0% found this document useful (0 votes)
9 views28 pages

Ict - Information Communicatiion Technology

EMPOWERMENT TECHNOLOGY

Uploaded by

larry macapia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views28 pages

Ict - Information Communicatiion Technology

EMPOWERMENT TECHNOLOGY

Uploaded by

larry macapia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 28

ICT – INFORMATION

COMMUNICATIION
TECHNOLOGY
Is an umbrella term referring to communication hardware or
software that allows the access, storage, transmission and
manipulation of information.

In terms of hardware, ICT specifically encompasses radio,


television, communication devices (smart and non-smart phones),
desktops computer, laptops and network hardware and
technologies.
ICT comprised of software, application and platforms that allows
information to bbe accessed, stored transmitted and manipulated.
CURRENT STATE OF ICT
1. Convergent Technologies – This is when multiple different
devices combine into a single gadget because of technological
advancement. One example of this smartphone, where it is capable
of doing the functions of a television, radio, computer,telephone,
camera and GPS as a single devices.
2. Social Media – These are software, applications or platforms that
allow user to communicate in an online social communities or
network. Social media allows people to communicate faster through
a larger number of people.
3. Mobile Technologies – This is a term for devices that are easily
carried and allows ffast means of communiucation. These devices
from the past were originally big and bulk, but due to the
technological advancement, they become smaller and more
compact.
Desktop
s and
laptops
1 2 Mobile
phones
and

4
smart
phones

3 Televisi
on and
Radio
There's almost no limit to what you can do online. The
Internet makes it possible to access information quickly,
communicate around the world, and much more.
Unfortunately, the Internet is also home to certain risks,
such as malware, spam, and phishing. If you want to stay
safe online, you'll need to understand these risks and
learn how to avoid them.
SHARED OR NOT SHARED?
THAT IS THE QUESTION
DIRECTIONS:
Read and reflect
each item
carefully. Copy
the table below
on your notebook
and check the
space whether
you have shared
or not shared
these pieces of
information in all
your social media
accounts.
ONLINE SAFETY, SECURITY
AND NETIQUETTE
There are numerous delinquencies that can be committed
on the internet such as stalking, identity theft, privacy
violations, and harassment.

To avoid these online crimes, follow the following online


safety measures:
Never give any personal information out about yourself
over the internet.
Do not give any banking or sensitive information unless
you are sure that it is a reputable business having a
secure service. To make sure that you are in a
secured network, the website address should begin with
“https://’ as opposed to “http://”. Never access your
accounts by following an email link, instead type your URL
Never open messages or attachments from someone
you do not know.
Regularly review your privacy settings in your online
accounts to make sure you are not sharing important
personal information.
When using a public computer terminal, be sure to
delete your browsing data before leaving.
Keep your software updated to avoid security holes
Do not download or install software or anything on your
computer or cell phone that is unknown to you.
NETIQUETTE
a combination of the
words network and
etiquette. It is a set of
rules for behaving
properly online.
10 RULES OF
NETIQUETTE:
Flame war is a series of
flame posts or messages in a
thread that are considered
derogatory in nature or are
completely off-topic. Often
these flames are posted for the
sole purpose of offending or
upsetting other users. The
flame becomes a flame war
when other users respond to
the thread with their own flame
message.
KINDS OF
ONLINE
THE FOLLOWING ARE THE TOP KINDS OF
ONLINE THREATS THAT YOU SHOULD BE AWARE
OF
A. Phishing happens
when an email is
sent from an internet
criminal disguised as an
email from a legitimate,
trustworthy source. The
message is meant to
lure you into revealing
sensitive or confidential
information.
B. Pharming happens
when a hacker (or
“pharmer”) directs an
internet user to a fake
website instead of a
legitimate one. These
“spoofed” sites can
capture a victim’s
confidential information,
including usernames,
passwords, and credit
card data, or install
malware on their
computer. Pharmers
usually focus on websites
in the financial sector,
C. Internet Scam
generally refers to someone
using internet services or
software to defraud or
take advantage of
victims, typically for
financial gain.
Cybercriminals may
contact potential victims
through personal or work
email accounts, social
networking sites, dating
apps, or other methods in
attempts to obtain
financial or other valuable
personal information.
D. Internet robots are also known as spiders,
crawlers, and web bots. It is a software application
that is programmed to do certain tasks. Bots are
automated, which means they run according to their
instructions without a human user. Some bots are
useful, such as search engine bots that index content
for search or customer service bots that help users.
Other bots are "bad" and are programmed to break
into user accounts, scan the web for contact
information for sending spam, or perform other
malicious activities. If it's connected to the Internet, a bot
will have an associated IP address.
E. Malware or malicious software, is any program or
file that is harmful to a computer user. Here are the
most common offenders in the rogues’ gallery of
malware:
F. Spams are unsolicited emails, instant messages coming from
recipients that are not granted verifiable permission for the
message to be sent. Spam messages can be damaging if you open
or respond to it.

G. Cyberstalking refers to the use of the internet or other electronic


device to harass or stalk individuals or organizations.
H. Cyberbullying refers to the act of tormenting, harassing, or
embarrassing another person using the internet.

I. Spoofing happens when someone or something pretends to be


something else to gain our confidence, get access to our
systems, steal data, steal money, or spread malware.
SHOW ME HOW YOU
HASHTAG
Direction: Look at the following
images and create a hashtag
based on the type of online
threat represented by each
image. Write your answers in
your activity notebook
Why is there a need to “Think
before you click?”

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy