Professional Documents
Culture Documents
Trends Lucifer Group 3 1
Trends Lucifer Group 3 1
Trends Lucifer Group 3 1
1.Follow the SecureIT advice about IT security. 2.Log 1.Don't access pornographic or obscene material or
out of computer systems when you have finished using material that could offend others. \
them. 2.Don't let anyone else use any of your accounts or tell
3.Remember that all use of IT facilities is logged and anyone your password.
monitored. 3.Don't download videos, music or anything else that's
4.Think carefully about your online conduct to protect copyrighted by other people.
personal information. 4.Don't use IT facilities to bully or harass other people.
5.Keep your operating systems and software up to date. 5.Don't install unlicensed or malicious software. 6.Don't
use IT facilities to advertise goods or services.
7.Don't uninstall security software from your
University-owned devices
Information Communication
Technology
Refers to all the technology used to handle
telecommunications , broadcast media, intelligent building
management systems , audiovisual processing and transmission
systems and network- based control and monitoring functions.
The term covers wireless networks, cell phones , the Internet
and other media for communication.
ICT is perceived to be instrumental in creating a global village ,
which is the world conceived as a single community linked by
telecommunications.
ICT IN EDUCATION
Ø Using digital education contents such as school management system to manage daily routines of the
schools .Specific examples are student registration, allocating timetables, managing student’s attendance ,
managing examination results, managing school accounting and financial processes.
ICT IN MEDICINE
ICT provides easy access to
patient records and medical Using computerized medical equipment such as MRI, CT
knowledge in the medical scanners, EEG , EGG machines
industry, enabling doctors to
analyze patient data for
proper diagnosis and
treatment. Online
appointments also allow
patients to be registered Channeling doctors over the Internet
early, reducing waiting times
and reducing waiting times.
Ø Using CAD (Computer Aided Designing) to design, analysis and optimize designs.
Examples :Construction plans ,Designing vehicles and machines,Using CAM (Computer
Aided Manufacturing) to create 3D models.
Using internet to retrieve financial information’s, currency exchange rates and stock
market.
ICT in Transportation
Booking air tickets over the online air ticket reservation systems.
Computer Gaming
01 02 03
Using computers Using robotics to Using
to analyze crimes. remove land computerized air
mines. defense systems.
Identifying a System’s Weakest Link
Through Strategic and Intuitive thinking
An attacker may target the weakest link in a network because it is a part
that is prone to failure or issues. This can occur in applications,
infrastructure, software systems, or in susceptible individuals to social
engineering. Social engineering is the practice of coercing people into
disclosing private information to commit fraud. It is the weak links that
attackers target, not the strongest ones. Security professionals can use both
strategic and intuitive thinking to find weak points. Strategic thinking
involves a clear risk analysis of available data, often using comparison and
logic. Risk analysis finds less dangerous options by pointing out potential
weak points that an attacker could exploit. Intuitive thinking concentrates
on the weakest portion of the link and its outward appearance. In order to
protect vulnerable points, professionals need to be prepared.
Post-test
Test I. Directions: Write your answers at the back of ¼ sheet of paper
1.The following are social networking sites and mobile apps EXCEPT;
A. Facebook B. Twitter C. Instagram D. Information and Technology
2.What term is being referred to as technology that handles telecommunications,
broadcast media, intelligent building management systems, audiovisual processing
and transmission systems and network-based control and monitoring functions?
A. IT B. ICT C. computers D. Internet Connections
3.Identify the statement to what category does it belong referring to the benefits of
information and communication technology. “ Learning becomes more enjoyable,
and teaching becomes more interactive compared to using the old methods.”
A. Education B. Business C. Medical D. Research
4 . Identify the statement to what category does it belong referring to the benefits of
information and communication technology. “ The work of a writer is made easier by
using word processors and applications and attaching Internet links to documents.”
A. Education B. Business C. Medical D. Research
5.It is the use of deception to manipulate individuals into divulging confidential or
personal information that may be used for fraudulent purposes.
A. link B. strongest link C. weakest link D. social engineering
6.Which of the following statements below is an effective use of ICT?
B. Using your smartphone as the only means to socialize with your friends.
B. Using Facebook as a tool to disseminate new captured selfies.
C. Movies and TV series marathon, for 20 hours, in your brand-new LED TV.
D. Using your computer to make PowerPoint presentations as a supplement, not as a sole
material, for your report
7.The following are the effective use of ICT , EXCEPT;
A. Making research paper with the used of laptap and internet.
B. Using the internet to research information for further knowledge.
C. Using mobile banking for ease of transferring money to other accounts.
D. Using your new cellphone to watch pornographic materials and videos.
8.It refers to the part that is likely to fail, to cause a problem , or to easily break. It is the
easy point for the attackers.
A. link B. strongest link C. weakest link D. problem
9.It is the use of deception to manipulate individuals into divulging confidential or
personal information that may be used for fraudulent purposes.
B. Link B. strongest link C. weakest link D. social engineering
10.This refers to the Management Information System which takes care of report
writing,home school links, attendance ,examination entries, and target setting.
A.MIS B. Learning C.ICT D.IT
Test 2 Directions: For nos 11-15, Identify and analyze the statements below whether the use
of ICT is enslaving , effective , does not affect lives or both enslaving and effective. Write
the letter of your choice before the number on the space provided. Choices are the
following :
A. Enslaving
B. Effective
C. Does not affect lives
D. Both enslaving and effective to the lives of the people
______11. Flooding your Instagram account with lots of glamorous photos to boost your
self esteem..
______12. Using the internet to research information for further knowledge.
______13.Using mobile banking for ease of transferring money to other accounts.
______14. Using your new cellphone to watch pornographic materials and videos.
______15.Gadgets has been used more than 22 hours for leisure purposes.