check summons ([www.jpj.gov.my]) - renew vehicle registration ([www.jpj.gov.my]) - register online for IPTA/IPTS application (www.moe.gov.my) COMPUTERS IN TOURISM ==================== ![](media/image188.jpeg)COMPUTERS IN THE HEALTHCAR E ==================================================== - maintaining patient records - monitoring patients*'* vital sign - assisting doctors, nurses and technicians with medical tests by using computer and computerised devices. - using medical software to help with researching and diagnosing health conditions. SCIENCE ======= - collecting, analyzing and modelling data - serving as medium of communication with colleagues around the world - contributing to new inventions or breakthrough in surgery, medicine and treatment - imitating functions of the central nervous system, retina of the eye and others by tiny computers - allowing a deaf person to listen through cochlear implant LESSON 22 COMPUTER USERS ======================== HOME USER ========= - business - communication - entertainment - education ![](media/image191.jpeg) SMALL OFFICE/HOME OFFICE (SOHO) USER ==================================== - accounting firms, travel agencies, florists and many more These SOHO users: - use desktop or notebook computers as well as telephone, handphones and PDAs in completing their tasks and communicating - work in a small company or work as an individual at home MOBILE USER =========== - include real estate agents, insurance agents, meter readers and journalists - use notebook computers, Internet-enabled PDAs or smart phones - work with basic business software such as word processing and spreadsheet business software - use presentation graphics software to create and deliver presentations to a large - audience by connecting a mobile computer or device to a video projector ![](media/image193.jpeg) POWER USER ========== - include engineers, scientists, architects and virtual reality animators - use computers with extremely fast processor, bigger storage and customised software - work with mini computers that uses design to meet the organisational needs - use software such as CAD, CAM and MATLABExamples : LARGE BUSINESS USER =================== - bank, insurance company, hypermarket - use computers for basic business activities - have e-commerce that allow customers and vendors to interact and do business transactions online therefore customers, vendors and other interested parties can access information on the web - have e-mail and web browsers to enable communications among employees, vendors and customers - provide kiosks in public locations VI. **LEARNING ACTIVITIES** VII. **EVALUATION** Evaluation like quizzes, midterm examination and final examination will be administered on google classroom/Microsoft Teams. VIII. **ASSIGNMENT** IX. **REFERENCES** **Books:** Mc Laughlin, Robert, Sasser, Susan Ralston, **Fix your own PC.** Philippines Graphics Arts, Inc., Tandang Sora St., Caloocan City Legaspi, Carlos, Caina, Mark Anthony **Operate A Personal Computer**. Dasmarinas Computer Learning Center. **Websites:** http://www.paramounthealthcare.com/body.cfm?id=65 http://www.mcrcc.osmre.gov.ph http://www.standards.dfes.gov.uk http://www.swce.gov.uk http://deming.eng.clemson.edu/pub/tutorials/qctools/flowm.htm http://en.wikipedia.org/wiki/Quality\_management http://www.empf.org/empfasis/aug04/prop.htm http://www.empf.org/empfasis/aug04/prop.htm http://www.lakeland.cc.il.us/\~internal/policymanual/10fiscalaffairs/1026.POL.htm https:.gao.gov/new.items/d0871.pdf\] https:plant-materials.nrcs.usda.gov/pubs/nmpmcnl6045.pdf https.cdpr.ca.gov https.freepatentsonline.com http://en.wikipedia.org/wiki/Customer\_service https://en.wikipedia.org/wiki/Quality\_standard https://www.technet.unsw.edu.au/tohss/swp.htm https:://xnet.rrc.mb.ca/healthsafety/safeworkprocedures https:// marketbusinessnews.com/financial-glossary/quality-improvement/ https://tiny.cc/kp62rz Prepared by: **ROMMEL M. CUDIA**

Use Quizgecko on...
Browser
Browser