SlideShare a Scribd company logo
NAME: ENIMIL KWEKU BOATENG
COURSE: ELECTIVE ICT
TOPIC: DIGITAL TECHNOLOGY CULTURE 1
EMAIL: KWEKUBOATENG38@GMAIL.COM
WEB: HTTP://ENIMIL.000WEBHOSTAPP.COM
Lesson quote
Set your goals high, and don’t stop
till you get there.
Bo Jackson
LESSON OBJECTIVES
At the end of this lesson, the student should be able to:
Explain general issues concerning information technology
Understand computer and information security and
distinguish between computer crime and cybercrime
Analyze the role and impact of information technology
on everyday life.
Digital technology culture
Digital culture refers to culture shaped by the emergence
and use of digital technologies. It can also be said of how
people use and interact with technology in their works and
lives. It describes the idea that technology and the
Internet significantly shape the way we interact behave,
think, and communicate as human beings in a societal
setting.
THE INTERNET
The Internet is a globally connected network system that
usesTransmission Control Protocol and Internet Protocol
(TCP/IP) to transmit data through various types of media
like coaxial cable, twisted pair cable, fiber-optic cable and
wireless.TCP/IP is a set of standardized rules that allow
computers to communicate on a network such as the
Internet.
Source: https://milcom.edu.au/different-types-
coaxial-cables/
Source: https://www.dreamstime.com/stock-
photo-ethernet-wire-cable-yellow-patch-
cord-twisted-pair-isolated-image88784783
Source: https://www.optcore.net/the-
difference-between-optical-fiber-and-
optical-fiber-cable/
Coaxial
Cable
Twisted
pair cable
Fibre optic
cable
THE INTERNET
It is worth knowing thatWWW which meansWorld
WideWeb is not the same as the Internet.TheWorld
WideWeb however is a collection of information
which is accessed through the Internet.The web has
matured through three generations, commonly called
Web 1.0, 2.0, and 3.0.
COMPUTER & INFORMATION SECURITY
Information security involves protecting individuals
and organizations information from theft and danger.
Computer security focuses on protecting information,
hardware, and software from unauthorized use, as
well as preventing or limiting the damage from
intrusions, sabotage, and natural disasters.
COMPUTER CRIME
Computer crime is an act performed by a knowledgeable
computer user, sometimes referred to as a hacker that
illegally browses or steals a company's or individuals private
information. It can also be defined as the use of information
technology for illegal purposes or for unauthorized access
of a computer system where the intent is to damage, delete
or alter the data present on the computer.
TYPES OF COMPUTER CRIME
Cracking
Unauthorized access
Computer malware
Denial-of-service attack
CYBERCRIMECRIME
Cybercrime is any criminal activity that involves a
computer, a networked device or a network.
Cybercrimes happen in the cyberspace in that the
computer is used as a tool alright but the target is not
the computer unlike a computer crime where the tool
used and the target happens to be the computer.
TYPES OF CYBERCRIME
Identity theft
Social engineering
Malvertising
Cyberstalking
EFFECTS OF COMPUTER & CYBERCRIMES
It can lead to job loss.
It damages brand image and company or individual’s
reputation.
There is high cost in mitigation strategies and recovery
from cyber and computer crimes.
It can lead to loss of trade and competitiveness.
ROLEAND IMPACT OF
TECHNOLOGY
Computer based training
Computer-based training is a learning method in which a
computer program is used as the primary mode of teaching.
With this type of training, you are able to teach yourself with
little or no outside help from a teacher.As you use the program,
you can study at your own pace and the program tracks your
progress. It involves the use of a personal or networked
computer for the delivery and access of training programs.
IMPORTANCE OF COMPUTER BASED
TRAINING
There is immediate feedback on work.
It respects one learning pace whether fast or slow learner.
It uses a multimedia approach to teaching like sound, sight
and interactive activities, therefore it works for all learning
types, whether you learn through reading, seeing or doing.
IMPORTANCE OF COMPUTER BASED
TRAINING
It allows for consistency in the training since the same
materials are used and there is no need to account for
individual teaching styles of instructors.
It is easy to track and analyze progress of trainees.
It is flexible and efficient
Computer AIDED DESIGN
Computer Aided Design (CAD) is the use of computer
software to design and document a product’s design process.
CAD is used to design, develop and optimize products. While
it is very versatile, CAD is extensively used in the design of
tools and equipment required in the manufacturing process
as well as in the construction domain. CAD enables design
engineers to layout and to develop their work on a computer
screen, print and save it for future editing.
IMPORTANCE OF Computer AIDED
DESIGN
It is very easy to edit design work.
There is a decrease in error percentage.
There is a decrease in design effort.
It is easy to share design work.
There is improvement in accuracy.
Computer ASSISTED MANUFACTURING
Computer assisted manufacturing (CAM) can be
defined as the use of computer systems to plan,
manage, and control the operations of a
manufacturing plant through either direct or
indirect computer interface with the plant’s
production resources.
IMPORTANCE OF Computer ASSISTED
MANUFACTURING
There is improvement in the manufacturing process.
It is very efficient and produces items quicker.
It is reliable, accurate and flexible.
It eliminates errors that may arise in the manual way
of manufacturing.
It is good for complex manufacturing processes.
Try thy hands on
Define the following:
A. Computer based learning.
B. Computer aided design.
C. Computer assisted manufacturing
List four (4) importance of the following:
A. Computer based learning.
B. Computer aided design.
C. Computer assisted manufacturing
Thanks 4 READING
Next tutorials will be on;
E-business, E-health, E-learning, E-mail, etc.
Subscribe and keep the channel active.

More Related Content

What's hot

Cctv report
Cctv reportCctv report
Intro to CAD/CAM/CIM
Intro to CAD/CAM/CIMIntro to CAD/CAM/CIM
Intro to CAD/CAM/CIMAbhay Gore
 
Robotics by rk mittal
Robotics by rk mittalRobotics by rk mittal
Robotics by rk mittal
ZAKI ANWER
 
Hvac Presentation
Hvac PresentationHvac Presentation
Hvac PresentationChoong KW
 
BHEL JHANSI
BHEL JHANSIBHEL JHANSI
Rfid based attendance system using arduino (1)
Rfid based attendance system using arduino (1)Rfid based attendance system using arduino (1)
Rfid based attendance system using arduino (1)
AWANISHKUMAR84
 
Programmable Logic Controller
Programmable Logic ControllerProgrammable Logic Controller
Programmable Logic Controller
Bipin Likhar
 
industrial automation history
industrial automation historyindustrial automation history
industrial automation history
sai anjaneya
 
UNIT I INTRODUCTION (MECHATRONICS)
UNIT I INTRODUCTION (MECHATRONICS)UNIT I INTRODUCTION (MECHATRONICS)
UNIT I INTRODUCTION (MECHATRONICS)
ravis205084
 
SCADA (Supervisory Control & data Acquisation) PPT
SCADA (Supervisory Control & data Acquisation) PPTSCADA (Supervisory Control & data Acquisation) PPT
SCADA (Supervisory Control & data Acquisation) PPT
DeepeshK4
 
Data center design 2
Data center design 2Data center design 2
Data center design 2
Aditya Gupta
 
Datacenter best practices design and implementation
Datacenter best practices design and implementationDatacenter best practices design and implementation
Datacenter best practices design and implementation
Anton An
 
Data Center Lessons Learned
Data Center Lessons LearnedData Center Lessons Learned
Data Center Lessons Learned
Tom Greenbaum
 
Types of cctv cameras
Types of cctv camerasTypes of cctv cameras
Types of cctv cameras
TanmayDivekar
 
HVAC system
HVAC systemHVAC system
HVAC system
Stanley Palma
 
Teaching Correct Statistical Methods in the Era of Knowledge Sharing
Teaching Correct Statistical Methods  in the Era of Knowledge SharingTeaching Correct Statistical Methods  in the Era of Knowledge Sharing
Teaching Correct Statistical Methods in the Era of Knowledge Sharing
Johnny Amora
 
Project Report-Read intesivelly
Project Report-Read intesivellyProject Report-Read intesivelly
Project Report-Read intesivellyJustine Joseph
 
Data Center Efficiency Workshop 2016
Data Center Efficiency Workshop 2016Data Center Efficiency Workshop 2016
Data Center Efficiency Workshop 2016
stexxe
 
Hvac course project
Hvac course projectHvac course project
Hvac course project
Darryl Hollis
 

What's hot (20)

Cctv report
Cctv reportCctv report
Cctv report
 
Intro to CAD/CAM/CIM
Intro to CAD/CAM/CIMIntro to CAD/CAM/CIM
Intro to CAD/CAM/CIM
 
Robotics by rk mittal
Robotics by rk mittalRobotics by rk mittal
Robotics by rk mittal
 
Hvac Presentation
Hvac PresentationHvac Presentation
Hvac Presentation
 
BHEL JHANSI
BHEL JHANSIBHEL JHANSI
BHEL JHANSI
 
Rfid based attendance system using arduino (1)
Rfid based attendance system using arduino (1)Rfid based attendance system using arduino (1)
Rfid based attendance system using arduino (1)
 
Programmable Logic Controller
Programmable Logic ControllerProgrammable Logic Controller
Programmable Logic Controller
 
industrial automation history
industrial automation historyindustrial automation history
industrial automation history
 
UNIT I INTRODUCTION (MECHATRONICS)
UNIT I INTRODUCTION (MECHATRONICS)UNIT I INTRODUCTION (MECHATRONICS)
UNIT I INTRODUCTION (MECHATRONICS)
 
SCADA (Supervisory Control & data Acquisation) PPT
SCADA (Supervisory Control & data Acquisation) PPTSCADA (Supervisory Control & data Acquisation) PPT
SCADA (Supervisory Control & data Acquisation) PPT
 
Data center design 2
Data center design 2Data center design 2
Data center design 2
 
Datacenter best practices design and implementation
Datacenter best practices design and implementationDatacenter best practices design and implementation
Datacenter best practices design and implementation
 
All about scada
All about scadaAll about scada
All about scada
 
Data Center Lessons Learned
Data Center Lessons LearnedData Center Lessons Learned
Data Center Lessons Learned
 
Types of cctv cameras
Types of cctv camerasTypes of cctv cameras
Types of cctv cameras
 
HVAC system
HVAC systemHVAC system
HVAC system
 
Teaching Correct Statistical Methods in the Era of Knowledge Sharing
Teaching Correct Statistical Methods  in the Era of Knowledge SharingTeaching Correct Statistical Methods  in the Era of Knowledge Sharing
Teaching Correct Statistical Methods in the Era of Knowledge Sharing
 
Project Report-Read intesivelly
Project Report-Read intesivellyProject Report-Read intesivelly
Project Report-Read intesivelly
 
Data Center Efficiency Workshop 2016
Data Center Efficiency Workshop 2016Data Center Efficiency Workshop 2016
Data Center Efficiency Workshop 2016
 
Hvac course project
Hvac course projectHvac course project
Hvac course project
 

Similar to Digital Technology Culture - Anti-Dote Series

Why Computer Science.pptx
Why Computer Science.pptxWhy Computer Science.pptx
Why Computer Science.pptx
slidecell212100
 
Kirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics ProjectKirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal
 
Aplication of comp
Aplication of compAplication of comp
Aplication of comp
Muhammad Asghar Ali
 
IT Fundamentals
IT FundamentalsIT Fundamentals
Modern Technology
Modern TechnologyModern Technology
Modern Technology
Md Saylab
 
Can body write an essay for me on dream job in Computer Engineerin.pdf
Can body write an essay for me on dream job in Computer Engineerin.pdfCan body write an essay for me on dream job in Computer Engineerin.pdf
Can body write an essay for me on dream job in Computer Engineerin.pdf
manjan6
 
Informati̇on technology 1
Informati̇on technology 1Informati̇on technology 1
Informati̇on technology 1
Enes Bolfidan
 
Act te 335 corrected
Act te 335 correctedAct te 335 corrected
Act te 335 corrected
Habibur Rahman
 
Information Technology (IT)
Information Technology (IT)Information Technology (IT)
Information Technology (IT)
Malik Afzaal
 
goldeninstituterup-blogspot-com-2024-01-diploma-in-computer-application-html ...
goldeninstituterup-blogspot-com-2024-01-diploma-in-computer-application-html ...goldeninstituterup-blogspot-com-2024-01-diploma-in-computer-application-html ...
goldeninstituterup-blogspot-com-2024-01-diploma-in-computer-application-html ...
goldeneducation28
 
Bachelor of Information Technology Sydney
Bachelor of Information Technology SydneyBachelor of Information Technology Sydney
Bachelor of Information Technology Sydney
vitseo1
 
Bachelor of Information Technology Melbourne
Bachelor of Information Technology MelbourneBachelor of Information Technology Melbourne
Bachelor of Information Technology Melbourne
vitseo1
 
Recent trends in cloud computing articles
Recent trends in cloud computing articlesRecent trends in cloud computing articles
Recent trends in cloud computing articles
AIRCC Publishing Corporation
 
Top machine learning trends for 2022 and beyond
Top machine learning trends for 2022 and beyondTop machine learning trends for 2022 and beyond
Top machine learning trends for 2022 and beyond
ArpitGautam20
 
fields of technology and computer .pptx
fields of technology and computer  .pptxfields of technology and computer  .pptx
fields of technology and computer .pptx
Home
 
Web Development SEO Expate Bangladesh Limited .pdf
Web Development SEO Expate Bangladesh Limited .pdfWeb Development SEO Expate Bangladesh Limited .pdf
Web Development SEO Expate Bangladesh Limited .pdf
Seo Expate BD LTD
 
EmergingTrend.pdf
EmergingTrend.pdfEmergingTrend.pdf
EmergingTrend.pdf
Vennimalai N
 

Similar to Digital Technology Culture - Anti-Dote Series (20)

Why Computer Science.pptx
Why Computer Science.pptxWhy Computer Science.pptx
Why Computer Science.pptx
 
Kirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics ProjectKirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics Project
 
Aplication of comp
Aplication of compAplication of comp
Aplication of comp
 
It project
It projectIt project
It project
 
IT Fundamentals
IT FundamentalsIT Fundamentals
IT Fundamentals
 
Modern Technology
Modern TechnologyModern Technology
Modern Technology
 
Notes1
Notes1Notes1
Notes1
 
Can body write an essay for me on dream job in Computer Engineerin.pdf
Can body write an essay for me on dream job in Computer Engineerin.pdfCan body write an essay for me on dream job in Computer Engineerin.pdf
Can body write an essay for me on dream job in Computer Engineerin.pdf
 
Informati̇on technology 1
Informati̇on technology 1Informati̇on technology 1
Informati̇on technology 1
 
Act te 335 corrected
Act te 335 correctedAct te 335 corrected
Act te 335 corrected
 
Information Technology (IT)
Information Technology (IT)Information Technology (IT)
Information Technology (IT)
 
goldeninstituterup-blogspot-com-2024-01-diploma-in-computer-application-html ...
goldeninstituterup-blogspot-com-2024-01-diploma-in-computer-application-html ...goldeninstituterup-blogspot-com-2024-01-diploma-in-computer-application-html ...
goldeninstituterup-blogspot-com-2024-01-diploma-in-computer-application-html ...
 
Bachelor of Information Technology Sydney
Bachelor of Information Technology SydneyBachelor of Information Technology Sydney
Bachelor of Information Technology Sydney
 
Bachelor of Information Technology Melbourne
Bachelor of Information Technology MelbourneBachelor of Information Technology Melbourne
Bachelor of Information Technology Melbourne
 
Recent trends in cloud computing articles
Recent trends in cloud computing articlesRecent trends in cloud computing articles
Recent trends in cloud computing articles
 
Top machine learning trends for 2022 and beyond
Top machine learning trends for 2022 and beyondTop machine learning trends for 2022 and beyond
Top machine learning trends for 2022 and beyond
 
fields of technology and computer .pptx
fields of technology and computer  .pptxfields of technology and computer  .pptx
fields of technology and computer .pptx
 
Ic3
Ic3Ic3
Ic3
 
Web Development SEO Expate Bangladesh Limited .pdf
Web Development SEO Expate Bangladesh Limited .pdfWeb Development SEO Expate Bangladesh Limited .pdf
Web Development SEO Expate Bangladesh Limited .pdf
 
EmergingTrend.pdf
EmergingTrend.pdfEmergingTrend.pdf
EmergingTrend.pdf
 

More from Enimil Kweku Boateng

E-ICT TYPES OF COMPUTER NETWORKS 2 ANTI-DOTE SERIES.pptx
E-ICT TYPES OF COMPUTER NETWORKS 2 ANTI-DOTE SERIES.pptxE-ICT TYPES OF COMPUTER NETWORKS 2 ANTI-DOTE SERIES.pptx
E-ICT TYPES OF COMPUTER NETWORKS 2 ANTI-DOTE SERIES.pptx
Enimil Kweku Boateng
 
E-ICT TYPES OF COMPUTER NETWORKS 1 ANTI-DOTE SERIES.pptx
E-ICT TYPES OF COMPUTER NETWORKS 1 ANTI-DOTE SERIES.pptxE-ICT TYPES OF COMPUTER NETWORKS 1 ANTI-DOTE SERIES.pptx
E-ICT TYPES OF COMPUTER NETWORKS 1 ANTI-DOTE SERIES.pptx
Enimil Kweku Boateng
 
E-ICT COMPUTER NETWORK CONCEPTS ANTI-DOTE SERIES
E-ICT COMPUTER NETWORK CONCEPTS ANTI-DOTE SERIESE-ICT COMPUTER NETWORK CONCEPTS ANTI-DOTE SERIES
E-ICT COMPUTER NETWORK CONCEPTS ANTI-DOTE SERIES
Enimil Kweku Boateng
 
E-ICT MULTIMEDIA IN EDUCATION ANTI-DOTE SERIES.pptx
E-ICT MULTIMEDIA IN EDUCATION ANTI-DOTE SERIES.pptxE-ICT MULTIMEDIA IN EDUCATION ANTI-DOTE SERIES.pptx
E-ICT MULTIMEDIA IN EDUCATION ANTI-DOTE SERIES.pptx
Enimil Kweku Boateng
 
E-ICT APPLICATION SOFTWARE ANTI-DOTE SERIES.pptx
E-ICT APPLICATION SOFTWARE ANTI-DOTE SERIES.pptxE-ICT APPLICATION SOFTWARE ANTI-DOTE SERIES.pptx
E-ICT APPLICATION SOFTWARE ANTI-DOTE SERIES.pptx
Enimil Kweku Boateng
 
E-ICT SYSTEM SOFTWARE ANTI-DOTE SERIES.pptx
E-ICT SYSTEM SOFTWARE ANTI-DOTE SERIES.pptxE-ICT SYSTEM SOFTWARE ANTI-DOTE SERIES.pptx
E-ICT SYSTEM SOFTWARE ANTI-DOTE SERIES.pptx
Enimil Kweku Boateng
 
E-ICT INTRODUCTION TO COMPUTER SOFTWARE ANTI-DOTE SERIES.pptx
E-ICT INTRODUCTION TO COMPUTER SOFTWARE ANTI-DOTE SERIES.pptxE-ICT INTRODUCTION TO COMPUTER SOFTWARE ANTI-DOTE SERIES.pptx
E-ICT INTRODUCTION TO COMPUTER SOFTWARE ANTI-DOTE SERIES.pptx
Enimil Kweku Boateng
 
E-ICT Data Representation 1 - Anti-Dote Series
E-ICT Data Representation 1 - Anti-Dote SeriesE-ICT Data Representation 1 - Anti-Dote Series
E-ICT Data Representation 1 - Anti-Dote Series
Enimil Kweku Boateng
 
Hardware Components2 - Anti-Dote Series
Hardware Components2 - Anti-Dote SeriesHardware Components2 - Anti-Dote Series
Hardware Components2 - Anti-Dote Series
Enimil Kweku Boateng
 
Hardware Components1 - Anti-Dote Series
Hardware Components1 - Anti-Dote SeriesHardware Components1 - Anti-Dote Series
Hardware Components1 - Anti-Dote Series
Enimil Kweku Boateng
 
E-ICT Digital Technology Culture 2 - Anti-Dote Series
E-ICT Digital Technology Culture 2 - Anti-Dote SeriesE-ICT Digital Technology Culture 2 - Anti-Dote Series
E-ICT Digital Technology Culture 2 - Anti-Dote Series
Enimil Kweku Boateng
 
Information Systems - Anti-Dote Series
Information Systems - Anti-Dote SeriesInformation Systems - Anti-Dote Series
Information Systems - Anti-Dote Series
Enimil Kweku Boateng
 

More from Enimil Kweku Boateng (12)

E-ICT TYPES OF COMPUTER NETWORKS 2 ANTI-DOTE SERIES.pptx
E-ICT TYPES OF COMPUTER NETWORKS 2 ANTI-DOTE SERIES.pptxE-ICT TYPES OF COMPUTER NETWORKS 2 ANTI-DOTE SERIES.pptx
E-ICT TYPES OF COMPUTER NETWORKS 2 ANTI-DOTE SERIES.pptx
 
E-ICT TYPES OF COMPUTER NETWORKS 1 ANTI-DOTE SERIES.pptx
E-ICT TYPES OF COMPUTER NETWORKS 1 ANTI-DOTE SERIES.pptxE-ICT TYPES OF COMPUTER NETWORKS 1 ANTI-DOTE SERIES.pptx
E-ICT TYPES OF COMPUTER NETWORKS 1 ANTI-DOTE SERIES.pptx
 
E-ICT COMPUTER NETWORK CONCEPTS ANTI-DOTE SERIES
E-ICT COMPUTER NETWORK CONCEPTS ANTI-DOTE SERIESE-ICT COMPUTER NETWORK CONCEPTS ANTI-DOTE SERIES
E-ICT COMPUTER NETWORK CONCEPTS ANTI-DOTE SERIES
 
E-ICT MULTIMEDIA IN EDUCATION ANTI-DOTE SERIES.pptx
E-ICT MULTIMEDIA IN EDUCATION ANTI-DOTE SERIES.pptxE-ICT MULTIMEDIA IN EDUCATION ANTI-DOTE SERIES.pptx
E-ICT MULTIMEDIA IN EDUCATION ANTI-DOTE SERIES.pptx
 
E-ICT APPLICATION SOFTWARE ANTI-DOTE SERIES.pptx
E-ICT APPLICATION SOFTWARE ANTI-DOTE SERIES.pptxE-ICT APPLICATION SOFTWARE ANTI-DOTE SERIES.pptx
E-ICT APPLICATION SOFTWARE ANTI-DOTE SERIES.pptx
 
E-ICT SYSTEM SOFTWARE ANTI-DOTE SERIES.pptx
E-ICT SYSTEM SOFTWARE ANTI-DOTE SERIES.pptxE-ICT SYSTEM SOFTWARE ANTI-DOTE SERIES.pptx
E-ICT SYSTEM SOFTWARE ANTI-DOTE SERIES.pptx
 
E-ICT INTRODUCTION TO COMPUTER SOFTWARE ANTI-DOTE SERIES.pptx
E-ICT INTRODUCTION TO COMPUTER SOFTWARE ANTI-DOTE SERIES.pptxE-ICT INTRODUCTION TO COMPUTER SOFTWARE ANTI-DOTE SERIES.pptx
E-ICT INTRODUCTION TO COMPUTER SOFTWARE ANTI-DOTE SERIES.pptx
 
E-ICT Data Representation 1 - Anti-Dote Series
E-ICT Data Representation 1 - Anti-Dote SeriesE-ICT Data Representation 1 - Anti-Dote Series
E-ICT Data Representation 1 - Anti-Dote Series
 
Hardware Components2 - Anti-Dote Series
Hardware Components2 - Anti-Dote SeriesHardware Components2 - Anti-Dote Series
Hardware Components2 - Anti-Dote Series
 
Hardware Components1 - Anti-Dote Series
Hardware Components1 - Anti-Dote SeriesHardware Components1 - Anti-Dote Series
Hardware Components1 - Anti-Dote Series
 
E-ICT Digital Technology Culture 2 - Anti-Dote Series
E-ICT Digital Technology Culture 2 - Anti-Dote SeriesE-ICT Digital Technology Culture 2 - Anti-Dote Series
E-ICT Digital Technology Culture 2 - Anti-Dote Series
 
Information Systems - Anti-Dote Series
Information Systems - Anti-Dote SeriesInformation Systems - Anti-Dote Series
Information Systems - Anti-Dote Series
 

Recently uploaded

Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 

Recently uploaded (20)

Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 

Digital Technology Culture - Anti-Dote Series

  • 1. NAME: ENIMIL KWEKU BOATENG COURSE: ELECTIVE ICT TOPIC: DIGITAL TECHNOLOGY CULTURE 1 EMAIL: KWEKUBOATENG38@GMAIL.COM WEB: HTTP://ENIMIL.000WEBHOSTAPP.COM
  • 2. Lesson quote Set your goals high, and don’t stop till you get there. Bo Jackson
  • 3. LESSON OBJECTIVES At the end of this lesson, the student should be able to: Explain general issues concerning information technology Understand computer and information security and distinguish between computer crime and cybercrime Analyze the role and impact of information technology on everyday life.
  • 4. Digital technology culture Digital culture refers to culture shaped by the emergence and use of digital technologies. It can also be said of how people use and interact with technology in their works and lives. It describes the idea that technology and the Internet significantly shape the way we interact behave, think, and communicate as human beings in a societal setting.
  • 5. THE INTERNET The Internet is a globally connected network system that usesTransmission Control Protocol and Internet Protocol (TCP/IP) to transmit data through various types of media like coaxial cable, twisted pair cable, fiber-optic cable and wireless.TCP/IP is a set of standardized rules that allow computers to communicate on a network such as the Internet.
  • 6. Source: https://milcom.edu.au/different-types- coaxial-cables/ Source: https://www.dreamstime.com/stock- photo-ethernet-wire-cable-yellow-patch- cord-twisted-pair-isolated-image88784783 Source: https://www.optcore.net/the- difference-between-optical-fiber-and- optical-fiber-cable/ Coaxial Cable Twisted pair cable Fibre optic cable
  • 7. THE INTERNET It is worth knowing thatWWW which meansWorld WideWeb is not the same as the Internet.TheWorld WideWeb however is a collection of information which is accessed through the Internet.The web has matured through three generations, commonly called Web 1.0, 2.0, and 3.0.
  • 8. COMPUTER & INFORMATION SECURITY Information security involves protecting individuals and organizations information from theft and danger. Computer security focuses on protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.
  • 9. COMPUTER CRIME Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a hacker that illegally browses or steals a company's or individuals private information. It can also be defined as the use of information technology for illegal purposes or for unauthorized access of a computer system where the intent is to damage, delete or alter the data present on the computer.
  • 10. TYPES OF COMPUTER CRIME Cracking Unauthorized access Computer malware Denial-of-service attack
  • 11. CYBERCRIMECRIME Cybercrime is any criminal activity that involves a computer, a networked device or a network. Cybercrimes happen in the cyberspace in that the computer is used as a tool alright but the target is not the computer unlike a computer crime where the tool used and the target happens to be the computer.
  • 12. TYPES OF CYBERCRIME Identity theft Social engineering Malvertising Cyberstalking
  • 13. EFFECTS OF COMPUTER & CYBERCRIMES It can lead to job loss. It damages brand image and company or individual’s reputation. There is high cost in mitigation strategies and recovery from cyber and computer crimes. It can lead to loss of trade and competitiveness.
  • 15. Computer based training Computer-based training is a learning method in which a computer program is used as the primary mode of teaching. With this type of training, you are able to teach yourself with little or no outside help from a teacher.As you use the program, you can study at your own pace and the program tracks your progress. It involves the use of a personal or networked computer for the delivery and access of training programs.
  • 16. IMPORTANCE OF COMPUTER BASED TRAINING There is immediate feedback on work. It respects one learning pace whether fast or slow learner. It uses a multimedia approach to teaching like sound, sight and interactive activities, therefore it works for all learning types, whether you learn through reading, seeing or doing.
  • 17. IMPORTANCE OF COMPUTER BASED TRAINING It allows for consistency in the training since the same materials are used and there is no need to account for individual teaching styles of instructors. It is easy to track and analyze progress of trainees. It is flexible and efficient
  • 18. Computer AIDED DESIGN Computer Aided Design (CAD) is the use of computer software to design and document a product’s design process. CAD is used to design, develop and optimize products. While it is very versatile, CAD is extensively used in the design of tools and equipment required in the manufacturing process as well as in the construction domain. CAD enables design engineers to layout and to develop their work on a computer screen, print and save it for future editing.
  • 19. IMPORTANCE OF Computer AIDED DESIGN It is very easy to edit design work. There is a decrease in error percentage. There is a decrease in design effort. It is easy to share design work. There is improvement in accuracy.
  • 20. Computer ASSISTED MANUFACTURING Computer assisted manufacturing (CAM) can be defined as the use of computer systems to plan, manage, and control the operations of a manufacturing plant through either direct or indirect computer interface with the plant’s production resources.
  • 21. IMPORTANCE OF Computer ASSISTED MANUFACTURING There is improvement in the manufacturing process. It is very efficient and produces items quicker. It is reliable, accurate and flexible. It eliminates errors that may arise in the manual way of manufacturing. It is good for complex manufacturing processes.
  • 22. Try thy hands on Define the following: A. Computer based learning. B. Computer aided design. C. Computer assisted manufacturing List four (4) importance of the following: A. Computer based learning. B. Computer aided design. C. Computer assisted manufacturing
  • 23. Thanks 4 READING Next tutorials will be on; E-business, E-health, E-learning, E-mail, etc. Subscribe and keep the channel active.