SlideShare a Scribd company logo
COURSE OUTLINE
•I. INTRODUCTION TO INFORMATION AND COMMUNICATION
TECHNOLOGY (ICT)
•II. COMPUTERS IN OUR DAILY LIFE
•III. THE INTERNET AND WORLD WIDE WEB
•IV. INFORMATION, CONTROL, AND PRIVACY
•V. IT, CULTURE, AND THE SOCIETY
•VI. IT TRENDS, ISSUES, AND CHALLENGES
I. INTRODUCTION TO ICT
•COVERS KEY TERMS IN ICT, HISTORY OF COMPUTERS,
COMPONENTS OF A COMPUTER, CLASSIFICATION OF
COMPUTERS, DIFFERENT FORMS OF MEDIA, TRENDS AND
ETHICAL ISSUES IN ICT
II. COMPUTERS IN OUR DAILY LIFE
• COVERS HOW COMPUTERS WORK, HOW COMPUTERS
INTERPRET DATA, HOW COMPUTERS COMMUNICATE WITH ONE
ANOTHER, HOW COMPUTERS CONNECT TO OTHER COMPUTERS,
HOW HUMANS COMMUNICATE WITH COMPUTERS, AND HOW
COMPUTERS IMPACT EVERYDAY LIFE
III. THE INTERNET AND THE W.W.W.
•COVERS THE INTERNET, JOBS THE INTERNET CAN DO,
HOW DATA TRAVELS THE INTERNET, WHAT COMPUTERS
DO ON THE INTERNET, AND THE WORLD WIDE WEB
IV. INFORMATION, CONTROL, AND PRIVACY
•COVERS INFORMATION AS A RESOURCE, INFORMATION
ECONOMICS, INFORMATION OVERLOAD, INFORMATION
CONTROL AND PRIVACY
V. IT, CULTURE, AND THE SOCIETY
•COVERS THE IMPACT OF IT ON THE SOCIETY, INTERNET OF
THINGS (IOT), AUTOMATION, THE INFLUENCE OF IT ON
CULTURE AND SOCIAL BEHAVIOR
VI. IT TRENDS, ISSUES, AND CHALLENGES
•COVERS HOW IT TRENDS AFFECT THE FILIPINO’S WAY OF
LIVING, ISSUES AND CHALLENGES IN IT THE DIFFERENT
SECTORS FACE AND INFLUENCE OF IT ON A SPECIFIC
SECTOR.
END

More Related Content

Similar to Course Outline_GEC-LIE.pptx

Political Economy
Political EconomyPolitical Economy
Political Economy
pumascomm
 
M02 introduksi teknologi informasi
M02 introduksi teknologi informasiM02 introduksi teknologi informasi
M02 introduksi teknologi informasi
Coky Fauzi Alfi
 
Practica 7 bis
Practica 7 bisPractica 7 bis
Practica 7 bis
BowieLyA
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT).pptx
INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT).pptxINFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT).pptx
INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT).pptx
JeanDacles
 
Teaching new literacy in a digital environment
Teaching new literacy in a digital environmentTeaching new literacy in a digital environment
Teaching new literacy in a digital environment
Nikkithalia
 
Why not use ict in sudan
Why not use ict in sudanWhy not use ict in sudan
Why not use ict in sudan
Hala Nur
 
Focus the digital revolution
Focus the digital revolutionFocus the digital revolution
Focus the digital revolution
Narvik High School College
 
Concept of ICT
Concept of ICTConcept of ICT
Concept of ICT
PoojaWalia6
 
Changing conceptions of information
Changing conceptions of informationChanging conceptions of information
Changing conceptions of information
mukeshraj36
 
Information and communication as sources of understanding and transforming th...
Information and communication as sources of understanding and transforming th...Information and communication as sources of understanding and transforming th...
Information and communication as sources of understanding and transforming th...
carmenpuigdueta
 
Digital Citizenship--National Liberty Museum
Digital Citizenship--National Liberty MuseumDigital Citizenship--National Liberty Museum
Digital Citizenship--National Liberty Museum
Mary Beth Hertz
 
Information society
Information societyInformation society
Information society
SelenaMarfon
 
Trends, Network and Critical Thinking Unit 6 information communication techno...
Trends, Network and Critical Thinking Unit 6 information communication techno...Trends, Network and Critical Thinking Unit 6 information communication techno...
Trends, Network and Critical Thinking Unit 6 information communication techno...
Eman Bustamante
 
mohammed ppt
mohammed pptmohammed ppt
mohammed ppt
Vishal Bunty
 
Social Equity in Post-Broadband Society U. of Melb. talk 13 Nov 2014
Social Equity in Post-Broadband Society U. of Melb. talk 13 Nov 2014Social Equity in Post-Broadband Society U. of Melb. talk 13 Nov 2014
Social Equity in Post-Broadband Society U. of Melb. talk 13 Nov 2014
University of Sydney
 
Impact of it in society and quality of
Impact of it in society and quality ofImpact of it in society and quality of
Impact of it in society and quality of
Prereet Jani
 
Chapter-3-Lesson-1-THE-INFORMATION-AGE.pptx
Chapter-3-Lesson-1-THE-INFORMATION-AGE.pptxChapter-3-Lesson-1-THE-INFORMATION-AGE.pptx
Chapter-3-Lesson-1-THE-INFORMATION-AGE.pptx
rannielseit
 
Foundation course –_ii_[autosaved]
Foundation course –_ii_[autosaved]Foundation course –_ii_[autosaved]
Foundation course –_ii_[autosaved]
richard786
 
Internet and Sudan
Internet and SudanInternet and Sudan
Internet and Sudan
Hala Nur
 
Comm.tech
Comm.techComm.tech
Comm.tech
diannaleamy
 

Similar to Course Outline_GEC-LIE.pptx (20)

Political Economy
Political EconomyPolitical Economy
Political Economy
 
M02 introduksi teknologi informasi
M02 introduksi teknologi informasiM02 introduksi teknologi informasi
M02 introduksi teknologi informasi
 
Practica 7 bis
Practica 7 bisPractica 7 bis
Practica 7 bis
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT).pptx
INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT).pptxINFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT).pptx
INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT).pptx
 
Teaching new literacy in a digital environment
Teaching new literacy in a digital environmentTeaching new literacy in a digital environment
Teaching new literacy in a digital environment
 
Why not use ict in sudan
Why not use ict in sudanWhy not use ict in sudan
Why not use ict in sudan
 
Focus the digital revolution
Focus the digital revolutionFocus the digital revolution
Focus the digital revolution
 
Concept of ICT
Concept of ICTConcept of ICT
Concept of ICT
 
Changing conceptions of information
Changing conceptions of informationChanging conceptions of information
Changing conceptions of information
 
Information and communication as sources of understanding and transforming th...
Information and communication as sources of understanding and transforming th...Information and communication as sources of understanding and transforming th...
Information and communication as sources of understanding and transforming th...
 
Digital Citizenship--National Liberty Museum
Digital Citizenship--National Liberty MuseumDigital Citizenship--National Liberty Museum
Digital Citizenship--National Liberty Museum
 
Information society
Information societyInformation society
Information society
 
Trends, Network and Critical Thinking Unit 6 information communication techno...
Trends, Network and Critical Thinking Unit 6 information communication techno...Trends, Network and Critical Thinking Unit 6 information communication techno...
Trends, Network and Critical Thinking Unit 6 information communication techno...
 
mohammed ppt
mohammed pptmohammed ppt
mohammed ppt
 
Social Equity in Post-Broadband Society U. of Melb. talk 13 Nov 2014
Social Equity in Post-Broadband Society U. of Melb. talk 13 Nov 2014Social Equity in Post-Broadband Society U. of Melb. talk 13 Nov 2014
Social Equity in Post-Broadband Society U. of Melb. talk 13 Nov 2014
 
Impact of it in society and quality of
Impact of it in society and quality ofImpact of it in society and quality of
Impact of it in society and quality of
 
Chapter-3-Lesson-1-THE-INFORMATION-AGE.pptx
Chapter-3-Lesson-1-THE-INFORMATION-AGE.pptxChapter-3-Lesson-1-THE-INFORMATION-AGE.pptx
Chapter-3-Lesson-1-THE-INFORMATION-AGE.pptx
 
Foundation course –_ii_[autosaved]
Foundation course –_ii_[autosaved]Foundation course –_ii_[autosaved]
Foundation course –_ii_[autosaved]
 
Internet and Sudan
Internet and SudanInternet and Sudan
Internet and Sudan
 
Comm.tech
Comm.techComm.tech
Comm.tech
 

Recently uploaded

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 

Recently uploaded (20)

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 

Course Outline_GEC-LIE.pptx

  • 1.
  • 2. COURSE OUTLINE •I. INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) •II. COMPUTERS IN OUR DAILY LIFE •III. THE INTERNET AND WORLD WIDE WEB •IV. INFORMATION, CONTROL, AND PRIVACY •V. IT, CULTURE, AND THE SOCIETY •VI. IT TRENDS, ISSUES, AND CHALLENGES
  • 3. I. INTRODUCTION TO ICT •COVERS KEY TERMS IN ICT, HISTORY OF COMPUTERS, COMPONENTS OF A COMPUTER, CLASSIFICATION OF COMPUTERS, DIFFERENT FORMS OF MEDIA, TRENDS AND ETHICAL ISSUES IN ICT
  • 4. II. COMPUTERS IN OUR DAILY LIFE • COVERS HOW COMPUTERS WORK, HOW COMPUTERS INTERPRET DATA, HOW COMPUTERS COMMUNICATE WITH ONE ANOTHER, HOW COMPUTERS CONNECT TO OTHER COMPUTERS, HOW HUMANS COMMUNICATE WITH COMPUTERS, AND HOW COMPUTERS IMPACT EVERYDAY LIFE
  • 5. III. THE INTERNET AND THE W.W.W. •COVERS THE INTERNET, JOBS THE INTERNET CAN DO, HOW DATA TRAVELS THE INTERNET, WHAT COMPUTERS DO ON THE INTERNET, AND THE WORLD WIDE WEB
  • 6. IV. INFORMATION, CONTROL, AND PRIVACY •COVERS INFORMATION AS A RESOURCE, INFORMATION ECONOMICS, INFORMATION OVERLOAD, INFORMATION CONTROL AND PRIVACY
  • 7. V. IT, CULTURE, AND THE SOCIETY •COVERS THE IMPACT OF IT ON THE SOCIETY, INTERNET OF THINGS (IOT), AUTOMATION, THE INFLUENCE OF IT ON CULTURE AND SOCIAL BEHAVIOR
  • 8. VI. IT TRENDS, ISSUES, AND CHALLENGES •COVERS HOW IT TRENDS AFFECT THE FILIPINO’S WAY OF LIVING, ISSUES AND CHALLENGES IN IT THE DIFFERENT SECTORS FACE AND INFLUENCE OF IT ON A SPECIFIC SECTOR.
  • 9. END