SlideShare uma empresa Scribd logo
1 de 58
Empowerment technology
ICT
ICT
COMMUNICATION
TECHNOLOGYINFORMATION
• IT IS THE UMBRELLA THAT
INCLUDES ANY COMMUNICATION
DEVICE OR APPLICATION,
INCOMPASING, RADIO, TELEVISION,
CELLPHONE, COMPUTER, ECT.
• IT IS ALSO MAIN METHOD OF
COMMUNICATION, AND
EDUCCATION, GETTING
INFORMATION AND ATTAINING
SERVICES, EXPRESSSING SOCIAL
ADVOCATES AND AWARENESS
WORLD WIDE WEB
CURRENT STATE TECHNOLOGY
• WEB 1.0
• WEB 2.0
• WEB 3.0
WEB 1.0
• IN THIS STAGE OF INTERNET
TECHNOLOGY THERE WERE VERY
WEB CONTENT CREATORS AND
MANY OF THEM WERE SO CALLED
‘‘READ ONLY WEB’’
• THERE WERE NO USER
INTEACTION
• WEB PAGES ARE STATIC
• THE FEEDBACK MECHANISM WAS
THRU PRIVATE EMAIL.
• NO DIRECT COMMENT AVAILABLE
• EXAMPLE:
WEB 2.0
• THE TERM WEB 2.0 WAS USED
AROUND 2004
• INTERNET TECHNOLOGY BECOME
MORE AND MORE INTERACTIVE
(USE OF SOCIAL MEDIA BEGINS)
• THE INTERNET BECAME MORE
AVAILABLE TO EVERY ONE
• THE USERS CAN NOW INTERACT,
CONTRIBUTE AND CREAT THERE
OWN INTERNET SPACE AND
CONTENT
WEB 3.0
• IT IS DESCOVERED BY, TIM
BERNES-LEE (FATHER OF THE
WORLD WIDE WEB) AS THE READ-
WRITE –EXECUTE WEB
• IT IS REFFERED TO AS THE
SEMANTIC WEB OR DATA DRIVEN
WEB CONTENT AND RESPONSE.
• IT WILL NOT MAKE THE WEB 2.0
OBSELETE
TECHNOLOGY
CONVERGENCE
TECHNOLOGY CONVERGENCE
• IT IS AN EVOLUTION OF TECHNOLOGICAL
DEVELOPMENT THAT MERGE INTO A NEW
SYSTEMS BRINGING TOGETHER DIFFERENT
TYPES OF APPLICANTS AND MEDIA
 SOCIAL MEDIA
• INTERNET CONNECTION
• IT IS A COLLECTION OF INTERNET –BASED
COMMUNICATION TOOLS AND COMPUTER-
ASSISTED CHANNELS DEDICATED TO ALLOW
USERS TO INTERACT ,COMMUNICATE ,AND
SHARE INFORMATION IN A VIRTUAL
COMMUNITY AND NETWORK.
 FACEBOOK
FACEBOOK
• IS A POPULAR AND FAMOUS
• IS A POPULAR AND FREE AND SOCIAL NETWORKING SITE
WITH MORE THAN A BILLION USERS TO CREATE PROFILES
,UPLOAD PHOTO AND VIDEOS, CREATE AND JOIN GROUPS,
REACT TO FRIENDS POST ,CREATE EVENTS, SEND MESSAGES
,KEEPING IN TOUCH WITH CLOSE FRIENDS,AND RELATIVES.
TWITTER
• WITH MORE THAN 300 MILLION USERS IN 2016
• ALLOWS USERS TO MICROBLOG OR BROADCAST SHORT
MESSAGE CALLED ‘’TWEETS.’’
INSTAGRAM
• A SOCIAL NETWORKING APP THAT ENABLES THE USER TO
SHARE MOBILE PHOTO AND VIDEO EITHER PUBLICITY OR
PRIVATELY.
SNAPCHAT
• DESIGNED FOR THE MOBILE NETWORKING APPLICATION.
• ALSO DESIGNED FOR PHOTO SHARING , CHAT AND
MESSAGING SERVICES.
ASSISTIVE MEDIA
• IT IS A NONPROFIT ORGANIZATION FOUNDED IN 1996 IN ANN
ARBOR, MICHIGAN USA.
• IT WAS THE FIRST INTERNET –BASED READING SERVICE FOR
PERSONS WITH VISUAL AND READING IMPAIRMENTS.
DANGERS ONLINE
EMAIL SPAM
• KNOWN AS JUNK EMAIL, USUALLY UNSOLICITATED
COMMERCIAL EMAIL SENT FROM ONE SOURCE WITH
IDENTICAL MESSAGE TO SEND TO MULTIPLE RECIPIENTS.
• SPAMMER - IS THE TERM USED TO REFER TO A PERSON WHO
CREATES ELECTRONIC SPAM.
•
EMAIL SPOOFING
• A DECIETFUL EMAIL PRACTICE IN WHICH THE SENDER
ADDRESS IS CHANGED SO THAT IT WOULD APPEAR TO HAVE
COME FROM A DIFFERENT SOURCES USUALLY SOMEONE YOU
KNOW.
• IT IS USUALLY USED BY SPAMMERS TO HIODE THE ORIGIN OF
THE SPAM.
PHISHING
• A DECEITFUL PRACTICE OF TRYING TO GET CONFIDENTIAL
INFORMATION SUCH AS PASSWORDS AND USERNAME,AND
CREDIT CARD details by making it appear as it if comes from a
trustworthy source
Pharming
• A dangerous hacker attack on a web site which directs all traffic to the web
site to another fictitious website.
• It main objective it to obtain username and passwords, as well as credit card
and financial information and use these to steal money electronically.
`
Spyware
• It is the computer program that is installed covertly on a personal computer
to collect information even take control over the computer without the
knowledge of the user.
Computer Worm
• It will delete your files
• Is a dangerous computer program that replicates itself though a network
then infect the system.
Trojan Horse
• A malicious software fronting to perform a good task, but covertly performs
undesirable function which the intension of entering the computer without
the users content.
• It can erase your data , can corrupt files
Computer Virus
• A program that duplicates itself & then infects the computer
• It spread like a real biological virus, where in attaches itself to a host
program and infects other computer it is received by a computer through the
internet.
• Virus can also be transferred by the use of removable storage
Hacker
• Is a person who is able to enter the control another peoples computer
without authorization.
• Be able to enter another computer, usually vandalizes the victims website,
steal personal information, obtains intellectual property, performs credit
cards fraud.
Protections From The
Danger
Security center
• Is the place where you can set additional proection from THREAT to your
computer, especially when using the internet.
SECURITY SETTING
FIREWALL
• Helps in protecting your computer from unauthorized entries viruses,or
worms from the internet or network.
Automatic updates
• Another feature of windows which when turned on will automatically
download updates from microsoft windows website.
Virus protection
• Is usually about the current antivirus software installed in your computer.
• Antivirus software is meant to locate, find ,and remove virus threats that are
already in your computer.
Contextualize
• Is to place (something , such as
word or activity )in a context
Research
• The collecting about a particular
subject.
Strategy
• The art of devising or employing
plans or strategies toward a goal.
• A careful plan or method
Compilation
• The act or process of compiling
Citation
• An act of quoting; especially the
citing of a previously settled case at
law.
Contextual Search
• Is attempt to be more precise in
providing the list documents
according to the words used by the
user to search the internet
• A good contextual research engine
would request for more
information to narrow down the
result of the research.
1.Identify or choose a topic
2.Topic or task definition
3.Identify methods of search
Experiments
Explore
Survey
RESEARCH SKILLS
Critical Thinking
• It is the ability to digest, reflect and
conclude from the information
searched.
ANALYTICAL THINKING
• The ability to look verbalize , conceptualized and gather data attuned
to the context of the subject.
The ability to apply synthesis focus and critical thinking to extract
the useful information.
PROBLEM SOLVING CAPABILITY
• The ability to present solution or solve problems by presenting a
decision based on the given information.
•People with this ability are able to define and identify the latitude of the
problem and present all possible solution.
ORGANIZED DATA MINING
• It is the ability to organized and catalogue all collected materials
efficiently despite data size.
RESEARCH PRESENTATION
• It is the ability to present ideas and draw conclusion from the research.
Be able to explain in writing the purpose , steps goals and objective of
the research.
CREATIVITY AND DEVELOPED
IMAGINATION
• It is the ability to look for alternative solutions to the problems needed
to solve in the research.
Thinking beyond the usual approaches to the research objectives.
COMPUTER LITERACY
• Knowledge of the various computer application and tools.
Skills in the use of software to write design and present.
Steps in contextualize Research
1. Open the google site.
2. On the upper right side of the window, click the google app icons & click search
G.
3. On the lower right part of the window , click setting and the google search setting
pop-up list will appear.
4. Click advanced search & the advanced search window will appear.
5. Type the keywords that you would like to search & click the advance search
button.
Identify good source from satirical source
• Satirical sites are websites that report untrue or false stories meant to amuse
or entertain.
• Untrue stories should not be shared with your friends, and family.
HOW TO DETECT SATIRICAL NEWS
1. If it is too good to be true,then it must be so.
2. If the news did not emanate from reliable news site.
3. If they are from known satirical sites.
LIST OF TOP SOURCES OF SATIRICAL
SITES
1. Adobo Chronicles ( adobochronicles.com )
2. So what’s News ?(sowhatsnews.wordpress.com)
3. Eritas Times (eritastime.com)
4. The Professional Heckler (ProfessionalHeckler.wordpress.com)
1. LIST AMERICAN SATIRICAL SITES IN
THE US
1. The Onion (theonion.com)
2. ClickHole (clickhole.com)
3.Christwire Global Media (christwire.org.)
MAIL MERGE AND LABEL
GENERATION
• It is used to automatically add mailing addresses or personalized information
to your publication.
PARTS OF MAIL MERGE
1. Recipient list
2. Publication with merge fields
3. Merge publication
MAILING START GROUP COMMANDS
• Mail merge
• Email merge
Merges data into a publication which
will be printed mailed. Shows step by
step mail merge wizard.
Merge data into a publication that will
be sent as e-mail.
• Select recipients
• Edit recipient list
• Chooses the list of people you
intend to send the letter to. You can
type your own list use our outlook
contacts or connect to a database.
• Makes changes to the llist of
recipients and decide whichof them
should receive you letter.
• Insert Merge field • Adds a field from your recipient list
to the publication.
Empowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine Gelos

Mais conteúdo relacionado

Mais procurados

Melanie g done 6565
Melanie g done 6565Melanie g done 6565
Melanie g done 6565pizonaim
 
Empowerment technology by: Irene Petere
Empowerment technology by: Irene PetereEmpowerment technology by: Irene Petere
Empowerment technology by: Irene PetereJuliezaMaeGermo
 
Ashpiaaaaa
AshpiaaaaaAshpiaaaaa
Ashpiaaaaapizonaim
 
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY   diana cerojales and jude bagayEMPOWERMENT TECHNOLOGY   diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagayniniogolo
 
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYkillersmile1
 
empowerment technologies
empowerment technologies empowerment technologies
empowerment technologies RicciGozon
 
EMPOWERMENT TECHNOLOGY by jessabel & mary grace
EMPOWERMENT TECHNOLOGY by jessabel & mary graceEMPOWERMENT TECHNOLOGY by jessabel & mary grace
EMPOWERMENT TECHNOLOGY by jessabel & mary graceobus25
 
Empowerment Technology by:jewelyn,liezel,mary joy,bryll
Empowerment Technology by:jewelyn,liezel,mary joy,bryllEmpowerment Technology by:jewelyn,liezel,mary joy,bryll
Empowerment Technology by:jewelyn,liezel,mary joy,brylljoanagolo4ever
 
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology  by: Geraldine Salve Pepe and Lailanie PepeEpowerment Technology  by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepesalvepepe
 
Divine Gono and Peter Paul Gato
Divine Gono and Peter Paul GatoDivine Gono and Peter Paul Gato
Divine Gono and Peter Paul GatoVineGono
 
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONImpowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONCedricPada
 
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...joanagolo4ever
 
Empowerment Technologies Lecture 12 (Philippines SHS)
Empowerment Technologies Lecture 12 (Philippines SHS)Empowerment Technologies Lecture 12 (Philippines SHS)
Empowerment Technologies Lecture 12 (Philippines SHS)John Bosco Javellana, MAEd.
 
empowerment technology by: kier and joveryn
empowerment technology by: kier and joverynempowerment technology by: kier and joveryn
empowerment technology by: kier and joverynkiersamaco
 
Information and Communication Technology (ICT) - Empowerment Technologies
Information and Communication Technology (ICT) - Empowerment TechnologiesInformation and Communication Technology (ICT) - Empowerment Technologies
Information and Communication Technology (ICT) - Empowerment TechnologiesMark Jhon Oxillo
 
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO LEIBE MAE GERONA APRIL ROSE GARON...
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO  LEIBE MAE GERONA APRIL ROSE GARON...EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO  LEIBE MAE GERONA APRIL ROSE GARON...
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO LEIBE MAE GERONA APRIL ROSE GARON...LanieGailGato
 

Mais procurados (20)

Melanie g done 6565
Melanie g done 6565Melanie g done 6565
Melanie g done 6565
 
Empowerment technology by: Irene Petere
Empowerment technology by: Irene PetereEmpowerment technology by: Irene Petere
Empowerment technology by: Irene Petere
 
Ashpiaaaaa
AshpiaaaaaAshpiaaaaa
Ashpiaaaaa
 
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY   diana cerojales and jude bagayEMPOWERMENT TECHNOLOGY   diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagay
 
ICT
ICTICT
ICT
 
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
 
empowerment technologies
empowerment technologies empowerment technologies
empowerment technologies
 
EMPOWERMENT TECHNOLOGY by jessabel & mary grace
EMPOWERMENT TECHNOLOGY by jessabel & mary graceEMPOWERMENT TECHNOLOGY by jessabel & mary grace
EMPOWERMENT TECHNOLOGY by jessabel & mary grace
 
Empowerment Technology by:jewelyn,liezel,mary joy,bryll
Empowerment Technology by:jewelyn,liezel,mary joy,bryllEmpowerment Technology by:jewelyn,liezel,mary joy,bryll
Empowerment Technology by:jewelyn,liezel,mary joy,bryll
 
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology  by: Geraldine Salve Pepe and Lailanie PepeEpowerment Technology  by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
 
Gwapo
GwapoGwapo
Gwapo
 
Divine Gono and Peter Paul Gato
Divine Gono and Peter Paul GatoDivine Gono and Peter Paul Gato
Divine Gono and Peter Paul Gato
 
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONImpowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
 
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
 
Internet Research
Internet ResearchInternet Research
Internet Research
 
Empowerment Technologies Lecture 12 (Philippines SHS)
Empowerment Technologies Lecture 12 (Philippines SHS)Empowerment Technologies Lecture 12 (Philippines SHS)
Empowerment Technologies Lecture 12 (Philippines SHS)
 
empowerment technology by: kier and joveryn
empowerment technology by: kier and joverynempowerment technology by: kier and joveryn
empowerment technology by: kier and joveryn
 
Information and Communication Technology (ICT) - Empowerment Technologies
Information and Communication Technology (ICT) - Empowerment TechnologiesInformation and Communication Technology (ICT) - Empowerment Technologies
Information and Communication Technology (ICT) - Empowerment Technologies
 
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO LEIBE MAE GERONA APRIL ROSE GARON...
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO  LEIBE MAE GERONA APRIL ROSE GARON...EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO  LEIBE MAE GERONA APRIL ROSE GARON...
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO LEIBE MAE GERONA APRIL ROSE GARON...
 
Christine
ChristineChristine
Christine
 

Semelhante a Empowerment technology Romel Padon & Airine Gelos

Empowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judithEmpowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judithmhedilyn8556
 
Empowerment technologies byShyna Gane Daleon and Galasao
Empowerment technologies byShyna Gane  Daleon and Galasao Empowerment technologies byShyna Gane  Daleon and Galasao
Empowerment technologies byShyna Gane Daleon and Galasao janelle17
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyesandregoron
 
empowerment technologies by: aiza martin and patricia obor
empowerment technologies  by: aiza martin and patricia oborempowerment technologies  by: aiza martin and patricia obor
empowerment technologies by: aiza martin and patricia obormartinaiza
 
EMPOWERMENT TECHNOLOGIES
EMPOWERMENT TECHNOLOGIESEMPOWERMENT TECHNOLOGIES
EMPOWERMENT TECHNOLOGIESagielyn
 
Empowerment technology
Empowerment technology Empowerment technology
Empowerment technology jonaspalen1
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technologypizonaim
 
2. ETECH Module 2 - Internet Safety and Security.pptx
2. ETECH Module 2 - Internet Safety and Security.pptx2. ETECH Module 2 - Internet Safety and Security.pptx
2. ETECH Module 2 - Internet Safety and Security.pptxKarmel7
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxShubhamGupta833557
 
Guideline about responsible use of social networks
Guideline about responsible use of social networksGuideline about responsible use of social networks
Guideline about responsible use of social networksprofesorjulioperez
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsIulia Porneala
 
00.fnc forensics overview new
00.fnc forensics overview new00.fnc forensics overview new
00.fnc forensics overview newforensicsnation
 
Presentation social networking service
Presentation social networking servicePresentation social networking service
Presentation social networking serviceManish S Thingalaya
 
Lea pagoyo final(1)
Lea pagoyo final(1)Lea pagoyo final(1)
Lea pagoyo final(1)jonaspalen1
 
The Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesThe Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesM. Prabu Wibowo
 

Semelhante a Empowerment technology Romel Padon & Airine Gelos (20)

Empowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judithEmpowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judith
 
Empowerment technologies byShyna Gane Daleon and Galasao
Empowerment technologies byShyna Gane  Daleon and Galasao Empowerment technologies byShyna Gane  Daleon and Galasao
Empowerment technologies byShyna Gane Daleon and Galasao
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
 
empowerment technologies by: aiza martin and patricia obor
empowerment technologies  by: aiza martin and patricia oborempowerment technologies  by: aiza martin and patricia obor
empowerment technologies by: aiza martin and patricia obor
 
EMPOWERMENT TECHNOLOGIES
EMPOWERMENT TECHNOLOGIESEMPOWERMENT TECHNOLOGIES
EMPOWERMENT TECHNOLOGIES
 
Empowerment technology
Empowerment technology Empowerment technology
Empowerment technology
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
2. ETECH Module 2 - Internet Safety and Security.pptx
2. ETECH Module 2 - Internet Safety and Security.pptx2. ETECH Module 2 - Internet Safety and Security.pptx
2. ETECH Module 2 - Internet Safety and Security.pptx
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
Guideline about responsible use of social networks
Guideline about responsible use of social networksGuideline about responsible use of social networks
Guideline about responsible use of social networks
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
 
00.fnc forensics overview new
00.fnc forensics overview new00.fnc forensics overview new
00.fnc forensics overview new
 
FNC Forensics Overview
FNC Forensics OverviewFNC Forensics Overview
FNC Forensics Overview
 
Presentation social networking service
Presentation social networking servicePresentation social networking service
Presentation social networking service
 
Lea pagoyo final(1)
Lea pagoyo final(1)Lea pagoyo final(1)
Lea pagoyo final(1)
 
The Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesThe Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal Issues
 
Social engineering
Social engineering Social engineering
Social engineering
 

Último

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 

Último (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 

Empowerment technology Romel Padon & Airine Gelos

  • 2. ICT ICT COMMUNICATION TECHNOLOGYINFORMATION • IT IS THE UMBRELLA THAT INCLUDES ANY COMMUNICATION DEVICE OR APPLICATION, INCOMPASING, RADIO, TELEVISION, CELLPHONE, COMPUTER, ECT. • IT IS ALSO MAIN METHOD OF COMMUNICATION, AND EDUCCATION, GETTING INFORMATION AND ATTAINING SERVICES, EXPRESSSING SOCIAL ADVOCATES AND AWARENESS
  • 4. CURRENT STATE TECHNOLOGY • WEB 1.0 • WEB 2.0 • WEB 3.0
  • 5. WEB 1.0 • IN THIS STAGE OF INTERNET TECHNOLOGY THERE WERE VERY WEB CONTENT CREATORS AND MANY OF THEM WERE SO CALLED ‘‘READ ONLY WEB’’ • THERE WERE NO USER INTEACTION • WEB PAGES ARE STATIC • THE FEEDBACK MECHANISM WAS THRU PRIVATE EMAIL. • NO DIRECT COMMENT AVAILABLE • EXAMPLE:
  • 6. WEB 2.0 • THE TERM WEB 2.0 WAS USED AROUND 2004 • INTERNET TECHNOLOGY BECOME MORE AND MORE INTERACTIVE (USE OF SOCIAL MEDIA BEGINS) • THE INTERNET BECAME MORE AVAILABLE TO EVERY ONE • THE USERS CAN NOW INTERACT, CONTRIBUTE AND CREAT THERE OWN INTERNET SPACE AND CONTENT
  • 7. WEB 3.0 • IT IS DESCOVERED BY, TIM BERNES-LEE (FATHER OF THE WORLD WIDE WEB) AS THE READ- WRITE –EXECUTE WEB • IT IS REFFERED TO AS THE SEMANTIC WEB OR DATA DRIVEN WEB CONTENT AND RESPONSE. • IT WILL NOT MAKE THE WEB 2.0 OBSELETE
  • 9. TECHNOLOGY CONVERGENCE • IT IS AN EVOLUTION OF TECHNOLOGICAL DEVELOPMENT THAT MERGE INTO A NEW SYSTEMS BRINGING TOGETHER DIFFERENT TYPES OF APPLICANTS AND MEDIA  SOCIAL MEDIA • INTERNET CONNECTION • IT IS A COLLECTION OF INTERNET –BASED COMMUNICATION TOOLS AND COMPUTER- ASSISTED CHANNELS DEDICATED TO ALLOW USERS TO INTERACT ,COMMUNICATE ,AND SHARE INFORMATION IN A VIRTUAL COMMUNITY AND NETWORK.  FACEBOOK
  • 10. FACEBOOK • IS A POPULAR AND FAMOUS • IS A POPULAR AND FREE AND SOCIAL NETWORKING SITE WITH MORE THAN A BILLION USERS TO CREATE PROFILES ,UPLOAD PHOTO AND VIDEOS, CREATE AND JOIN GROUPS, REACT TO FRIENDS POST ,CREATE EVENTS, SEND MESSAGES ,KEEPING IN TOUCH WITH CLOSE FRIENDS,AND RELATIVES.
  • 11. TWITTER • WITH MORE THAN 300 MILLION USERS IN 2016 • ALLOWS USERS TO MICROBLOG OR BROADCAST SHORT MESSAGE CALLED ‘’TWEETS.’’
  • 12. INSTAGRAM • A SOCIAL NETWORKING APP THAT ENABLES THE USER TO SHARE MOBILE PHOTO AND VIDEO EITHER PUBLICITY OR PRIVATELY.
  • 13. SNAPCHAT • DESIGNED FOR THE MOBILE NETWORKING APPLICATION. • ALSO DESIGNED FOR PHOTO SHARING , CHAT AND MESSAGING SERVICES.
  • 14. ASSISTIVE MEDIA • IT IS A NONPROFIT ORGANIZATION FOUNDED IN 1996 IN ANN ARBOR, MICHIGAN USA. • IT WAS THE FIRST INTERNET –BASED READING SERVICE FOR PERSONS WITH VISUAL AND READING IMPAIRMENTS.
  • 16. EMAIL SPAM • KNOWN AS JUNK EMAIL, USUALLY UNSOLICITATED COMMERCIAL EMAIL SENT FROM ONE SOURCE WITH IDENTICAL MESSAGE TO SEND TO MULTIPLE RECIPIENTS. • SPAMMER - IS THE TERM USED TO REFER TO A PERSON WHO CREATES ELECTRONIC SPAM. •
  • 17. EMAIL SPOOFING • A DECIETFUL EMAIL PRACTICE IN WHICH THE SENDER ADDRESS IS CHANGED SO THAT IT WOULD APPEAR TO HAVE COME FROM A DIFFERENT SOURCES USUALLY SOMEONE YOU KNOW. • IT IS USUALLY USED BY SPAMMERS TO HIODE THE ORIGIN OF THE SPAM.
  • 18. PHISHING • A DECEITFUL PRACTICE OF TRYING TO GET CONFIDENTIAL INFORMATION SUCH AS PASSWORDS AND USERNAME,AND CREDIT CARD details by making it appear as it if comes from a trustworthy source
  • 19. Pharming • A dangerous hacker attack on a web site which directs all traffic to the web site to another fictitious website. • It main objective it to obtain username and passwords, as well as credit card and financial information and use these to steal money electronically. `
  • 20. Spyware • It is the computer program that is installed covertly on a personal computer to collect information even take control over the computer without the knowledge of the user.
  • 21. Computer Worm • It will delete your files • Is a dangerous computer program that replicates itself though a network then infect the system.
  • 22. Trojan Horse • A malicious software fronting to perform a good task, but covertly performs undesirable function which the intension of entering the computer without the users content. • It can erase your data , can corrupt files
  • 23. Computer Virus • A program that duplicates itself & then infects the computer • It spread like a real biological virus, where in attaches itself to a host program and infects other computer it is received by a computer through the internet. • Virus can also be transferred by the use of removable storage
  • 24. Hacker • Is a person who is able to enter the control another peoples computer without authorization. • Be able to enter another computer, usually vandalizes the victims website, steal personal information, obtains intellectual property, performs credit cards fraud.
  • 26. Security center • Is the place where you can set additional proection from THREAT to your computer, especially when using the internet.
  • 28. FIREWALL • Helps in protecting your computer from unauthorized entries viruses,or worms from the internet or network.
  • 29. Automatic updates • Another feature of windows which when turned on will automatically download updates from microsoft windows website.
  • 30. Virus protection • Is usually about the current antivirus software installed in your computer. • Antivirus software is meant to locate, find ,and remove virus threats that are already in your computer.
  • 31. Contextualize • Is to place (something , such as word or activity )in a context Research • The collecting about a particular subject. Strategy • The art of devising or employing plans or strategies toward a goal. • A careful plan or method Compilation • The act or process of compiling
  • 32. Citation • An act of quoting; especially the citing of a previously settled case at law.
  • 33. Contextual Search • Is attempt to be more precise in providing the list documents according to the words used by the user to search the internet • A good contextual research engine would request for more information to narrow down the result of the research.
  • 34. 1.Identify or choose a topic 2.Topic or task definition 3.Identify methods of search Experiments Explore Survey
  • 36. Critical Thinking • It is the ability to digest, reflect and conclude from the information searched.
  • 37. ANALYTICAL THINKING • The ability to look verbalize , conceptualized and gather data attuned to the context of the subject. The ability to apply synthesis focus and critical thinking to extract the useful information.
  • 38. PROBLEM SOLVING CAPABILITY • The ability to present solution or solve problems by presenting a decision based on the given information. •People with this ability are able to define and identify the latitude of the problem and present all possible solution.
  • 39. ORGANIZED DATA MINING • It is the ability to organized and catalogue all collected materials efficiently despite data size.
  • 40. RESEARCH PRESENTATION • It is the ability to present ideas and draw conclusion from the research. Be able to explain in writing the purpose , steps goals and objective of the research.
  • 41. CREATIVITY AND DEVELOPED IMAGINATION • It is the ability to look for alternative solutions to the problems needed to solve in the research. Thinking beyond the usual approaches to the research objectives.
  • 42. COMPUTER LITERACY • Knowledge of the various computer application and tools. Skills in the use of software to write design and present.
  • 43. Steps in contextualize Research 1. Open the google site. 2. On the upper right side of the window, click the google app icons & click search G. 3. On the lower right part of the window , click setting and the google search setting pop-up list will appear. 4. Click advanced search & the advanced search window will appear. 5. Type the keywords that you would like to search & click the advance search button.
  • 44. Identify good source from satirical source • Satirical sites are websites that report untrue or false stories meant to amuse or entertain. • Untrue stories should not be shared with your friends, and family.
  • 45. HOW TO DETECT SATIRICAL NEWS 1. If it is too good to be true,then it must be so. 2. If the news did not emanate from reliable news site. 3. If they are from known satirical sites.
  • 46. LIST OF TOP SOURCES OF SATIRICAL SITES 1. Adobo Chronicles ( adobochronicles.com ) 2. So what’s News ?(sowhatsnews.wordpress.com) 3. Eritas Times (eritastime.com) 4. The Professional Heckler (ProfessionalHeckler.wordpress.com)
  • 47. 1. LIST AMERICAN SATIRICAL SITES IN THE US 1. The Onion (theonion.com) 2. ClickHole (clickhole.com) 3.Christwire Global Media (christwire.org.)
  • 48. MAIL MERGE AND LABEL GENERATION • It is used to automatically add mailing addresses or personalized information to your publication.
  • 49. PARTS OF MAIL MERGE 1. Recipient list 2. Publication with merge fields 3. Merge publication
  • 50. MAILING START GROUP COMMANDS • Mail merge • Email merge Merges data into a publication which will be printed mailed. Shows step by step mail merge wizard. Merge data into a publication that will be sent as e-mail.
  • 51. • Select recipients • Edit recipient list • Chooses the list of people you intend to send the letter to. You can type your own list use our outlook contacts or connect to a database. • Makes changes to the llist of recipients and decide whichof them should receive you letter.
  • 52. • Insert Merge field • Adds a field from your recipient list to the publication.