SlideShare a Scribd company logo
Empowerment Technology
FIRST QUARTER
Good Luck and God Bless!
Empowerment Technology
Coverage of 1st Quarter
Unit I : Information and Communication Technology
Lesson 1 - What is Information and Communication Technology (ICT)
Lesson 2 – Online Safety, Security, Ethics, and Etiquette
Lesson 3 – Contextualized Online Search and Research Skills
Lesson 4 – Developing ICT Content for Specific Purposes
Lesson 5 – Manipulating Text, Graphics, and Images to Create ICT
Content Intended for an Online Environment
???
???
???
???
Charles Babbage
“Father of Computing”
Timothy John Berners-Lee
Inventor of the World Wide Web
Vint Cerf
Co-founder of Internet
Steve Jobs
Co-founder of Apple Company
What is ICT?
Gathering Information
ACQUISITION
Refinement of data and stored properly
STORAGE
Analyzing stage, to convert data into information
MANIPULATION
Solution or answer
RETRIEVAL
Report
DISTRIBUTION
Data
Information
Steps involved in Converting Data to Information
Information and Communication Technology
(ICT)
Deals with the use of different communication
technologies such as mobile phones, telephone,
Internet, etc. to locate, save, send, and edit
information.
https://wheelofnames.com/
In the April 2022 Ookla Speedtest Global
Index, the Philippines ranked 95th of 142
countries in mobile internet speed with
19.45 Mbps (global average of 30.75 Mbps)
and 59th of 181 countries with 55.21 Mbps
(global average of 63.46 Mbps) in fixed
broadband speed. By 2025, the number of
mobile subscribers in the Philippines will
reach 159 million, and broadband
subscribers will number 10.8 million.
ICT in the Community
Readiness for the Networked World
Readiness for the Networked World
Is the degree to which a community is prepared to
participate in the Networked World. It is gauged by
assessing a community’s advancement in the areas that
are most critical to the adoption of information and
communication technologies.
According to Harvard Center for
International Development
The assessment section of the Guide asks participants to place their
community on a scale from one to four (lowest to highest) in nineteen
categories, grouped in five sections
Assessment Guide
• Network Access
• Networked Learning
• Networked Society
• Networked Economy
• Network Policy
Network Access
What are the availability, cost and quality of ICT
networks, services and equipment?
Networked Learning
Does the educational system integrate ICTs into its
processes to improve learning? Are there technical
training programs in the community that can train
and prepare an ICT workforce?
Networked Society
To what extent are individuals using information and
communication technologies at work and in their
personal lives? Are there significant opportunities
available for those with ICT skills?
Networked Economy
How are businesses and governments using
information and communication technologies to
interact with the public and with each other?
Network Policy
To what extent does the policy environment
promote or hinder the growth of ICT adoption and
use?
ICT in the Community
Great Job Everyone!
Lesson 1, Done!
Multimedia Source & References: www.google.com,www.youtube.com
Online Safety, Security, Ethics, and Etiquette
Tips to Safe Online
1 Be mindful of what you share
online and what site you share it to.
2 Do not just accept terms and
condition; read it.
3
Check out the privacy policy page
of a website to learn how the
website handles the information
you shares.
4
Know the security features of the
social networking site you use. By
keeping your profile private, search
engines will not be able to scan your
profile.
5 Do not share your password
anyone.
6
Avoid logging on to public
network/Wi-Fi. Browsing in
“incognito or private mode”, a
feature of the browser, will not
protect you from hackers.
7 Do not talk to strangers whether
online or face-to-face.
8
Never post anything about a future
vacation. It is similar to posting,
“Rob my house at this date.”
9 Add friends you know in real life.
10Avoid visiting untrusted website.
11
Install and update an antivirus
software on your computer. Use
only one antivirus software to
avoid conflict.
12
If you have a WIFI at home, make it
a private network by adding a
password.
13
Avoid downloading anything from
untrusted website. Your are most
vulnerable in peer-to-peer
downloads (torrents) as the
download is most likely not
monitored by the site owner.
14Buy the software; do not used
pirated one.
15 Do not reply or click links from
suspicious emails.
Online Threats
Online Threats
Malware, Spam, & Phishing
1. MALWARE
Stands for Malicious Software
a. Virus
A malicious program designed to
replicate itself and transfer form one
computer to another through the
internet and local network or data
storage.
b. Worm
A malicious program that transfer from
one computer to another by any type of
means.
Trivia:
ILOVEYOU worm (Love Bug Worm)
Created by a Filipino.
c. Trojan
It disguised as a useful program.
Sample are:
Crack Antivirus
Youtube Downloader
Pre-Activated Application
c.1. Rogue Security
Software
Trick the user by posing that is a
security software.
d. Spyware
Program that run in the background
without noticing it.
To check this:
Open the Task Manager
(ctrl + alt + delete)
d.1. Keylogger
Use to record the keystroke done by
the user.
e. Adware
A program design to send you
advertisement. (ADS)
2. Spam
Unwanted emails, mostly from bots or
advertisement.
3. Phishing
Its goal is to acquire sensitive
information like password and credit
card details.
3.1 Pharming
A more complicated way of phishing
where it exploits the DNS system.
Main use:
DDoS Attack ( to avoid, use VPN)
Virtual Private Network
Copyright Infringement
As a general matter, copyright infringement
occurs when a copyrighted work is reproduced,
distributed, performed, publicly displayed, or
made into a derivative work without the
permission of the copyright owner.
Definitions (FAQ) - U.S. Copyright Office
https://www.copyright.gov ›
Intellectual Property
An idea, an invention, a form of literary work,
or research, you have the right as to how it
should be used by others.
Great Job Everyone!
Empowerment Technology
Multimedia Source & References: www.google.com,www.youtube.com
(Book)REX Bookstore – Empowerment Technology
HOW TO STAY SAFE
ONLINE

More Related Content

Similar to empowerment technology for stem and gas .pdf

Internal social networks
Internal social networksInternal social networks
Internal social networks
Prof. Jacques Folon (Ph.D)
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
RheamaeLiwan
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
JakeTorio1
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
EliseoBartolome1
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
TrixieAnneAlindao
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
EhraicaSaquing
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
ChadrickThompson1
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
DineLiwan
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
Liberty Aquino
 
EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.
RIZALEAHSAMANIEGO
 
Shannon Morris PDLM presentation
Shannon Morris PDLM presentationShannon Morris PDLM presentation
Shannon Morris PDLM presentation
shannoncmorris
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technologyJohan Koren
 
Lesson-1-Introduction-and Current-Situation-of-ICT.pptx
Lesson-1-Introduction-and Current-Situation-of-ICT.pptxLesson-1-Introduction-and Current-Situation-of-ICT.pptx
Lesson-1-Introduction-and Current-Situation-of-ICT.pptx
jjjaca
 
ICT online tools & Internet Safety
ICT online tools & Internet SafetyICT online tools & Internet Safety
ICT online tools & Internet Safety
Charina Mostierra
 
Reliability_Undesirability
Reliability_UndesirabilityReliability_Undesirability
Reliability_UndesirabilityMohamed Omar
 
Etl523 pres jj jarick
Etl523 pres jj jarickEtl523 pres jj jarick
Etl523 pres jj jarick
jamesjarick
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
Param Nanavati
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
mulingoh
 
Digital Competence framework for citizens (DIGCOMP )
Digital Competence framework for citizens (DIGCOMP )Digital Competence framework for citizens (DIGCOMP )
Digital Competence framework for citizens (DIGCOMP )
Riina Vuorikari
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx
ssuser84f16f
 

Similar to empowerment technology for stem and gas .pdf (20)

Internal social networks
Internal social networksInternal social networks
Internal social networks
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.
 
Shannon Morris PDLM presentation
Shannon Morris PDLM presentationShannon Morris PDLM presentation
Shannon Morris PDLM presentation
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
 
Lesson-1-Introduction-and Current-Situation-of-ICT.pptx
Lesson-1-Introduction-and Current-Situation-of-ICT.pptxLesson-1-Introduction-and Current-Situation-of-ICT.pptx
Lesson-1-Introduction-and Current-Situation-of-ICT.pptx
 
ICT online tools & Internet Safety
ICT online tools & Internet SafetyICT online tools & Internet Safety
ICT online tools & Internet Safety
 
Reliability_Undesirability
Reliability_UndesirabilityReliability_Undesirability
Reliability_Undesirability
 
Etl523 pres jj jarick
Etl523 pres jj jarickEtl523 pres jj jarick
Etl523 pres jj jarick
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Digital Competence framework for citizens (DIGCOMP )
Digital Competence framework for citizens (DIGCOMP )Digital Competence framework for citizens (DIGCOMP )
Digital Competence framework for citizens (DIGCOMP )
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx
 

More from ChristianZapico1

Practical Research 1 for senior highschool.pptx
Practical Research 1 for senior highschool.pptxPractical Research 1 for senior highschool.pptx
Practical Research 1 for senior highschool.pptx
ChristianZapico1
 
Presentation-WPS Office Media and Information Technology.pptx
Presentation-WPS Office Media and Information Technology.pptxPresentation-WPS Office Media and Information Technology.pptx
Presentation-WPS Office Media and Information Technology.pptx
ChristianZapico1
 
NOV-14-2023 TVL Empowerment Technology SY 223-24
NOV-14-2023 TVL Empowerment Technology SY 223-24NOV-14-2023 TVL Empowerment Technology SY 223-24
NOV-14-2023 TVL Empowerment Technology SY 223-24
ChristianZapico1
 
A.-Planning-and-WPS-Office - Empowerment Technology.pptx
A.-Planning-and-WPS-Office - Empowerment Technology.pptxA.-Planning-and-WPS-Office - Empowerment Technology.pptx
A.-Planning-and-WPS-Office - Empowerment Technology.pptx
ChristianZapico1
 
MEDIA AND INFORMATION LITERACY GR .1 REPORT.pptx
MEDIA AND INFORMATION LITERACY GR .1 REPORT.pptxMEDIA AND INFORMATION LITERACY GR .1 REPORT.pptx
MEDIA AND INFORMATION LITERACY GR .1 REPORT.pptx
ChristianZapico1
 
Media and Information Literacy Grade 11 Gas
Media and Information Literacy Grade 11 GasMedia and Information Literacy Grade 11 Gas
Media and Information Literacy Grade 11 Gas
ChristianZapico1
 

More from ChristianZapico1 (6)

Practical Research 1 for senior highschool.pptx
Practical Research 1 for senior highschool.pptxPractical Research 1 for senior highschool.pptx
Practical Research 1 for senior highschool.pptx
 
Presentation-WPS Office Media and Information Technology.pptx
Presentation-WPS Office Media and Information Technology.pptxPresentation-WPS Office Media and Information Technology.pptx
Presentation-WPS Office Media and Information Technology.pptx
 
NOV-14-2023 TVL Empowerment Technology SY 223-24
NOV-14-2023 TVL Empowerment Technology SY 223-24NOV-14-2023 TVL Empowerment Technology SY 223-24
NOV-14-2023 TVL Empowerment Technology SY 223-24
 
A.-Planning-and-WPS-Office - Empowerment Technology.pptx
A.-Planning-and-WPS-Office - Empowerment Technology.pptxA.-Planning-and-WPS-Office - Empowerment Technology.pptx
A.-Planning-and-WPS-Office - Empowerment Technology.pptx
 
MEDIA AND INFORMATION LITERACY GR .1 REPORT.pptx
MEDIA AND INFORMATION LITERACY GR .1 REPORT.pptxMEDIA AND INFORMATION LITERACY GR .1 REPORT.pptx
MEDIA AND INFORMATION LITERACY GR .1 REPORT.pptx
 
Media and Information Literacy Grade 11 Gas
Media and Information Literacy Grade 11 GasMedia and Information Literacy Grade 11 Gas
Media and Information Literacy Grade 11 Gas
 

Recently uploaded

The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Sourabh Kumar
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Denish Jangid
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
Vivekanand Anglo Vedic Academy
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 

Recently uploaded (20)

The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 

empowerment technology for stem and gas .pdf

  • 3. Coverage of 1st Quarter Unit I : Information and Communication Technology Lesson 1 - What is Information and Communication Technology (ICT) Lesson 2 – Online Safety, Security, Ethics, and Etiquette Lesson 3 – Contextualized Online Search and Research Skills Lesson 4 – Developing ICT Content for Specific Purposes Lesson 5 – Manipulating Text, Graphics, and Images to Create ICT Content Intended for an Online Environment
  • 4.
  • 5. ???
  • 6. ???
  • 7. ???
  • 8. ???
  • 10. Timothy John Berners-Lee Inventor of the World Wide Web
  • 12. Steve Jobs Co-founder of Apple Company
  • 14.
  • 15. Gathering Information ACQUISITION Refinement of data and stored properly STORAGE Analyzing stage, to convert data into information MANIPULATION Solution or answer RETRIEVAL Report DISTRIBUTION Data Information Steps involved in Converting Data to Information
  • 16. Information and Communication Technology (ICT) Deals with the use of different communication technologies such as mobile phones, telephone, Internet, etc. to locate, save, send, and edit information.
  • 17.
  • 19.
  • 20. In the April 2022 Ookla Speedtest Global Index, the Philippines ranked 95th of 142 countries in mobile internet speed with 19.45 Mbps (global average of 30.75 Mbps) and 59th of 181 countries with 55.21 Mbps (global average of 63.46 Mbps) in fixed broadband speed. By 2025, the number of mobile subscribers in the Philippines will reach 159 million, and broadband subscribers will number 10.8 million.
  • 21. ICT in the Community
  • 22. Readiness for the Networked World
  • 23. Readiness for the Networked World Is the degree to which a community is prepared to participate in the Networked World. It is gauged by assessing a community’s advancement in the areas that are most critical to the adoption of information and communication technologies.
  • 24. According to Harvard Center for International Development The assessment section of the Guide asks participants to place their community on a scale from one to four (lowest to highest) in nineteen categories, grouped in five sections
  • 25. Assessment Guide • Network Access • Networked Learning • Networked Society • Networked Economy • Network Policy
  • 26. Network Access What are the availability, cost and quality of ICT networks, services and equipment?
  • 27. Networked Learning Does the educational system integrate ICTs into its processes to improve learning? Are there technical training programs in the community that can train and prepare an ICT workforce?
  • 28. Networked Society To what extent are individuals using information and communication technologies at work and in their personal lives? Are there significant opportunities available for those with ICT skills?
  • 29. Networked Economy How are businesses and governments using information and communication technologies to interact with the public and with each other?
  • 30. Network Policy To what extent does the policy environment promote or hinder the growth of ICT adoption and use?
  • 31. ICT in the Community
  • 32. Great Job Everyone! Lesson 1, Done! Multimedia Source & References: www.google.com,www.youtube.com
  • 33. Online Safety, Security, Ethics, and Etiquette
  • 34.
  • 35.
  • 36. Tips to Safe Online
  • 37. 1 Be mindful of what you share online and what site you share it to.
  • 38. 2 Do not just accept terms and condition; read it.
  • 39. 3 Check out the privacy policy page of a website to learn how the website handles the information you shares.
  • 40. 4 Know the security features of the social networking site you use. By keeping your profile private, search engines will not be able to scan your profile.
  • 41. 5 Do not share your password anyone.
  • 42. 6 Avoid logging on to public network/Wi-Fi. Browsing in “incognito or private mode”, a feature of the browser, will not protect you from hackers.
  • 43. 7 Do not talk to strangers whether online or face-to-face.
  • 44. 8 Never post anything about a future vacation. It is similar to posting, “Rob my house at this date.”
  • 45. 9 Add friends you know in real life.
  • 47. 11 Install and update an antivirus software on your computer. Use only one antivirus software to avoid conflict.
  • 48. 12 If you have a WIFI at home, make it a private network by adding a password.
  • 49. 13 Avoid downloading anything from untrusted website. Your are most vulnerable in peer-to-peer downloads (torrents) as the download is most likely not monitored by the site owner.
  • 50. 14Buy the software; do not used pirated one.
  • 51. 15 Do not reply or click links from suspicious emails.
  • 54. 1. MALWARE Stands for Malicious Software
  • 55. a. Virus A malicious program designed to replicate itself and transfer form one computer to another through the internet and local network or data storage.
  • 56. b. Worm A malicious program that transfer from one computer to another by any type of means. Trivia: ILOVEYOU worm (Love Bug Worm) Created by a Filipino.
  • 57. c. Trojan It disguised as a useful program. Sample are: Crack Antivirus Youtube Downloader Pre-Activated Application
  • 58. c.1. Rogue Security Software Trick the user by posing that is a security software.
  • 59. d. Spyware Program that run in the background without noticing it. To check this: Open the Task Manager (ctrl + alt + delete)
  • 60. d.1. Keylogger Use to record the keystroke done by the user.
  • 61. e. Adware A program design to send you advertisement. (ADS)
  • 62. 2. Spam Unwanted emails, mostly from bots or advertisement.
  • 63. 3. Phishing Its goal is to acquire sensitive information like password and credit card details.
  • 64. 3.1 Pharming A more complicated way of phishing where it exploits the DNS system. Main use: DDoS Attack ( to avoid, use VPN) Virtual Private Network
  • 65. Copyright Infringement As a general matter, copyright infringement occurs when a copyrighted work is reproduced, distributed, performed, publicly displayed, or made into a derivative work without the permission of the copyright owner. Definitions (FAQ) - U.S. Copyright Office https://www.copyright.gov ›
  • 66. Intellectual Property An idea, an invention, a form of literary work, or research, you have the right as to how it should be used by others.
  • 67. Great Job Everyone! Empowerment Technology Multimedia Source & References: www.google.com,www.youtube.com (Book)REX Bookstore – Empowerment Technology
  • 68. HOW TO STAY SAFE ONLINE