SlideShare a Scribd company logo
1 of 7
The disadvantages of ict
1. Understand the several problems ICT has
created in their generation; and
2. Write a reflective essay on how ICT can
change the world for better or for worse
1. phishing-spoofing- the act of sending multiple emails to multiple users in hopes
of having a number of them clicking on the links or malwares attached to the
emails. Most email services today have spam or bulk folders that automatically
put these suspicious emails to that folder. However, this is not 100% accurate
that some emails not filtered and some others emails that are legitimate end
upon on the spam folder.
2. blackmail/extortion- the act of using the internet to threaten or damage
someone’s Reputation to extort money or anything else of value.This can be
avoided if you are aware of what you should post on the internet.The victims of
this act tend to have posted something “inappropriate” over the internet even if
they put it at secured location
Accessing stored communication- or hacking; the act of obtaining unauthorized
access to data from a computer network.This is typically done to commercial and
government sites to threaten its owner. In late 2014, a group of hackers hacked
sony’s website because of the impending release of the controversial film “the
interview”
3. Sports betting – the act of wagering on any sports event over the internet. In
some countries, gambling (including sports betting) is illegal even if you are doing
it over the internet
4. Non-delivery of merchandise- the act of devising a scheme wherein a culprit post
an item or service for sale on the internet and once the transaction’s have been
done, does really give the item or service.
5. Electronic harassment- the act of anonymously using the internet to harass,
abuse, threaten, or annoy other people.This is also an act of cyber bullying
however, because the culprit is anonymous, it is hard to detect who is bullying you
6. Child pornography- the act of using the internet to show child pornography this
act is highly punishable by law
8. Prostitution- the act of using the internet to engage in prostitution
9. DrugTrafficking- the act of selling illegal substances using internet
10. Criminal copyright infringement- the act of piracy mainly for financial gain. In late 2014,
the number one pirate website, thepirateby, was raided for the second time due to
years of pirating movies, music, games, books, and other software these kinds of
website earn money through advertising.
the Internet is the present and the future of yourr generation and you define what
impact it can do to shape our society, whether it is negative or positive.The future is in
your hands.
there are several ways the authorities can help solve or prevent cybercrimes.
Here are some of them
1. Network Security- before a hacker can get through the unauthorized files he or she is
targeting, the hacker has to get through several security measures like Encryption is the
process of converting raw data into code. However, theses methods are not 100% secure
and there will always be away for hacker to hack
2. Investigation- URL tracing and logging are used by website to track your unique IP
addresses.This can be used by investigators to trace hackers. In piracy, trackers are used
to identify ip addresses currently sharing a pirated file.
3. Penalties- More and more laws are being created and implemented today. Penalties
include both a fine and imprisonment
As responsible users of technology, we should be are of the limitations of using the
internet
1. Form a group of three members
2. Write the Internet crimes that are rampant today
3. Research on the punishments for the said crimes and discuss among yourselves if these
punishment are fair or not
4. Try to revise these punishment as you see fit
5. Report your revisio0n in class

More Related Content

What's hot

10 ICT as a Platform for Change
10 ICT as a Platform for Change10 ICT as a Platform for Change
10 ICT as a Platform for ChangeTeodoro Llanes II
 
Empowerment technologies byShyna Gane Daleon and Galasao
Empowerment technologies byShyna Gane  Daleon and Galasao Empowerment technologies byShyna Gane  Daleon and Galasao
Empowerment technologies byShyna Gane Daleon and Galasao janelle17
 
Empowerment Technologies - Module 6
Empowerment Technologies - Module 6Empowerment Technologies - Module 6
Empowerment Technologies - Module 6Jesus Rances
 
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and EtiquetteLea Rodriguez
 
Group 3 basic web page creation
Group 3  basic web page creationGroup 3  basic web page creation
Group 3 basic web page creationFe Lanny Tejano
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesMark Jhon Oxillo
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Jesus Rances
 
ICT a Medium for Advocacy and Development Communication
ICT a Medium for Advocacy and Development CommunicationICT a Medium for Advocacy and Development Communication
ICT a Medium for Advocacy and Development CommunicationFrancineEspineda
 
8 Collaborative ICT Development
8 Collaborative ICT Development8 Collaborative ICT Development
8 Collaborative ICT DevelopmentTeodoro Llanes II
 
[EMPOWERMENT TECHNOLOGIES]-ADVANCED PRESENTATION SKILLS
[EMPOWERMENT TECHNOLOGIES]-ADVANCED PRESENTATION SKILLS[EMPOWERMENT TECHNOLOGIES]-ADVANCED PRESENTATION SKILLS
[EMPOWERMENT TECHNOLOGIES]-ADVANCED PRESENTATION SKILLSJazzyNF
 
11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change11 Developing ICT Project for Social Change
11 Developing ICT Project for Social ChangeTeodoro Llanes II
 
Group 3 lesson 13 ict project publication and statistics
Group 3 lesson 13 ict project publication and statisticsGroup 3 lesson 13 ict project publication and statistics
Group 3 lesson 13 ict project publication and statisticsEricaVS
 
L15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptxL15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptxBenjieBarlaan
 
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptxRyanRojasRicablanca
 
12 Publishing and Sustaining for ICT Project
12 Publishing and Sustaining for ICT Project12 Publishing and Sustaining for ICT Project
12 Publishing and Sustaining for ICT ProjectTeodoro Llanes II
 
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)bloodyblade06
 
Online platforms for ICT Content Development
Online platforms for ICT Content DevelopmentOnline platforms for ICT Content Development
Online platforms for ICT Content DevelopmentAngelito Quiambao
 

What's hot (20)

10 ICT as a Platform for Change
10 ICT as a Platform for Change10 ICT as a Platform for Change
10 ICT as a Platform for Change
 
Empowerment technologies byShyna Gane Daleon and Galasao
Empowerment technologies byShyna Gane  Daleon and Galasao Empowerment technologies byShyna Gane  Daleon and Galasao
Empowerment technologies byShyna Gane Daleon and Galasao
 
Empowerment Technologies - Module 6
Empowerment Technologies - Module 6Empowerment Technologies - Module 6
Empowerment Technologies - Module 6
 
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and Etiquette
 
Group 3 basic web page creation
Group 3  basic web page creationGroup 3  basic web page creation
Group 3 basic web page creation
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment Technologies
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3
 
ICT a Medium for Advocacy and Development Communication
ICT a Medium for Advocacy and Development CommunicationICT a Medium for Advocacy and Development Communication
ICT a Medium for Advocacy and Development Communication
 
8 Collaborative ICT Development
8 Collaborative ICT Development8 Collaborative ICT Development
8 Collaborative ICT Development
 
[EMPOWERMENT TECHNOLOGIES]-ADVANCED PRESENTATION SKILLS
[EMPOWERMENT TECHNOLOGIES]-ADVANCED PRESENTATION SKILLS[EMPOWERMENT TECHNOLOGIES]-ADVANCED PRESENTATION SKILLS
[EMPOWERMENT TECHNOLOGIES]-ADVANCED PRESENTATION SKILLS
 
Lesson 14
Lesson 14Lesson 14
Lesson 14
 
11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change
 
Group 3 lesson 13 ict project publication and statistics
Group 3 lesson 13 ict project publication and statisticsGroup 3 lesson 13 ict project publication and statistics
Group 3 lesson 13 ict project publication and statistics
 
L15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptxL15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptx
 
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
 
ICT as a Platform for Change
ICT as a Platform for Change ICT as a Platform for Change
ICT as a Platform for Change
 
ICT as a Platform for Change
ICT as a Platform for ChangeICT as a Platform for Change
ICT as a Platform for Change
 
12 Publishing and Sustaining for ICT Project
12 Publishing and Sustaining for ICT Project12 Publishing and Sustaining for ICT Project
12 Publishing and Sustaining for ICT Project
 
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
 
Online platforms for ICT Content Development
Online platforms for ICT Content DevelopmentOnline platforms for ICT Content Development
Online platforms for ICT Content Development
 

Similar to The disadvantages of ict

The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxAnecitaLCalamohoy
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxAnecitaLCalamohoy
 
L15 The Disadvantages of ICT.ppt
L15 The Disadvantages of ICT.pptL15 The Disadvantages of ICT.ppt
L15 The Disadvantages of ICT.pptraffy ursulum
 
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptxThe disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptxAnecitaLCalamohoy
 
E-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptxE-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptxLeah Condina
 
15_The_Disadvantages_of_ICT.pptx
15_The_Disadvantages_of_ICT.pptx15_The_Disadvantages_of_ICT.pptx
15_The_Disadvantages_of_ICT.pptxReminPasion1
 
Disadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptxDisadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptxDixsonCaluag2
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptxangellaclarianes1
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitySohailAkbar14
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfvichu19891
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crimeAlisha Korpal
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxPrinceKumar851167
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
Internet Security
Internet SecurityInternet Security
Internet SecurityParv Poddar
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptxRajviNikeetaRathore
 

Similar to The disadvantages of ict (20)

The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
 
L15 The Disadvantages of ICT.ppt
L15 The Disadvantages of ICT.pptL15 The Disadvantages of ICT.ppt
L15 The Disadvantages of ICT.ppt
 
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptxThe disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx
 
E-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptxE-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptx
 
15_The_Disadvantages_of_ICT.pptx
15_The_Disadvantages_of_ICT.pptx15_The_Disadvantages_of_ICT.pptx
15_The_Disadvantages_of_ICT.pptx
 
Disadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptxDisadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptx
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptx
 
trial
trialtrial
trial
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
ICT, the Self, and Society.pdf
ICT, the Self, and Society.pdfICT, the Self, and Society.pdf
ICT, the Self, and Society.pdf
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 

Recently uploaded

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

The disadvantages of ict

  • 2. 1. Understand the several problems ICT has created in their generation; and 2. Write a reflective essay on how ICT can change the world for better or for worse
  • 3. 1. phishing-spoofing- the act of sending multiple emails to multiple users in hopes of having a number of them clicking on the links or malwares attached to the emails. Most email services today have spam or bulk folders that automatically put these suspicious emails to that folder. However, this is not 100% accurate that some emails not filtered and some others emails that are legitimate end upon on the spam folder. 2. blackmail/extortion- the act of using the internet to threaten or damage someone’s Reputation to extort money or anything else of value.This can be avoided if you are aware of what you should post on the internet.The victims of this act tend to have posted something “inappropriate” over the internet even if they put it at secured location
  • 4. Accessing stored communication- or hacking; the act of obtaining unauthorized access to data from a computer network.This is typically done to commercial and government sites to threaten its owner. In late 2014, a group of hackers hacked sony’s website because of the impending release of the controversial film “the interview” 3. Sports betting – the act of wagering on any sports event over the internet. In some countries, gambling (including sports betting) is illegal even if you are doing it over the internet 4. Non-delivery of merchandise- the act of devising a scheme wherein a culprit post an item or service for sale on the internet and once the transaction’s have been done, does really give the item or service. 5. Electronic harassment- the act of anonymously using the internet to harass, abuse, threaten, or annoy other people.This is also an act of cyber bullying however, because the culprit is anonymous, it is hard to detect who is bullying you 6. Child pornography- the act of using the internet to show child pornography this act is highly punishable by law
  • 5. 8. Prostitution- the act of using the internet to engage in prostitution 9. DrugTrafficking- the act of selling illegal substances using internet 10. Criminal copyright infringement- the act of piracy mainly for financial gain. In late 2014, the number one pirate website, thepirateby, was raided for the second time due to years of pirating movies, music, games, books, and other software these kinds of website earn money through advertising. the Internet is the present and the future of yourr generation and you define what impact it can do to shape our society, whether it is negative or positive.The future is in your hands.
  • 6. there are several ways the authorities can help solve or prevent cybercrimes. Here are some of them 1. Network Security- before a hacker can get through the unauthorized files he or she is targeting, the hacker has to get through several security measures like Encryption is the process of converting raw data into code. However, theses methods are not 100% secure and there will always be away for hacker to hack 2. Investigation- URL tracing and logging are used by website to track your unique IP addresses.This can be used by investigators to trace hackers. In piracy, trackers are used to identify ip addresses currently sharing a pirated file. 3. Penalties- More and more laws are being created and implemented today. Penalties include both a fine and imprisonment
  • 7. As responsible users of technology, we should be are of the limitations of using the internet 1. Form a group of three members 2. Write the Internet crimes that are rampant today 3. Research on the punishments for the said crimes and discuss among yourselves if these punishment are fair or not 4. Try to revise these punishment as you see fit 5. Report your revisio0n in class