Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 16

Introduction

to
ICT
by: alliah vance o. capuz
11 a b m a - s t . s e b a s t i a n
What is ICT?
 ICT stands for Information and Communication Technology. It is the technology
required for infoirmation processing, in particular, the use of electronic computers,
communication devices, and software applications to convert, store, protect, process,
transmit, and retrieve information from anywhere, anytime.

 Information and communications technology (ICT) is an extended term for


information technology (IT) which stresses the role of unified communications and
the integration of telecommunications (telephone lines and wireless signals),
computers as well as necessary software, its storage and the audio-visual systems,
which enable all users to access, store, transmit, and manipulate information.

 The term ICT is also used to refer to the combining of audio-visual and telephone
networks with computer networks through a single cabling or link system. There are
large economic incentives (huge cost savings due to elimination of the telephone
network) to merge the telephone network with the computer network system using a
single unified system of cabling, signal distribution and management.
INFORMATI - Information refers to the knowledge obtained from reading,
investigation, study or research. The tools to transmit information
ONtelevision and radio. Information is knowledge and helps us to fulfill our daily
are the telephone,
tasks.

- Communication is an act of transmitting messages. It is a COMMUNICATIO


process whereby information is exchanged between
N
using symbols, signs or verbal interactions. Communication is important in order to gain knowledge.
individuals

TECHNOLO Technology is the use of scientific knowledge, experience and


resources
GY
Technology is vital in communication
to create processes products that fulfill human needs.
EVOLUTION OF COMPUTERS
COMPUTER GENERATIONS

First Generation (1940-1956)

Second Generation (1956-1963)

Third Generation (1964-1971)

Fourth Generation (1971- PRESENT)

Fifth Generation (PRESENT & BEYOND)

New Era Computer


The usage of ICT in everyday life
EDUCATI BANKING INDUSTR E-
ON Y COMMER
CE

In education, teachers, Computers are used to E-commerce helps in


students, researchers In the banking, facilitate production boosting the economy. It
and school customers, planning and control makes buying and selling
administrators businessman & bank systems, to support activities easier, more
benefits from the administrator benefits chain management efficient and faster. For
usage of ICT. Schools from the usage of ICT. and to help in product this application,
use a diverse set of Banks also use ICT to design in the industrial computers, Internet and
ICT tools to clear checks and sector. In the shared software are
communicate, create, handle electronic and industrial sector, needed. In the e-commerce
disseminate, store, and international bank workers, researchers sector, customers,
manage information. transfers. and administrator suppliers and employees
benefits from the benefits from the usage of
usage of ICT. ICT.
Computerised vs Non-Computerised
Computerised Non-
Computerised
more interesting & depends on teachers &
interactive experiences. textbook =.
all transactions are done by banking was done manually.
computers.
Computers and Production was slow because
telecommunications industry everything was done depended
became very popular and on human labour.
profitable since production
can be increased through an
all day operation.

E-commerce plays in Trading was made using


important role in the barter system and it was then
economic scene. It includes later developed into currency.
distribution, buying, selling,
and servicing products that
are done electronically.
IMPACT OF ICT IN SOCIETY

FASTER RELIABLE MODE


LOWER
COMMUNICATION OF
COMMUNICATION
SPEED COMMUNICATION
COST

IMPACT
OF ICT IN
SOCIETY

EFFECTIVE
SOCIAL
SHARING ON
PROBLEMS
INFORMATION

PAPERLESS BORDERLESS
ENVIRONMENT COMMUNICATION
COMPUTER ETHICS
Computer ethics is a system of moral standards or values used as a guideline for computer
users. It is needed to stop the current technology products from being exploited. Ethics is a
moral philosophy where a person makes a specific moral choice and sticks to it. Code of
ethics in computing means moral guidelines to refer to when using the computer and the
Internet.

INTELLECTUAL PROPERTY
Intellectual property refers to any product of human intellect that is unique and has value in the
market place. This covers ideas, inventions, unique name, computer program codes and many
more.

PRIVA CYBER
Privacy in IT refers to data and Cyber law refers to any laws relating to
CY
information privacy. In general, data
LAW
protecting the Internet and other online
include texts, numbers, sounds, images communication technologies.
and video. Information privacy is It is also known as cyber crime law, is
described as the rights of individuals and legislation focused on the acceptable
companies to deny or restrict the behavioral use of technology including
collection and use of information about computer hardware and software, the
them. internet, and networks.
ETHICS
AND LAW
ETHICS LAW
Guideline: As a guideline to computer users. Control: As a rule to control computer user
Moral Standards: Ethical behaviour is judged by Judicial Standards Law: Law is judged by
moral standards. judicial standrads.

No Punishments: No punishment for anyone who Must Follow: Computer users must follow the
violates ethics. regulations and law.

Free to Folow: Computer users are free to follow Punishments: Penalties, imprisonments, and
or ignore the code of ethics. other punishments for those who break the law.

Immoral: Not honouring computer ethics means Depends On Country: Depends on country and
ignoring the moral elements (immoral). state where the crime is committed.

Universals: Universal, can be applied Prevent in Misuisng Computers: To prevent


everywhere, all over the world. misuse of computers.

Produce Ethical Computer Users: To produce Crime: Not honouring the law means
ethical computer users. committing a crime.
INTELLECTUAL
PROPERTY LAWS
Intellectual property laws are needed to establish
and safeguard the intellectual property which refers
to works created by inventors, authors and artists. It
is also needed as businesses today continue to expand
globally. There are four types of Intellectual
Property protection. They are patents forinvention,
trademarks for brand identity, designs for product
appearance and copyright for material.
The Ways to Protect Privacy
PRIVACY LAW
The privacy laws in Malaysia emphasises on thePrivacy following:
1. Security Services to review the security policy
2. Security Management to protect the resources law
3. Security Mechanism to implement the required security services
4. Security Objects, the important entities within the system environment

UTILITIES SOFTWARE
Utilities . Example: anti-spam program, firewall, anti- spyware and
antivirus.software
Authentication and Verification Methods/ Technologies

Methods of authentication
here are two commonly used authentication methods,
which are biometric device and callback system.
Biometric device is a device that translates personal
characteristics into a digital code that is compared
with a digital code stored in the database. Biometric
devices include Fingerprint Recognition, Facial
Recognition, Hand Geogmetry, Iris Scanning, Retinal
Scanning, Voice Recognition and Signature
Verification. Callback system refers to the checking
system that authenticates the user.

methods of verification
Methods of VerificationThere are two methods
used in verification, which are user
identificationand processed object. User
identification refers to the process ofvalidating
the user. Processed object refers to something the
user hassuch as identification card, security token
and cell phone.
EFFECTS OF CONTROVERSIAL CONTENTS ON
SOCIETY
Pornography- can lead to criminal acts such asexploitation of women and
children can lead to sexualaddiction or perversion can develop low moral
valuetowards other men, women or children can erode goodreligious,
cultural and social beliefs and behaviou

Slander Slander: can develop into a society that disregardshonesty and


truth can develop bad habit of spreadinguntruths and rumours can lead to
unnecessary argumentcan cause people to have negative attitudes
towardsanother person
CYBER LAW
Cyber Law is needed as in the recent years, many concerns and
issues were raised on the integrity and security of information,
legal status of online transactions, privacy and confidentiality of
information, intellectual property rights and security of
government data placed on the Internet.

COMPUTER CRIMES BELOW


1. Fraud- wrongful or criminal deception intended to result in financial or personal gain.
2. Copyright Infringement- (at times referred to as piracy) is the use of works protected
by copyright law without permission for a usage where such permission is required
3. Theft- It includes unauthorized access of information and break security like privacy,
password, etc. of any person with the use of internet. The most common types of cyber
theft include identity theft, password theft, theft of information, internet time thefts etc.
4. Attacks- Cyber attacks most commonly involve the following: Malware, in which
malicious software is used to attack information systems. Ransomware, spyware and
Trojans are examples of malware. It is also sometimes called an eavesdropping attack.
Computer Security
Computer security means protecting our computer systems and the
information they contain against unwanted access, damage, destruction or
modification. Three types of computer security are: hardware security
software security/data security network security.
security threats
1. Malicious Code
2. Hacking
3. Natural Disaster
Thank You

You might also like