You are on page 1of 238

ITRODUCTION TO

LIVING IN THE
INFORMATION
TECHNOLOGY ERA
Learning outcomes
• Define Information Technology.
• Be acquainted the basic concept of Information and
Communication Technology (ICT).
• Know the role and importance of ICT.
OVERVIEW OF ICT
The term TECHNOLOGY presently
includes advancements in
communication and how information
is handled, thus enabling
governments, organizations,
industries, and ordinary individuals to
improve on their decision-making,
business processes and everyday
living.
Information and communication
technology (ICT)
These are related to
technologies that
facilitate the transfer of
information and various
types of electronically
mediated communication CREDITS:
This presentation template was created by Slidesgo,
(Zuppo, 2012).
including icons by Flaticon, and infographics &
images by Freepik.
Please keep this slide for attribution.
ICT Hierarchy by colrain zuppo
When do we use
the term ICT and
how does it differ
from IT?
Information technology Information communication
technology
• Pertains to the industry that involves • Described as using computers and other
computers, software, networking, and other digital technologies to assist individuals or
IT infrastructure to help relay or manage institutions in handling or using information.
information important in modern-day living as
seen primarily in large companies or • ICT is technology that supports activities
corporations. involving information such as gathering,
processing, storing, and presenting data.
Uses of ICT In Our Daily Lives
• Communication
• Job Opportunities
• Education
• Socializing
Four Basic Periods
of Computer History
Four Basic Periods of Computer History

Pre-mechanical Mechanical Age Electromechanical Electronic Age


Age Age
The Pre-Mechanical age 3,000 BC to 1450 AD

Writing and alphabets

Petroglyphs Ideographs
The Pre-Mechanical age 3,000 BC to 1450 AD

Writing and alphabets

Cuneiform
The Pre-Mechanical age 3,000 BC to 1450 AD
• At around 2000 BC the
Phoenicians created symbols
that expressed single syllables
and consonants (the first true
alphabet)
• Greek adopted the Phoenician
alphabet and added vowels
• Romans gave the letters Latin
name to create the alphabet we
use today
Paper and pens

Sumerians Egyptians Chinese


The first calculator
Abacus- first recorded
adding machine.
Invented in Babylonia
and popularized in
China.
Mechanical Age (1450 – 1840)
First Information Explosion

Johann Guttenberg
– Movable metal
type printing process
in 1450.
Mechanical Age (1450 – 1840)

The first general purpose computers


• John Napier – (1614) a Baron of
Merchiston, Scotland invented LOGS
(Logarithm).
• LOGS – allows multiplication and division
to be reduce in addition and subtraction.
• 1614 – Arabian Lattice – lays out a
special version of the multiplication tables
on a set of four-sided wooden
rods.(multiply, divide large numbers and
find square and cube root)
Mechanical Age (1450 – 1840)

The first general purpose computers


• Wilhelm Shickard – 1623 - (Professor
at University of Tubingen, Germany) –
invented the first mechanical
calculator that can work with six
digits and can carries digits across
columns.

• William Oughtred – (1575 – 1660)


invented the slide rule.
Mechanical Age (1450 – 1840)
• Blaise Pascal (1642) – invented the
Pascaline. (made of clock gears and levers)
that could solve mathematical problems like
addition and subtraction.
• Gottfried Leibniz – (1617) invented Stepped
Reckoner that could multiply 5 digit and 12
digit numbers yielding up to 16 digit
numbers.
• Joseph-Marie Jacquard (1801) developed
the automatic loom (weaving loom) that
was controlled by punched cards.
Mechanical Age (1450 – 1840)
• Charles Xavier Thomas de Colmar -1820 –
developed Arithmometer (the first mass
produced calculator).

• Charles Babbage – invented the difference


engine (1821) and analytical engine (1832). -
Father of modern computer.

• Lady Ada Augusta Lovelace Byron – 1842 –


the first computer programmer.
ELECTROMECHANICAL AGE (1840-1940)
The Beginning of Telecommunications

• Voltaic Battery – first


electric battery known as
voltaic pile.
• Telegraph Samuel F.B.
Morse – conceived of his
version of an
Electromagnetic Telegraph
(1832)
ELECTROMECHANICAL AGE (1840-1940)
Telephone and Radio

• Graham Bell – 1879 -


developed the first working
telephone.
• Guglielmo Marconi – 1894 –
(RADIO) discovered that
electrical waves travel
through space and can
produce and effect far from
the point at which it
ELECTROMECHANICAL AGE (1840-1940)

• Dorr Felt – 1885 – devises


the comptometer, a key
driven adding and
subtracting calculator.
• Comptograph containing
a built-in printer.
ELECTROMECHANICAL AGE (1840-1940)
• Herman Hollerith – father of
information processing.
• Punched Card – provided
computer programmers with a
new way to put information into
their machines.
• He founded the Tabulating
Machine Company , later became
the Computer Tabulating
Recording Company and
International Business Machines
Corporation (IBM)
ELECTROMECHANICAL AGE (1840-1940)

Lee de Forest – 1906 – developed


vacuum tubes This is important for it
provided electrically controlled switch.
ELECTRONIC AGE (1941 – PRESENT)
• Konrad Zuse – 1941 –
built the first
programmable
computer called Z3.

• Howard Aiken – 1942 –


developed Mark I the CREDITS:

first stored program


This presentation template was created by Slidesgo,
including icons by Flaticon, and infographics &
images by Freepik.

computer. Please keep this slide for attribution.


ELECTRONIC AGE (1941 – PRESENT)
• John Atanasoff and
Clifford Berry – 1942 –
completed the first all
electronic computer
called ABC or
Atanasoff-Berry
Computer CREDITS:
This presentation template was created by Slidesgo,
including icons by Flaticon, and infographics &
images by Freepik.
Please keep this slide for attribution.
THANKS!

CREDITS:
This presentation template was created by Slidesgo,
including icons by Flaticon, and infographics &
images by Freepik.
Please keep this slide for attribution.
References
https://www.slideshare.net/nsparanagama/lesson-
4fourbasicperiodofcomputerhistory?fbclid=IwAR1FSNnbniTCpidhbTj6vD
Og4fp7PRck8Ul_BSCc2hewf8M7dYlPXGQbgd0

Eleazar M. et. al. (2019). Living in the Information Literacy Era


References
W. Samuel, S. G. Ajumo, E. C. Anderson and S. Worgu (2016). ICT As A Change
Angent For Socialization and Social Engineering. IOSR Journal of Computer
Engineering (IOSRJCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 4,
Ver. II

https://www.digitalistmag.com/cio-knowledge/2019/02/26/evolution-of-
technologycontinues-what-is-next-in-2019-06196611/

https://bit.ly/30IZ4FO

https://ailynvlla.home.blog/2019/03/04/how-ict-affect-our-daily-life/

https://bit.ly/32Vlpm6

https://www.wikijob.co.uk/content/application-advice/job-applications/what-are-ict-skills

https://bit.ly/2BuODwV
• Very expensive
• Very Large
• Used a lot of
electricity
• Generated a lot of heat
• Relied on machine
language
• Solve one problem at a
time
• Input was based on
punched cards and paper
tape
• Output was displayed on
printouts
• Unreliable
• Need AC
• Non-portable
• Slow input and output
devices
• Smaller
• More energy-
efficient
• More reliable
• Generated a lot
of heat
• Still rely on
punch cards for
input
• Printouts for
output
• Consumed less
power
• More compact in
size
• More reliable and
faster
• Still very costly
• AC required
• Smaller in size
• Reliable and efficient
• Started remote
processing, time-
sharing, multi-
programming
• High Level Programming
• Generated less heat
• Faster
• Lesser maintenance
• Costly
• AC required
• Lesser electricity
• Keyboards & monitors
introduced
• More powerful
• Internet introduced
• Development of GUIs,
mouses, and handheld
devices
• very cheap
• Portable and reliable
• Use of PCs
• Very small in size
• No AC required
• Easily available
• Artificial Intelligence
• High level programming
• Ultra large-scale
integration (ULSI)
• User-friendly interface
• Multimedia features
• Very powerful
• Cheaper rates
• Still in development
Elements of Computer
System and Basic Computer
Components
Start now!
Overview and Pre- Assessment
Learning Outcomes Take this pre-assessment first before
going to the lesson proper.

Upload
Hardware of a Computer Software of a Computer
Overview
Learning Outcomes
This module is specifically At the end of this module, you are expected to:
1. Identify and explain the functions of the elements
crafted to focus on the basic
of the computer system
structure of computer 2. Describe computer Hardware
system, software and 3. Manage to use the different storage devices
hardware of the computer. properly
Hardware
Computer hardware is the collection of
physical elements that constitutes a
computer system. Computer hardware is the
physical parts or components of a computer,
such as the monitor, mouse, keyboard,
computer data storage, hard disk drive
(HDD), graphic cards, sound cards, memory,
motherboard, and so on, all of which are
physical objects that are tangible.
Software
(a) System software
(b) Application software
(c) Operating system
(d) Device Driver
(e) Utility software
People
The most important element of a computer
system is its users. They are also called
live-ware of the computer system.
(a) System Analysts
(b) System Programmers
(c) System Operators
Procedures
Procedure is a step by step series
of instructions to perform a specific
function and achieve the desired
output.
(a) Hardware oriented procedure
(b) Software oriented procedure
(c) Internal procedure
Data
The facts and figures that are fed into a
computer for further processing are called
data. Data is raw until the computer
system interprets it using machine
language, stores it in memory, classifies it
for processing, and produces results in
conformance with the instructions given to
it. Processed and useful data is called
information that is used for decision
making.
Connectivity
When two or more computers are
connected, they can share information
and resources such as sharing of files
(data/music, etc.), sharing of the
printer, sharing of facilities like the
internet, etc. This sharing is possible
using wires, cables, satellite, infra-red,
Bluetooth, microwave transmission,
etc.
Components of Computer
Case

The computer case is a plastic or metal


enclosure that houses most of the
components.
Power Supply
A power supply unit (PSU) converts
alternating current (AC) electric
power to low-voltage DC power for
the internal components of the
computer. Laptops are capable of
running from a built-in battery,
normally for a period of hours.
Motherboard
The motherboard is the main component
of a computer. It is a large rectangular
board with integrated circuitry that
connects the other parts of the
computer including the CPU, the RAM,
the disk drives (CD, DVD, hard disk, or
any others) as well as any peripherals
connected via the ports or the expansion
slots.
INSIDE THE MOTHERBOARD

CPU RAM ROM

BUSES CMOS BATTERY


Central Processing Unit (CPU)
The CPU (Central Processing Unit) performs
most of the calculations which enable a
computer to function and is sometimes
referred to as the “brain” of the computer. It
is usually cooled by a heat sink and fan.
Most new CPUs include an on-die Graphics
Processing Unit (GPU).
Random Access Memory (RAM)

The Random-Access Memory (RAM) stores


the code and data that are being actively
accessed by the CPU.
Read-Only Memory (ROM)
The Read-Only Memory (ROM) stores the
BIOS that runs when the computer is
powered on or otherwise begins execution, a
process known as Bootstrapping, or
“booting” or “booting up”. The BIOS (Basic
Input Output System) includes boot firmware
and power management firmware.
Buses

Buses connect the CPU to various


internal components and to expand
cards for graphics and sound.
CMOS Battery

The CMOS battery is also attached to the


motherboard. This battery is the same as
a watch battery or a battery for a remote
to a car’s central locking system.
Expansion Cards
An expansion card in computing is a printed
circuit board that can be inserted into an
expansion slot of a computer motherboard or
backplane to add functionality to a computer
system via the expansion bus. Expansions
cards can be used to obtain or expand on
features not offered by the motherboard.
Input Devices Output Devices

Input devices allow the user to enter Output devices display information in
information into the system or control a human readable form.
its operation.
INPUT DEVICES

KEYBOARD

Most common and very popular input device


which helps to input data to the computer.
The layout of the keyboard is like that a
traditional typewriter, although there are
some additional keys provided for performing
additional functions.
INPUT DEVICES

Mouse

The mouse is the most popular pointing


device. It is a very famous cursorcontrol
device having a palm-size box with around a
ball at its base, which senses the movement
of the mouse and sends corresponding
signals to the CPU when the mouse buttons
are pressed.
INPUT DEVICES

Joystick
Is also a pointing device, which is used to
move the cursor position on a monitor
screen. It is a stick having a spherical ball
at its both lower and upper ends. The
lower spherical ball moves in a socket.
The joystick can be moved in all four
directions.
INPUT DEVICES

Light Pen

It is a pointing device similar to a


pen. It is used to select a displayed
menu item or draw pictures on the
monitor screen. It consists of a
photocell and an optical system
placed in a small tube.
INPUT DEVICES

Trackball
It is an input device that is mostly used in
a notebook or laptop computer, instead of
a mouse. This is a ball that his half
inserted and by moving fingers on the ball,
the pointer can be moved.
INPUT DEVICES

Scanner
Scanners an input device, which
works more like a photocopy
machine. It is used when some
information is available on paper
and it is to be transferred to the
hard disk of the computer for further
manipulation.
INPUT DEVICES

Digital Digitizer
It is an input that waivers analog
information into digital A digitizer can
convert a signal from the television or
camera into a series of numbers that
would be sent to the computer. They can
be used by the computer to create a
picture of whatever the camera had been
pointed at.
INPUT DEVICES

Microphone

The microphone is an input device


to input sound that is then stored in
a digital form. The microphone is
used for various applications such
as adding sound to a multimedia
presentation or for mixing music.
INPUT DEVICES

Magnetic Ink Card Reader (MICR)


MICR input device is generally used in
banks as the large numbers of cheques to
be processed every day. The bank's code
number and cheque number are printed on
the cheques with a special type of ink
that contains particles of magnetic
material that are machine-readable.
INPUT DEVICES

Optical Character Reader (OCR)

OCR is an input device used to read a printed


text. OCR scans the text optically, character
by character, converts them into a chine-
readable code, and stores the text on the
system memory.
INPUT DEVICES

Bar Code Readers


Bar Code Reader is a device used for
reading bar coded data (data in the
form of light and dark lines).
Barcoded data is generally used in
labeling goods, numbering the
books, etc. It may be a handheld
scanner or may be embedded in a
stationary scanner.
INPUT DEVICES

Optical Mark Reader (OMR)


OMR is a special type of optical scanner
used to recognize the type of mark
made by pea nor pencil. It is used where
one out of a few alternatives is to be
selected and marked.
OUTPUT DEVICES

Monitors

Monitors, commonly called as Visual Display


Unit (VDU), are the main output device of a
computer. It forms images from tiny dots,
called pixels that are arranged in a
rectangular form. The sharpness of the
image depends upon the number of pixels.
OUTPUT DEVICES

Cathode-Ray Tube (CRT) Flat-Panel Display


OUTPUT DEVICES

Printers

The printer is an output device, which is


used to print information on paper. There are
two types of printers −
• Impact Printers
• Non-Impact Printers
IMPACT PRINTERS: CHARACTER PRINTERS

Dot Matrix Printer(DMP) Daisy Wheel


IMPACT PRINTERS: LINE PRINTERS

Drum Printer Chain Printer


NON-IMPACT PRINTERS

Laser Printers Inkjet Printers


OUTPUT DEVICES

SPEAKERS HEADSETS
PRIMARY STORAGE DEVICE

As primary memory is
expensive,
technologies are
developed to optimize
its use. These are
broad types of primary
memory available.
SECONDARY STORAGE DEVICE

Depending on whether
the second memory
device is part of the
CPU or not, there are
two types of secondary
memory – fixed and
removable.
FIXED DEVICES

Hard Disk Drive CD/DVD Drive


REMOVABLE DEVICES

Pen Drive/Thumb Blu Ray Disk


Drive/Flash Disk
STORAGE DEVICES
Historia
References
Bogs De Castro. (2014, June 27). Computer Hardware Servicing Learning Module v.2.0.
Slideshare. https://www.slideshare.net/skyrocker0004/computer-hardware-servicing-
learning-module-v20
Computer Basics. (n.d.). Retrieved August 15, 2020, from
https://www.jyukawa.com/documents/m1-computers-handouts.pdf
Reading: Computer Hardware | Introduction to Computer Applications and Concepts.
(n.d.). Courses.Lumenlearning.Com. Retrieved August 15, 2020, from
https://courses.lumenlearning.com/zeliite115/chapter/reading-hardware-2/
Thank You!
Do you have any questions?

Just message me in my Moodle Account or in Messenger.

CREDITS: This presentation template was created by Slidesgo, including icons


Slidesgo
Mylene.
Slidesgoand infographics & images by Freepik
by Flaticon,
OPERATING
SYSTEM
System Software and Application Software
▪ System software: It is designed to run a
computer’s hardware and application
software, and make the computer system
available for use. It serves as the
interface between hardware, application
software, and the user.

▪ Application software: Programs that allow


a user to perform specific tasks on a
computer
2
3
Operating system: A collection of programs
that manage and coordinate the activities
taking place within a computer system.
Acts as an intermediary between the user
and the computer.

4
Functions of an Operating System
▪ Memory Management
▪ Processor Management
▪ Device Management
▪ File Management
▪ Security
▪ Control over system performance
▪ Job accounting
▪ Error detecting aids
▪ Coordination between other software and users

5
File Management

6
Types of Operating System
▪ Batch operating system
The users of batch operating system do not
interact with the computer directly. Each user
prepares his job on an off-line device like punch
cards and submits it to the computer operator. To
speed up processing, jobs with similar needs are
batched together and run as a group. Thus, the
programmers left their programs with the
operator. The operator then sorts programs into
batches with similar requirements.

7
Types of Operating System
▪ Time sharing is a technique which enables
many people, located at various terminals,
to use a particular computer system at the
same time. Time-sharing or multitasking is
a logical extension of multiprogramming.
Processor’s time which is shared among
multiple users simultaneously is termed as
time-sharing.

8
Types of Operating System
▪ Distributed operating System
Distributed systems use multiple central
processors to serve multiple real time
application and multiple users. Data
processing jobs are distributed among the
processors accordingly to which one can
perform each job most efficiently.

9
Types of Operating System
▪ Network operating System
Network Operating System runs on a server
and provides server the capability to
manage data, users, groups, security,
applications, and other networking
functions. Examples of network operating
systems are Microsoft Windows Server
2003, Microsoft Windows Server 2008,
UNIX, Linux, Mac OS X, Novell NetWare,
and BSD.
10
Types of Operating System
▪ Real Time operating System
Real time system is defines as a data processing
system in which the time interval required to
process and respond to inputs is so small that it
controls the environment. Real time processing is
always on line whereas on line system need not be
real time. For example Scientific experiments,
medical imaging systems, industrial control
systems, weapon systems, robots, and home-
applicance controllers, Air traffic control
system etc.

11
Processing Techniques
▪ Batch processing
Batch processing is a technique in which
Operating System collects one programs
and data together in a batch before
processing starts. Operating system does
the following activities related to batch
processing.

12
Processing Techniques
▪ Multitasking
The ability of an operating system to
have more than one program (task) open at
one time.
▪ Multiprogramming
When two or more programs are residing in
memory at the same time, then sharing the
processor is referred to the
multiprogramming.

13
Processing Techniques
▪ Interactivity
Interactivity refers that a User is
capable to interact with computer system.

▪ Real Time System


Real time systems represents are usually
dedicated, embedded systems.

14
Processing Techniques
▪ Distributed Environment
Distributed environment refers to
multiple independent CPUs or processors
in a computer system.

15
Processing Techniques
▪ Spooling
Spooling is an acronym for simultaneous
peripheral operations on line. Spooling
refers to putting data of various I/O
jobs in a buffer. This buffer is a
special area in memory or hard disk which
is accessible to I/O devices.

16
Processing Techniques
▪ Multiprocessing and parallel processing:
Multiple processors (or multiple cores) are
used in one computer system to perform work
more efficiently
▫ Simultaneous processing: Performs tasks at
the same time
▫ Multiprocessing: Each CPU (or core)
typically works on a different job
▫ Parallel processing: CPUs or cores
typically works together to complete one
job more quickly
17
Processing Techniques
▪ Memory management: Optimizing the use of
main memory (RAM.
▫ Virtual memory: Memory-management
technique that uses hard drive space as
additional RAM.

18
Differences Among Operating Systems
▪ Command line vs. graphical user interface
(GUI)
▪ Most operating systems use GUI today

19
Differences Among Operating Systems
▪ Personal operating system: designed to be
installed on a single computer
▪ Server operating system: designed to be
installed on a network server
▪ Mobile and embedded operating systems also
exist

20
Server Operating Systems

21
Differences Among Operating Systems
▪ Types of processors supported
▫ Desktop, mobile, server, etc. • Number
of processors
▫ 32-bit or 64-bit CPUs
▪ Support for other technologies
▫ New types of buses
▫ Virtualization
▫ Power-saving features
▫ Touch and gesture input

22
Operating Systems for Personal Computers and Servers
▪ DOS: Disk Operating System
▫ PC-DOS: Created
originally for IBM
microcomputers
▫ MS-DOS: used with IBM-
compatible computers
▫ DOS traditionally used a
command-line interface
▫ Can enter DOS commands
in Windows
23
Windows
▪ Windows: The predominate personal operating
system developed by Microsoft Corporation

24
Mac OS
▪ Mac OS: Proprietary operating system for
computers made by Apple Corporation
▫ Based on the UNIX operating system;
originally set the standard for graphical
user interfaces

25
UNIX
▪ UNIX: Operating system developed in the late
1960s for midrange servers

26
LINUX
▪ Linux: Version (flavor) of UNIX available
without charge over the Internet

27
Operating Systems for
Mobile Phones and Other Devices
▪ Windows Mobile: Designed for mobile phones
▫ Look and feel of desktop versions
▫ Current version 6.1, next version to be called
Microsoft Phone.
▪ Windows Embedded: Designed for consumer and
industrial devices that are not personal computers
▫ Cash register, GPS devices, ATMs, medical
devices and robots.
▫ Windows Automotive and Microsoft Auto for cars
▪ Android: Linux based OS developed by Open Handset
Alliance (including Google)
28
Operating Systems for
Mobile Phones and Other Devices

▪ iPhone OS: Designed for Apple Mobile phones


and mobile devices.
▪ BlackBerry Operating System: Designed for
BlackBerry devices
▪ Palm OS and Palm webOS: Designed for Palm
devices
▪ Symbian OS: Designed for use with smart phones
▪ Embedded Linux: Used with mobile phones, GPS
devices, and other mobile devices
29
30
Operating Systems for Larger Computers
▪ Larger computers sometimes use operating
systems designed solely for that type of
system
▪ IBM’s z/OS and i/5OS operating systems are
designed for their servers and mainframes
▪ Windows, UNIX, and Linux are also used with
both mainframes and supercomputers
▪ Often a group of Linux computers are linked
together to form what is referred to as a
Linux supercomputing cluster
31
COMPUTER
NETWORK
What is Network?
Infrastructure is the
basic underlying
physical structure or
framework needed for
the operation of a
service or enterprise.
In the case of
networking,
infrastructure is the
hardware that supports
high-speed
communications and data
transfer. 33
Why Network?

Networks are in wide use


today because they are
practical and useful.
They enable users to
share many things,
including:
▪ Files
▪ Resources
▪ Internet Connections
34
COMPUTER NETWORK DEVICES

NETWORK INTERFACE CARD REPEATER


COMPUTER NETWORK DEVICES

HUB BRIDGE
COMPUTER NETWORK DEVICES

SWITCH ROUTER
COMPUTER NETWORK DEVICES

SERVER GATEWAY
TOPOLOGIES

STAR BUS MESH


NETWORK ARCHITECTURE

CLIENT-SERVER PEER-TO-PEER
NETWORK ARCHITECTURE
NETWORK ARCHITECTURE
NETWORK ARCHITECTURE
Thanks!
ANY QUESTIONS?

44
Cybercrimes
Cyber

It is the characteristics of the


culture of computers,
information, technology and
virtual reality.
Cybercrime
Defined as a crime
in which a computer
is the object of the
crime is used as a
tool to commit an
offense.
Republic Act No. 10175 Cybercrime
Prevention Act of 2012
A law in the Philippines
approved on September
12,2012 which aims to
address legal issues
concerning online
interactions and internet
Republic Act No. 10173 Data Privacy
Act of 2012

An act protecting individual


personal information.
COMMON
FORMS OF
CYBERCRIMES
Copyright Plagiarism Computer Addiction
HACKING

• Infection of IT Systems with Malware – if


the act is committed against critical
infrastructure of the Philippines the,
penalty is between 12-20 years reclusion
temporal
• Six years up to twelve years of
imprisonment also known as prison
mayor.
COMPUTER-RELATED FORGERY, FRAUD
AND/OR IDENTITY THEFT

Maximum of Php 200,000 fine or


prison mayor
ELECTRONIC THEFT

• Copyright Infringement
• Penalty of Php 50,000 –
500, 000 and or prison
mayor
CYBERBULLYING

The Anti-Bullying Act of 2013


(RA 10627)
CYBERSEX

Penalty at least Php 200,000 and or


prison mayor
CHILD PORNOGRAPHY

• Unlawful or prohibited acts defined


and punishable by Republic Act No.
9775 or the AntiChild Pornography
Act of 2009, committed through a
computer system.
• Penalty of 12-20 years of
imprisonment or reclusion temporal
CYBER DEFAMATION

Penalty of 6-12 years of


imprisonment or prison mayor.
Internet Threats
Hacking

Hacking is a term used to describe


actions taken by someone to gain
unauthorized access to a
computer. The availability of
information online on the tools,
techniques, and malware makes it
easier for even non-technical
people to undertake malicious
activities.
Malware

Malware is one of the more


common ways to infiltrate or
damage your computer. Malicious
software that infects your
computer, such as computer
viruses, worms, Trojan horses,
spyware, and adware.
Pharming

Pharming is a common type of


online fraud. A means to point you
to a malicious and illegitimate
website by redirecting the
legitimate URL. Even if the URL is
entered correctly, it can still be
redirected to a fake website.
Phishing

Phishing is used most often by


cyber criminals because it's easy
to execute and can produce the
results they're looking for with
very little effort.
Ransomware

Ransomware is a type of malware


that restricts access to your
computer or your files and
displays a message that demands
payment in order for the
restriction to be removed.
Spam

The mass distribution of


unsolicited messages, advertising
or pornography to addresses
which can be easily found on the
Internet through things like social
networking sites, company
websites and personal blogs.
Spyware (Spyware & Adware)

Software that collects personal


information about you without you
knowing. They often come in the
form of a ‘free' download and are
installed automatically with or
without your consent. These are
difficult to remove and can infect
your computer with viruses.
Trojan Horses

A malicious program that is


disguised as, or embedded within,
legitimate software. It is an
executable file that will install
itself and run automatically once
it's downloaded.
Viruses

Malicious computer programs that


are often sent as an email
attachment or a download with the
intent of infecting your computer,
as well as the computers of
everyone in your contact list. Just
visiting a site can start an
automatic download of a virus.
Wi-Fi Eavesdropping

WiFi eavesdropping is another method used by cyber criminals to


capture personal information. Virtual “listening in” on information
that's shared over an unsecure (not encrypted) WiFi network.
Worms

A worm, unlike a virus, goes to


work on its own without attaching
itself to files or programs. It lives
in your computer memory, doesn't
damage or alter the hard drive and
propagates by sending itself to
other computers in a network.
References

• https://www.investopedia.com/terms/c/cloud-computing.asp
• https://computer.howstuffworks.com/cloud-computing/cloud-storage.htm
• https://www.youtube.com/watch?v=dH0yz-Osy54
• https://www.youtube.com/watch?v=QJncFirhjPg
• LIVING IN THE IT ERA Instructional Materials for Students, PUP
Thanks!
CREDITS: This presentation template was created by Slidesgo, including
icons by Flaticon, infographics & images by Freepik and illustrations by
Stories
Please keep this slide for attribution

You might also like