empowerment technology for stem and gas .pdf

ChristianZapico1 103 views 68 slides May 09, 2024
Slide 1
Slide 1 of 68
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68

About This Presentation

ICT


Slide Content

Empowerment Technology
FIRST QUARTER
Good Luck and God Bless!

Empowerment Technology

Coverage of 1
st
Quarter
UnitI:InformationandCommunicationTechnology
Lesson1-WhatisInformationandCommunicationTechnology(ICT)
Lesson2–OnlineSafety,Security,Ethics,andEtiquette
Lesson3–ContextualizedOnlineSearchandResearchSkills
Lesson4–DevelopingICTContentforSpecificPurposes
Lesson5–ManipulatingText,Graphics,andImagestoCreateICT
ContentIntendedforanOnlineEnvironment

???

???

???

???

Charles Babbage
“Father of Computing”

Timothy John Berners-Lee
Inventor of the World Wide Web

VintCerf
Co-founder of Internet

Steve Jobs
Co-founder of Apple Company

What is ICT?

Gathering Information
ACQUISITION
Refinement of data and stored properly
STORAGE
Analyzing stage, to convert data into information
MANIPULATION
Solution or answer
RETRIEVAL
Report
DISTRIBUTION
Data
Information
Steps involved in Converting Data to Information

Information and Communication Technology
(ICT)
Deals with the use of different communication
technologiessuch as mobile phones, telephone,
Internet, etc. to locate, save, send, and edit
information.

https://wheelofnames.com/

IntheApril2022OoklaSpeedtestGlobal
Index,thePhilippinesranked95thof142
countriesinmobileinternetspeedwith
19.45Mbps(globalaverageof30.75Mbps)
and59thof181countrieswith55.21Mbps
(globalaverageof63.46Mbps)infixed
broadbandspeed.By2025,thenumberof
mobilesubscribersinthePhilippineswill
reach159million,andbroadband
subscriberswillnumber10.8million.

ICT in the Community

Readiness for the Networked World

Readiness for the Networked World
Is the degree to which a community is prepared to
participate in the Networked World. It is gauged by
assessing a community’s advancement in the areas that
are most critical to the adoption of information and
communication technologies.

According to Harvard Center for
International Development
The assessment section of the Guide asks participants to place their
community on a scale from one to four (lowest to highest) in nineteen
categories, grouped in five sections

Assessment Guide
•Network Access
•Networked Learning
•Networked Society
•Networked Economy
•Network Policy

Network Access
What are the availability, cost and quality of ICT
networks, services and equipment?

Networked Learning
Does the educational system integrate ICTs into its
processes to improve learning? Are there technical
training programs in the community that can train
and prepare an ICT workforce?

Networked Society
To what extent are individuals using information and
communication technologies at work and in their
personal lives? Are there significant opportunities
available for those with ICT skills?

Networked Economy
How are businesses and governments using
information and communication technologies to
interact with the public and with each other?

Network Policy
To what extent does the policy environment
promote or hinder the growth of ICT adoption and
use?

ICT in the Community

Great Job Everyone!
Lesson 1, Done!
Multimedia Source & References: www.google.com,www.youtube.com

Online Safety, Security, Ethics, and Etiquette

Tips to Safe Online

1
Be mindfulof what you share
online and what site you share it to.

2
Do not just accept terms and
condition; read it.

3
Check out the privacy policy page
of a website to learn how the
website handles the information
you shares.

4
Know the security features of the
social networking site you use. By
keeping your profile private, search
engines will not be able to scan your
profile.

5
Do not share your password
anyone.

6
Avoid logging on to public
network/Wi-Fi. Browsing in
“incognito or private mode”, a
feature of the browser, will not
protect you from hackers.

7
Do not talk to strangerswhether
online or face-to-face.

8
Never post anything about a future
vacation. It is similar to posting,
“Rob my house at this date.”

9
Add friends you know in real life.

10
Avoid visiting untrustedwebsite.

11
Install and update an antivirus
software on your computer. Use
only one antivirussoftware to
avoid conflict.

12
If you have a WIFI at home, make it
a private network by adding a
password.

13
Avoid downloading anything from
untrusted website. Your are most
vulnerable in peer-to-peer
downloads (torrents) as the
download is most likely not
monitored by the site owner.

14
Buy the software; do not used
piratedone.

15
Do not reply or click links from
suspicious emails.

Online Threats

Online Threats
Malware, Spam, & Phishing

1. MALWARE
Stands for Malicious Software

a. Virus
Amaliciousprogramdesignedto
replicateitselfandtransferformone
computertoanotherthroughthe
internetandlocalnetworkordata
storage.

b. Worm
Amaliciousprogramthattransferfrom
onecomputertoanotherbyanytypeof
means.
Trivia:
ILOVEYOUworm(LoveBugWorm)
CreatedbyaFilipino.

c. Trojan
Itdisguisedasausefulprogram.
Sampleare:
CrackAntivirus
YoutubeDownloader
Pre-ActivatedApplication

c.1. Rogue Security
Software
Tricktheuserbyposingthatisa
securitysoftware.

d. Spyware
Programthatruninthebackground
withoutnoticingit.
Tocheckthis:
OpentheTaskManager
(ctrl+alt+delete)

d.1. Keylogger
Usetorecordthekeystrokedoneby
theuser.

e. Adware
Aprogramdesigntosendyou
advertisement.(ADS)

2. Spam
Unwantedemails,mostlyfrombotsor
advertisement.

3. Phishing
Itsgoalistoacquiresensitive
informationlikepasswordandcredit
carddetails.

3.1 Pharming
Amorecomplicatedwayofphishing
whereitexploitstheDNSsystem.
Mainuse:
DDoSAttack(toavoid,useVPN)
VirtualPrivateNetwork

Copyright Infringement
As a general matter, copyright infringement
occurs when a copyrighted work is reproduced,
distributed, performed, publicly displayed, or
made into a derivative work without the
permission of the copyright owner.
Definitions (FAQ) - U.S. Copyright Office
https://www.copyright.gov›

Intellectual Property
An idea, an invention, a form of literary work,
or research, you have the right as to how it
should be used by others.

Great Job Everyone!
Empowerment Technology
Multimedia Source & References: www.google.com,www.youtube.com
(Book)REX Bookstore – Empowerment Technology

HOW TO STAY SAFE
ONLINE
Tags