Empowerment Technology
FIRST QUARTER
Good Luck and God Bless!
Empowerment Technology
Coverage of 1
st
Quarter
UnitI:InformationandCommunicationTechnology
Lesson1-WhatisInformationandCommunicationTechnology(ICT)
Lesson2–OnlineSafety,Security,Ethics,andEtiquette
Lesson3–ContextualizedOnlineSearchandResearchSkills
Lesson4–DevelopingICTContentforSpecificPurposes
Lesson5–ManipulatingText,Graphics,andImagestoCreateICT
ContentIntendedforanOnlineEnvironment
???
???
???
???
Charles Babbage
“Father of Computing”
Timothy John Berners-Lee
Inventor of the World Wide Web
VintCerf
Co-founder of Internet
Steve Jobs
Co-founder of Apple Company
What is ICT?
Gathering Information
ACQUISITION
Refinement of data and stored properly
STORAGE
Analyzing stage, to convert data into information
MANIPULATION
Solution or answer
RETRIEVAL
Report
DISTRIBUTION
Data
Information
Steps involved in Converting Data to Information
Information and Communication Technology
(ICT)
Deals with the use of different communication
technologiessuch as mobile phones, telephone,
Internet, etc. to locate, save, send, and edit
information.
Readiness for the Networked World
Is the degree to which a community is prepared to
participate in the Networked World. It is gauged by
assessing a community’s advancement in the areas that
are most critical to the adoption of information and
communication technologies.
According to Harvard Center for
International Development
The assessment section of the Guide asks participants to place their
community on a scale from one to four (lowest to highest) in nineteen
categories, grouped in five sections
Network Access
What are the availability, cost and quality of ICT
networks, services and equipment?
Networked Learning
Does the educational system integrate ICTs into its
processes to improve learning? Are there technical
training programs in the community that can train
and prepare an ICT workforce?
Networked Society
To what extent are individuals using information and
communication technologies at work and in their
personal lives? Are there significant opportunities
available for those with ICT skills?
Networked Economy
How are businesses and governments using
information and communication technologies to
interact with the public and with each other?
Network Policy
To what extent does the policy environment
promote or hinder the growth of ICT adoption and
use?
1
Be mindfulof what you share
online and what site you share it to.
2
Do not just accept terms and
condition; read it.
3
Check out the privacy policy page
of a website to learn how the
website handles the information
you shares.
4
Know the security features of the
social networking site you use. By
keeping your profile private, search
engines will not be able to scan your
profile.
5
Do not share your password
anyone.
6
Avoid logging on to public
network/Wi-Fi. Browsing in
“incognito or private mode”, a
feature of the browser, will not
protect you from hackers.
7
Do not talk to strangerswhether
online or face-to-face.
8
Never post anything about a future
vacation. It is similar to posting,
“Rob my house at this date.”
9
Add friends you know in real life.
10
Avoid visiting untrustedwebsite.
11
Install and update an antivirus
software on your computer. Use
only one antivirussoftware to
avoid conflict.
12
If you have a WIFI at home, make it
a private network by adding a
password.
13
Avoid downloading anything from
untrusted website. Your are most
vulnerable in peer-to-peer
downloads (torrents) as the
download is most likely not
monitored by the site owner.
14
Buy the software; do not used
piratedone.
15
Do not reply or click links from
suspicious emails.
Online Threats
Online Threats
Malware, Spam, & Phishing
1. MALWARE
Stands for Malicious Software
a. Virus
Amaliciousprogramdesignedto
replicateitselfandtransferformone
computertoanotherthroughthe
internetandlocalnetworkordata
storage.
b. Worm
Amaliciousprogramthattransferfrom
onecomputertoanotherbyanytypeof
means.
Trivia:
ILOVEYOUworm(LoveBugWorm)
CreatedbyaFilipino.
c. Trojan
Itdisguisedasausefulprogram.
Sampleare:
CrackAntivirus
YoutubeDownloader
Pre-ActivatedApplication
Copyright Infringement
As a general matter, copyright infringement
occurs when a copyrighted work is reproduced,
distributed, performed, publicly displayed, or
made into a derivative work without the
permission of the copyright owner.
Definitions (FAQ) - U.S. Copyright Office
https://www.copyright.gov›
Intellectual Property
An idea, an invention, a form of literary work,
or research, you have the right as to how it
should be used by others.