SlideShare a Scribd company logo
1 of 19
ICT
Information and Communication
Technology
• Information and Communication Technology
has provided society with a huge range of new
communication capabilities, competence, and
experiences.
• It allows people in different locations to
communicate in real-time through the use of
technologies such as instant messaging,
blogging, chatting, and audio-video
conferencing and the like.
Although ICT has brought many
benefits and conveniences, there
are many things to be considered
and special precautions that need
to be followed.
Benefits that technology can provide
to Enterprises.
• Efficient Management and Increased
Productivity.
• Increased Collaboration.
• Increased Communication.
• Better customer Satisfaction.
Popular Online Tools that can be
used for business today.
1. Wiki
- A website that allows Internet
users to contribute, delete, make
changes, or correct information on
the content by signing-up.
Popular Online Tools that can be
used for business today.
2. Blog Site
-a kind of website that contains
online personal reflections,
comments and hyperlinks provided
by the writer or contributor.
Popular Online Tools that can be
used for business today.
3. Email
- Short for electronic mail. It is an
electronic message sent from one
device to another.
Popular Online Tools that can be
used for business today.
4. Teleconference
- A type of meeting involving three
or more people in different
locations by using computer
networks capable of transmitting
audio and video data.
Internet Safety
1. Make sure all personal
information and passwords
are kept private.
Internet Safety
2. Never meet up with
people you only know
online.
Internet Safety
3. Do not open emails from
strangers and unknown
sources.
Internet Safety
Not all information online is
reliable. Always check or
verify all information and
data.
Internet Safety
Tell a trusted adult if
anything online makes you
feel uncomfortable or
threatened.
Dangers and Threats on
the Internet
• Spam Mail
• Spyware
• Pharming
• Computer Virus
• Hacker
Some safety and responsible
practices in using online tools.
1. Use the computer or mobile device
for learning, studying, and
researching for information.
2. Keep your password safe.
Some safety and responsible
practices in using online tools.
3. Follow age restrictions and policies.
4. Show respect for others online and
their work.
5. Do not copy other people’s work.
Some safety and responsible
practices in using online tools.
6. Do not make untrue and/or
damaging remarks that embarrass
others.
7. Do not use other people’s accounts.
Some safety and responsible
practices in using online tools.
8. Do not share another person’s full
name or send his or her photo without
permission.
9. Be careful in sharing your personal
information.
Some safety and responsible
practices in using online tools.
10. If you are the moderator,post the
rules for the participants;if you are a
participant, follow the rules or
prescribed netiquette.
11. Use your time wisely.

More Related Content

What's hot

Social & professional issues in IT
Social & professional issues in ITSocial & professional issues in IT
Social & professional issues in ITRohana K Amarakoon
 
The 9 elements of digital citizenship
The 9 elements of digital citizenshipThe 9 elements of digital citizenship
The 9 elements of digital citizenshipJimPowers
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipZephyrum
 
Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)Hîmãlåy Làdhä
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYFaMulan2
 
Net smartz teens-presentation-2015 mac
Net smartz teens-presentation-2015 macNet smartz teens-presentation-2015 mac
Net smartz teens-presentation-2015 mackdcsdross
 
Six pillars for web 2 powerpoint
Six pillars for web 2 powerpointSix pillars for web 2 powerpoint
Six pillars for web 2 powerpointberryj
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionHannah323676
 
Ten commandments
Ten commandmentsTen commandments
Ten commandmentslsanford84
 
Reflective Response
Reflective Response Reflective Response
Reflective Response Ern Marino
 
WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers Dinesh O Bareja
 
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEAlminaVelasco
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 

What's hot (19)

Social & professional issues in IT
Social & professional issues in ITSocial & professional issues in IT
Social & professional issues in IT
 
The 9 elements of digital citizenship
The 9 elements of digital citizenshipThe 9 elements of digital citizenship
The 9 elements of digital citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Krishna cyber safety
Krishna cyber safetyKrishna cyber safety
Krishna cyber safety
 
Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
Net smartz teens-presentation-2015 mac
Net smartz teens-presentation-2015 macNet smartz teens-presentation-2015 mac
Net smartz teens-presentation-2015 mac
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Six pillars for web 2 powerpoint
Six pillars for web 2 powerpointSix pillars for web 2 powerpoint
Six pillars for web 2 powerpoint
 
Internet safety
Internet safetyInternet safety
Internet safety
 
7 computer ethics
7 computer ethics7 computer ethics
7 computer ethics
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Ten commandments
Ten commandmentsTen commandments
Ten commandments
 
Reflective Response
Reflective Response Reflective Response
Reflective Response
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers
 
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 

Similar to ICT online tools & Internet Safety

NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxCatherineBagaan
 
DIWAN2 HUMSS 11 A.pptx
DIWAN2 HUMSS 11 A.pptxDIWAN2 HUMSS 11 A.pptx
DIWAN2 HUMSS 11 A.pptxJoshuaCasas7
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteGab Billones
 
Chapter7-ICT as Platform for Change.pptx
Chapter7-ICT as Platform for Change.pptxChapter7-ICT as Platform for Change.pptx
Chapter7-ICT as Platform for Change.pptxAnamaeIcaranomFlores
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipegschool
 
Digital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptxDigital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptxJCGonzaga1
 
TLE 6_LESSON 2_SAFE AND RESPONSIBLE USE OF ICT.pptx
TLE 6_LESSON 2_SAFE AND RESPONSIBLE USE OF ICT.pptxTLE 6_LESSON 2_SAFE AND RESPONSIBLE USE OF ICT.pptx
TLE 6_LESSON 2_SAFE AND RESPONSIBLE USE OF ICT.pptxBryanBangiban1
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxRheamaeLiwan
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxJakeTorio1
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxEhraicaSaquing
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxDineLiwan
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxLiberty Aquino
 

Similar to ICT online tools & Internet Safety (20)

NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
 
DIWAN2 HUMSS 11 A.pptx
DIWAN2 HUMSS 11 A.pptxDIWAN2 HUMSS 11 A.pptx
DIWAN2 HUMSS 11 A.pptx
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
 
8._safety_and_security.pdf
8._safety_and_security.pdf8._safety_and_security.pdf
8._safety_and_security.pdf
 
Chapter7-ICT as Platform for Change.pptx
Chapter7-ICT as Platform for Change.pptxChapter7-ICT as Platform for Change.pptx
Chapter7-ICT as Platform for Change.pptx
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Digital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptxDigital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptx
 
TLE 6_LESSON 2_SAFE AND RESPONSIBLE USE OF ICT.pptx
TLE 6_LESSON 2_SAFE AND RESPONSIBLE USE OF ICT.pptxTLE 6_LESSON 2_SAFE AND RESPONSIBLE USE OF ICT.pptx
TLE 6_LESSON 2_SAFE AND RESPONSIBLE USE OF ICT.pptx
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
SOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptxSOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptx
 

Recently uploaded

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 

Recently uploaded (20)

Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

ICT online tools & Internet Safety

  • 2. • Information and Communication Technology has provided society with a huge range of new communication capabilities, competence, and experiences. • It allows people in different locations to communicate in real-time through the use of technologies such as instant messaging, blogging, chatting, and audio-video conferencing and the like.
  • 3. Although ICT has brought many benefits and conveniences, there are many things to be considered and special precautions that need to be followed.
  • 4. Benefits that technology can provide to Enterprises. • Efficient Management and Increased Productivity. • Increased Collaboration. • Increased Communication. • Better customer Satisfaction.
  • 5. Popular Online Tools that can be used for business today. 1. Wiki - A website that allows Internet users to contribute, delete, make changes, or correct information on the content by signing-up.
  • 6. Popular Online Tools that can be used for business today. 2. Blog Site -a kind of website that contains online personal reflections, comments and hyperlinks provided by the writer or contributor.
  • 7. Popular Online Tools that can be used for business today. 3. Email - Short for electronic mail. It is an electronic message sent from one device to another.
  • 8. Popular Online Tools that can be used for business today. 4. Teleconference - A type of meeting involving three or more people in different locations by using computer networks capable of transmitting audio and video data.
  • 9. Internet Safety 1. Make sure all personal information and passwords are kept private.
  • 10. Internet Safety 2. Never meet up with people you only know online.
  • 11. Internet Safety 3. Do not open emails from strangers and unknown sources.
  • 12. Internet Safety Not all information online is reliable. Always check or verify all information and data.
  • 13. Internet Safety Tell a trusted adult if anything online makes you feel uncomfortable or threatened.
  • 14. Dangers and Threats on the Internet • Spam Mail • Spyware • Pharming • Computer Virus • Hacker
  • 15. Some safety and responsible practices in using online tools. 1. Use the computer or mobile device for learning, studying, and researching for information. 2. Keep your password safe.
  • 16. Some safety and responsible practices in using online tools. 3. Follow age restrictions and policies. 4. Show respect for others online and their work. 5. Do not copy other people’s work.
  • 17. Some safety and responsible practices in using online tools. 6. Do not make untrue and/or damaging remarks that embarrass others. 7. Do not use other people’s accounts.
  • 18. Some safety and responsible practices in using online tools. 8. Do not share another person’s full name or send his or her photo without permission. 9. Be careful in sharing your personal information.
  • 19. Some safety and responsible practices in using online tools. 10. If you are the moderator,post the rules for the participants;if you are a participant, follow the rules or prescribed netiquette. 11. Use your time wisely.