0% found this document useful (0 votes)
215 views23 pages

Safe and Responsible Use of Computer, Internet, and Email

The document discusses safe and responsible use of computers, the internet, and email. It defines ICT and its components like cloud computing, software, hardware, communication technology, data, and internet access. It also discusses roles, advantages, and disadvantages of ICT. The document provides guidelines for safe and responsible use of ICT, including being secure, respectful, safe, responsible, and legal.

Uploaded by

anjieneth.cailo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
215 views23 pages

Safe and Responsible Use of Computer, Internet, and Email

The document discusses safe and responsible use of computers, the internet, and email. It defines ICT and its components like cloud computing, software, hardware, communication technology, data, and internet access. It also discusses roles, advantages, and disadvantages of ICT. The document provides guidelines for safe and responsible use of ICT, including being secure, respectful, safe, responsible, and legal.

Uploaded by

anjieneth.cailo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

SAFE AND RESPONSIBLE

USE OF COMPUTER,
INTERNET, AND EMAIL
OBJECTIVES:

a. indicate an understanding of Safe


and Responsible Use of Computer,
Internet, and Email;

b. promote the value of personal


responsibility and safety when using
email, the internet, and computers; and

c. provide an example of a problem


encountered with ICT and how to solve
it.
ACTIVATE:
"Nothing EVER goes away
once it is posted
online"
01 WHAT IS ICT?
Information and communication
technologies (ICT) is defined as
a diverse set of technological
tools and resources used to
ICT
transmit, store, create, share
or exchange information.

ACCORDING TO UNESCO'S INTERNATIONAL INSTITUTE


FOR EDUCATIONAL PLANNING
07 COMPONENTS OF ICT
01 CLOUD COMPUTING

The delivery of different services


through the Internet. These resources
include tools and applications like
data storage, servers, databases,
networking, and software.
02 SOFTWARE

a group of guidelines,
facts, or software used to
run machines and carry out
particular activities.
03 HARDWARE

the hardware, both internal and


external, that gives you the
ability to do key tasks including
input, output, storage,
communication, processing, and
more.
04 TRANSACTION
the purchase, importation,
transfer, installation, selling, or
use of any information and
communications technology or
service, including continuous
operations
05
The transfer of messages
(information) among COMMUNICATION
people and/or machines TECHNOLOGY
through the use of
technology.
06 DATA

Information that has been


translated into a form that is
efficient for movement or
processing
Internet access is the process of
connecting to the internet using personal
computers, laptops or mobile devices by
users or enterprises.

07 INTERNET ACCESS
ROLES OF ICT

Communication Inventory
Management

Management
Data Management Information

Customer Relationship
Management
ADVANTAGES OF ICT

Globalization Cost Effectiveness

Communication Bridging the


Cultural Gap

Creation of
new Jobs
DISADVANTAGES OF
ICT

01 Unemployment 02 Privacy
Lack of Job
03 Security 04 Dominant Culture
SAFE AND
RESPONSIBLE USE
OF ICT
BE SECURE
Keep passwords to yourself and not
share them with anyone, even with
your close friends.
Always log out and log off your
account on any the device that you
are using.
Always lock your computer when you
walk away from the screen.
BE RESPECTFUL

Always be polite and use appropriate language.


Do not access, create, store or distribute files
that could be thought of as offensive, indecent or
cause hurt or upset anyone.
Do not look at anyone else’s files without their
permission
Know that cyberbullying is unacceptable and may
lead to very serious consequences.
BE SAFE
Do not share your personal information or
of other people’s.
Be wary of emails that ask you for any
personal information.
Do not put any personal details about
other people into emails, posts, comments
or updates.
BE RESPONSIBLE

Think carefully about the places you go


online and keep focused when on learning
tasks.
Take good care of the ICT equipment you
use. Understand that if you are
irresponsible in the use of ICT, you may
lose your access to it.
BE LEGAL
Only copy/upload/publish/ distribute materials that
are appropriate.
Do not take videos or pictures of other people
without their permission.
Do not plagiarize other people’s works.
Do not copy materials, music, videos or pictures for
your own interest unless they are copyright free.
Remember that anything you do can be traced back to
you including your browsing history and content you
may copy or published.
APPLY

Create a poster showing how to promote


the value of personal responsibility and
safety when using computer, internet,
and email. Draw this on a ¼ illustration
board together with your group with 7
members.
THANK YOU

You might also like