SlideShare uma empresa Scribd logo
1 de 62
Opportunities,
Challenges and Power of
Media and Information
Oppurtunity
A set of circumstances
that makes it possible to
do something
Challenges
• Illegal Content
• Cybercrime
• Copy right infringement
• Identity theft
Power
The mass media is powerful
because audiences tend to
trust them all the time.
A. Economic,
Educational ,Social and
Political
ECONOMY
Economic actors need accurate
and timely information to allocate
resources efficiently, investors and
other groups increasing value and
demand a governance-monitoring
role from the media.
Educational
Learning has never been easier
and at the same time more
complicated than today in the age of
media and information
Social
Media of today is playing an
outstanding role in creating
and shaping of public opinion
and strengthening of society
Political
Candidates amd their supporters
constantly pist their views on
Facebook and Twitter. Each party
has its own pages, from which it
broadcasts propaganda and
requests for donation
B. Threats, Risks,
Abuse, and Misuse
Phishing
Includes the theft of confidential information or money.
Example:
Paypal, scammers may try to steal your login information
by sending out an email that instructs users to click on a
link in order to fix a discrepancy with their account.
Phishing
Site compromise
Occurs when attacker embeds malicious code on a
site, in things like advertisements, for anyone to
activate. Spam and malware threats occur when
attacker embeds spam or viruses in some content
that is distributed by anyone downloading that
content. Lastly, personal or confidential information
that's made available to the world is known as
INFORMATION DISCLOSURE
Site Compromise
Abuse
- refers to the deliberate and harmful manipulation or
exploitation of media and information. This can
include spreading false or misleading information,
engaging in propaganda and disinformation
campaigns or using media platforms to promote hate
speech, discrimination or violence.
Misuse
-used incorrectly or carelessly or for an improper
purpose " misused words are often laughable but
one weeps for misused talents
-Excessive or improper use of a thing, or to employ
something in a manner contrary to the natural or
legal rules for its use.
Current and Future Trends
of Media and Information
A. Massive open online content
Trend
A change or development towards
something new or different; reflects what
seems to be going around at any given
time
Massive online courses
 Refers to a route or pattern of getting content or
information available through an online system that can
be accessed by many people
 Also described as a pattern for providing learning
information or content online to any person who needs
to take up a course with no limit on attendance
M O O C
Massive Open Online Course
Credentials and MOOC based
degrees:
MOOCs can also be used for
continuing education certifications and
degree programs. MOOC certification
levels typically fall into the following six
general categories:
 Micro Credential. Micro credential programs typically
consist of three to six courses. According to EdX, a popular
platform for MOOCs, the median price for micro credential
program is $946. Typically, they are narrow in focus and
provide a specific skill or competency.
 University credit. Courses in this tier are university
accredited and comparable to online courses at institutions
that provide degrees. Individual courses at this level can
range from a few hundred dollars to a few thousand dollars.
 Online degree
Online degree programs are equivalent to
master's or continuing education degree program
to universities and offer comparable volume and
depth of coursework.
 Corporate training
Corporate training MOOCs are deployed on an
enterprise level. This pricing options is typically
structured as a per user cost for access.
Wearable technology ( google
glass, iphone watch etc, )
Example of wearable technology;
Fitness tracker-monitor step taken, heart rate,
calories burn etc,
Smart clothing-type of clothing come in built-in
technology that can perform a variety of task including
fitness or health monitoring, interacting with phones
and other devices and changing fabric characteristic to
suit the users preference, activity or invironment.
Fitness tracker
Smart clothes
VR headset - entirely replace the users environment
with digital information and enhance the fictional reality.
VR users are controlled by the sysyem.
Smart Jewelry - This can include smart rings, wristband,
and watches. Smaller wearable devices typically work
with smartphone app for display and interaction.
Virtual Assistants
Some companies create wearable virtual
assistant that clip to a user's clothes and are controlled
with vouce and gestures. Humane's AI Pin is one
example, which features virtual assistant powered by
the GPT- 4 language model and meniature projector
that can turn the users hand into a touch screen.
Virtual assistant
AI hearing aids
AI hearing aids can filter out unwanted noises and
automatically adapt to provide the best performance in
the users current environment and for their individual
hearing needs.
3D Environment ( 3D films, 3D
printer, Holograms etc, )
3D Environment
-refers to a three dimensional space or medium
that can be experienced or percieved in three
dimension. It can be created using various
technologies and techniques such as 3D films, 3D
printer, Holograms etc,
3D films
These are movies that are produced and projected
in three dimensions, giving viewers the illusion of
dept and making the on screen objects appear
more realistic and immersive
3D Films
3D Printer
Holograms
Are three dimensional images that are created using
light diffraction, inferference and other optical
techniques. They can be viewed without the need for
special glasses or equipment and appear to float in
space, giving a sense of dept and realism.
Holograms
Ubiquitos Learning
-learning anywhere, anytime and is associated with
mobile technology
-transcends the old pedagogical seperations of
space and time
-Is fundamental of e-learning and all students should
be able to access knowlegde anywhere and
anytime.
Characteristic of Ubiquitos learning
 Adaptability
 Permanency
 Accesibility
 Immediacy
 Interactivity
 Situating of Instructional activities
 https://study.com/academy/lesson/social-media-threats-risks-
security.html
 https://youtube.com/@marylienoran6482?si=RXlVesL74jqswdD
Q
 https://dictionary.cambridge.org/dictionary/english/abuse
 https://stopdomesticabuse.uk/domestic-abuse-types
Source;
1. Uses trusted person as to gain sensitive
information on a person.
2. Refers to the deliberate and harmful
manipulation or exploitation of media and
information.
3. Includes the theft of confidential information or
money.
4. Occurs when attacker embeds malicious code on
asite , in things like advertisements, for anyone to
activate.
5. The risk, threats or negative effects of media and
information.
6. Is a set of circumstances that makes it possible to
do something.
7. The authority, influence of media and
information.
8.Some are example of wearable technology except.
A. Smart clothing
B. B. Fitness tracker
C. C. Holograms
9.Are the three dimensional images that are created
using light diffraction and other optical techniques.
A. Hologram
B. 3D printer
C. 3D film
D. 10. Refers to a three dimensional space or
medium that are experienced in three dimension.
A. 3d environment
B. Holograms
C. Wearable technology
11. Is any kind of electronic device designed to be
worn by a person .
A. 3d environment
B. Holograms
C. Wearable technology
12.A technology that can monitor step taken, heart
rate, calories burn etc.
A. Fitness tracker
B. Smart clothing
C. VR headset
13. It is entirely replace the users environment and
digital information and enhance the fictional reality
A. 3d films
B. Holograms
C. VR headset
14.A wearable technology that can filter out
unwanted noises and automatically adapt to provide
the best performance
A. Al hearing aids
B. VR headset
C. Smart clothing

Mais conteúdo relacionado

Semelhante a Media and Information Literacy Grade 11 Gas

BYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBloxx
 
Building an Effective School BYOD Plan
Building an Effective School BYOD PlanBuilding an Effective School BYOD Plan
Building an Effective School BYOD PlanSam Gliksman
 
Considerations for ICT in Learning
Considerations for ICT in Learning Considerations for ICT in Learning
Considerations for ICT in Learning Louise Jones
 
ET PRESENTATION DAP-UG - ALCANTARA - CACHO - ABAN - BUTAWAN - DOMINGO - BRUAN...
ET PRESENTATION DAP-UG - ALCANTARA - CACHO - ABAN - BUTAWAN - DOMINGO - BRUAN...ET PRESENTATION DAP-UG - ALCANTARA - CACHO - ABAN - BUTAWAN - DOMINGO - BRUAN...
ET PRESENTATION DAP-UG - ALCANTARA - CACHO - ABAN - BUTAWAN - DOMINGO - BRUAN...magluyanmai
 
Knowledge management for professionals
Knowledge management for professionalsKnowledge management for professionals
Knowledge management for professionalsEsteban Romero Frías
 
Enhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital WorldEnhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital Worldcyberprosocial
 
Media and information literacy. Media Literacy, information literacypptx
Media  and information literacy. Media Literacy, information literacypptxMedia  and information literacy. Media Literacy, information literacypptx
Media and information literacy. Media Literacy, information literacypptxMiralynYabanaDomael
 
BYOD & Digital Literacies (University of Ulster BYOD Board)
BYOD & Digital Literacies (University of Ulster BYOD Board)BYOD & Digital Literacies (University of Ulster BYOD Board)
BYOD & Digital Literacies (University of Ulster BYOD Board)Fiona Harvey
 
EMPOWERMENT TECHNOLOGIES.pptx
EMPOWERMENT TECHNOLOGIES.pptxEMPOWERMENT TECHNOLOGIES.pptx
EMPOWERMENT TECHNOLOGIES.pptxTedsTV
 
Digital Competences Guitert. Digital Empowerment
Digital Competences Guitert. Digital Empowerment Digital Competences Guitert. Digital Empowerment
Digital Competences Guitert. Digital Empowerment UOC
 
week 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptxweek 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptxdanielloberiz1
 
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...Education 2Conf
 
CYBER SECURITY AWARENESS AND CYBER RESILIENT FUTURE
CYBER SECURITY AWARENESS AND CYBER RESILIENT FUTURECYBER SECURITY AWARENESS AND CYBER RESILIENT FUTURE
CYBER SECURITY AWARENESS AND CYBER RESILIENT FUTUREsarithakoshydm
 
Advantages and Disadvantages of Social Media.edited.docx
Advantages and Disadvantages of Social Media.edited.docxAdvantages and Disadvantages of Social Media.edited.docx
Advantages and Disadvantages of Social Media.edited.docxNehar35
 

Semelhante a Media and Information Literacy Grade 11 Gas (20)

BYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for Education
 
Uhmlg2011
Uhmlg2011Uhmlg2011
Uhmlg2011
 
mod 1 mil.pptx
mod 1 mil.pptxmod 1 mil.pptx
mod 1 mil.pptx
 
mod 1 mil.pptx
mod 1 mil.pptxmod 1 mil.pptx
mod 1 mil.pptx
 
Building an Effective School BYOD Plan
Building an Effective School BYOD PlanBuilding an Effective School BYOD Plan
Building an Effective School BYOD Plan
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
SOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptxSOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptx
 
Considerations for ICT in Learning
Considerations for ICT in Learning Considerations for ICT in Learning
Considerations for ICT in Learning
 
ET PRESENTATION DAP-UG - ALCANTARA - CACHO - ABAN - BUTAWAN - DOMINGO - BRUAN...
ET PRESENTATION DAP-UG - ALCANTARA - CACHO - ABAN - BUTAWAN - DOMINGO - BRUAN...ET PRESENTATION DAP-UG - ALCANTARA - CACHO - ABAN - BUTAWAN - DOMINGO - BRUAN...
ET PRESENTATION DAP-UG - ALCANTARA - CACHO - ABAN - BUTAWAN - DOMINGO - BRUAN...
 
Knowledge management for professionals
Knowledge management for professionalsKnowledge management for professionals
Knowledge management for professionals
 
Enhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital WorldEnhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital World
 
Media and information literacy. Media Literacy, information literacypptx
Media  and information literacy. Media Literacy, information literacypptxMedia  and information literacy. Media Literacy, information literacypptx
Media and information literacy. Media Literacy, information literacypptx
 
BYOD & Digital Literacies (University of Ulster BYOD Board)
BYOD & Digital Literacies (University of Ulster BYOD Board)BYOD & Digital Literacies (University of Ulster BYOD Board)
BYOD & Digital Literacies (University of Ulster BYOD Board)
 
EMPOWERMENT TECHNOLOGIES.pptx
EMPOWERMENT TECHNOLOGIES.pptxEMPOWERMENT TECHNOLOGIES.pptx
EMPOWERMENT TECHNOLOGIES.pptx
 
Digital Competences Guitert. Digital Empowerment
Digital Competences Guitert. Digital Empowerment Digital Competences Guitert. Digital Empowerment
Digital Competences Guitert. Digital Empowerment
 
week 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptxweek 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptx
 
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
 
CYBER SECURITY AWARENESS AND CYBER RESILIENT FUTURE
CYBER SECURITY AWARENESS AND CYBER RESILIENT FUTURECYBER SECURITY AWARENESS AND CYBER RESILIENT FUTURE
CYBER SECURITY AWARENESS AND CYBER RESILIENT FUTURE
 
Advantages and Disadvantages of Social Media.edited.docx
Advantages and Disadvantages of Social Media.edited.docxAdvantages and Disadvantages of Social Media.edited.docx
Advantages and Disadvantages of Social Media.edited.docx
 
157 20509 DQ Digital Citizenship
157 20509 DQ Digital Citizenship157 20509 DQ Digital Citizenship
157 20509 DQ Digital Citizenship
 

Último

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 

Último (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 

Media and Information Literacy Grade 11 Gas

  • 1. Opportunities, Challenges and Power of Media and Information
  • 2. Oppurtunity A set of circumstances that makes it possible to do something
  • 3. Challenges • Illegal Content • Cybercrime • Copy right infringement • Identity theft
  • 4. Power The mass media is powerful because audiences tend to trust them all the time.
  • 5.
  • 7. ECONOMY Economic actors need accurate and timely information to allocate resources efficiently, investors and other groups increasing value and demand a governance-monitoring role from the media.
  • 8. Educational Learning has never been easier and at the same time more complicated than today in the age of media and information
  • 9.
  • 10. Social Media of today is playing an outstanding role in creating and shaping of public opinion and strengthening of society
  • 11.
  • 12. Political Candidates amd their supporters constantly pist their views on Facebook and Twitter. Each party has its own pages, from which it broadcasts propaganda and requests for donation
  • 13.
  • 15.
  • 16. Phishing Includes the theft of confidential information or money. Example: Paypal, scammers may try to steal your login information by sending out an email that instructs users to click on a link in order to fix a discrepancy with their account.
  • 17.
  • 19. Site compromise Occurs when attacker embeds malicious code on a site, in things like advertisements, for anyone to activate. Spam and malware threats occur when attacker embeds spam or viruses in some content that is distributed by anyone downloading that content. Lastly, personal or confidential information that's made available to the world is known as INFORMATION DISCLOSURE
  • 21. Abuse - refers to the deliberate and harmful manipulation or exploitation of media and information. This can include spreading false or misleading information, engaging in propaganda and disinformation campaigns or using media platforms to promote hate speech, discrimination or violence.
  • 22. Misuse -used incorrectly or carelessly or for an improper purpose " misused words are often laughable but one weeps for misused talents -Excessive or improper use of a thing, or to employ something in a manner contrary to the natural or legal rules for its use.
  • 23. Current and Future Trends of Media and Information
  • 24. A. Massive open online content
  • 25. Trend A change or development towards something new or different; reflects what seems to be going around at any given time
  • 26. Massive online courses  Refers to a route or pattern of getting content or information available through an online system that can be accessed by many people  Also described as a pattern for providing learning information or content online to any person who needs to take up a course with no limit on attendance
  • 27. M O O C Massive Open Online Course
  • 28. Credentials and MOOC based degrees: MOOCs can also be used for continuing education certifications and degree programs. MOOC certification levels typically fall into the following six general categories:
  • 29.
  • 30.  Micro Credential. Micro credential programs typically consist of three to six courses. According to EdX, a popular platform for MOOCs, the median price for micro credential program is $946. Typically, they are narrow in focus and provide a specific skill or competency.  University credit. Courses in this tier are university accredited and comparable to online courses at institutions that provide degrees. Individual courses at this level can range from a few hundred dollars to a few thousand dollars.
  • 31.  Online degree Online degree programs are equivalent to master's or continuing education degree program to universities and offer comparable volume and depth of coursework.
  • 32.  Corporate training Corporate training MOOCs are deployed on an enterprise level. This pricing options is typically structured as a per user cost for access.
  • 33. Wearable technology ( google glass, iphone watch etc, )
  • 34.
  • 35. Example of wearable technology; Fitness tracker-monitor step taken, heart rate, calories burn etc, Smart clothing-type of clothing come in built-in technology that can perform a variety of task including fitness or health monitoring, interacting with phones and other devices and changing fabric characteristic to suit the users preference, activity or invironment.
  • 38. VR headset - entirely replace the users environment with digital information and enhance the fictional reality. VR users are controlled by the sysyem. Smart Jewelry - This can include smart rings, wristband, and watches. Smaller wearable devices typically work with smartphone app for display and interaction.
  • 39.
  • 40.
  • 41. Virtual Assistants Some companies create wearable virtual assistant that clip to a user's clothes and are controlled with vouce and gestures. Humane's AI Pin is one example, which features virtual assistant powered by the GPT- 4 language model and meniature projector that can turn the users hand into a touch screen.
  • 43. AI hearing aids AI hearing aids can filter out unwanted noises and automatically adapt to provide the best performance in the users current environment and for their individual hearing needs.
  • 44.
  • 45. 3D Environment ( 3D films, 3D printer, Holograms etc, )
  • 46. 3D Environment -refers to a three dimensional space or medium that can be experienced or percieved in three dimension. It can be created using various technologies and techniques such as 3D films, 3D printer, Holograms etc,
  • 47. 3D films These are movies that are produced and projected in three dimensions, giving viewers the illusion of dept and making the on screen objects appear more realistic and immersive
  • 49.
  • 51. Holograms Are three dimensional images that are created using light diffraction, inferference and other optical techniques. They can be viewed without the need for special glasses or equipment and appear to float in space, giving a sense of dept and realism.
  • 53. Ubiquitos Learning -learning anywhere, anytime and is associated with mobile technology -transcends the old pedagogical seperations of space and time -Is fundamental of e-learning and all students should be able to access knowlegde anywhere and anytime.
  • 54. Characteristic of Ubiquitos learning  Adaptability  Permanency  Accesibility  Immediacy  Interactivity  Situating of Instructional activities
  • 55.
  • 56.  https://study.com/academy/lesson/social-media-threats-risks- security.html  https://youtube.com/@marylienoran6482?si=RXlVesL74jqswdD Q  https://dictionary.cambridge.org/dictionary/english/abuse  https://stopdomesticabuse.uk/domestic-abuse-types Source;
  • 57.
  • 58. 1. Uses trusted person as to gain sensitive information on a person. 2. Refers to the deliberate and harmful manipulation or exploitation of media and information. 3. Includes the theft of confidential information or money. 4. Occurs when attacker embeds malicious code on asite , in things like advertisements, for anyone to activate. 5. The risk, threats or negative effects of media and information. 6. Is a set of circumstances that makes it possible to do something. 7. The authority, influence of media and information.
  • 59. 8.Some are example of wearable technology except. A. Smart clothing B. B. Fitness tracker C. C. Holograms 9.Are the three dimensional images that are created using light diffraction and other optical techniques. A. Hologram B. 3D printer C. 3D film D. 10. Refers to a three dimensional space or medium that are experienced in three dimension.
  • 60. A. 3d environment B. Holograms C. Wearable technology 11. Is any kind of electronic device designed to be worn by a person . A. 3d environment B. Holograms C. Wearable technology 12.A technology that can monitor step taken, heart rate, calories burn etc.
  • 61. A. Fitness tracker B. Smart clothing C. VR headset 13. It is entirely replace the users environment and digital information and enhance the fictional reality A. 3d films B. Holograms C. VR headset 14.A wearable technology that can filter out unwanted noises and automatically adapt to provide the best performance
  • 62. A. Al hearing aids B. VR headset C. Smart clothing