You are on page 1of 47

E M P O W E R M E N T

TECHNOLOGY
EMPOWERMENT
- refers to the process of giving
yourself, or other people, the
capacity to achieve a specific
end-goal.
E M PE OM W
P OE WR EM RE MN E T N T
TECHNOLOGY
- refers to a strategy that aims to give individuals
the tools and resources necessary to take
initiative, as well as gather and analyze
information or situations, thus making informed
decisions to solve problems and improve services
or performance.
INFORMATION AND COMMUNICATION

TECHNOLOGY
- deals with the use of different
communication technologies such as
mobile phones, telephone, Internet, etc. to
locate, save, send, and edit information.
INFORMATION AND COMMUNICATION
TECHNOLOGY
• Empowers individual and give impact to the society.
• The demands in the workplace have also changed
dramatically.
• According to Harvard Business Review (2012), the top three
requirements for applicants today are (1) ICT skills, (2)
Communication skills, (3) Analytical Skills.
• The focus of technological advancement today is actually on
integration of technology knowledge and skills in the 4Cs or
21st century skills and students’ college readiness.
INFORMATION & COMMUNICATION

TECHNOLOGY
WEB 1.0
• Static (also known as flat page or
stationary page) in the sense that the
page is “as is” and cannot be
manipulated by the user. The content is
also the same for all users.
Websites are accessed using
Uniform Resource Locators
(URLs) interlinked using
hypertext links and accessed
via the Internet.
AI AND ADVANCED MACHINE LEARNING
• This is composed of many
technologies and techniques (deep
learning, neural networks, and
natural-language processing) that
make smart things “intelligent”.
INTELLIGENT APPS
• Virtual personal assistants, like
Siri and Google Home that perform
some human assistance functions,
making tasks easier.
INTELLIGENT THINGS
• This refers to the physical things that
are imbued with machine learning
capabilities through rigid programming.
Examples are autonomous cars (Google
Cars), drones, Internet of Things (IoT)
smart appliances, and many more.
VIRTUAL AND AUGMENTED REALITY
• This refers to the immersive technologies
that are now dominating the market. Basic
virtual reality is now accessible to
consumers through different wearables,
like VR boxes that are cheap, and
smartphones capable enough of running VR
apps.
DIGITAL TWIN
• This refers to the dynamic software
model of a machine or a thing or
system that uses data from various
sensors to do autonomous actions
such as comprehension, reaction, and
improvement of operations.
156 ÷ 2 = 78 0
78 ÷ 2 = 39 0
.5
39 ÷ 2 = 19.5 1
.5
19 ÷ 2.5= 9.5 1
9 ÷ 2 = 4.5 1
2÷2=1 0
1 ÷ 2 ==0.5
0.5 1
Internet
defined as the information superhighway. This
means that anyone has access to this
highway, can place and grab information. Any
information that you set privately can be
access on way or another.

27
Malware /ˈmalwer/
– stands for Malicious Software

Virus – a malicious program designed


to replicate itself and transfer from one
computer to another either through the
internet and local networks or data
storage like flash drives and CD’s.
28
Worm
– a malicious program that transfers from one
computer to another by any type of means, often it
uses a computer networks to spread itself.

Example:
ILOVEYOU worm (love bug worm)
created by a Filipino back in 2000s.

29
Trojan
a malicious program that is disguised as a useful
program but once downloaded or installed, leaves
your PC unprotected and allows hackers to get your
information.

30
Example for Trojan:

Ransomware Trojans
- is designed to extort money from
Damage Cost:
a victim. Demands a payment in $11.5 Billion (2019)
order to undo changes that
the Trojan virus has made to the
victim's computer.

31
SPYWARE
– a program that runs in the background without you
knowing it (thus called “Spy”). It has the ability to
monitor what you are currently doing and typing
through keyloggers.

Keyloggers – it can record email,


messages, or any information you
type using you keyboard.

32
ADWARE
a program designed to send you advertisements,
mostly as pop-ups.

Spam/spam/
– unwanted email mostly from bots or
advertisers. It is use to send malware.
33
Phishing
The goal is to acquire sensitive
personal information.

It sends an email that directed to


the user to visit a website and
asked to update his/her username,
password, credit card and
personal information. 34
Pharming
a more complicated way of
phishing where it exploits the
DNS (Domain Name Service)
system.

35
VERIFICATION
ONLINE SOURCE MATERIAL

It is best to do your research far ahead of the


deadline to allow yourself some time to evaluate and
verify the sources of your homework.
Follow the criteria below when evaluating your source material:

▸ Currency – Is the information up-to-date?


▸ Security – Does the site ask too much personal information?
▸ Scope – is the information in-depth?
▸ Authority – Does the information come from a trusted expert?
THE FOLLOWING ARE SOME OF THE GOOD PRACTICES
WHEN USING THE INTERNET:
1. Always keep your software or application updated
and uninstall the ones that you do not use.
2. Do not reveal sensitive information online,
especially on unsafe websites.
3. Be careful when dealing with emails from
unknown sources or spam.
4. Run your antivirus software before going online.
5. Think before you click. What you post on the
internet may stay online forever.
10 COMMANDMENTS OF COMUPTER ETHICS

1 Do not use a computer to harm other people.

2 Do not interfere with other people's computer work.


Do not snoop around in other people's computer files.
3

Do not use a computer to steal.


4

Do not use a computer to bear false witness.


5
Do not copy or use proprietary software for which you have not
6
paid (without permission).
Do not use other people's computer resources without
7
authorization or proper compensation.
8 Do not appropriate other people's intellectual output.
Do think about the social consequences of the program you are
9
writing or the system you are designing.
Do always use a computer in ways that ensure consideration
10
and respect for other humans
COPYRIGHT
a part of the law, wherein you have the
rights to your work, and anyone who uses
it without your consent is punishable by
law. ✓ Art works ✓ Music
✓ Images ✓ Movies
✓ Novels
COPYRIGHT INFRINGEMENT
As a general matter, copyright
infringement occurs when a copyrighted
work is reproduced, distributed,
performed, publicly displayed, or made
into a derivative work without the
permission of the copyright owner.
PLAGIARISM
to "plagiarize" means: to steal and pass
off (the ideas or words of another) as
one's own.
Here are some tips that could help you avoid copyright
infringement:
1. Understand –This means that you can express
something using your own words, but you should
give credit to the source.
2. Be Responsible – be responsible enough to know if
something has a copyright.
3. Be Creative – It is important to have your
own creative strategies in the project.
4. Know the Law – Copyrights only last a
lifetime (of the author) plus 50 years.
WAYS TO AVOID PLAGIARISM:
1. Paraphrase – Read the material you wish to use
and rephrase it in your own words.
2. Cite – proper citation must observe when
referencing existing materials; citation often
requires the name of the author of the material
you intend to reference and the publication date.
3. Referencing – it is also important to provide a
page for references and other materials used
at the end of your work.
FAIR USE
Fair use permits a party to use a copyrighted
work without the copyright owner's permission
for purposes such as criticism, comment,
news reporting, teaching, scholarship, or
research. These purposes only illustrate what
might be considered as fair use and are not
examples of what will always be considered as
fair use.
APA FORMAT citation

Title: Exploring Natural Science: Physical Science Senior High School


Year:2016
Author: Rocelia M. De Villa
Publisher: Don Bosco Press, Inc.

De Villa, R. (2016). Exploring Natural Science: Physical


Science Senior High School, Don Bosco Press, Inc.

You might also like