Global Citizenship 9 L1 Past Paper PDF 2024-2025

Summary

This document is a past paper for Global Citizenship 9 L1, covering information, technology, and communication. It explores the definition of terms like global connectivity, internet (data) cables, and cybercrime. Included is an introduction with historical examples, and sections on the internet, the world wide web and the impact on businesses and individuals.

Full Transcript

Subject : Global Citizenship 9 L1 Supp. Note: #1 Term / SY : Term 3 / SY 2024-2025 Class: JHS-3 Name : ____________________________________________________ T3 L1: GLOBALIZATION AND INTERDEPENDENCE Information, Technolog...

Subject : Global Citizenship 9 L1 Supp. Note: #1 Term / SY : Term 3 / SY 2024-2025 Class: JHS-3 Name : ____________________________________________________ T3 L1: GLOBALIZATION AND INTERDEPENDENCE Information, Technology, & Communication Definition of Terms global connectivity - the ability of computers and other electronic equipment to connect with the internet or with other computers or programs around the world internet (data) cables - wires that enable computers to access the internet network - a set of computers that are connected to each other so that they can share information telecommunications - the sending and receiving of messages by telephone, computer, radio, television, and so on World Wide Web - the system for making information available, anywhere in the world internet - an electronic communications network that connects computer networks and organizational computer facilities around the world (Merriam-Webster) cybercrime – a crime committed by means of computers or the internet (collinsdictionary.com) INTRODUCTION During the early 1800s, the quickest way to get from China to the UK was by tea clipper. It took just under a hundred days for these fast cargo ships to cross the 11,000 nautical miles (20,000 km) between the ports of Hong Kong and London. The arrival of the electric telegraph in the late 1800s meant that a message could be sent and a reply received on the same day. TEA CLIPPER A clipper was a type of mid-19th- century merchant sailing vessel, designed purely for speed. Clippers were generally narrow for their length and could carry a limited bulk freight, but the sail area was large for the size of the vessel. Today, high-speed internet cables mean that ping’s average time is just over 200 ms (milliseconds). Ping is the time taken to send a small amount of data from one point to another and back again. The growth in global telecommunications technology has been astounding and is a good example of globalization and interdependence. It would be difficult for any business or organization with a global reach to function without the Internet. However, it is not just large corporations that benefit from global connectivity. INTERNET & WORLD WIDE WEB The Internet and the World Wide Web have become essential in many ways The world economy depends on them. Utility services, including power and transport, cannot function without them. Development programs like BBC Janala need them to provide their services. However, the Internet and the World Wide Web are vulnerable. For example: The World Wide Web is unfiltered, which means anything can be put online, including criminal and terrorist activity, particularly using readily available 'dark web' tools. Cyberspace – the virtual computer world – is becoming a battleground for state-sponsored cyber attacks, all dependent on the internet. Vital undersea internet cables can be threatened with disruption or destruction by hostile states. The World Wide Web can used as a means of oppression by states who use it to monitor dissidents and restrict freedoms. MISINFORMATION VS DISINFOMATION Misinformation and disinformation may sound the same, but they are quite different. Knowing the difference helps you to understand the purpose or intention behind a story, post, or article. Misinformation is inaccurate information that is originated or shared. The person sharing is misinformed. They may believe that what they are sharing is correct, but they are wrong. Disinformation is intended to deceive. The person originating or sharing it knows it is for political, commercial, or ideological gain. PHISHING & SPEAR PHISHING Individuals and criminal gangs are constantly finding new ways to deceive people into committing cybercrime. Their aim is to get money or information. One common way they do this is by ‘phishing’, or its related ‘spear phishing’. Phishing – you are persuaded to reveal personal information - for example, your username, passwords, bank card details, and PINs - that is then used in criminal activity. The methods vary but often involve receiving an email saying your account has been compromised and asking you to click a link to make your account secure. The link identifies you and gives the criminals the login details to an online bank account or retailer Now they can log in as you, and divert money to their account or order goods to be delivered to their address. The key to combatting phishing is: recognizing a phishing email ensuring that you have strong passwords enabling two-factor authentication Spear Phishing – Spear phishing happens when the email contains personal information - your name, for example. This is to make you think it is more genuine. Criminals trade lists of personal information to make their attacks more effective. Impact of the Internet on Education and Knowledge Production (Britannica) The Internet has significantly influenced various sectors, including commerce and industry. However, its impact on foundational institutions such as education and knowledge production is noteworthy and multifaceted, with some concerning implications. Nichification and Its Impact on Consumers and Advertisers Nichification refers to the process that enables consumers to find specific products or services that meet their needs. This process also creates opportunities for advertisers to target consumers effectively. For instance, search engines generate revenue by aligning advertisements with individual search queries, allowing for a more personalized advertising experience. Cyberattack and Cyberdefense Challenges in Cyberwarfare Cyberwarfare presents numerous challenges for both attackers and defenders. Attackers must find ways to bypass cyberdefenses, while both sides face a rapid offense-defense cycle. The offense tends to dominate in cyberspace due to the inherent vulnerabilities of large networks and the fallibility of human users. A key point is that an attacker needs to succeed only once, whereas a defender must continuously thwart attacks. Cyberdefense Strategies Despite the challenges, many nations prioritize cyberdefense. Key components of a robust cyberdefense structure include: Firewalls to filter network traffic Data encryption Tools for preventing and detecting intrusions Physical security of equipment and facilities Training and monitoring of network users

Use Quizgecko on...
Browser
Browser