0% found this document useful (0 votes)
137 views60 pages

Week 1 Introduction To ICT

The document provides information about information and communication technology (ICT) including its key components like hardware, software, cellphones, desktops, laptops, and network devices. It also discusses trends in ICT such as convergent technologies, social media, mobile technologies, and the world wide web. The document then provides tips on how to stay safe online including being mindful of what you share, reading privacy policies, using strong passwords, avoiding public WiFi networks, not downloading from untrusted sites, and installing antivirus software. It also outlines various internet threats like malware, viruses, worms, trojans, spyware, keyloggers, adware, spam, and phishing.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
137 views60 pages

Week 1 Introduction To ICT

The document provides information about information and communication technology (ICT) including its key components like hardware, software, cellphones, desktops, laptops, and network devices. It also discusses trends in ICT such as convergent technologies, social media, mobile technologies, and the world wide web. The document then provides tips on how to stay safe online including being mindful of what you share, reading privacy policies, using strong passwords, avoiding public WiFi networks, not downloading from untrusted sites, and installing antivirus software. It also outlines various internet threats like malware, viruses, worms, trojans, spyware, keyloggers, adware, spam, and phishing.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 60

Let us Pray

At the end of the session, you


are expected to:
1. identify what is ICT;
2. explain and give how ICT affects their
everyday lives and its current state; and
3. compare and contrast the nuances of varied
online platforms, sites, and content to achieve
specific class objectives or address situational
challenges.
Using the Venn
diagram, I want
you to list down
how each one is
similar to the other.
Write your answer
into a Jamboard.
INFORMATION AND COMMUNICATION
TECHNOLOGY

Hardware Software
Cellphone

Desktop Laptop
Network Devices
TRENDS IN ICT
Convergent
Technologies
multiple different
devices combine
into a single gadget
because of
technological
advancement
Social
Media
software,
applications or
platforms that allow
users to
communicate in an
online social
communities or
network. Social
media allows people
to communicate
faster
Mobile
Technologies
devices that are
easily carried and
allows fast means of
communication
World Wide WEb
Web Versions
Web Versions
Communication Service Provider
Payment System
Social Media Platform
Social Networking Platform
Web Versions
https://jamboard.google.com/d/1b835lZa_QfnAiefZhaTkHehVeYLtDshSfc3es4hw1oA/edit
?usp=sharing
Source: https://www.google.com.ph/images

Think Before You Click

1. Before you post something on the web, ask these


questions to yourself: Would you want your parents
or grandparents to see it? Would you want your
future boss to see it? Once you post something on
the web, you have no control of who sees your posts.
Source: https://www.google.com.ph/images

Think Before You Click

2. Your friends depend on you to protect their


reputation online. Talk to your friends about this
serious responsibility.
Source: https://www.google.com.ph/images

How Safe Are You?

The Internet is defined as the information


superhighway. This means that anyone has access
to this highway, can place information, and can
grab that information.
Source: https://www.google.com.ph/images

Tips to Stay Safe Online

Be mindful of what your share online and what site


you share it to.
Source: https://www.google.com.ph/images

Tips to Stay Safe Online

Do not just accept terms and conditions; read it.


Source: https://www.google.com.ph/images

Tips to Stay Safe Online

Check out the privacy policy pages of a website to


learn how the website handles the information you
share.
Source: https://www.google.com.ph/images

Tips to Stay Safe Online

Know the security features of the social networking


site you use. By keeping your profile private, search
engines will not be able to scan your profile.
Source: https://www.google.com.ph/images

Tips to Stay Safe Online

Do not share your password with anyone.


Source: https://www.google.com.ph/images

Tips to Stay Safe Online

Avoid logging in to public networks/Wi-Fi. Browsing


in “incognito (or private) mode.” A feature of the
browser, will not protect you from hackers.
Source: https://www.google.com.ph/images

Tips to Stay Safe Online

Do not talk to strangers whether online or face-to-


face.
Source: https://www.google.com.ph/images

Tips to Stay Safe Online

Never post anything about a future vacation. It is


similar to posting, “Rob my house at this date.”
Source: https://www.google.com.ph/images

Tips to Stay Safe Online

Add friends you know in real life.


Source: https://www.google.com.ph/images

Tips to Stay Safe Online

Install and update an antivirus software on your


computer. Use only one anti-virus software to
avoid conflicts.
Source: https://www.google.com.ph/images

Tips to Stay Safe Online

If you have a Wi-Fi at home, make it a private


network by adding a password.
Source: https://www.google.com.ph/images

Tips to Stay Safe Online

Avoid downloading anything from untrusted websites. You are


most vulnerable in peer-to-peer downloads (torrents) as the
download is most likely not monitored by the site owner.
Source: https://www.google.com.ph/images

Tips to Stay Safe Online

Buy the software; do not use pirated ones.


Source: https://www.google.com.ph/images

Tips to Stay Safe Online

Do not reply or click links from suspicious emails.


Source: https://www.google.com.ph/images

Internet Threats
Source: https://www.google.com.ph/images

1. Malware

Stands for Malicious Software


Source: https://www.google.com.ph/images

Virus

A malicious program designed to replicate itself and transfer


from one computer to another either through the Internet and
local networks or data storage like flash drives and CDs.
Source: https://www.google.com.ph/images

Worm

A malicious program that transfers from one computer to


another by any type of means. Often, it uses a computer
network to spread itself. For example, the ILOVEYOU worm
(Love Bug Worm) created by a Filipino.
Source: https://www.google.com.ph/images

Trojan

A malicious program that is disguised as a useful program


but once downloaded or installed, leaves your PC
unprotected and allows hackers to get your information.
Source: https://www.google.com.ph/images

Rogue Security Software

Tricks the user into posing that it is a security software. It


asks the user to pay to improve his/her security but in
reality, they are not protected at all.
Source: https://www.google.com.ph/images

Spyware

A program that runs in the background without you knowing it


(thus called “spy”). It has the ability to monitor what you are
currently doing and typing through keylogging.
Source: https://www.google.com.ph/images

Keyloggers

Used to record the keystroke done by the users. This is done to


steal their password or any other sensitive information. It can
record email, messages, or any information you type using your
keyboard.
Source: https://www.google.com.ph/images

Adware

A program designed to send you advertisements,


mostly as pop-ups.
Source: https://www.google.com.ph/images

2. Spam

Unwanted email mostly from bots or advertisers. It


can be used to send malware.
Source: https://www.google.com.ph/images

3. Phishing

Its goal is to acquire sensitive personal information like passwords


and credit card details. This is done by sending you an email that will
direct the user to visit a website and be asked to update his/her
username, password, credit card, or personal information.

You might also like