Вы находитесь на странице: 1из 4

EMPOWERING TECHNOLOGY

Three factors:
1. ABILITY
- is what you are capable of doing
2. MOTIVATION
- Determines what you do
3. ATTITUDE
- Determines how well you do it
These three factors are according to Lou Holtz (football coach)

Empowerment Technology in ICT


- It deals with the use of different communication technologies such as phone, mobile gadgets and internet to send
and receive information.

 Computer started with Abacus


 ICT was born when the first email was sent
 Sent by computer engineer Ray Tomlinson in 1971, the email was simply a test message to himself. The email
was sent from one computer to another computer sitting right beside it in Cambridge, Massachusetts, but it
traveled via ARPANET, a network of computers that was the precursor to the Internet.

Impacts of ICT:

Education without ICT Education with ICT


Banking without ICT Banking with ICT
Shopping without ICT Shopping with ICT
Health Service without ICT Health Service with ICT

1. Speed
2. Convenience
3. Portability

What is Information and Communication Technology?

 Refers to technologies that provide access to information through telecommunications.


 It is similar to Information Technology (IT), but focuses primarily on communication technologies which include
Internet, wireless networks, and phones.

What is Information Technology?


- The study or use of systems (especially computers and telecommunications) for storing, retrieving, and sending
information.
 Data: Raw facts, figures, and details.
 Information: An organized, meaningful, and useful interpretation of data.

COMPONENTS OF IT
1. Hardware - Physical Equipment
2. Software - Program/ set of instructions that tells the hardware how to perform task
3. Peopleware - user
4. Communication - connectivity
5. Procedure – methods on how things are done

USES OF ICT
 There are six things ICT is good at or six core uses of ICT that make it valuable to organisations:
TRENDS in ICT
1. Convergence – is the synergy of technological advancements to work on a similar goal or task
2. Social Media – a website, application or online channel that enables web users to create, co-create, discuss,
modify and exchange user generated contents
3. Mobile Technologies - used for cellular communication, smartphones and tablets
4. Assistive Media – designed to help people who have visual and reading impairments.

 Social Media
• Social Networks- sites that allow you to connect with other people with the same interest or background.
• Bookmarking – sites that allow you to store and manage links to various websites and resources.
• Social News – sites that allow users to post their own news items or links to other news sources.
• Media Sharing – sites that allow you to upload and share media content like images, music, and video.
• Micro blogging – sites that focus short updates from the user.
• Blogs and Forums- these allow users to post their content.

 Mobile Technologies
 iOS – used in Apple devices
 Android – open source operating system developed by Google.
 Blackberry OS – used in Blackberry devices
 Windows Mobile – developed by Microsoft
 Symbian – used by nokia devices

The World Wide Web


The World Wide Web (abbreviated WWW or the Web) is an information space where documents and other web
resources are identified by Uniform Resource Locators (URLs), interlinked by hypertext links, and can be accessed via the
Internet. English scientist Tim Berners-Lee invented the World Wide Web in 1989.

 Web 1.0
A static web page (sometimes called a flat page/stationary page) is a web page that is delivered to the user
exactly as stored.
 Web 2.0
A dynamic website contains information that changes, depending on the viewer, the time of the day, the time
zone, the viewer's native language, and other factors.
 Web 3.0
The Semantic Web provides a common framework that allows data to be shared and reused across application,
enterprise, and community boundaries.
- Movement led by World Wide Web consortium (W3C).
- The term "Semantic Web" was coined by Tim Berners-Lee, the inventor of the World Wide Web and director
of the World Wide Web Consortium ("W3C"), which oversees the development of proposed Semantic Web standards.
He defines the Semantic Web as "a web of data that can be processed directly and indirectly by machines".

Health and Safety


Ergonomics
- The process of designing or arranging workplaces, products and systems so that they fit the people who use them.

What Elements and Practices Can Help Create a Good Working Environment?
 Appropriate positioning of monitors, keyboards and adjustable chairs
 Use of a mouse mat
 Use of a monitor filter
 Provision of adequate lighting and ventilation
 Frequent breaks away from the computer

List some common health problems associated with using a computer


 Injuries to wrists caused by prolonged typing (RSI)
 Eye strain caused by screen glare
 Back problems associated with poor seating or bad posture
Security

 An Acceptable Use Policy (AUP) might include:


 Not using the service as part of violating any law
 Not attempting to break the security of any computer network or user
 Not posting commercial messages to Usenet groups without prior permission
 Not attempting to send junk e-mail or spam to anyone who doesn't want to receive it
 Not attempting to mail bomb a site with mass amounts of e-mail in order to flood their server
 Users also typically agree to report any attempt to break into their accounts

 Know about privacy issues associated with computers


 A password is an un-spaced sequence of characters used to determine that a computer user requesting access
to a computer system is really that particular user
 Typically, users of a multi-user or securely protected single-user system claim a unique name (often called a
User ID) that can be generally known
 In order to verify that someone entering that user ID really is that person, a second identification, the password,
known only to that person and to the system itself, is entered by the user
 A password is typically somewhere between four and 16 characters, depending on how the computer system is
set up
 Passwords are case-specific
 When a password is entered, the computer system is careful not to display the characters on the display screen,
in case others might see it

 Good criteria when choosing a password or setting up password guidelines include the following:
 Don't pick a password that someone can easily guess if they know who you are (for example, not your
National Insurance number, birthday, or maiden name)
 Don't pick a word that can be found in the dictionary (since there are programs that can rapidly try every
word in the dictionary!)
 Don't pick a word that is currently newsworthy
 Don't pick a password that is similar to your previous password
 Do pick a mixture of letters and at least one number
 Do pick a word that you can easily remember
 Many networks require that you change your password on some periodic basis

Purpose and Value of Backing Store of Computer Files


 Organize your computer for more efficient backups
 Complete vs. incremental backups
 Back up to removable medium
e.g. CD-ROM, tape, ZIP disk
 Use 'off-site' storage

Computer Malware

Malware
 short for malicious software, is an umbrella term used to refer to a variety of forms of hostile or intrusive
software, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and
other malicious programs.

Understand the term virus when used in computing


 A virus is a piece of programming code usually disguised as something else that causes some unexpected and
usually undesirable event
 A virus is often designed so that it is automatically spread to other computer users
 Some viruses wreak their effect as soon as their code is executed
 other viruses lie dormant until circumstances cause their code to be executed by the computer
 Some viruses are playful in intent and effect and some can be harmful, erasing data or causing your hard disk to
require reformatting
 There are three main classes of VIRUSES:
1. File infectors
 Some file infector viruses attach themselves to program files
 Some can infect any program for which execution is requested
 Other file infector viruses arrive as wholly-contained programs or scripts sent as an attachment to an e-mail
note
2. System or boot-record infectors
 These viruses infect executable code found in certain system areas on a disk
 They attach to the DOS boot sector on diskettes or the Master Boot Record on hard disks
3. Macro viruses
 These are among the most common viruses, and they tend to do the least damage
 Macro viruses infect your Microsoft Word application and typically insert unwanted words or phrases

 Understand that there are different types of MALWARE:

 Trojan horse- is a program in which malicious or harmful code is contained inside apparently harmless
programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the
file allocation table on your hard disk
- A Trojan horse may be widely redistributed as part of a computer virus
 Worm - is a self-replicating virus that does not alter files but resides in active memory and duplicates itself
- Worms use parts of an operating system that are automatic and usually invisible to the user
- It is common for worms to be noticed only when their uncontrolled replication consumes system
resources, slowing or halting other tasks

 Phishing

Phishing: scam by which an e-mail user is duped into revealing sensitive information such as passwords and
credit card details

How Malware Spreads

 USB drives can be carriers of computer viruses.


 Window that pops up when you insert an infected USB drive looks similar to that when inserting a clean USB
drive.
◦ Clicking icon infects the computer.
◦ To prevent further infection, click the X on the top right.
◦ However clean drives can still be infected just by using the USB drive with an infected computer.

When and How malware can enter a computer system

 As a file attached to an e-mail message


 Via instant messengers such as AOL, Yahoo!, MSN and Windows Messenger
 On an infected diskette
 As a download via the internet
 By hackers gaining access to your computer via a communications port

Know about anti-virus measures

 Do not open e-mail attachments unless they are from a trusted source
 Install a firewall program
 Buy anti-virus software that can screen e-mail attachments
 Keep anti-virus software up to date on a weekly basis
 Schedule regular virus scans of hard drives
 Install all the critical Windows updates from Microsoft
 Be aware of hoax e-mail warnings

Вам также может понравиться