Trends Lucifer Group 3 1

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 26

Dimensions of

Technology that are


Enabling and
Inhibiting
Trends, Networks and Critical
Thinking in the 21st Century

Presented by: GROUP


3
Pre-test
Direction: Get ¼ sheet of paper.
1.What term is being referred to as technology that handles telecommunications, broadcast
media, intelligent building management systems, audiovisual processing and transmission
systems and network-based control and monitoring functions?
A. IT B. ICT C. computers D. Internet Connections
2.The following are social networking sites and mobile apps EXCEPT;
A. Facebook B. Twitter C. Instagram D. Information and Technology
3.The following are functions of Information and Communication Technology EXCEPT; A.
Technical function C. Decision-making support
B. Infrastructure function D. Hacking personal datas
4.Identify the statement to what category does it belong referring to the benefits of
information and communication technology. “ Learning becomes more enjoyable, and
teaching becomes more interactive compared to using the old methods.”
A. Education B. Business C. Medical D. Research
5. Identify the statement to what category does it belong referring to the
benefits of information and communication technology.”Information and
communications technology has also made shopping a lot esier.”
A. Education B. Business C. Medical D. Research
6. Identify the statement to what category does it belong referring to the
benefits of information and communication technology.” Information and
communications technology provides easy access to a patient’s record and
medical information.”
B. Education B. Business C. Medical D. Research
7. Identify the statement to what category does it belong referring to the
benefits of information and communication technology. “ The work of a
writer is made easier by using word processors and applications and attaching
Internet links to documents.”
A. Education B. Business C. Medical D. Research
8.It refers to the part that is likely to fail, to cause a problem , or to easily
break.It is the easy point for the attackers.
A.link B. strongest link C. weakest link D. problem
9.It is the use of deception to manipulate individuals into divulging
confidential or personal information that may be used for fraudulent
purposes.
A.link B. strongest link C. weakest link D.social engineering
10.Who are the ones who manipulate people to break into the security
wall?
A. Practitioners of social engineering
B. Practitioners of school
C. Practitioners of the Information Technology
D. Practitioners of the Information and communication technology.
11.This refers to the Management Information System which takes care
of report writing,home school links, attendance ,examination entries, and
target setting.
A.MIS B. Learning C.ICT D.IT
12.This includes storing grades electronically and making them available
to teachers.
A.MIS B. Learning C.ICT D.IT
13.This is about projecting the right image of the school through its
website, which provides the public an idea about the school.
A.MIS B. Learning C.ICT D.communication
tool
14.Attackers look for what appears to be the _______ link , not what
appears to be the the strongest link.
A. weakest B.weak C.weaker D.stronger
15.A ___ practitioner employs risk analysis by identifying the options which
are less risky, in other words they identify the weakest links which attackers
may exploit.
A. security B. ICT personnel C. teacher D. web navigator

"Honesty is the first chapter in the book of wisdom."


Dimensions of Technology that are
Enabling and Inhibiting
 ICT in education utilizes data and communication
technology to enhance learning and Teaching strategies.
Research by the national institute of multimedia education
in Japan Shows that increased ICT use and integration into
educational plans significantly Improve students'
performance, fostering better information, creativity, and
willingness to engage in learning.
DO'S AND DON'TS of using
ICT tools. DO’S DON’TS

1.Follow the SecureIT advice about IT security. 2.Log 1.Don't access pornographic or obscene material or
out of computer systems when you have finished using material that could offend others. \
them. 2.Don't let anyone else use any of your accounts or tell
3.Remember that all use of IT facilities is logged and anyone your password.
monitored. 3.Don't download videos, music or anything else that's
4.Think carefully about your online conduct to protect copyrighted by other people.
personal information. 4.Don't use IT facilities to bully or harass other people.
5.Keep your operating systems and software up to date. 5.Don't install unlicensed or malicious software. 6.Don't
use IT facilities to advertise goods or services.
7.Don't uninstall security software from your
University-owned devices
Information Communication
Technology
 Refers to all the technology used to handle
telecommunications , broadcast media, intelligent building
management systems , audiovisual processing and transmission
systems and network- based control and monitoring functions.
 The term covers wireless networks, cell phones , the Internet
and other media for communication.
 ICT is perceived to be instrumental in creating a global village ,
which is the world conceived as a single community linked by
telecommunications.
ICT IN EDUCATION

Ø Using Virtual Learning Environments for distance education

Ø Using Video trainings

Ø Using digital education contents such as school management system to manage daily routines of the
schools .Specific examples are student registration, allocating timetables, managing student’s attendance ,
managing examination results, managing school accounting and financial processes.
ICT IN MEDICINE
ICT provides easy access to
patient records and medical Using computerized medical equipment such as MRI, CT
knowledge in the medical scanners, EEG , EGG machines
industry, enabling doctors to
analyze patient data for
proper diagnosis and
treatment. Online
appointments also allow
patients to be registered Channeling doctors over the Internet
early, reducing waiting times
and reducing waiting times.

Using Tele medicine , the use of medical information


exchanged from one site to another via electronic
communications to improve patient’s clinical health status.
ICT IN AGRICULTURE

Using computerized agricultural equipment for instance using computerized


feeders for diary cows, computerized milk processing systems, computerized
controlled green houses.

Using internet and email to disseminate information on research


information, market prices , agricultural instructions

Managing and analyzing information of research and experiments.


ICT in Engineering

Ø Using CAD (Computer Aided Designing) to design, analysis and optimize designs.
Examples :Construction plans ,Designing vehicles and machines,Using CAM (Computer
Aided Manufacturing) to create 3D models.

Ø Using robotics in manufacturing plants.

Ø Computers can be used in different types of fields in engineering such as Electronic


engineering ;Electrical engineering ;Industrial engineering; Mechanical engineering
ICT in Banking and Finance

Using internet for banking transactions such as E banking

Using ATM/ Automated teller Machines Ø Using networking to inter-connect


branches

Using electronic payment methods in e – commerce such as credit card, paypal.

Using internet to retrieve financial information’s, currency exchange rates and stock
market.
ICT in Transportation

Using air traffic control systems.

Booking air tickets over the online air ticket reservation systems.

Controlling traffic jams using computerized traffic controlling


systems.
ICT in Entertainment

Computer Gaming

Animating, Editing in film industry

Using computers for music composing

Using portable music players such as iPod ,Mobile phones

Purchasing digital contents on-line example ,Apple iTunes


ICT in Security and Defense

01 02 03
Using computers Using robotics to Using
to analyze crimes. remove land computerized air
mines. defense systems.
Identifying a System’s Weakest Link
Through Strategic and Intuitive thinking
An attacker may target the weakest link in a network because it is a part
that is prone to failure or issues. This can occur in applications,
infrastructure, software systems, or in susceptible individuals to social
engineering. Social engineering is the practice of coercing people into
disclosing private information to commit fraud. It is the weak links that
attackers target, not the strongest ones. Security professionals can use both
strategic and intuitive thinking to find weak points. Strategic thinking
involves a clear risk analysis of available data, often using comparison and
logic. Risk analysis finds less dangerous options by pointing out potential
weak points that an attacker could exploit. Intuitive thinking concentrates
on the weakest portion of the link and its outward appearance. In order to
protect vulnerable points, professionals need to be prepared.
Post-test
Test I. Directions: Write your answers at the back of ¼ sheet of paper
1.The following are social networking sites and mobile apps EXCEPT;
A. Facebook B. Twitter C. Instagram D. Information and Technology
2.What term is being referred to as technology that handles telecommunications,
broadcast media, intelligent building management systems, audiovisual processing
and transmission systems and network-based control and monitoring functions?
A. IT B. ICT C. computers D. Internet Connections
3.Identify the statement to what category does it belong referring to the benefits of
information and communication technology. “ Learning becomes more enjoyable,
and teaching becomes more interactive compared to using the old methods.”
A. Education B. Business C. Medical D. Research
4 . Identify the statement to what category does it belong referring to the benefits of
information and communication technology. “ The work of a writer is made easier by
using word processors and applications and attaching Internet links to documents.”
A. Education B. Business C. Medical D. Research
5.It is the use of deception to manipulate individuals into divulging confidential or
personal information that may be used for fraudulent purposes.
A. link B. strongest link C. weakest link D. social engineering
6.Which of the following statements below is an effective use of ICT?
B. Using your smartphone as the only means to socialize with your friends.
B. Using Facebook as a tool to disseminate new captured selfies.
C. Movies and TV series marathon, for 20 hours, in your brand-new LED TV.
D. Using your computer to make PowerPoint presentations as a supplement, not as a sole
material, for your report
7.The following are the effective use of ICT , EXCEPT;
A. Making research paper with the used of laptap and internet.
B. Using the internet to research information for further knowledge.
C. Using mobile banking for ease of transferring money to other accounts.
D. Using your new cellphone to watch pornographic materials and videos.
8.It refers to the part that is likely to fail, to cause a problem , or to easily break. It is the
easy point for the attackers.
A. link B. strongest link C. weakest link D. problem
9.It is the use of deception to manipulate individuals into divulging confidential or
personal information that may be used for fraudulent purposes.
B. Link B. strongest link C. weakest link D. social engineering
10.This refers to the Management Information System which takes care of report
writing,home school links, attendance ,examination entries, and target setting.
A.MIS B. Learning C.ICT D.IT
Test 2 Directions: For nos 11-15, Identify and analyze the statements below whether the use
of ICT is enslaving , effective , does not affect lives or both enslaving and effective. Write
the letter of your choice before the number on the space provided. Choices are the
following :
A. Enslaving
B. Effective
C. Does not affect lives
D. Both enslaving and effective to the lives of the people
______11. Flooding your Instagram account with lots of glamorous photos to boost your
self esteem..
______12. Using the internet to research information for further knowledge.
______13.Using mobile banking for ease of transferring money to other accounts.
______14. Using your new cellphone to watch pornographic materials and videos.
______15.Gadgets has been used more than 22 hours for leisure purposes.

“It takes strength and courage to admit the truth.”


Activity: Get 1whole sheet paper and copy & answer, By group.
ASSIGNMENT
Thank you!!!!!

You might also like