Professional Documents
Culture Documents
Living in IT Era Activities. Ramirez
Living in IT Era Activities. Ramirez
* ICT is in almost everywhere, in my chosen course learning a bit from ICT is important because in the near future
whatever kind of industry we choose if it is related to our course I’m sure we will going to use what we have learned
from ICT. For example in my job as a sales promoter in telco we are using social media to spread our brand and to
promote our product, in terms of reporting we also using excel to input how many sales we have produced for the
company.
* E-mail, Market shopping to on-line shopping, Classroom learning to e-learning, Makes communication faster.
ICT makes our daily lives easy because it helps to find the study materials very easily, make our shopping easy cause
even if we don't go outside we can buy things through on-line shopping, we can learn too even if we're just in the house
we can use the social networking education, and we can all communicate by just using internet and it makes the
communication faster, and by using the E-mail we can have an on-line job or other by just using the E-mail.
Positive
* ICT also help students and teachers to communicate in this kind of pandemic.
Negative
4. Write your realizations about the videos you have watched about the ICT
* I realized that ICT are made to make our daily life be easier, but not really that super easy because you know if you
don’t do anything nothing will happen in your life. And also ICT is not just the thing that we know, that we see in our
daily lives but it has a lot in it and I want to learn it.mo
Lesson 2 Activity
Create a timeline table how the computer evolved with the following information such as Inventor, Year Invented, Name
of Inventions, Place and Functions or Purposes why it was invested.
Inventor Name of Year Place and
inventions invented function
Blaise Pascaline 1642 addition and
Pascal subtraction
Gottfried Step 1673 could add
Wilhelm Reckoner and subtract,
von Leibniz like Pascal’s
machine, but
it could also
multiply and
divide
Charles Automatic 1822 mathematical
Babbage Difference tables for
Engine navigation
Lesson 3 Activity
Lesson 4 Activity
Activity # 4.1
Define the Following crimes in your own words the way you understand.
Online Impersonation – The criminals will use other identification to manipulate or scam other innocent people.
Social Network Fraud – Criminals are providing a fake information to take advantage of their victim
Cyberbullying – This is typically happen everywhere cyberbullying is that when bullied are using the internet to bully the
innocent one.
Trafficking Passwords – Criminals are selling some hack account. The most victim of this crime are the gamers.
Cyber Extortion – The criminals will send you a treat using internet and they are asking for money for your safety.
Creating or Possessing Child Pornography – Child pornography is when you use a minor to do some pornography for
money.
Identity Theft – It is relater to social network fraud, it is when the criminals use your identity to manipulate innocent
people.
Unauthorized System Access – it is when a person is not authorized to connect or to used the forbidden app or website.
Activity # 4.2
Choose of Three (2) Cases which are relevant to the Cybercrimes commonly happened here in our country. Give
Solutions to those cases you have chosen. Use this format for your study.
Title of case study – Security Hacker
Introduction - when detection is least likely to occur, strike. like Christmas, Thanksgiving, or any other national holiday.
Let's examine a real-world illustration of this to see how a holiday might benefit a hacker. Here is a company's narrative.
Solutions – Solution for this kind of cases are avoid sharing some information to social media and don’t put everything
about your identity.
Activity # 4.3
Create a poster design using powerpoint for the 10 Commandments of Computer Ethics.