Empowerment Technology 1
Empowerment Technology 1
Empowerment Technology 1
Empowerment Technology 1
EMPTECH (reviewer)
THE CURRENT STATE OF ICT TECHNOLOGIES
WHAT IS ICT? information system as part of its
documentation
Information and Communication
3. HARDWARE - is the physical parts or
Technology (ICT) deals with the use of
components of a computer. Hardware
different communication technologies
components are categorized as Input
such as mobile phones, telephones,
devices, Output devices and Storage
internet etc. to locate, save, send, and edit
devices.
information.
INPUT DEVICES – KEYBOARD, MOUSE,
Components of ICT
AND SCANNER
Software
OUTPUT DEVICES – MONITOR AND
Hardware
PRINTER
Data
STORAGE DEVICES – HARDDISK, CD-
Internet Access
ROM, FLASHDRIVE
Cloud Computing
4. SOFTWARE - is a collection of programs
1. INFORMATION TECHNOLOGY
designed to operate, control, and extend
is the use of any computer, storage,
the processing capabilities of the
networking, and other physical devices,
computer.
infrastructure, and processes to create,
EX. OPERATING SYSTEMS, COMPILERS,
store, secure, and exchange all forms of
INTERPRETERS AND ASSEMBLERS
electronic data
5. TELECOMMUNICATION - used to
2. INFORMATION SYSTEM
connect, or network, computer systems
is the collection of technical and human
and portable and wearable devices and to
resources that provide the storage,
transmit information.
computing, distribution, and
EX.WIRELESS CONNECTION AND
communication of the information required
WIRED CONNECTION
by enterprises
USES OF ICT
COMPONENTS OF INFORMATION
1. EDUCATION
SYSTEM
Learning Management Software uses
The main components of information
online classes and Moodle-style websites
systems are People, Procedures,
as ways of utilizing technology in
Hardware, Software, and
education.
Telecommunication
2. BUSINESS
1. PEOPLE - Qualified people are a vital
ICT is a key technology in interdisciplinary
component of any information system.
measures to reduce costs, improve
EX. BUSINESS ANALYSTS, DATABASE
processes boost innovation, and increase
ADMINISTRATOR, PROGRAMMERS
productivity.
AND COMPUTER TECHNICIANS
2. ROCEDURE - procedures are used for
using, operating, and maintaining an
NETIQUETTE
DO’S 7. Thou shall not use other people’s computer
resources without authorization or proper
Be kind and respectful
compensation.
Think before you say or post something
Remember what you put online will be stay 8. Thou shall not appropriate other people’s
online forever intellectual output.
Obey the law
9. Thou shall think about the social consequences
DON’T
of the program you write and or the
Don’t type in ALL CAPS
system you design.
Don’t use inappropriate language
Don’t hurt other feelings 10. Thou shall use a computer in ways that show
Don’t Spam consideration and respect for your fellow humans.
TEN COMMANDMENTS OF COMPUTER ETHICS ISSUES IN COMPUTER ETHICS
1. Thou shall not use a computer to harm other Privacy –responsibility to protect data about
people. individuals
2. Thou shall not interfere with other people’s Accuracy –responsibility of data collectors to
computer work. authenticate information and ensure its accuracy
3. Thou shall not snoop around in other people’s Property –who owns information and software and
files. how can they be sold and exchanged.
4. Thou shall not use a computer to steal. Access –responsibility of data collectors to
control access and determine what information a
5. Thou shall not use a computer to bear false
person has the right to obtain about others and
witness
how the information can be used.
6. Thou shall not copy or use proprietary software
for which you have not paid.
INTERNET THREATS
CYBERCRIME TOP 5 POPULAR CYBERCRIME
Is a crime that involves a computer and a 1. Phishing scams
network. 2. Identity theft scams
Damage to computers, programs or files 3. Online harassment
(Virus, Worms etc.) 4. Cyberstalking
Theft/Stealing (Software Piracy, 5. Invasion of privacy
Identity Theft, etc.)
View/Manipulation (Harassment,
Cyberbullying etc.)
CYBER ATTACK
1. Spam -is the use of electronic
messaging systems to send unwanted
bulk messages, especially advertising,
indiscriminately. A person who creates
electronic spam is called a Spammer.
2. Phishing –is done by sending you an
email that will direct the user to visit
a website and be asked to update
his/her username, password, credit
card, or personal information. Its goal TYPES OF MALWARE
is to acquire sensitive personal Malware “Malicious Software”
information is a software used or programmed by
3. Click Fraud -Occurs when user or attackers to disrupt computer operation,
individual or computer program gather sensitive information, or gain
prudently clicks on online ad without access to private computer systems.
any intention of learning more about It can appear in the form of code,
the advertiser scripts, active content, and other
4. Evil Twins -A wireless network that software.
pretends to offer trustworthy Wi-Fi VIRUS
connections to the internet A malicious program or file designed to
5. Identity Theft -Theft of personal replicate itself and transfer from one
information to impersonate someone. computer to another
6. Information Leaks -It is when * Almost all viruses are attached to an
information is revealed to the public executable file. (.exe)
or given to unauthorized user. WORMS
*May also refer to “Data Breach” Stand alone malware computer program
JOHN VON NEUMANN that replicates itself in order to spread
The first academic work on the theory of to other computers. Often, it uses a
computer viruses (although the term computer network to spread itself.
"computer virus" was not used at that TROJAN
time) was done in 1949 by John von A malicious program that is disguised as a
Neumann who gave lectures at the useful program but once downloaded or
University of Illinois about the "Theory installed leaves your PC unprotected and
and Organization of Complicated allows hacker to get your information
Automata“ Von Neumann's design for a SPYWARE
self-reproducing computer program is .Software that aids in gathering
considered the world's first computer information about a person or
virus, and he is considered to be the organization without their knowledge and
theoretical father of computer virology. that may send such information to
another entity without user’s consent
.
KEYLOGGING COPYRIGHT
is the action of recording (or logging) the is the concept that original works belong
keys struck on akeyboard, typically in a to the people who create them, and you
covert manner so that the person using cannot use, copy, modified or publish that
the keyboard is unaware that their work without the owner's permission.
actions are being monitored.
Copyright protection includes:
ADWARE
Advertising supported software, is Motion pictures & Other audio - visual works
software that displays unwanted Architectural Works
advertisements on your computer. It uses
the browser to collect your web browsing Sound Recordings & Musical Works - Software/
history in order to 'target' Application
advertisements that seem tailored to
your interests. Pictorial, graphics & Sculptural Works - Literary
RANSOMWARE Works
may be used without a consent as long as it is Check out the privacy policy page of a
used in commentaries, criticisms, search engines, website to learn how the website handles
parodies, news reports, research, library the information you have.
archiving, teaching, and education. Know the security features of the social
WHAT IS COMPUTER SECURITY
networking site you use.
Computer security refers to protecting
Do not share your password with anyone.
computer systems and information they
contain against unwanted access, Avoid logging in to Public Networks/ Wi-
modification, or destruction. Fi.
MEASURES TO PROTECT COMPUTER FILES Always browse the internet using
1. Change password frequently incognito mode.
2. Make back up copies file Do not talk to strangers online or face to
3. Use anti-virus software face.
4. Encrypt data Never post anything about a future
COMPUTER SECURITY INVOLVES vacation.
PROTECTING: Add friends you know in real life.
1. INFORMATION Avoid visiting untrusted websites.
2. HARDWARE Install and update an antivirus software
3. SOFTWARE in your computer.
4. UNAUTHORIZED USE AND
Make sure that your Wi-Fi at home has a
DAMAGE
password.
5. SABOTAGE AND NATURAL
Buy Official Software. Do not use
DISASTERS
pirated ones.
TIPS TO STAY SAFE ONLINE
Do not reply or click links from
suspicious emails
Be mindful of what you share online and
what site you share it to.
Do not just accept terms and conditions;
read it.
1. RA 4200 4. RA 8792
Anti wiretapping law Electronic commerce act
2. RA 8484
Access devices regulation act of 5. RA 9208
1998 Anti-trafficking in persons act of
3. RA 11449 2003
An act providing for additional 6. RA 9775
prohibitions to and increasing Anti-child pornography act of 2009
penalties for violations of republic
act no. 8484
7. RA 9995
Ant-photo and voyeurism act of 10. RA 10175
2009 Cybercrime prevention act of 2012
8. RA 10173 11. RA 10844
Data privacy act of 2012 Department of information and
9. RA 10627 communications technology act of
Anti-bullying act of 2013 2015
BATCH FILES
BATCH FILE
A script file in Microsoft Windows
It consist a series of commands to be executed by CLI
Command Line Interface/ Command Line Interpreter or also known as Command Prompt
You can create a virus using batch file
HTML
tags that tell a Web browser how to
structure it to display.
1995HTML 2.0
1999HTML 4.0
WHAT IS HTML?
HTML stands for Hypertext Markup
Language, and it is the most widely used
language to write/ create Web Pages.
Hypertext refers to the way in which Web
pages (HTML documents) are linked
together. Thus, the link available on a
webpage is called Hypertext.
As its name suggests, HTML is a Markup
Language which means you use HTML to
simply "mark-up" a text document with
ABC
HTML images are defined with
the <img> tag.