Вы находитесь на странице: 1из 4

Information—processed data.

Knowledge obtained through reading,


studying, investigation, or research
Impacts of ICT
 Data—raw facts
 Good
Communication—transferring of messages from one point to another o Borderless communication
o Lower communication cost
 IOT—Internet of Things o Paperless environment
 RFID—Radio Frequency ID o Faster communication speed
Technology—devices invented to cater the dissemination of information o Reliable information
and communication form one entity to another  Bad
o Social Problems
 Cyber Bullying
Creation of Technology o Health Problems

 Smoke signals
 Vocals Current Situation of ICT in the Philippines
 Writings
o Cuneiform  Fastest text messaging country
o Phoenician  Social media capital of the world
o Paper (Tsai Lun, Chinese) o 7 billion users worldwide
o Printing Press o 83 million users in the Ph
 Bible—first book published o 63 million facebook users Ph
 Telegraph (1793) o 20 million other platforms
o Morse Code  ICT hub of Asia
 Telephone (Alexander Graham Bell, 1876)  15 out of 15 in Southeast Asia in terms of internet speed and
 Television (1925) cost, with an average of 5.5 mbps (DICT)
 Computer (1941)  Ph: Priciest and slowest internet speed (SOTI Report, Akamai)
 Internet/Arpanet (1969)  LTE—long term evolution
 Pipol Konek—Ph Public Wifi
 RA 8792 E-commerce Act
Uses of ICT  RA 8775 Anti Child Pornography Act
 Business  RA 9995 Anti Photo and Video Voyeurism Act
 Education  RA 10173 Data Privacy Act
 Government  RA 10175 Cyber Crime Prevention Act
 Health and wellness  RA 10844 DICT Act
 Agriculture Visual Basic—simplest programming language
 Banking and finance
Computer Ethics—right actions while using the computer  Prohibits taking photos/videos of sexual acts or any similar
activity, images of private areas of a person…
10 commandments of computer ethics
 To use, to copy, to sell sexual photos/videos is illegal
1. thou shall not use computers to harm
RA 10175 Cyber Crime Prevention Act
2. thou shall not interfere with another people’s work
3. thou shall not snoop around another people’s computer files  Cyber Libel—uploading photos/videos and attaching false
4. thou shall not use computers to steal/phish messages is punishable
5. thou shall not bear false witnesses  Public officials/personalities can be photographed during public
6. thou shall not copy or use proprietary software services
7. thou shall not use another people’s gadgets without  Taking photos/videos of public figures during private time is
authorization or compensation illegal
8. thou shall not plagiarize/appropriate another people’s
intellectual output RA8775 Anti-Child Pornography Act
9. thou shall think of the consequences of the programs you create
 Explicit sexual activity
10. thou shall use computer with consideration and respect
o Sexual intercourse
o Bestiality
o Masturbation
RA 8792 E-commerce Act o sadistic or masochistic abuse
 text messages are accepted as electronic evidence o lascivious exhibition of private parts
o use of object or instruments for lascivious acts
 electronic signature—refers to any distinctive mark,
characteristics, and/or sound in electronic form, representing  Who may file a complaint?
the identity of a person… o offended party
o parent/guardian
RA 10844 DICT Act o ascendant or collateral relative
o officer, social worker
 Give ICT services to the public
o local social welfare development officer
 Host Government Websites
o barangay chairman
RA 10178 Data Privacy Act o law enforcement officer
o at least three concerned citizens
 Proper disposal of information (burn, shred, soak, etc.) o any person knowledgeable of the circumstance
 Supreme court order—needed document to request someone’s  Reclusion perpetua and a fine not less than 2M but not more
data from a telecommunications office without the consent of the than 5M
data subject  Reclusion temporal
 Disclosure of Data (Data Confidentiality)
 Data breach through negligence is punishable
RA 9995 Anti Photo and Video Voyeurism Act Trends in ICT
1993—World Wide Web (Tim Berners-Lee)
 Web 1.0—Static Web  Steal your information
 Web 2.0—Dynamic Web o Card number generator
 Web 3.0—Semantic Web o Social engineering
o Intelligence  Destroy your computer
o Search History  To stalk
o Predictive Search
Spyware
TRENDS
 Executable file (.exe)
 Technological Convergence  Tracking your activities
o Syncing  Normal flow/no harm done
 Social Media—platforms which enables us to connect or interact
with each other Malware
o Social Networking Sites—where we interact with people  Malicious software
of the same interest  Intended to harm/destroy computers and corrupt files
o Bookmarking sites—where we can save links for future o Worm—through computer networks
use o Virus
o Media Sharing—platform which we can use to share  Trojan Horse—blue screen of death
videos, images…
o Microblogging—limited number of characters per post
o Blogs and Forum
Ransomware
 Mobile Technologies
 Assistive Media  all computer files will be encrypted
 Connected Augmented Intelligence  requires payment to retrieve files
o Predictive Analytics
o Image Analytics (face recognition)
o Machine Learning How to protect your computer?

 Firewall—tracking all processes in your computer, running only


Hacker—people who get access over someone’s information without what is authorized
his/her consent  Antivirus—checking every file to see if there is a suspicious file
 Email Security—checking viruses on email attachments
 White Hacker (Ethical Hackers)—employed hackers to hack  Always update
an organization’s own website to check the level of vulnerability.  Do not install more than 1 antivirus, it may slow your computer
 Black Hacker—steal and destroy your computer and files performance
Reasons for Hacking

 Tripping
 Check their hacking capabilities
Tips to avoid cyber criminals/tips to be safe online 7. Portfolio—Ideal for showcasing your work, to show off your
talent to potential employers
1. Do not share your personal information on your social media
8. Catalogue and Brochure—enable you to display what you have
accounts
to offer and attract potential clients. Ideal for dental surgeries,
2. Do not share your future destination/vacation online
salons, destinations, and manufacturers.
3. Do not post that you are alone in the house
9. Business Directory—they can be dedicated to a specific
4. Do not share your password to anyone
location, topic or industry. They serve as useful lists of resources.
5. Create a strong password
10. Bio—useful in the world of publishing and establishment of a fan
 Uppercase base. Includes the author’s biography, catalogue of their works
 Lowercase with reviews and comments, links to their socmed, etc.
 Numbers
 Special characters
6. Change your password at least once a month
7. Do not share your id’s online, to avoid identity theft
8. Do not login to your social media account through public wifi
9. Do not login to your social media accounts through shared
computers
10. Do not open suspicious links
11. Add only accounts of people you know

10 most popular websites


1. Ecommerce website—is an online shop where people can order
goods and make payments from the comfort of their homes.
2. Blogs and personal websites—personal websites are for
families and people who wish to document the big occasions of
their lives. Blogs are usually updated frequently and older posts
can be viewed through archives.
3. Informational websites—people are researching, self-teaching
with online tutorials, hacks and tips from such websites.
4. Online Community—get in touch and share ideas with people
with the same interests or from similar backgrounds through the
internet.
5. Photo sharing—allow people to upload and download photos
for free.
6. Resume—showcases who you are, not just your qualifications,
giving you much more control over your first impressions with
prospective employers.

Вам также может понравиться