7. ECONOMY
Economic actors need accurate
and timely information to allocate
resources efficiently, investors and
other groups increasing value and
demand a governance-monitoring
role from the media.
8. Educational
Learning has never been easier
and at the same time more
complicated than today in the age of
media and information
9.
10. Social
Media of today is playing an
outstanding role in creating
and shaping of public opinion
and strengthening of society
11.
12. Political
Candidates amd their supporters
constantly pist their views on
Facebook and Twitter. Each party
has its own pages, from which it
broadcasts propaganda and
requests for donation
16. Phishing
Includes the theft of confidential information or money.
Example:
Paypal, scammers may try to steal your login information
by sending out an email that instructs users to click on a
link in order to fix a discrepancy with their account.
19. Site compromise
Occurs when attacker embeds malicious code on a
site, in things like advertisements, for anyone to
activate. Spam and malware threats occur when
attacker embeds spam or viruses in some content
that is distributed by anyone downloading that
content. Lastly, personal or confidential information
that's made available to the world is known as
INFORMATION DISCLOSURE
21. Abuse
- refers to the deliberate and harmful manipulation or
exploitation of media and information. This can
include spreading false or misleading information,
engaging in propaganda and disinformation
campaigns or using media platforms to promote hate
speech, discrimination or violence.
22. Misuse
-used incorrectly or carelessly or for an improper
purpose " misused words are often laughable but
one weeps for misused talents
-Excessive or improper use of a thing, or to employ
something in a manner contrary to the natural or
legal rules for its use.
25. Trend
A change or development towards
something new or different; reflects what
seems to be going around at any given
time
26. Massive online courses
Refers to a route or pattern of getting content or
information available through an online system that can
be accessed by many people
Also described as a pattern for providing learning
information or content online to any person who needs
to take up a course with no limit on attendance
28. Credentials and MOOC based
degrees:
MOOCs can also be used for
continuing education certifications and
degree programs. MOOC certification
levels typically fall into the following six
general categories:
29.
30. Micro Credential. Micro credential programs typically
consist of three to six courses. According to EdX, a popular
platform for MOOCs, the median price for micro credential
program is $946. Typically, they are narrow in focus and
provide a specific skill or competency.
University credit. Courses in this tier are university
accredited and comparable to online courses at institutions
that provide degrees. Individual courses at this level can
range from a few hundred dollars to a few thousand dollars.
31. Online degree
Online degree programs are equivalent to
master's or continuing education degree program
to universities and offer comparable volume and
depth of coursework.
32. Corporate training
Corporate training MOOCs are deployed on an
enterprise level. This pricing options is typically
structured as a per user cost for access.
35. Example of wearable technology;
Fitness tracker-monitor step taken, heart rate,
calories burn etc,
Smart clothing-type of clothing come in built-in
technology that can perform a variety of task including
fitness or health monitoring, interacting with phones
and other devices and changing fabric characteristic to
suit the users preference, activity or invironment.
38. VR headset - entirely replace the users environment
with digital information and enhance the fictional reality.
VR users are controlled by the sysyem.
Smart Jewelry - This can include smart rings, wristband,
and watches. Smaller wearable devices typically work
with smartphone app for display and interaction.
39.
40.
41. Virtual Assistants
Some companies create wearable virtual
assistant that clip to a user's clothes and are controlled
with vouce and gestures. Humane's AI Pin is one
example, which features virtual assistant powered by
the GPT- 4 language model and meniature projector
that can turn the users hand into a touch screen.
43. AI hearing aids
AI hearing aids can filter out unwanted noises and
automatically adapt to provide the best performance in
the users current environment and for their individual
hearing needs.
46. 3D Environment
-refers to a three dimensional space or medium
that can be experienced or percieved in three
dimension. It can be created using various
technologies and techniques such as 3D films, 3D
printer, Holograms etc,
47. 3D films
These are movies that are produced and projected
in three dimensions, giving viewers the illusion of
dept and making the on screen objects appear
more realistic and immersive
51. Holograms
Are three dimensional images that are created using
light diffraction, inferference and other optical
techniques. They can be viewed without the need for
special glasses or equipment and appear to float in
space, giving a sense of dept and realism.
53. Ubiquitos Learning
-learning anywhere, anytime and is associated with
mobile technology
-transcends the old pedagogical seperations of
space and time
-Is fundamental of e-learning and all students should
be able to access knowlegde anywhere and
anytime.
54. Characteristic of Ubiquitos learning
Adaptability
Permanency
Accesibility
Immediacy
Interactivity
Situating of Instructional activities
58. 1. Uses trusted person as to gain sensitive
information on a person.
2. Refers to the deliberate and harmful
manipulation or exploitation of media and
information.
3. Includes the theft of confidential information or
money.
4. Occurs when attacker embeds malicious code on
asite , in things like advertisements, for anyone to
activate.
5. The risk, threats or negative effects of media and
information.
6. Is a set of circumstances that makes it possible to
do something.
7. The authority, influence of media and
information.
59. 8.Some are example of wearable technology except.
A. Smart clothing
B. B. Fitness tracker
C. C. Holograms
9.Are the three dimensional images that are created
using light diffraction and other optical techniques.
A. Hologram
B. 3D printer
C. 3D film
D. 10. Refers to a three dimensional space or
medium that are experienced in three dimension.
60. A. 3d environment
B. Holograms
C. Wearable technology
11. Is any kind of electronic device designed to be
worn by a person .
A. 3d environment
B. Holograms
C. Wearable technology
12.A technology that can monitor step taken, heart
rate, calories burn etc.
61. A. Fitness tracker
B. Smart clothing
C. VR headset
13. It is entirely replace the users environment and
digital information and enhance the fictional reality
A. 3d films
B. Holograms
C. VR headset
14.A wearable technology that can filter out
unwanted noises and automatically adapt to provide
the best performance