Digital Technology Culture - Anti-Dote Series

E
Enimil Kweku BoatengTeacher em Sonrise Christian High School
NAME: ENIMIL KWEKU BOATENG
COURSE: ELECTIVE ICT
TOPIC: DIGITAL TECHNOLOGY CULTURE 1
EMAIL: KWEKUBOATENG38@GMAIL.COM
WEB: HTTP://ENIMIL.000WEBHOSTAPP.COM
Lesson quote
Set your goals high, and don’t stop
till you get there.
Bo Jackson
LESSON OBJECTIVES
At the end of this lesson, the student should be able to:
Explain general issues concerning information technology
Understand computer and information security and
distinguish between computer crime and cybercrime
Analyze the role and impact of information technology
on everyday life.
Digital technology culture
Digital culture refers to culture shaped by the emergence
and use of digital technologies. It can also be said of how
people use and interact with technology in their works and
lives. It describes the idea that technology and the
Internet significantly shape the way we interact behave,
think, and communicate as human beings in a societal
setting.
THE INTERNET
The Internet is a globally connected network system that
usesTransmission Control Protocol and Internet Protocol
(TCP/IP) to transmit data through various types of media
like coaxial cable, twisted pair cable, fiber-optic cable and
wireless.TCP/IP is a set of standardized rules that allow
computers to communicate on a network such as the
Internet.
Source: https://milcom.edu.au/different-types-
coaxial-cables/
Source: https://www.dreamstime.com/stock-
photo-ethernet-wire-cable-yellow-patch-
cord-twisted-pair-isolated-image88784783
Source: https://www.optcore.net/the-
difference-between-optical-fiber-and-
optical-fiber-cable/
Coaxial
Cable
Twisted
pair cable
Fibre optic
cable
THE INTERNET
It is worth knowing thatWWW which meansWorld
WideWeb is not the same as the Internet.TheWorld
WideWeb however is a collection of information
which is accessed through the Internet.The web has
matured through three generations, commonly called
Web 1.0, 2.0, and 3.0.
COMPUTER & INFORMATION SECURITY
Information security involves protecting individuals
and organizations information from theft and danger.
Computer security focuses on protecting information,
hardware, and software from unauthorized use, as
well as preventing or limiting the damage from
intrusions, sabotage, and natural disasters.
COMPUTER CRIME
Computer crime is an act performed by a knowledgeable
computer user, sometimes referred to as a hacker that
illegally browses or steals a company's or individuals private
information. It can also be defined as the use of information
technology for illegal purposes or for unauthorized access
of a computer system where the intent is to damage, delete
or alter the data present on the computer.
TYPES OF COMPUTER CRIME
Cracking
Unauthorized access
Computer malware
Denial-of-service attack
CYBERCRIMECRIME
Cybercrime is any criminal activity that involves a
computer, a networked device or a network.
Cybercrimes happen in the cyberspace in that the
computer is used as a tool alright but the target is not
the computer unlike a computer crime where the tool
used and the target happens to be the computer.
TYPES OF CYBERCRIME
Identity theft
Social engineering
Malvertising
Cyberstalking
EFFECTS OF COMPUTER & CYBERCRIMES
It can lead to job loss.
It damages brand image and company or individual’s
reputation.
There is high cost in mitigation strategies and recovery
from cyber and computer crimes.
It can lead to loss of trade and competitiveness.
ROLEAND IMPACT OF
TECHNOLOGY
Computer based training
Computer-based training is a learning method in which a
computer program is used as the primary mode of teaching.
With this type of training, you are able to teach yourself with
little or no outside help from a teacher.As you use the program,
you can study at your own pace and the program tracks your
progress. It involves the use of a personal or networked
computer for the delivery and access of training programs.
IMPORTANCE OF COMPUTER BASED
TRAINING
There is immediate feedback on work.
It respects one learning pace whether fast or slow learner.
It uses a multimedia approach to teaching like sound, sight
and interactive activities, therefore it works for all learning
types, whether you learn through reading, seeing or doing.
IMPORTANCE OF COMPUTER BASED
TRAINING
It allows for consistency in the training since the same
materials are used and there is no need to account for
individual teaching styles of instructors.
It is easy to track and analyze progress of trainees.
It is flexible and efficient
Computer AIDED DESIGN
Computer Aided Design (CAD) is the use of computer
software to design and document a product’s design process.
CAD is used to design, develop and optimize products. While
it is very versatile, CAD is extensively used in the design of
tools and equipment required in the manufacturing process
as well as in the construction domain. CAD enables design
engineers to layout and to develop their work on a computer
screen, print and save it for future editing.
IMPORTANCE OF Computer AIDED
DESIGN
It is very easy to edit design work.
There is a decrease in error percentage.
There is a decrease in design effort.
It is easy to share design work.
There is improvement in accuracy.
Computer ASSISTED MANUFACTURING
Computer assisted manufacturing (CAM) can be
defined as the use of computer systems to plan,
manage, and control the operations of a
manufacturing plant through either direct or
indirect computer interface with the plant’s
production resources.
IMPORTANCE OF Computer ASSISTED
MANUFACTURING
There is improvement in the manufacturing process.
It is very efficient and produces items quicker.
It is reliable, accurate and flexible.
It eliminates errors that may arise in the manual way
of manufacturing.
It is good for complex manufacturing processes.
Try thy hands on
Define the following:
A. Computer based learning.
B. Computer aided design.
C. Computer assisted manufacturing
List four (4) importance of the following:
A. Computer based learning.
B. Computer aided design.
C. Computer assisted manufacturing
Thanks 4 READING
Next tutorials will be on;
E-business, E-health, E-learning, E-mail, etc.
Subscribe and keep the channel active.
1 de 23

Recomendados

E-ICT Digital Technology Culture 2 - Anti-Dote Series por
E-ICT Digital Technology Culture 2 - Anti-Dote SeriesE-ICT Digital Technology Culture 2 - Anti-Dote Series
E-ICT Digital Technology Culture 2 - Anti-Dote SeriesEnimil Kweku Boateng
108 visualizações24 slides
Information Systems - Anti-Dote Series por
Information Systems - Anti-Dote SeriesInformation Systems - Anti-Dote Series
Information Systems - Anti-Dote SeriesEnimil Kweku Boateng
284 visualizações15 slides
Information technology (part 1) por
Information technology (part  1)Information technology (part  1)
Information technology (part 1)smumbahelp
132 visualizações2 slides
security in it (data and cyber security) por
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)Rohana K Amarakoon
1.8K visualizações32 slides
ICT Presentation - Std 10th C por
ICT Presentation - Std 10th CICT Presentation - Std 10th C
ICT Presentation - Std 10th CKrupesh Shah
16.9K visualizações12 slides
Weekly report 2 por
Weekly report 2Weekly report 2
Weekly report 2Oxygenmin Phreeraphattanakarn
54 visualizações1 slide

Mais conteúdo relacionado

Mais procurados

Information Technology of Metro (MCC)- TQM por
Information Technology of Metro (MCC)-  TQMInformation Technology of Metro (MCC)-  TQM
Information Technology of Metro (MCC)- TQMSalma Bashir
2.5K visualizações62 slides
Ioe orientation por
Ioe orientationIoe orientation
Ioe orientationnikshaikh786
116 visualizações19 slides
Impactof IT por
Impactof ITImpactof IT
Impactof ITPIREH
923 visualizações11 slides
Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont... por
Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...
Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...IOSR Journals
1.5K visualizações7 slides
Information Technology por
Information TechnologyInformation Technology
Information TechnologySoklang Ul
2.4K visualizações10 slides
Ebin ephrem elavathingal por
Ebin  ephrem elavathingalEbin  ephrem elavathingal
Ebin ephrem elavathingalEbin Ephrem Elavathingal
439 visualizações13 slides

Mais procurados(19)

Information Technology of Metro (MCC)- TQM por Salma Bashir
Information Technology of Metro (MCC)-  TQMInformation Technology of Metro (MCC)-  TQM
Information Technology of Metro (MCC)- TQM
Salma Bashir2.5K visualizações
Ioe orientation por nikshaikh786
Ioe orientationIoe orientation
Ioe orientation
nikshaikh786116 visualizações
Impactof IT por PIREH
Impactof ITImpactof IT
Impactof IT
PIREH923 visualizações
Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont... por IOSR Journals
Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...
Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...
IOSR Journals1.5K visualizações
Information Technology por Soklang Ul
Information TechnologyInformation Technology
Information Technology
Soklang Ul2.4K visualizações
Chapter01discovering computers2012 por Frya Lora
Chapter01discovering computers2012Chapter01discovering computers2012
Chapter01discovering computers2012
Frya Lora335 visualizações
College Collaboration Portal with Training and Placement por IOSR Journals
College Collaboration Portal with Training and PlacementCollege Collaboration Portal with Training and Placement
College Collaboration Portal with Training and Placement
IOSR Journals307 visualizações
Macro estructura de ingenieria electronica por Rafael Brito
Macro estructura de ingenieria electronicaMacro estructura de ingenieria electronica
Macro estructura de ingenieria electronica
Rafael Brito73 visualizações
SOCIOTECHNICAL SYSTEMS IN INFORMATION TECHNOLOGY por Riri Satria
SOCIOTECHNICAL SYSTEMS IN INFORMATION TECHNOLOGYSOCIOTECHNICAL SYSTEMS IN INFORMATION TECHNOLOGY
SOCIOTECHNICAL SYSTEMS IN INFORMATION TECHNOLOGY
Riri Satria1.9K visualizações
The Use of Social Media to Gather Qualitative Data: A Case of Government E-P... por IAIN Datokarama Palu
The Use of Social Media to Gather Qualitative Data: A Case of Government E-P...The Use of Social Media to Gather Qualitative Data: A Case of Government E-P...
The Use of Social Media to Gather Qualitative Data: A Case of Government E-P...
IAIN Datokarama Palu 869 visualizações
An educational bluetooth quizzing application in android por ijwmn
An educational bluetooth quizzing application in androidAn educational bluetooth quizzing application in android
An educational bluetooth quizzing application in android
ijwmn603 visualizações
It project por naniprb90
It projectIt project
It project
naniprb901.5K visualizações
Capstone Project 2 and Social and Professional Issues Deliverables por Richard Dioteles
Capstone Project 2 and Social and Professional Issues DeliverablesCapstone Project 2 and Social and Professional Issues Deliverables
Capstone Project 2 and Social and Professional Issues Deliverables
Richard Dioteles15 visualizações
Information technology ppt por Akhilesh Verma
Information technology pptInformation technology ppt
Information technology ppt
Akhilesh Verma1.7K visualizações
Research Opportunities with IEEE/ Research Pattern/ Paper guidelines/ How to ... por Mehak Azeem
Research Opportunities with IEEE/ Research Pattern/ Paper guidelines/ How to ...Research Opportunities with IEEE/ Research Pattern/ Paper guidelines/ How to ...
Research Opportunities with IEEE/ Research Pattern/ Paper guidelines/ How to ...
Mehak Azeem345 visualizações
Computer Engineering por Roberto Madera
Computer EngineeringComputer Engineering
Computer Engineering
Roberto Madera9K visualizações
REMOTE CONTROL FOR SMART CLASSROOM WITH BLUETOOTH NETWORKS por ijcsit
REMOTE CONTROL FOR SMART CLASSROOM WITH BLUETOOTH NETWORKSREMOTE CONTROL FOR SMART CLASSROOM WITH BLUETOOTH NETWORKS
REMOTE CONTROL FOR SMART CLASSROOM WITH BLUETOOTH NETWORKS
ijcsit9 visualizações
Cynthia Professional Prortfolio por Cynthia Eichner
Cynthia Professional PrortfolioCynthia Professional Prortfolio
Cynthia Professional Prortfolio
Cynthia Eichner191 visualizações

Similar a Digital Technology Culture - Anti-Dote Series

Kirtesh Khandelwal Visual Basics Project por
Kirtesh Khandelwal Visual Basics ProjectKirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics ProjectKirtesh Khandelwal
193 visualizações201 slides
Aplication of comp por
Aplication of compAplication of comp
Aplication of compMuhammad Asghar Ali
64 visualizações23 slides
Statement Of Purpose For Information Technology por
Statement Of Purpose For Information TechnologyStatement Of Purpose For Information Technology
Statement Of Purpose For Information TechnologyMichelle Robison
2 visualizações46 slides
Statement Of Purpose For Information Technology por
Statement Of Purpose For Information TechnologyStatement Of Purpose For Information Technology
Statement Of Purpose For Information TechnologyIoulia King
3 visualizações46 slides
JOB SEARCH PAPERThe three most interesting jobs chosen for t.docx por
JOB SEARCH PAPERThe three most interesting jobs chosen for t.docxJOB SEARCH PAPERThe three most interesting jobs chosen for t.docx
JOB SEARCH PAPERThe three most interesting jobs chosen for t.docxpriestmanmable
10 visualizações8 slides
IT Fundamentals por
IT FundamentalsIT Fundamentals
IT FundamentalsRicardo Trujillo Rodríguez
338 visualizações44 slides

Similar a Digital Technology Culture - Anti-Dote Series(20)

Kirtesh Khandelwal Visual Basics Project por Kirtesh Khandelwal
Kirtesh Khandelwal Visual Basics ProjectKirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal193 visualizações
Statement Of Purpose For Information Technology por Michelle Robison
Statement Of Purpose For Information TechnologyStatement Of Purpose For Information Technology
Statement Of Purpose For Information Technology
Michelle Robison2 visualizações
Statement Of Purpose For Information Technology por Ioulia King
Statement Of Purpose For Information TechnologyStatement Of Purpose For Information Technology
Statement Of Purpose For Information Technology
Ioulia King3 visualizações
JOB SEARCH PAPERThe three most interesting jobs chosen for t.docx por priestmanmable
JOB SEARCH PAPERThe three most interesting jobs chosen for t.docxJOB SEARCH PAPERThe three most interesting jobs chosen for t.docx
JOB SEARCH PAPERThe three most interesting jobs chosen for t.docx
priestmanmable10 visualizações
Modern Technology por Md Saylab
Modern TechnologyModern Technology
Modern Technology
Md Saylab22 visualizações
Notes1 por Nadirah Aziz
Notes1Notes1
Notes1
Nadirah Aziz767 visualizações
Informati̇on technology 1 por Enes Bolfidan
Informati̇on technology 1Informati̇on technology 1
Informati̇on technology 1
Enes Bolfidan713 visualizações
Act te 335 corrected por Habibur Rahman
Act te 335 correctedAct te 335 corrected
Act te 335 corrected
Habibur Rahman2.2K visualizações
Information Technology (IT) por Malik Afzaal
Information Technology (IT)Information Technology (IT)
Information Technology (IT)
Malik Afzaal255 visualizações
Bachelor of Information Technology Melbourne por vitseo1
Bachelor of Information Technology Melbourne Bachelor of Information Technology Melbourne
Bachelor of Information Technology Melbourne
vitseo15 visualizações
Bachelor of Information Technology Melbourne por vitseo1
Bachelor of Information Technology MelbourneBachelor of Information Technology Melbourne
Bachelor of Information Technology Melbourne
vitseo157 visualizações
Bachelor of Information Technology Sydney por vitseo1
Bachelor of Information Technology SydneyBachelor of Information Technology Sydney
Bachelor of Information Technology Sydney
vitseo15 visualizações
Bachelor of Information Technology Melbourne por vitseo1
Bachelor of Information Technology MelbourneBachelor of Information Technology Melbourne
Bachelor of Information Technology Melbourne
vitseo137 visualizações
Bachelor of Information Technology Melbourne por vitseo1
Bachelor of Information Technology MelbourneBachelor of Information Technology Melbourne
Bachelor of Information Technology Melbourne
vitseo164 visualizações
Top machine learning trends for 2022 and beyond por ArpitGautam20
Top machine learning trends for 2022 and beyondTop machine learning trends for 2022 and beyond
Top machine learning trends for 2022 and beyond
ArpitGautam20155 visualizações
DISRUPTIVE INNOVATIONS by ANIKET ROY, 12000921054.pdf por SwapanRoy16
DISRUPTIVE INNOVATIONS by ANIKET ROY, 12000921054.pdfDISRUPTIVE INNOVATIONS by ANIKET ROY, 12000921054.pdf
DISRUPTIVE INNOVATIONS by ANIKET ROY, 12000921054.pdf
SwapanRoy163 visualizações

Mais de Enimil Kweku Boateng

E-ICT MULTIMEDIA IN EDUCATION ANTI-DOTE SERIES.pptx por
E-ICT MULTIMEDIA IN EDUCATION ANTI-DOTE SERIES.pptxE-ICT MULTIMEDIA IN EDUCATION ANTI-DOTE SERIES.pptx
E-ICT MULTIMEDIA IN EDUCATION ANTI-DOTE SERIES.pptxEnimil Kweku Boateng
35 visualizações15 slides
E-ICT APPLICATION SOFTWARE ANTI-DOTE SERIES.pptx por
E-ICT APPLICATION SOFTWARE ANTI-DOTE SERIES.pptxE-ICT APPLICATION SOFTWARE ANTI-DOTE SERIES.pptx
E-ICT APPLICATION SOFTWARE ANTI-DOTE SERIES.pptxEnimil Kweku Boateng
34 visualizações12 slides
E-ICT SYSTEM SOFTWARE ANTI-DOTE SERIES.pptx por
E-ICT SYSTEM SOFTWARE ANTI-DOTE SERIES.pptxE-ICT SYSTEM SOFTWARE ANTI-DOTE SERIES.pptx
E-ICT SYSTEM SOFTWARE ANTI-DOTE SERIES.pptxEnimil Kweku Boateng
18 visualizações20 slides
E-ICT INTRODUCTION TO COMPUTER SOFTWARE ANTI-DOTE SERIES.pptx por
E-ICT INTRODUCTION TO COMPUTER SOFTWARE ANTI-DOTE SERIES.pptxE-ICT INTRODUCTION TO COMPUTER SOFTWARE ANTI-DOTE SERIES.pptx
E-ICT INTRODUCTION TO COMPUTER SOFTWARE ANTI-DOTE SERIES.pptxEnimil Kweku Boateng
10 visualizações18 slides
E-ICT Data Representation 1 - Anti-Dote Series por
E-ICT Data Representation 1 - Anti-Dote SeriesE-ICT Data Representation 1 - Anti-Dote Series
E-ICT Data Representation 1 - Anti-Dote SeriesEnimil Kweku Boateng
43 visualizações11 slides
Hardware Components2 - Anti-Dote Series por
Hardware Components2 - Anti-Dote SeriesHardware Components2 - Anti-Dote Series
Hardware Components2 - Anti-Dote SeriesEnimil Kweku Boateng
28 visualizações15 slides

Mais de Enimil Kweku Boateng(7)

E-ICT MULTIMEDIA IN EDUCATION ANTI-DOTE SERIES.pptx por Enimil Kweku Boateng
E-ICT MULTIMEDIA IN EDUCATION ANTI-DOTE SERIES.pptxE-ICT MULTIMEDIA IN EDUCATION ANTI-DOTE SERIES.pptx
E-ICT MULTIMEDIA IN EDUCATION ANTI-DOTE SERIES.pptx
Enimil Kweku Boateng35 visualizações
E-ICT APPLICATION SOFTWARE ANTI-DOTE SERIES.pptx por Enimil Kweku Boateng
E-ICT APPLICATION SOFTWARE ANTI-DOTE SERIES.pptxE-ICT APPLICATION SOFTWARE ANTI-DOTE SERIES.pptx
E-ICT APPLICATION SOFTWARE ANTI-DOTE SERIES.pptx
Enimil Kweku Boateng34 visualizações
E-ICT SYSTEM SOFTWARE ANTI-DOTE SERIES.pptx por Enimil Kweku Boateng
E-ICT SYSTEM SOFTWARE ANTI-DOTE SERIES.pptxE-ICT SYSTEM SOFTWARE ANTI-DOTE SERIES.pptx
E-ICT SYSTEM SOFTWARE ANTI-DOTE SERIES.pptx
Enimil Kweku Boateng18 visualizações
E-ICT INTRODUCTION TO COMPUTER SOFTWARE ANTI-DOTE SERIES.pptx por Enimil Kweku Boateng
E-ICT INTRODUCTION TO COMPUTER SOFTWARE ANTI-DOTE SERIES.pptxE-ICT INTRODUCTION TO COMPUTER SOFTWARE ANTI-DOTE SERIES.pptx
E-ICT INTRODUCTION TO COMPUTER SOFTWARE ANTI-DOTE SERIES.pptx
Enimil Kweku Boateng10 visualizações
E-ICT Data Representation 1 - Anti-Dote Series por Enimil Kweku Boateng
E-ICT Data Representation 1 - Anti-Dote SeriesE-ICT Data Representation 1 - Anti-Dote Series
E-ICT Data Representation 1 - Anti-Dote Series
Enimil Kweku Boateng43 visualizações
Hardware Components2 - Anti-Dote Series por Enimil Kweku Boateng
Hardware Components2 - Anti-Dote SeriesHardware Components2 - Anti-Dote Series
Hardware Components2 - Anti-Dote Series
Enimil Kweku Boateng28 visualizações
Hardware Components1 - Anti-Dote Series por Enimil Kweku Boateng
Hardware Components1 - Anti-Dote SeriesHardware Components1 - Anti-Dote Series
Hardware Components1 - Anti-Dote Series
Enimil Kweku Boateng37 visualizações

Último

GSoC 2024 por
GSoC 2024GSoC 2024
GSoC 2024DeveloperStudentClub10
68 visualizações15 slides
Classification of crude drugs.pptx por
Classification of crude drugs.pptxClassification of crude drugs.pptx
Classification of crude drugs.pptxGayatriPatra14
77 visualizações13 slides
Google solution challenge..pptx por
Google solution challenge..pptxGoogle solution challenge..pptx
Google solution challenge..pptxChitreshGyanani1
98 visualizações18 slides
REPRESENTATION - GAUNTLET.pptx por
REPRESENTATION - GAUNTLET.pptxREPRESENTATION - GAUNTLET.pptx
REPRESENTATION - GAUNTLET.pptxiammrhaywood
83 visualizações26 slides
Ch. 7 Political Participation and Elections.pptx por
Ch. 7 Political Participation and Elections.pptxCh. 7 Political Participation and Elections.pptx
Ch. 7 Political Participation and Elections.pptxRommel Regala
72 visualizações11 slides
Collective Bargaining and Understanding a Teacher Contract(16793704.1).pptx por
Collective Bargaining and Understanding a Teacher Contract(16793704.1).pptxCollective Bargaining and Understanding a Teacher Contract(16793704.1).pptx
Collective Bargaining and Understanding a Teacher Contract(16793704.1).pptxCenter for Integrated Training & Education
90 visualizações57 slides

Último(20)

Classification of crude drugs.pptx por GayatriPatra14
Classification of crude drugs.pptxClassification of crude drugs.pptx
Classification of crude drugs.pptx
GayatriPatra1477 visualizações
Google solution challenge..pptx por ChitreshGyanani1
Google solution challenge..pptxGoogle solution challenge..pptx
Google solution challenge..pptx
ChitreshGyanani198 visualizações
REPRESENTATION - GAUNTLET.pptx por iammrhaywood
REPRESENTATION - GAUNTLET.pptxREPRESENTATION - GAUNTLET.pptx
REPRESENTATION - GAUNTLET.pptx
iammrhaywood83 visualizações
Ch. 7 Political Participation and Elections.pptx por Rommel Regala
Ch. 7 Political Participation and Elections.pptxCh. 7 Political Participation and Elections.pptx
Ch. 7 Political Participation and Elections.pptx
Rommel Regala72 visualizações
ICS3211_lecture 08_2023.pdf por Vanessa Camilleri
ICS3211_lecture 08_2023.pdfICS3211_lecture 08_2023.pdf
ICS3211_lecture 08_2023.pdf
Vanessa Camilleri103 visualizações
7 NOVEL DRUG DELIVERY SYSTEM.pptx por Sachin Nitave
7 NOVEL DRUG DELIVERY SYSTEM.pptx7 NOVEL DRUG DELIVERY SYSTEM.pptx
7 NOVEL DRUG DELIVERY SYSTEM.pptx
Sachin Nitave58 visualizações
The basics - information, data, technology and systems.pdf por JonathanCovena1
The basics - information, data, technology and systems.pdfThe basics - information, data, technology and systems.pdf
The basics - information, data, technology and systems.pdf
JonathanCovena188 visualizações
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1} por DR .PALLAVI PATHANIA
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
DR .PALLAVI PATHANIA240 visualizações
AUDIENCE - BANDURA.pptx por iammrhaywood
AUDIENCE - BANDURA.pptxAUDIENCE - BANDURA.pptx
AUDIENCE - BANDURA.pptx
iammrhaywood69 visualizações
Community-led Open Access Publishing webinar.pptx por Jisc
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptx
Jisc74 visualizações
The Accursed House by Émile Gaboriau por DivyaSheta
The Accursed House  by Émile GaboriauThe Accursed House  by Émile Gaboriau
The Accursed House by Émile Gaboriau
DivyaSheta158 visualizações
Are we onboard yet University of Sussex.pptx por Jisc
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptx
Jisc77 visualizações
Scope of Biochemistry.pptx por shoba shoba
Scope of Biochemistry.pptxScope of Biochemistry.pptx
Scope of Biochemistry.pptx
shoba shoba124 visualizações
Create a Structure in VBNet.pptx por Breach_P
Create a Structure in VBNet.pptxCreate a Structure in VBNet.pptx
Create a Structure in VBNet.pptx
Breach_P70 visualizações
JiscOAWeek_LAIR_slides_October2023.pptx por Jisc
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptx
Jisc79 visualizações
Class 10 English lesson plans por TARIQ KHAN
Class 10 English  lesson plansClass 10 English  lesson plans
Class 10 English lesson plans
TARIQ KHAN257 visualizações
Structure and Functions of Cell.pdf por Nithya Murugan
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdf
Nithya Murugan368 visualizações

Digital Technology Culture - Anti-Dote Series

  • 1. NAME: ENIMIL KWEKU BOATENG COURSE: ELECTIVE ICT TOPIC: DIGITAL TECHNOLOGY CULTURE 1 EMAIL: KWEKUBOATENG38@GMAIL.COM WEB: HTTP://ENIMIL.000WEBHOSTAPP.COM
  • 2. Lesson quote Set your goals high, and don’t stop till you get there. Bo Jackson
  • 3. LESSON OBJECTIVES At the end of this lesson, the student should be able to: Explain general issues concerning information technology Understand computer and information security and distinguish between computer crime and cybercrime Analyze the role and impact of information technology on everyday life.
  • 4. Digital technology culture Digital culture refers to culture shaped by the emergence and use of digital technologies. It can also be said of how people use and interact with technology in their works and lives. It describes the idea that technology and the Internet significantly shape the way we interact behave, think, and communicate as human beings in a societal setting.
  • 5. THE INTERNET The Internet is a globally connected network system that usesTransmission Control Protocol and Internet Protocol (TCP/IP) to transmit data through various types of media like coaxial cable, twisted pair cable, fiber-optic cable and wireless.TCP/IP is a set of standardized rules that allow computers to communicate on a network such as the Internet.
  • 6. Source: https://milcom.edu.au/different-types- coaxial-cables/ Source: https://www.dreamstime.com/stock- photo-ethernet-wire-cable-yellow-patch- cord-twisted-pair-isolated-image88784783 Source: https://www.optcore.net/the- difference-between-optical-fiber-and- optical-fiber-cable/ Coaxial Cable Twisted pair cable Fibre optic cable
  • 7. THE INTERNET It is worth knowing thatWWW which meansWorld WideWeb is not the same as the Internet.TheWorld WideWeb however is a collection of information which is accessed through the Internet.The web has matured through three generations, commonly called Web 1.0, 2.0, and 3.0.
  • 8. COMPUTER & INFORMATION SECURITY Information security involves protecting individuals and organizations information from theft and danger. Computer security focuses on protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.
  • 9. COMPUTER CRIME Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a hacker that illegally browses or steals a company's or individuals private information. It can also be defined as the use of information technology for illegal purposes or for unauthorized access of a computer system where the intent is to damage, delete or alter the data present on the computer.
  • 10. TYPES OF COMPUTER CRIME Cracking Unauthorized access Computer malware Denial-of-service attack
  • 11. CYBERCRIMECRIME Cybercrime is any criminal activity that involves a computer, a networked device or a network. Cybercrimes happen in the cyberspace in that the computer is used as a tool alright but the target is not the computer unlike a computer crime where the tool used and the target happens to be the computer.
  • 12. TYPES OF CYBERCRIME Identity theft Social engineering Malvertising Cyberstalking
  • 13. EFFECTS OF COMPUTER & CYBERCRIMES It can lead to job loss. It damages brand image and company or individual’s reputation. There is high cost in mitigation strategies and recovery from cyber and computer crimes. It can lead to loss of trade and competitiveness.
  • 15. Computer based training Computer-based training is a learning method in which a computer program is used as the primary mode of teaching. With this type of training, you are able to teach yourself with little or no outside help from a teacher.As you use the program, you can study at your own pace and the program tracks your progress. It involves the use of a personal or networked computer for the delivery and access of training programs.
  • 16. IMPORTANCE OF COMPUTER BASED TRAINING There is immediate feedback on work. It respects one learning pace whether fast or slow learner. It uses a multimedia approach to teaching like sound, sight and interactive activities, therefore it works for all learning types, whether you learn through reading, seeing or doing.
  • 17. IMPORTANCE OF COMPUTER BASED TRAINING It allows for consistency in the training since the same materials are used and there is no need to account for individual teaching styles of instructors. It is easy to track and analyze progress of trainees. It is flexible and efficient
  • 18. Computer AIDED DESIGN Computer Aided Design (CAD) is the use of computer software to design and document a product’s design process. CAD is used to design, develop and optimize products. While it is very versatile, CAD is extensively used in the design of tools and equipment required in the manufacturing process as well as in the construction domain. CAD enables design engineers to layout and to develop their work on a computer screen, print and save it for future editing.
  • 19. IMPORTANCE OF Computer AIDED DESIGN It is very easy to edit design work. There is a decrease in error percentage. There is a decrease in design effort. It is easy to share design work. There is improvement in accuracy.
  • 20. Computer ASSISTED MANUFACTURING Computer assisted manufacturing (CAM) can be defined as the use of computer systems to plan, manage, and control the operations of a manufacturing plant through either direct or indirect computer interface with the plant’s production resources.
  • 21. IMPORTANCE OF Computer ASSISTED MANUFACTURING There is improvement in the manufacturing process. It is very efficient and produces items quicker. It is reliable, accurate and flexible. It eliminates errors that may arise in the manual way of manufacturing. It is good for complex manufacturing processes.
  • 22. Try thy hands on Define the following: A. Computer based learning. B. Computer aided design. C. Computer assisted manufacturing List four (4) importance of the following: A. Computer based learning. B. Computer aided design. C. Computer assisted manufacturing
  • 23. Thanks 4 READING Next tutorials will be on; E-business, E-health, E-learning, E-mail, etc. Subscribe and keep the channel active.