🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Living-in-the-I.T.-Era-Midterms-Reviewer.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

Living in the I.T. Era IT / ICT in Education CM 1 (Part I): Introduction to Information Technology (I.T.) and ICT has profoundly impacted education by introducing e-...

Living in the I.T. Era IT / ICT in Education CM 1 (Part I): Introduction to Information Technology (I.T.) and ICT has profoundly impacted education by introducing e- learning platforms, online courses, and digital libraries, Information Communications revolutionizing access to knowledge dissemination. Technology (ICT) Students now engage in remote learning, access global educational resources, and participate in interactive learning experiences facilitated by digital technologies. Overview of ICT This transformation has democratized education, enhancing accessibility and flexibility for learners across How do you communicate with friends and your loved diverse ages and backgrounds. ones from afar? How do you complete schoolwork without going to the library? How do you find the information you Entertainment need? How do you buy things you need when you’re too lazy or shy to go out? IT/ ICT has significantly transformed the entertainment industry by revolutionizing how content is created, Information technologies are powerful because people distributed, and consumed. Digital entertainment have a strong desire for information, and IT facilitates platforms, streaming services, online gaming, and social easy access to it. The world is abundant with information media networks have become components of our daily about our identities, residences, and means of lives, providing users worldwide with a wide range of sustenance. Until the advent of computers around 1990, immersive experiences. ICT drives ongoing innovation in this information was primarily written on paper, published entertainment, enhancing accessibility, interactivity, and in newspapers or magazines, and stored in libraries and personalization of content tailored to user preferences. office files. Business Information Technology Within business and industry, ICT serves as the backbone Information technology, commonly known as IT, for critical functions such as enterprise resource planning is generally the use of technology to solve (ERP), customer relationship management (CRM), and problems. supply chain management. Businesses leverage ICT to It encompasses the utilization, creation, and streamline operations, boost productivity, and achieve oversight of computer-based systems, software, competitive advantages in global markets. Through and networks for the storage, processing, ecommerce platforms, digital marketing strategies, and transmission, and retrieval of data. It data analytics tools, powered by ICT, businesses expand encompasses a broad spectrum of tasks, their reach to global customers, optimize processes, and including the development of hardware and drive innovation in product development and service software, network administration, database delivery. management, and tech support IT System Information Communications Technology Every hardware and software used within a network of There is no universal definition for ICT due to how individuals constitutes an IT system. This includes broad it is, but it is usually agreed upon that it has anything used to help you store, retrieve, manipulate, and more to do with communication than Information communicate data. Technology does. ICT encompasses technologies facilitating Research communication, collaboration, and integration across various information systems. It includes IT supports scientific research by providing computational telecommunication networks, internet resources (e.g. computer algebras, graphing software technologies, multimedia systems, and digital etc.), data processing tools, and specialized software for tools that enable the exchange and sharing of tasks such as data analysis, simulations, and modeling in information. fields like physics, biology, chemistry, mathematics, and ICT is more inclusive of technologies that allows environmental science. you to communicate with others and is a direct extension of IT. Digital Forensics IT plays a crucial role in digital forensics, aiding in the investigation and analysis of digital evidence in legal and criminal inquiries. Digital forensics utilizes specialized Computer Systems and Components tools and techniques to assist experts in retrieving, preserving, and examining data from computers, mobile devices, and digital storage media. History of Hardware and Software The history of information technology encompasses the Treatise Against Technology development of both computer hardware and software. Charles Babbage is recognized for constructing the first mechanical computer in the 1820s. More than a century later, in 1946, a team at the University of Pennsylvania unveiled the first programmable, general-purpose computer, known as the Electronic Numerical Integrator and Computer (ENIAC). The ENIAC weighed 30 tons and occupied 1800 square feet of space. It supported most hardware and software components that modern programmers recognize. The ENIAC could read inputted data, hold information in memory, step through programming instructions, create and call sub-programs, Theodore Kacyznski (The Unabomber) loop through code, and print output. Industrial Society and its Future Eventually, these shared tasks were consolidated into computer programs known as operating systems. The Ted Kaczynski was an American Mathematician and Operating System (OS) functions as the brain of the prodigy specializing in Complex Analysis. Around 1971, computer, managing all its components. Elements such he left the academia and pursued a primitive lifestyle. as the computer mouse, keyboard, display monitor, Upon witnessing the destruction of the wilderness around motherboards, and storage drives come together to form his cabin, he concluded that primitive way of living was a functional computer only when the OS recognizes them becoming impossible. He seeks to fight the advancement and coordinates their actions. When you move your of technology through extreme methods such as nation- mouse, tap your screen, type on your keyboard, or make wide bombing. a phone call, the OS interprets these actions and instructs the components on how to respond to achieve the desired Kacyznski murdered 3 people and injured several others result. in his campaign against people he believed to be advancing modern technology Pre-Modern Computing Summarized from “Industrial Society and Its Future” by Kacyznski 1. Modern technology constitutes an indivisible, self-perpetuating system that is not under human control. 2. Humans are biologically and psychologically maladapted to life in a technological society. 3. The continued development of the technological Abacus, a counting device dating back to ancient system will inevitably lead to destruction of civilizations humanity or at least a total subordination to the system. First Generation Computers (1940s-1950s) 4. Since the technological system cannot be controlled, and hence cannot be reformed, a revolutionary overthrow of the system is necessary to avert catastrophe. 5. Leftist activism is a form of pseudo-rebellion that serves to distract attention from the problem of technology. Electronic Numerical Integrator and Computer Personal Computers (PCs): IBM PC (1981) and (ENIAC): Developed during World War II (1943- clones popularized PCs for home and business 1946), ENIAC was the first general-purpose use, leading to a surge in software development electronic digital computer, using vacuum tubes and user accessibility. for calculations Mobile Computing: Proliferation of smartphones UNIVAC I: The first commercially produced and tablets, leveraging advances in computer (1951), used for business and scientific microelectronics and wireless technologies. applications. Computer Hardware and Software Second Generation Computers (1950s-1960s) Types of Computers Supercomputers: These are powerful machines used for complex calculations, theorem proving, weather forecasting, and simulations. Mainframes: powerful systems used by businesses and government organizations for critical applications, bulk data processing, and large-scale transaction processing. Servers: These are computers that provide data, Transistors: Replaced vacuum tubes, leading to resources, and services to other computers over a smaller, faster, and more reliable computers. network. IBM 1401: Introduced in 1959, it became one of the most popular second-generation computers Personal computers: General purpose computers used for business use. for different personal task e.g. desktops, laptops, tablets. Third Generation Computers (1960-1970s) Embedded Systems: Specialized computers integrated into other devices like cars, appliances, and medical equipment. Internal Components of a Computer Internal components are the parts inside a computer that make it function: CPU (Central processing Unit): The brain of the computer that performs calculations and executes Integrated Circuits (ICs): Multiple transistors on a instructions. single chip, greatly increasing computing power and efficiency Motherboard: The main circuit board that connects all Mainframes and Minicomputers: IBM System/360 internal components and allows them to communicate. (1964) marked the shift towards compatible families of computers, while DEC’s PDP series Memory (RAM): Temporary storage used by the CPU to (1960s) popularized minicomputers. store data that is being processed. 1970s- Present Storage Drives (HDD/SSD): Devices that store data permanently. Hard Disk Drives (HDD) use spinning disks, while Solid-State Drives (SSD) use flash memory. Power Supply Unit (PSU): Converts electrical power from an outlet into usable power for the computer's internal components. Microprocessors: Intel 4004 (1971) and Graphics Processing Unit (GPU): Handles rendering of subsequent chips revolutionized computing by images, video, and animations. Essential for gaming, integrating all components of a computer on a video editing, and graphic design. The Graphics single chip. Processing Unit (GPU) is also used for computing tasks beyond rendering images and videos e.g. mining Excel, PowerPoint), Google Workspace, and Adobe cryptocurrencies. Acrobat. Peripheral Devices Media Players: Software for playing audio and video files. Examples include VLC Media Player, Windows Media Input Devices: Allow users to input data into the Player, and iTunes. computer. Examples include keyboards, mice, scanners, and microphones. Web Browsers: Applications for accessing and navigating the internet. Examples include Google Output Devices: Display or output data from the Chrome, Mozilla Firefox, Microsoft Edge, and Safari. computer. Examples include monitors, printers, and speakers. Graphics and Design Software: Tools for creating and editing images, videos, and animations. Examples include Storage Devices: External devices for storing data. Adobe Photoshop, Illustrator, and Premiere Pro. Examples include external hard drives, USB flash drives, and memory cards. Communication Software: Programs that facilitate communication through email, instant messaging, and Network Devices: Enable computers to connect to video conferencing. Examples include Microsoft Outlook, networks. Examples include modems, routers, and WhatsApp, and Zoom network adapters. Games and Entertainment Software: Applications Computer Software designed for entertainment, including video games and other interactive media. Computer software refers to a collection of data or computer instructions that tell the computer how to work. It is an intangible component of a computer, as opposed to the physical hardware. Software can be categorized into two main types: system software and application software. Each type serves different purposes and functions. System Software System software is essential for managing the hardware and creating an environment for applications to run. The main component of system software is the operating system (OS). Operating System (OS): The core software that manages hardware resources and provides common services for application software. Popular operating systems include Microsoft Windows, macOS, Linux, and Android. The OS handles tasks like memory management, process scheduling, file management, and device control. Device Drivers: These programs allow the OS to communicate with hardware devices like printers, graphics cards, and keyboards. Utility Programs: These perform maintenance tasks such as virus scanning, disk cleanup etc. Application Software Productivity Software: Tools that assist users in creating documents, spreadsheets, presentations, and other work- related tasks. Examples include Microsoft Office (Word, Mail Server – incoming e-mail, outgoing e-mail, Living in the I.T. Era delivery File Server – central storage, data files, network CM 1 (Part II): The Web and the access Internet Policy Server – security, policy-based network, authorization, tracking control The Internet Browser The internet is a worldwide network of interconnected computer networks that use the Internet Protocol (IP) suite to enable communication between networks and devices. It is often described as a ”network of networks” because it connects private, public, academic, business, and government networks, ranging from local to global in scope. These connections are made possible through a variety of technologies, including electronic, wireless, and optical networking. Domain Name System IP Address (Internet Protocol) Major Components of the Internet Internet Service Provider Servers Type of ISP: National ISP Regional ISP Types of Servers: The Web Application Server – business logic, application The World Wide Web, commonly referred to as the Web, program is an information system that allows users to access Web Server – HTML pages, files, serve requests documents and other resources through Uniform Proxy Server – intermediary, endpoint device, Resource Locator (URL). These resources can be user request connected by hyperlinks and are accessible via the Internet. Information on the Web is transferred using the Hypertext Transfer Protocol (HTTP). Users interact with the Web through web browsers, while the content is hosted on web servers. It is important to note that the Web is not the same as the Internet; the Internet existed for over twenty years before the Web was developed, serving as the foundation for Web technologies. Web 2.0 Content Creation: Extensive creation by many users. Information Access: Interactive and participatory. Design Purpose: Fosters interaction and participation. Nickname: Referred to as the “participatory social Web.” Features: Emphasizes users, communities, partnerships, discussions, and social media. Popularized through mobile internet access and apps like Tiktok, Twitter, and Youtube. Evolution of Web Web 3.0 Content Creation: Emphasizes decentralization and openness. Web 1.0 Information Access: Enhanced user utility through decentralized Initial Version: Known as Web platforms. 1.0. Design Purpose: Utilizes AI and Content Creation: Small ML for intelligent, autonomous number of individuals created content internet functions. Functions as a for a broad audience. ”global” by analyzing content Information Access: Allowed conceptually and contextually. direct access to original sources of Nickname: Referred to as the information. “read, write, executre Web.” Design Purpose: Simplified Originally referred to as the information discovery, prioritizing Semantic Web by Tim Berners-Lee. information seeker’s needs. Features: Shift from centralized Nickname: Referred to as the platforms (e.g. Facebook, Google, Twitter) to “read-only Web.” distributed and anonymous services. Features: Lacked forms, images, controls, and interactive features of the modern internet. Key Differences Between Web Versions Some of the component that are existing and are in use today: Cross Platforms Key Features Between Web Versions Web Decentralized Structure Confidence in Blockchain Innovation The Rise of Cryptocurrency Online Communication and Collaboration Online Meetings and Videoconferencing Evolution of Social Media Microsoft 365 Productivity Tools Types of Online Communication Communicating effectively online is a crucial digital skill for both the workplace and university studies. Text-based: Email, discussion forums, texts, messaging, and chat Video and audio: Online meetings and conferences, screen and application sharing, virtual worlds, and gaming Social media: Platforms that use text, images, and video Advantages of Online Communication Flexibility Increased productivity and efficiency Skill development Cost efficiency Disadvantages of Online Communication Word or time limits Lack of visual or tonal cues Conversation pace Difficulty retracing statements Collaborative Documents Examples: Living in the I.T. Era Domino’s Anywhere – this platform enables CM 2 (Part I): Digital Technology and customers to order pizza using various devices and Social Change interfaces, including smartwatches, voice assistants, and social media platforms. BMW’s India’s Contactless Experience – this Current Trends allows customers to explore and purchase vehicles through a fully digital and contactless process, Hyper-automation integrating web, mobile, and augmented reality (AR) touchpoints. It is the integration of advanced technologies to automate Retail Apps – many retail apps now allow users to tasks and processes beyond traditional automation. check stock availability, add items to their grocery list, and communicate with customer service through Combines technologies like AI, ML, RPA, and decision- web apps, mobile apps, and wearables. making tools. Benefits of Multi-experience Aims to automate as many business and IT processes as possible. 1. Enhanced customer engagement 2. Increased customer satisfaction Examples: 3. Brand differentiation 4. Improved efficiency Retail – in retail, hyper-automation can optimize 5. Increased revenue inventory management, customer service, and supply chain operations. Multi-experience Challenges Healthcare – hyper-automation can improve regulatory compliance and fraud detection in 1. Consistency across platforms healthcare. 2. Integration complexity Banking – in the banking sector, hyper- 3. Security and privacy automation can enhance customer onboarding, loan 4. Performance optimization processing, and compliance. 5. User behavior understanding Accounts Payable – hyper-automation can 6. Development and maintenance costs streamline the AP process by automating the receipt, 7. Testing and quality assurance processing, and payment of invoices. Democratization Benefits of Hyper-automation The process of making advanced technologies accessible 1. Increased efficiency and usable by a broader, including those without 2. Enhanced accuracy specialized technical skill. 3. Scalability 4. Improved compliance Examples: 5. Employee empowerment Printing Press – One of the earliest examples is Hyperautomation Challengers the invention of the printing press by Johannes Gutenberg in the 15th century. 1. Difficulty and time consumption Affordable Computers – Various types of 2. Measuring success computers are available at different price points, 3. Overwhelming marketplace of tools making them accessible to a broader audience. 4. Change management Online Information Access – The internet has made information more easily accessible Multi-experience Benefits of Democratization Multi-experience refers to the various overlapping modes of interaction and interfaces between a user and digital 1. Enhanced employee productivity technology. 2. Innovation 3. Increased agility and efficiency It’s about creating a cohesive experience across web, 4. Increase customer satisfaction mobile, wearable, conversational, immersive technologies, and more. Drawbacks of Democratization of Technologies Crucial for protecting privacy, ensuring data security, and maintaining compliance with legal and ethical standards. 1. Inequality 2. Negative impact on society Examples: 3. No privacy 4. Negative impact on employment Crime Analytics – This involves analyzing large datasets to identify patterns and trends in criminal Human Augmentation activity Predictive Crime Profiling – Using data to Enhancing human abilities through the use of technology. predict where and when crimes are likely to occur. This can include physical, cognitive, and sensory Network Analysis of Criminal Gangs – This enhancements. application uses data to map out the relationships and interactions within criminal networks. Examples: Intelligence Gathering – Leveraging various data sources, including social media and surveillance Virtual Reality (VR) – VR creates immersive data, to gather intelligence on criminal activities and digital environments that can enhance learning, potential threats. training, and entertainment experiences. Augmented Reality (AR) – AR overlays digital Benefits of Data Policing information onto the real world, improving tasks like navigation, maintenance, and education. 1. Crime prevention Mixed Reality – This combines element of both 2. Resource optimization VR and AR to create interactive experiences that 3. Improved decision-making blend the physical and digital worlds. 4. Enhanced investigations Virtual Assistants – AI-powered virtual 5. Transparency and accountability assistants help with tasks like scheduling, reminders, 6. Community trust and information retrieval, enhancing productivity. 7. Cost savings Chatbots – These AI-driven tools provide quick 8. Enhanced collaboration responses and solutions to user queries, improving customer service and support. Drawbacks of Data Policing Exoskeletons – Wearable devices that enhance physical capabilities, often used in rehabilitation and 1. Privacy concerns industrial applications. 2. Bias and discrimination Prosthetic Limbs – Advanced prosthetics that 3. Over-reliance on technology restore or enhance limb functionality for individuals 4. Data security risks with amputations. 5. Cost and resource allocation 3D Bioprinting – This technology is used to create 6. Ethical issues biological structures, such as tissues and organs, 7. Accuracy and reliability potentially revolutionizing medical treatments. 8. Public trust Pros of Human Augmentation Machine Learning 1. Enhanced capabilities and collaboration Machine learning is a subfield of artificial intelligence that 2. Optimized performance involves training algorithms on data sets to develop 3. Range of Applications - healthcare, models. manufacturing, finance, and military Often powers many of the digital goods and services we Cons of Human Augmentation use every day. 1. Ethical questions Types of Machine Learning 2. Perceptions of unfair competition 3. Other potential risks Supervised Learning Semi-supervised Learning Data Policing Unsupervised Learning Reinforcement Learning Data policing refers to the practices and regulations involved in monitoring, managing, and ensuring the responsible use of data. Examples: Applications: Recommender Systems – These systems use Manufacturing – Robotics is widely used in supervised learning to suggest products, services, or manufacturing to automate repetitive tasks, increase content to users based on their preferences and past productivity and improve quality. behavior. Transportation – Self-driving cars, drones, and Computer Vision – Unsupervised learning is autonomous vehicles are examples of robotics used in computer vision to identify patterns and applications in transportation. features in images without labeled data. Healthcare – Robotics technology is increasingly Fraud Detection – Semi-supervised learning being used in healthcare to assist with surgeries, helps in detecting fraudulent activities by combining rehabilitation, and other medical procedures. a small amount of labeled data with a large amount Agriculture – Agricultural robots are being used of unlabeled data. to plant and harvest crops, monitor crop growth, and Self-Driving Cars – Reinforcement learning is perform other tasks to increase efficiency and reduce crucial for training autonomous vehicles to make labor costs. decisions and navigate safely. Construction – Robotics technology is being Video Games – Reinforcement learning is used used in construction to automate tasks such as to create intelligent agents that can learn and adapt bricklaying, concrete pouring, and other labor- to different game scenarios. intensive tasks. Spam Detection – Supervised learning is Space Exploration – Robotics technology plays employed to filter out spam emails by recognizing an important role in space exploration as it can be patterns in the content. used to explore other planets, moons, and asteroids. Market Prediction – Supervised learning models Service Industry – Robotics technology is used predict stock and housing market trends based on in the service industries such as hotels, malls, banks, historical data. etc. to provide customer service like answering Customer Segmentation – Unsupervised queries, providing information, and guiding learning helps businesses segment their customers customers. into different groups based on purchasing behavior Military and Defense – Robotics technology is and other factors. being used in military and defense to perform tasks such as surveillance, reconnaissance, and bomb Benefits of Machine Learning disposal. 1. Enhanced decision-making Drawbacks of Robotic Process 2. Automation 3. Personalization 1. Handling complex tasks 4. Scalability 2. High initial investment 5. Improved security 3. Scalability issues 6. Cost optimization 4. Impact on employment 7. Trend identification 5. Software dependency 6. Security challenges Drawbacks of Machine Learning Blockchain 1. Data dependency 2. High computational costs A decentralized, distributed ledger technology that 3. Complexity and underfitting securely records transactions across a network of 4. Bias and discrimination computers. 5. Security vulnerabilities 6. Ethical concerns Best known for their crucial role in cryptocurrency 7. Dependency on expertise systems for maintaining a secure. Robotic Process Applications: It is a technology that uses software robots, or “bots,” to Money Transfer – Blockchain is widely used in automate repetitive tasks typically performed by humans. financial services to facilitate secure and efficient money transfer. These bots can handle tasks such as data extraction, form Smart Contracts – These are automated filling, and file movement. agreements that execute when predefined conditions are met. Internet of Things (IoT) – Blockchain enhances Voice Biometrics for Security – This application IoT security by providing a decentralized and tamper- uses a person’s voice to authenticate their identity, proof ledger. enhancing security in various sectors. Personal Identity Security – Blockchain helps in Automotive – In-car voice recognition systems securing personal identities by storing data in a allow drivers to make calls, set directions, and control decentralized manner. music without taking their hands off the wheel. Healthcare – Blockchain is used to secure electronic health records (EHRs) and streamline Advantages of Voice Search clinical trial research. Logistics & Supply Chain Management – 1. Faster than typing Blockchain provides end-to-end visibility and 2. Advancements in Voice User Interface (VUI) traceability in supply chains. 3. Boosts productivity Non-Fungible Tokens (NFTs) – NFTs are digital 4. Instant access to information assets that represent ownership of unique items like 5. Breaking language barriers art, music, and videos. Government – Blockchain can improve Drawbacks of Voice Search government efficiency by securing documents and providing transparent record-keeping. 1. Privacy of voice recorded data 2. Error and misinterpretation of words Pros of Blockchain Technology Analytics 1. Enhanced Security 2. Transparency It is the process of gathering and analyzing data from a 3. Decentralization range of digital sources. And when used correctly, it can 4. Cost efficiency help inform your marketing decisions. 5. Speed and efficiency 6. Immutability Examples: 7. Accessibility Retail – Retailers use data analytics to anticipate Drawbacks of Blockchain Technology customer demands, ensuring merchandise availability. 1. Transaction limitations Banking and Finance – Financial institutions 2. High energy consumption use data analytics to manage risk, avoid errors, and 3. Scalability issues prevent fraud. 4. Regulatory concerns Construction – Data analytics helps construction companies with design and modeling, incorporating Voice Search environmental concerns, and integrating stakeholder inputs. Voice search functionality works through the automatic Transportation – Transport authorities use data speech recognition system (ASR) to transform voice analytics to capture customer journey preferences, signals into text. mitigate unexpected problems, and deliver personalized programs. Speech recognition technology has made our lives even Media and Entertainment – Companies in this easier and shopping more effortless. sector use data analytics to understand consumer usage patterns and deliver personalized content. Applications: Education – Educational institutions use data analytics to track student progress, fine-tune Voice Search – This is arguably the most teaching methods, and structure syllabi. common use of voice recognition technology. Healthcare – The medical industry uses data Speech to Text – Voice recognition enables analytics to improve patient care and community hands-free computing, allowing users to write emails, well-being. Wearable trackers collect health data, compose documents, and send texts without typing. helping physicians make better medical decisions. Smart Home Devices – Voice commands are Public Services – Governments use data used to control smart home devices, such as turning analytics to understand financial markets, research on lights, adjusting thermostats, and boiling water. health-related fields, conserve environmental Customer Service – Voice recognition is used in resources, and detect crime. call centers to provide 24/7 service, automate responses, and analyze call patterns. Disadvantages of Analytics 1. Data quality issues 2. Privacy concerns 3. Complexity and skill gap 4. Cost of implementation 5. Integration challenges 6. Bias and interpretation 7. Security risks 8. Lack of scalability Advantages of Analytics 1. Improved decision-making 2. Enhanced operational efficiency 3. Better customer understanding 4. Competitive 5. Risk mitigation 6. Costs savings 7. Innovation and product development 8. Performance monitoring 3. Financial theft or card payment data Living in the I.T. Era 4. Theft and sale of corporate data 5. Cyberextortion CM 2 (Part II): Digital Technology and 6. Ransomware attacks Social Change 7. Cryptojacking 8. Cyberespionage 9. Systems interference The Netiquette and the Computer Ethics 10. Infringing copyright 11. Illegal gambling Cyber/Computer Ethics 12. Selling illegal items online 13. Soliciting, producing, or possessing child It refers to the code of responsible behavior on the pornography internet. Examples of Cybercrime This includes social media etiquettes and communication etiquettes. 1. Malware attacks 2. Phishing Netiquettes 3. Distributed DOS attacks Ethical – It means we should share our How to Protect Yourself Against Cybercrime information and expertise online without any copyright violations. 1. Keep software and operating systems updated Respectful – It means we should respect other 2. Use anti-virus software and keep it updated people’s privacy and the freedom or personal 3. Use strong passwords expression. 4. Never open attachments in spam emails Responsible – It means we should not indulge in 5. Do not click on links in spam emails or untrusted any insulting, degrading or intimidating online websites behavior which is cyber bullying. 6. Do not give out personal information unless secure Cyber Bullying 7. Contact companies directly about suspicious requests This happens when a person is harassed, humiliated, 8. Be mindful of which websites URLs you visit embarrassed, threatened or tormented through the use of 9. Keep an eye on your bank statements digital technology. Social Media Etiquettes Protecting personal information Being careful with online friendships Managing sensitive and confidential files Beware of fake news Online Media Etiquettes The importance of being precise Mindfulness during online meetings Politeness and digital behavior Building digital credibility Cybercrime Cybercrime refers to illegal activities that involve targeting or utilizing computers, computer networks, or networked devices. Types of Cybercrime 1. Email and internet fraud 2. Identity fraud

Use Quizgecko on...
Browser
Browser