0% found this document useful (0 votes)
80 views43 pages

Empowerment Technologies

The document provides information about information and communication technology (ICT). It defines ICT as dealing with using different communication technologies like mobile phones, internet, etc. to locate, save, send and edit information. It discusses some examples of how ICT is used like video calls using the internet and texting or calling using cellular networks. The document then discusses the history and origins of ICT dating back 3000 years BC and highlights some key developments. It also outlines some common functions of ICT like email, video conferencing, collaboration software, social media, blogs and forums. Finally, it profiles some famous personalities in the field of ICT like Steve Jobs, Tim Berners-Lee, Bill Gates, James Gosling, Lin

Uploaded by

Jonalyn Montero
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
80 views43 pages

Empowerment Technologies

The document provides information about information and communication technology (ICT). It defines ICT as dealing with using different communication technologies like mobile phones, internet, etc. to locate, save, send and edit information. It discusses some examples of how ICT is used like video calls using the internet and texting or calling using cellular networks. The document then discusses the history and origins of ICT dating back 3000 years BC and highlights some key developments. It also outlines some common functions of ICT like email, video conferencing, collaboration software, social media, blogs and forums. Finally, it profiles some famous personalities in the field of ICT like Steve Jobs, Tim Berners-Lee, Bill Gates, James Gosling, Lin

Uploaded by

Jonalyn Montero
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 43

Empowermen

t Technologies
Francis N. Montero
What is ICT?
Information and Communications Technology (ICT) deals
with the use of different communication technologies such as
mobile phones, telephone, internet, etc. to locate, save, send,
and edit information.
What is ICT?
When we make a video call, we use the internet.
When we send a text or make a call, we use
cellular networks.
What is ICT?
“According to Rouse (n.d.), ICT means: ICT
(Information ang communications technology – or
technologies) is an umbrella term includes any
communication device or application, encompassing,
radio, television, cellular phones, computer and
network hardware and software, satellite systems and
so on, as well as the various services, and applications
associated with them, such as video conferencing and
distance learning.
The history of ICT originates from humble beginnings
(Bames, n. d.):
• The abacus is thought to have been originally invented 3,000 years
before the birth of Christ.
• In 1624, Wilhelm Schickard built the first four function calculator
– clock at the University of Heidelberg.
• The first general purpose computer was designed by Charles
Babbage around the year 1833.
• In 1855, George and Edvard Scheutz built a practical model based
on Babbage’s original designs.
• The first electronic calculator (named the Z1) was built by Konrad
Zuse in 1931.
Function of ICT
 Email
- you can easily send your employees an
email when you need to communicate
something without having to see them in
person. Email is also great channel for sending
official communication to clients and leaves a
clean virtual paper trail which allows you to
keep a steady record of correspondence.
Function of ICT
 Video Conferencing
- Video conferencing is a great way to
communicate with a faraway team and being
able to see them at the same time. It easier to
have remote meetings and even collaborate
on a project together. With video conferencing
, you might as well be in the same room.
Function of ICT
 Collaboration Software
- collaboration software allows teams to
work together on a projects in a manner that is
both efficient and fast. With the right
collaboration software, you can cut project
times by up to half and do away with needless
meeting since everything can be done in a
virtual meeting room.
Function of ICT
 Social Media
- social media not allows you employees to
keep up to date with the latest industry
information but also present a fun way to wind
down and socialize.
Function of ICT
 Blogs and Forums
- These websites allows users to post their
content. Other users are able to comment on the
said topic. There are several free blogging
platforms like Bloggers, WordPress, and Tumblr. On
the other hand, forums are typically part of a
certain website or web service.
Famous Personalities
in the Field of ICT and
Their Major
Contributions
Steeve Jobs
Steeve Jobs
- the co-founder and chief executive of
Apple Computer, topped the Computer
Weekly 40th anniversary poll due to the
devoted following he has generated
through his pioneering work in personal
computing and product design.
Tim Berners Lee
Tim Berners-Lee
- Dot coms, bloggers and Google all
have one man to thank for their place in
the 21st century world. In 1990, 
Tim Berners-Lee made the imaginative
leap to combine the internet with the
hypertext concept, and the worldwide
web was born.
Bill Gates
Bill Gates
- As joint founder of the world’s
biggest software company,
Microsoft, Bill Gates’ approach to
technology and business was
instrumental in making technology
available to the masses.
James
Gosling
James Gosling
- Of your choice of the most influential
people in IT, James Gosling is the true
geek. Unlike Bill Gates and Steve Jobs,
neither of whom finished college, Gosling
completed a PhD in computer science
and contributed to software innovation at
a technical level.
Linus Torvalds
Linus Torvalds
- As the creator of the Linux operating system, 
Linus Torvalds has been a driving force behind the
whole open source movement, which represents
not only an ever increasing challenge to proprietary
software, but is also the inspiration for the industry
to move to open standards.
Torvalds remains the ultimate authority on what
new code is incorporated into the Linux kernel.
Mark Zuckerberg
- He pioneered
Facebook and later
bought Instagram.
Online Safety, Security, Ethics and Etiquette
The Internet, truly, is a power tool. It can be used to promote
your business, gain new friends, and stay in touch with the
old ones. It is also a source of entertainment through games,
online communities, and everything in between. But like
most things in the world, there is always the “other side of
the coin”. The internet is one of the most dangerous places,
especially if you do not know what you are doing with it.
But there is no need to worry, it is never that late.
Tips to Stay Safe Online

The internet is a public place and it is up to you


to protect yourself. Here are some tips to help
you stay safe. When using the internet.

1. Be mindful of what you share online and


what site you share to it.
2. Do not just accept terms and conditions; read
it.
3. Check out the privacy policy page of a website
to learn how the website handles the information
you share.
4. Know the security features of the social
networking site you use. By keeping your profile
private, search engines will not be able to scan
your profile.
5. Do not share your password with anyone.
6. Avoid logging into public networks/WIFI.
Browsing in “incognito (or private) mode.” a
feature of the browser, will not protected you
from hackers.
7. Do not talk to strangers whether online or
face-to-face.
8. Never post anything about a future vacation. It
is similar to posting. “Rob my house at this
date.”
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software
on your software on your computer. Use only
one antivirus software to avoid conflicts.
12. If you have a Wi-Fi at home, make it a
private network by adding a password.
13. Avoid downloading anything from
untrusted websites. You are most vulnerable
in peer-to- peer downloads as the downloads
is likely not monitored by the site owner.
14. Buy the software do not use pirated ones.
15. Do not reply or click links from
suspicious emails.
Here are some of the threats you should be aware of when using the Internet:
1. Malware – stands for malicious software
a. Virus – a malicious program designed to replicate itself and transfer from one
computer to another either through the internet and local networks or date storage
like flash drives and CDs
b. Worm – a malicious program that transfers from one computer to another by any
type of means. Often, it uses a computer network to spread itself. For example, the
ILOVEYOU WORM (Love Bug Worm)
c. Trojan – a malicious program that is disguised as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hackers to get your
information.
d. Spyware – a program that runs in the background without you knowing it.
e. Adware - a program designed to send you advertisement, mostly as pop – ups.
f. Ransomware – restricts access to your computer or your files and displays a
message that demands payment in order for the restrictions to be moved.
2. Spam – unwanted email mostly
from bots or advertisers.
3. Phishing – its goal is to acquire
personal information like
passwords and credit card details.
Protecting Reputations Online
Think Before You Click
Here are things you might want to consider before
posting something over the internet.
1. Before you post something on the web, ask these
questions to yourself: would you want your parents or
grandparents to see it? Would you want your future boss
see it? Once you post something on the web, you have
no control of who sees your posts.
2. Your Friends depend on you to protect their
reputation online. Talk to your friends about this serious
responsibility.
3. Set your post to “Private”. In this way, search engines
will not be able to scan that post.
4. Avoid using names. Names are easy for search
engines to scan.
5. If you feel that a post can affect you or other’s
reputation, ask the one who posted it to pull it down or
report it as inappropriate.
Core Rules of Netiquette
Netiquette, or network etiquette , is concerned
with the “proper” way to communicate in an
online environment. Consider the following
“rules,” adapted from Virginia Shea’s The Core
Rules of Netiquette, whenever you
communicate in the virtual world.
Rule 1: Remember the Human
When communicate electronically, whether
through email, instant message, discussion
post, text, or some other method, practice
Golden Rule: Do unto others as you would
have others do unto you.
Rule 2: Adhere to the same standards of
behavior online that you follow in real life
while it can be argued that standards of
behavior may be different in the virtual world,
they certainly should not be lower. You should
do your best to act within the laws and ethical
manners of society whenever you inhabit
“cyberspace.”
Rule 3: Know where you are in cyberspace
“Netiquette varies from domain to
domain.”(Shea, 1994) Depending on where
you are in the virtual world, the same written
communication can be acceptable in one area,
where it might be considered inappropriate in
another. What you text to a friend may not be
appropriate in an email to a classmate or
collegue.
Rule 4: Respect other people’s time and bandwidth
Electronic communication takes time: time to read and
time in which to respond. Most people today lead busy
lives, just like you do, and don’t have time to read or
respond to frivolous emails or discussion posts. As a
virtual world communicator, it is your responsibility to
make sure that the time spent reading your words isn’t
wasted.
Rule 5: Make yourself good online
One of the best things about the virtual world
is the lack of judgement associated with your
physical appearance, the sound of your voice,
or the clothes you wear (unless you post a
video of yourself singing karaoke in a clown
outfit.) You will, however, be judged by the
quality of your writing, so keep the following
tips in mind:
Rule 6: Share expert knowledge
The Internet offers its users many
benefits; one is the ease in which
information can be shared or access
and in fact, this “information sharing”
capability is one of the reasons the
Internet was founded.
Rule 7: Help flame wars under control
What is meant by “flaming wars?” “Flaming is what people
do when they express a strongly held opinion without
holding back any emotion”. (Shea, 1994). As an example,
think of the kinds of passionate comments you might read on
a sports blog. While “flaming” is not necessarily forbidden
in virtual communication, “flame wars,” when two or three
people exchange angry posts between one another, must be
controlled or the camaraderie of the group could be
compromised. Don’t feed the flames; extinguish them by
guiding the discussion back to a more productive direction.
Rule 8: Respect other people’s privacy
Depending on what you are reading in the
virtual world, be it an online class
discussion forum, Facebook page, or an
email, you may be exposed to some private
or personal information that needs to be
handled with care.
Rule 9: Don’t abuse power
Just like face-to-face situations, there are
people in cyberspace who have more
“power” than others. They have more
expertise in technology or they have
years of experience in a particular skill or
subject matter.
Rule 10: Be forgiving of other people’s mistakes
Not everyone has the same amount of experience working in
the virtual world. And not everyone knows the rules of
netiquette. At some point, you will see a stupid question, read
an unnecessarily long response, or encounter misspelled
words; when this happens, practice kindness and forgiveness
as you would hope someone would do if you had committed
the same offense. If it’s a minor “offense,” you might want to
let it slide. If you feel compelled to respond to a mistake, do
so in a private email rather than a public forum.

You might also like