Essay
Essay
Essay.
What part are you now in the empowerment technology e-book? Explain in your own statement
of the topics you have read. You can also state here of what you have answered in Empowerment
Technologies E-Book.
I am now in Lesson 3 in the empowerment technology e-book. In lesson 1, the book talks
about the definition of ICT and its uses. ICT refers to the infrastructure and components that
enables the convergence of modern computing, and all other things related to technology,
networks, systems, devices, and even the people that are interacting with the digital world. ICT
covers a vast range of technologies, but it can be grouped in different components such as
hardware, software, data, infrastructure, and people. Hardware refers to the machinery and its
physical parts. It also includes communication devices, processing, storage, input, and output.
Technically, hardware are parts that can be seen and touched. Software, on the other hand, refers
to a set of programs that allows or instruct a computer on how it should operate. It is the opposite
of hardware, as software are programs, data, and even applications that runs on the device or
machinery. Data is simply a set of numbers, symbols, letters that are generated in order to
become information that are processed and stored in the computer systems. Infrastructure refers
to both the information and communication technologies. This is the physical structures that
connects with the technology and this includes cellular towers, data lines, and network cables.
The last component, people, are those who build, develop, program, organize, and even design
the hardware and software of a computer system.
With today’s massive use of modern technology, ICT covers a wide range of use in each
of our everyday lives. It can be used at home, school, economy, and even healthcare. Nowadays,
households have appliances that can be controlled by smartphones as they are connected to
wireless networks. ICT is relevant in education as it makes it easier for the students to search
something in the internet and teachers are now able to present their lessons with ease. In terms of
economy, ICT is used in businesses such as devices for payments, scanners, and even to manage
global operations. ICT is also widely used in manufacturing factories since it allows
manufacturers to build products efficiently and with ease.
In lesson 3, the topics are about threats and cybersecurity. These threats are anything that
are harmful to the computer system. Before, they were only used as pranks, but nowadays, they
are considered to be serious because they may bring forth disruption and damage that may cause
the loss of files and data. They could also cause malfunctioning and may even lead to the stop -of
the operation of the device. Threats may come in forms of Malware, Social Engineering,
Password Attack, Person-in-the-Middle, Injection and Cross-Site Scripting, and Data Breaches.
Cybersecurity is a set of measure that may help I keeping your data and device away from harm.
This cybersecurity are Antivirus and Anti-Malware, Firewall, Phishing Protection, Access
Management, Updating and Patching, and Encryption.