SlideShare a Scribd company logo
1 of 9
ICT IN CONTEXT OF
GLOBAL
COMMUNICATION
EMPOWERMENT TECHNOLOGY
Government Service
OComputers in government offices
are used by Bureau of Internal
Revenue (BIR) to compute taxes of
real properties such as homes and
buildings.
OThe city governments to render
service to it’s citizens; for example,
traffic lights are controlled by
computer to lessen congestion of
vehicles.
O The National Statistics Office (NSO) uses computers
to record the birth, marriages, and deaths of then
country’s citizen. It is also used to record other
valuable personal information.
O The Department of Foreign Affairs (DFA) records all
citizen travelling abroad. DFA issues computer-
generated passports, the latest passports have
barcodes included for faster information retrieval and
monitoring.
Military Application
O Computer are used to guide weapon
systems from any source to pinpoint
targets with precision and accuracy.
O Computers on board mechanical vehicles
are used to locate and diffused bombs.
O Computers controlled unmanned
airplanes, or drones to locate enemy
locations and deliver firepower when
necessary.
O Computers used software embedded in
many modern weapons to ensure
accuracy and precision. Computer are
also process valuable information or
intelligence especially impending terrorist
attacks
Weather Analysis
O There are supercomputers used to
analyze and predict the weather of the
day. Data gather from weather satellites
will be calculated by these computers to
give the wind direction, wind velocity,
volume or rainfall, and other important
weather information.
Space Exploration
O The National Aeronautics and Space
administration (NASA) in the U.S.A uses
computers in spacecraft to explore planets
and other heavenly bodies.
O Computers are likewise used in Earth
control stations for the spacecraft and
satellite on mission.
O Computers are also used on satellites and
control stations to monitor weather, transmit
voice and data , and other applications around
the world.
O Computers on board spacecraft are equipped
with camera, video and other sensor that send
vital data back to earth.
Aeronautics
O Pilots are trained using software which
stimulates flying. Flight stimulations are
safe and cost-effective means of training
future pilots without the risk of the real
airplane crash. They employ software to
enhance both visual and mechanical
reflexes to new and even seasoned pilots.

More Related Content

What's hot

[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLSJazzyNF
 
2 Online Safety, Security, Ethics, and Etiquette
2 Online Safety,  Security, Ethics, and Etiquette2 Online Safety,  Security, Ethics, and Etiquette
2 Online Safety, Security, Ethics, and EtiquetteTeodoro Llanes II
 
Imaging and Design for Online Environment
Imaging and Design for Online EnvironmentImaging and Design for Online Environment
Imaging and Design for Online EnvironmentRichard Meriveles
 
Imaging and Design for the Online Environment - Empowerment Technologies
Imaging and Design for the Online Environment - Empowerment TechnologiesImaging and Design for the Online Environment - Empowerment Technologies
Imaging and Design for the Online Environment - Empowerment TechnologiesMark Jhon Oxillo
 
Dll empowerment technologies
Dll empowerment technologiesDll empowerment technologies
Dll empowerment technologieswacasr12
 
Contextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsContextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsAngelito Quiambao
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Jesus Rances
 
Contextualized Online Search and search skills zeng
Contextualized Online Search and search skills zengContextualized Online Search and search skills zeng
Contextualized Online Search and search skills zengRose Yanna
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyesandregoron
 
11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change11 Developing ICT Project for Social Change
11 Developing ICT Project for Social ChangeTeodoro Llanes II
 
Imaging and Design for Online Environment
Imaging and Design for Online EnvironmentImaging and Design for Online Environment
Imaging and Design for Online EnvironmentAngelito Quiambao
 
Managing and sustaining ict projects
Managing and sustaining ict projectsManaging and sustaining ict projects
Managing and sustaining ict projectsAubrey Mae Antonio
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATSJazzyNF
 
Empowerment Technologies - Microsoft Word
Empowerment Technologies - Microsoft WordEmpowerment Technologies - Microsoft Word
Empowerment Technologies - Microsoft WordJuan Miguel Palero
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Dll_empowerment_technologies.docx
Dll_empowerment_technologies.docxDll_empowerment_technologies.docx
Dll_empowerment_technologies.docxrodelmegollas4
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 

What's hot (20)

[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
 
2 Online Safety, Security, Ethics, and Etiquette
2 Online Safety,  Security, Ethics, and Etiquette2 Online Safety,  Security, Ethics, and Etiquette
2 Online Safety, Security, Ethics, and Etiquette
 
Imaging and Design for Online Environment
Imaging and Design for Online EnvironmentImaging and Design for Online Environment
Imaging and Design for Online Environment
 
Imaging and Design for the Online Environment - Empowerment Technologies
Imaging and Design for the Online Environment - Empowerment TechnologiesImaging and Design for the Online Environment - Empowerment Technologies
Imaging and Design for the Online Environment - Empowerment Technologies
 
Empowerment Technology
Empowerment TechnologyEmpowerment Technology
Empowerment Technology
 
ETECH MELCS
ETECH MELCSETECH MELCS
ETECH MELCS
 
Dll empowerment technologies
Dll empowerment technologiesDll empowerment technologies
Dll empowerment technologies
 
Contextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsContextualized Online Search and Research Skills
Contextualized Online Search and Research Skills
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1
 
Empowerment Technology - Learning Content
Empowerment Technology -  Learning ContentEmpowerment Technology -  Learning Content
Empowerment Technology - Learning Content
 
Contextualized Online Search and search skills zeng
Contextualized Online Search and search skills zengContextualized Online Search and search skills zeng
Contextualized Online Search and search skills zeng
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
 
11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change
 
Imaging and Design for Online Environment
Imaging and Design for Online EnvironmentImaging and Design for Online Environment
Imaging and Design for Online Environment
 
Managing and sustaining ict projects
Managing and sustaining ict projectsManaging and sustaining ict projects
Managing and sustaining ict projects
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Empowerment Technologies - Microsoft Word
Empowerment Technologies - Microsoft WordEmpowerment Technologies - Microsoft Word
Empowerment Technologies - Microsoft Word
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Dll_empowerment_technologies.docx
Dll_empowerment_technologies.docxDll_empowerment_technologies.docx
Dll_empowerment_technologies.docx
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 

Similar to Ict in context of global communication

Group ppt 30127290-30129080-emerging tech. of business
Group ppt 30127290-30129080-emerging tech. of businessGroup ppt 30127290-30129080-emerging tech. of business
Group ppt 30127290-30129080-emerging tech. of businessMANDEEP5669
 
Computer Science Engineering
Computer Science EngineeringComputer Science Engineering
Computer Science Engineeringmanjusha pawar
 
What is Computer and Uses of Computer in modern ERA.
 What is Computer and Uses of Computer in modern ERA. What is Computer and Uses of Computer in modern ERA.
What is Computer and Uses of Computer in modern ERA.Arslan Haider
 
NSIT Unmanned Aerial Vehicle Orientation
NSIT Unmanned Aerial Vehicle OrientationNSIT Unmanned Aerial Vehicle Orientation
NSIT Unmanned Aerial Vehicle OrientationPallav Raj
 
Role of/on government in Technology
Role of/on government in TechnologyRole of/on government in Technology
Role of/on government in TechnologyR
 
Uses of computer in space
Uses of computer in spaceUses of computer in space
Uses of computer in spaceAbdul Hadi
 
AI/Artificial Intelligent in Aviation Beyond Covid 19
AI/Artificial Intelligent in Aviation Beyond Covid 19AI/Artificial Intelligent in Aviation Beyond Covid 19
AI/Artificial Intelligent in Aviation Beyond Covid 19Assem mousa
 
IMPORTANCE OF COMPUTERS IN TRANSPORTATION GROUP15.pptx
IMPORTANCE OF COMPUTERS IN TRANSPORTATION GROUP15.pptxIMPORTANCE OF COMPUTERS IN TRANSPORTATION GROUP15.pptx
IMPORTANCE OF COMPUTERS IN TRANSPORTATION GROUP15.pptxOgunmolaTunde
 
AI/Artificial Intelligent in Aviation Beyond Covid 19
AI/Artificial Intelligent in Aviation Beyond Covid 19AI/Artificial Intelligent in Aviation Beyond Covid 19
AI/Artificial Intelligent in Aviation Beyond Covid 19Assem mousa
 
computer and their application
computer and their application computer and their application
computer and their application BeeducatorComputer
 
APPLICATIONS OF COMPUTER
APPLICATIONS OF COMPUTERAPPLICATIONS OF COMPUTER
APPLICATIONS OF COMPUTERArpita Singh
 
Application of Data Science in the Airline industry
Application of Data Science in the Airline industryApplication of Data Science in the Airline industry
Application of Data Science in the Airline industryEshaNair4
 
Empowerment Technology.pptx
Empowerment Technology.pptxEmpowerment Technology.pptx
Empowerment Technology.pptxKarloFredoAngway
 
Airscan Traffic Congestion
Airscan Traffic CongestionAirscan Traffic Congestion
Airscan Traffic CongestionJulia McNally
 
Embedded-Web-Technology.pptx
Embedded-Web-Technology.pptxEmbedded-Web-Technology.pptx
Embedded-Web-Technology.pptxSruthiReddy112
 
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...DroneSec
 
_What is Drone Technology, How works and It’s Future.pdf
_What is Drone Technology, How works and It’s Future.pdf_What is Drone Technology, How works and It’s Future.pdf
_What is Drone Technology, How works and It’s Future.pdfEyasin Ansari
 

Similar to Ict in context of global communication (20)

Group ppt 30127290-30129080-emerging tech. of business
Group ppt 30127290-30129080-emerging tech. of businessGroup ppt 30127290-30129080-emerging tech. of business
Group ppt 30127290-30129080-emerging tech. of business
 
Computer Science Engineering
Computer Science EngineeringComputer Science Engineering
Computer Science Engineering
 
What is Computer and Uses of Computer in modern ERA.
 What is Computer and Uses of Computer in modern ERA. What is Computer and Uses of Computer in modern ERA.
What is Computer and Uses of Computer in modern ERA.
 
NSIT Unmanned Aerial Vehicle Orientation
NSIT Unmanned Aerial Vehicle OrientationNSIT Unmanned Aerial Vehicle Orientation
NSIT Unmanned Aerial Vehicle Orientation
 
Role of/on government in Technology
Role of/on government in TechnologyRole of/on government in Technology
Role of/on government in Technology
 
Uses of computer in space
Uses of computer in spaceUses of computer in space
Uses of computer in space
 
AI/Artificial Intelligent in Aviation Beyond Covid 19
AI/Artificial Intelligent in Aviation Beyond Covid 19AI/Artificial Intelligent in Aviation Beyond Covid 19
AI/Artificial Intelligent in Aviation Beyond Covid 19
 
introduction to computer
introduction to computerintroduction to computer
introduction to computer
 
IMPORTANCE OF COMPUTERS IN TRANSPORTATION GROUP15.pptx
IMPORTANCE OF COMPUTERS IN TRANSPORTATION GROUP15.pptxIMPORTANCE OF COMPUTERS IN TRANSPORTATION GROUP15.pptx
IMPORTANCE OF COMPUTERS IN TRANSPORTATION GROUP15.pptx
 
AI/Artificial Intelligent in Aviation Beyond Covid 19
AI/Artificial Intelligent in Aviation Beyond Covid 19AI/Artificial Intelligent in Aviation Beyond Covid 19
AI/Artificial Intelligent in Aviation Beyond Covid 19
 
computer and their application
computer and their application computer and their application
computer and their application
 
APPLICATIONS OF COMPUTER
APPLICATIONS OF COMPUTERAPPLICATIONS OF COMPUTER
APPLICATIONS OF COMPUTER
 
Application of Data Science in the Airline industry
Application of Data Science in the Airline industryApplication of Data Science in the Airline industry
Application of Data Science in the Airline industry
 
Empowerment Technology.pptx
Empowerment Technology.pptxEmpowerment Technology.pptx
Empowerment Technology.pptx
 
Airscan Traffic Congestion
Airscan Traffic CongestionAirscan Traffic Congestion
Airscan Traffic Congestion
 
H.w
H.wH.w
H.w
 
H.w
H.wH.w
H.w
 
Embedded-Web-Technology.pptx
Embedded-Web-Technology.pptxEmbedded-Web-Technology.pptx
Embedded-Web-Technology.pptx
 
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
 
_What is Drone Technology, How works and It’s Future.pdf
_What is Drone Technology, How works and It’s Future.pdf_What is Drone Technology, How works and It’s Future.pdf
_What is Drone Technology, How works and It’s Future.pdf
 

Recently uploaded

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Ict in context of global communication

  • 1. ICT IN CONTEXT OF GLOBAL COMMUNICATION EMPOWERMENT TECHNOLOGY
  • 2. Government Service OComputers in government offices are used by Bureau of Internal Revenue (BIR) to compute taxes of real properties such as homes and buildings. OThe city governments to render service to it’s citizens; for example, traffic lights are controlled by computer to lessen congestion of vehicles.
  • 3. O The National Statistics Office (NSO) uses computers to record the birth, marriages, and deaths of then country’s citizen. It is also used to record other valuable personal information. O The Department of Foreign Affairs (DFA) records all citizen travelling abroad. DFA issues computer- generated passports, the latest passports have barcodes included for faster information retrieval and monitoring.
  • 4. Military Application O Computer are used to guide weapon systems from any source to pinpoint targets with precision and accuracy. O Computers on board mechanical vehicles are used to locate and diffused bombs. O Computers controlled unmanned airplanes, or drones to locate enemy locations and deliver firepower when necessary.
  • 5. O Computers used software embedded in many modern weapons to ensure accuracy and precision. Computer are also process valuable information or intelligence especially impending terrorist attacks
  • 6. Weather Analysis O There are supercomputers used to analyze and predict the weather of the day. Data gather from weather satellites will be calculated by these computers to give the wind direction, wind velocity, volume or rainfall, and other important weather information.
  • 7. Space Exploration O The National Aeronautics and Space administration (NASA) in the U.S.A uses computers in spacecraft to explore planets and other heavenly bodies. O Computers are likewise used in Earth control stations for the spacecraft and satellite on mission.
  • 8. O Computers are also used on satellites and control stations to monitor weather, transmit voice and data , and other applications around the world. O Computers on board spacecraft are equipped with camera, video and other sensor that send vital data back to earth.
  • 9. Aeronautics O Pilots are trained using software which stimulates flying. Flight stimulations are safe and cost-effective means of training future pilots without the risk of the real airplane crash. They employ software to enhance both visual and mechanical reflexes to new and even seasoned pilots.