Empowerment Technology (ICT)_Grade 11.pptx

HazelTuberaIbrao 43 views 43 slides Oct 15, 2024
Slide 1
Slide 1 of 43
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43

About This Presentation

In this power point, "Information to ICT" and "Ethics on the Internet" are included.


Slide Content

Empowerment Technology ( ICT )

Introduction to I and C T nformation ommunication echnology It deals with the use of different communication technologies such as mobile phones, telephone, Internet to locate, save, send and edit information Is a study of computers as data processing tools. It introduces students to the fundamental of using computer systems in an internet environment.

Introduction to Information and Communication Technology ICT in the Philippines Philippines is dub as the “ ICT Hub of Asia” because of huge growth of ICT-related jobs, one of which is BPO, Business Process Outsourcing, or call centers.

Computer Internet – is the global system of interconnected computer networks that use the internet protocol suite (TCIP/IP) to link billions of devices worldwide. Introduction to Information and Communication Technology

Introduction to Information and Communication Technology World Wide Web An information system on the internet that allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another.

Introduction to Information and Communication Technology World Wide Web Is an information space where documents and other web resources are identified by URLs, interlinked by hypertext links, and can be accessed via the Internet. Invented by Tim-Berners Lee

Introduction to Information and Communication Technology Web Pages Web page is a hypertext document connected to the World Wide Web. It is a document that is suitable for the World Wide Web. a kind of specially-formatted text that provides a link to other content.

Introduction to Information and Communication Technology The different online platforms of World Wide Web: Web 1.0 – refers to the first stage in the World Wide Web, which was entirely made up of the Web pages connected by hyperlinks . A bit of text, an image, or a button in a hypertext document that you can click.It provides direct access from one place in a document to another in the same or a different document.

Introduction to Information and Communication Technology The different online platforms of World Wide Web: Here are a few characteristics found in Web 1.0: It’s made up of static pages connected to a system via hyperlinks It has HTML 3.2 elements like frames and tables HTML forms get sent through e-mail The content comes from the server's filesystem, not a relational database management system It features GIF buttons and graphics

Introduction to Information and Communication Technology The different online platforms of World Wide Web: Here are a few characteristics found in Web 1.0: HTML - HyperText Markup Language <!DOCTYPE html><html><head> <title>Page Title</title></head><body> <h1>My First Heading</h1> <p>My first paragraph.</p></body></html> Take a real-world dictionary, digitize everything in it, and make it accessible to people online to look at (but not be able to react to it).

Introduction to Information and Communication Technology The different online platforms of World Wide Web: Web 2.0 – is the evolution of Web 1.0 by adding dynamic pages. The user is able to see a website differently than others. – Allows users to interact with the page; instead of just reading the page, the user may be able to comment or create user account.

Introduction to Information and Communication Technology The different online platforms of World Wide Web: Web 2.0 characteristics: It encourages self-usage and allows forms of interaction like: Podcasting, Social media, Tagging. Blogging, Commenting, Curating with RSS, Social networking, Web content voting It’s used by society at large and not limited to specific communities.

Introduction to Information and Communication Technology The different online platforms of World Wide Web: Web 3.0 – this platform is all about semantic web. – Aims to have machines (or servers) understand the user’s preferences to be able to deliver web content.

Introduction to Information and Communication Technology The different online platforms of World Wide Web: Web 3.0 characteristics: It's a semantic web, where the web technology evolves into a tool that lets users create, share, and connect content via search and analysis. It is based on comprehension of words instead of numbers and keywords.

Introduction to Information and Communication Technology The different online platforms of World Wide Web: Web 3.0 characteristics: It uses 3-D graphics. In fact, we already see this in computer games, virtual tours, and e-commerce. It can be used for: Privacy and digital infrastructure: This use includes zero -knowledge proofs and more secure personal information

Introduction to Information and Communication Technology The different online platforms of World Wide Web: Web 3.0 characteristics: Decentralized autonomous organizations. Community members own online communities.

Ethics on the Internet Online Security and Safety Online safety , sometimes regarded as e-safety or cyber safety, refers to the maximization of internet user’s knowledge and awareness of safety protocols, online crimes, and security risks in the private property and information which are connected to the use of internet. Online safety is a user’s precautionary measures that he or she applies to ensure that his or her experience online does not harm him or her in any way.

Ethics on the Internet Online security , refers to the “rules that are followed and the actions that are taken to make sure that online users and data privacy aren’t compromised by cybercriminals”, (Mocan, 2019). Online security is designed by websites and other internet pages to ensure that the people accessing their sites and pages are protected from different online risks and danger. Online Security and Safety

Ethics on the Internet Online Crimes 1. Cyberbullying Republic Act 10627 or The Anti-Bullying Act of 2013 defines bullying as "any severe or repeated use by one or more students of a written, verbal or electronic expression, or a physical act or gesture, or any combination thereof, directed at another student that has the effect of actually causing or placing the latter in reasonable fear of physical or emotional harm or damage to his property; creating a hostile

Ethics on the Internet Online Crimes 1. Cyberbullying environment at school, infringing on the rights of another, or materially or substantially disrupting the education process." Any violation of this act is considered as cyberbullying. The Sec. 3 of the Implementing Rules of RA 10627 states that cyberbullying "covers social bullying aiming to belittle another individual or group or gender-based bullying that humiliates another on the basis of perceived or sexual orientation, or gender identity (in dela Cruz, 2017)."

Ethics on the Internet Online Crimes 1. Cyberbullying Cyberbullying comes in different forms. It can be flaming, harassment, denigration, impersonation, outing, trickery, exclusion, and cyberstalking. ferent forms. In the article, Cyber Safety: An Interactive Guide to Staying Safe on the internet, the following forms of cyberbullying are defined as:

Ethics on the Internet Online Crimes 1. Cyberbullying 1.1 Flaming is an online fight using electronic messages with angry and vulgar languages. 1.2 Harassment is the act of repeatedly sending nasty, mean, and insulting messages. 1.3 Denigration is sending or posting gossip or rumors about a person to damage his or her reputation or friendships.

Ethics on the Internet Online Crimes 1. Cyberbullying 1.4 Impersonation is when someone is pretending to be someone else and sending or posting material to get that person in trouble or da prefer to damage that person's reputation or friendships. 1.5 Outing is the act of sharing someone's secrets or embarrassing information or images online.

Ethics on the Internet Online Crimes 1. Cyberbullying 1.6 Trickery is when someone is talking to a person to let him or her reveal his or her secrets or embarrassing information and then, shares the sensitive information online. 1.7 Exclusion is when one is intentionally or cruelly excluded from an online group.

Ethics on the Internet Online Crimes 1. Cyberbullying 1.8 Cyberstalking is the act of repeated, intense harassment and denigration that includes threats or creates significant fear. Be cautious when surfing online as cyberbullying may occur in different online spaces such as in the emails, chat rooms, social media, blogs, video games, and even cellular phones.This may include depression , severe sadness , lowered self-worth and confidence , stress , absences in school , and even thoughts of self-harm .

Ethics on the Internet Online Crimes When cyberbullying is observed, it is best to do the f f : a. Inform a trusted person. The best persons to talk to are your parents or guardians. It can also be your teacher or any adult whom you trust. Tell them of your situation, as they can guide you on what to do. b. Try not to instigate. When there are mean or cruel actions done to you, try not to fight back with your emotions. This will further the bullying. Ignore them but be proactive.

Ethics on the Internet Online Crimes When cyberbullying is observed, it is best to do the f f : c. Block connection with the bully. Try to cut your online connection with the bully. If you two are connected in social media, unfriend or block him or her. d. Always be aware. It is important that you are aware of how people treat you online. Knowing these forms of bullying gives you a hint on whether these bullying perpetrators are starting to victimize you. If this is the case, take the necessary steps such as the ones mentioned earlier.

Ethics on the Internet Online Crimes When cyberbullying is observed, it is best to do the f f : e. Logout from online accounts. Forgetting to logout, especially from public computers, may give the bully the opportunity to instigate the crime. Always ensure that you have properly logged out. f. Be not a cyberbully. The golden rule, "Do not do to others what you would not want others to Bo to you," must always be observed izens in the online world. As part of ethical practices in surfing the net, never bully other netizens.

Ethics on the Internet Online Crimes 2. Identity Theft US Department of Justice defines "identity theft" and "identity fraud" as "all types of crimes in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain."

Ethics on the Internet Online Crimes 2. Identity Theft The US Department of Justice further explained that identity theft and fraud may commonly happen in these situations: a.When " shoulder surfing " is done by criminals, as you use online communication in public places. This may come in events the criminal is watching over you as you dial phone numbers , or when listening over conversations where they get private information like credit card number , birthday , or home address .

Ethics on the Internet Online Crimes 2. Identity Theft The US Department of Justice further explained that identity theft and fraud may commonly happen in these situations: b. When you receive pre-approved credit cards but discard them improperly. From here, criminals may be able to activate the trashed cards at your expense.

Ethics on the Internet Online Crimes 2. Identity Theft The US Department of Justice further explained that identity theft and fraud may commonly happen in these situations: C. When you respond to spam mails or unsolicited emails which require you to input personal data. The collected data will later be used to steal other information or to hack your online accounts.

Ethics on the Internet Online Crimes There are some practical tips that should be observed to be protected from online identity theft and fraud. a. Use Good Password. Ensure that your account password is strong. Strong password means that it is long enough, makes use of mixed types of characters, and should be relevant and irrelevant. A password that is relevant and irrelevant means that the password seems random to other people, but meaningful specifically to the owner.

Ethics on the Internet Online Crimes There are some practical tips that should be observed to be protected from online identity theft and fraud. b. Report Identity Theft. Violations can be reported to the right authorities that are responsible for dealing with crimes. On social media, it can be initially reported to the site, but in serious cases, the victim may avail a legal advice and have this raised to a court.

Ethics on the Internet Online Crimes 3. Phishing Oxford Lexico defines phishing as, "the fraudulent practice of sending emails to be from reputable companies in oerder to induce individuals to reveal personal information such as passwords and credit card numbers”. Many official correspondence texts ask for digital signature.

Ethics on the Internet Online Crimes 3. Phishing Nevertheless, there are ways to be secured from phishing attacks. One might consider the following: a. Be scrutinizing of the website that you are logged in. Many websites that intend to scam internet users imitate the original sites.

Ethics on the Internet Online Crimes 3. Phishing Nevertheless, there are ways to be secured from phishing attacks. One might consider the following: b. Be cautious on giving information online. If you are not sure of the security, do not provide essential and sensitive information that are unique to you like your birth date, financial data, passwords, or home address.

Ethics on the Internet Online Crimes 3. Phishing Nevertheless, there are ways to be secured from phishing attacks. One might consider the following: c. Be alert with links sent via messages and emails. These maybe schemes to steal your personal information.

Ethics on the Internet Online Crimes 4 . Plagiarism or Copyright Infringement is presenting someone else’s work or ideas as your own, with or without their consent, by incorporating it in your work without full acknowledgement the violation may be one or a combination of these forms: verbatim qoutation without clear acknowledgement , cutting and pasting ideas from the internet without proper citation , paraphrasing without due acknowledgement of the source , collusion , autoplagiarism

Ethics on the Internet Online Crimes 4 . Plagiarism or Copyright Infringement The best way that you can avoid these crimes is to be respectful of others’ intellectual properties. When you use any of other people’s works, be sure that you will sufficiently acknowledge them and/or secure permission for using a particular text or media.

Ethics on the Internet Online Etiquette Acceptable conduct that adheres to polite behaviours and respectful manners is called online etiquette. Here are the ways on how to behave and present yourself when you are online: 1. Be always courteous 2. Do not use foul language and incite anger by writing in uppercase and overusing the exclamation mark

Ethics on the Internet Online Etiquette Acceptable conduct that adheres to polite behaviours and respectful manners is called online etiquette. Here are the ways on how to behave and present yourself when you are online: 3. Appropriate your humor and avoid sarcasm 4. Do not share or post offensive materials 5. Always acknowledge owners of ideas and materials used

Ethics on the Internet Online Etiquette Acceptable conduct that adheres to polite behaviours and respectful manners is called online etiquette. Here are the ways on how to behave and present yourself when you are online: 6. Try to be understanding to a maximum tolerance. Be kind 7. Respect others’ opinions. Deal with everyone with a humanitarian approach.
Tags