You are on page 1of 6

REVIEWER IN ITE-GEE

WEEK 2 LIVING IN IT ERA

Information is data that has been processed and organized in a meaningful and useful way. It
can be text, numbers, images, or sounds.

Technology is the application of scientific knowledge for practical purposes. It includes the
development of tools, machines, and systems that can be used to create, store, process, and
transmit information.

HOW INFORMATION TECHNOLOGY CHANGED OUR LIFE

 We can now access information from anywhere in the world, at any time,thanks to the
internet.
 We can communicate with others instantly, using email, text messaging,and video chat.
 We can work from anywhere, thanks to mobile devices and remote accesstechnologies.
 We can shop online, track our finances, and manage our health care from home.
 We can learn new things and stay entertained with online courses, games,and movies.

IT HAS BECOME AN INTEGRAL PART OF DAILY LIFE AND VARIOUS FIELDS

In daily life: We use IT for everything from communication and entertainment to shopping and
banking.

In business: IT is used in business to automate tasks, improve efficiency, and make better decisions.
Businesses use computers and other devices to track inventory, manage finances, and communicate
with customers. They also use IT to develop new products and services, and to market them to
customers.

In education: IT is used in education to provide students with access to information and resources, to
deliver instruction, and to assess student learning. Students use computers and other devices to
research topics, collaborate on projects, and take online courses. Teachers use IT to create and deliver
lesson plans, grade assignments, and communicate with parents.

In government: IT is used by governments to provide services to citizens, to manage finances, and to


protect national security. Governments use computers and other devices to collect data, issue licenses
and permits and deliver benefits to citizens. They also use IT to track crime, prevent terrorism, and
respond to natural disasters.

INFORMATION TECHNOLOGY INTEGRATION-

Fostering student engagement

Making learning more engaging and interactive: IT can be used to create interactive and multimedia
learning experiences that are more engaging and motivating for students.

Providing access to resources: IT can be used to provide students with access to a wide range of
resources, including textbooks, articles, and videos. This can help students to learn more about the topics
they are studying.

Supporting differentiated instruction: IT can be used to support differentiated instruction, which is


the practice of tailoring instruction to the individual needs of students.

Promoting collaboration and communication: IT can be used to promote collaboration and


communication among students. For example, students can use online forums and chat rooms to discuss
their work, or they can work together on collaborative projects.

Personalizing the learning experience: IT can be used to personalize the learning experience for each
student.
Benefits of integrating IT in education:

Improved learning outcomes: IT can help students to learn more effectively by providing
them with access to a wider range of resources, allowing them to collaborate with others, and
personalizing the learning experience.

Increased motivation: IT can make learning more engaging and motivating for students by
using interactive and multimedia content.

Fostered creativity: IT can help students to develop their creativity by allowing them to create
their own digital projects.

Prepared for the future: IT skills are essential in the 21st century workforce. By integrating IT
into education, students can learn the skills they need to succeed in the future.

How technology can be used to aid in understanding Education concepts

Virtual reality (VR) and augmented reality (AR): VR and AR are emerging technologies that
can be used to create immersive learning experiences. For example, students can use VR to
explore historical sites or to learn about the human body.

Gamification: Gamification is the use of game-like elements in non-game contexts. For


example, students can earn points or badges for completing learning activities.

Data analytics: Data analytics can be used to track student progress and identify areas
where they need additional support. This information can then be used to personalize the
learning experience for each student.

Artificial intelligence (AI): AI can be used to create intelligent tutoring systems that can
provide personalized instruction to students.

IMPACTS OF IT IN THE EDUCATION SECTOR

Personalized learning: IT can be used to personalize the learning experience for each student.
This can be done by providing students with access to different learning materials and activities,
or by tracking their progress and providing them with feedback.

Collaboration: IT can be used to facilitate collaboration among students and teachers. This can
be done through online forums, chat rooms, and video conferencing.

Access to resources: IT can be used to provide students with access to a wide range of
resources, including textbooks, articles, and videos. This can help students to learn more about
the topics they are studying.

Assessment: IT can be used to assess student learning in a variety of ways, including online
quizzes and tests. This can help teachers to track student progress and identify areas where they
need additional support.

Teacher training: IT can be used to train teachers on how to use technology effectively in the
classroom. This can help teachers to create more engaging and effective learning experiences for
their students.

Administration: IT can be used to automate administrative tasks, such as grading papers and
scheduling classes. This can free up teachers' time so they can focus on teaching.
Specific examples of how technology is being used to enhance the Education
Sector
Virtual reality (VR) and augmented reality (AR): VR and AR are emerging technologies that can be
used to create immersive learning experiences. For example, students can use VR to explore historical
sites or to learn about the human body.

Gamification: Gamification is the use of game-like elements in non-game contexts. For example,
students can earn points or badges for completing learning activities.

Data analytics: Data analytics can be used to track student progress and identify areas where they need
additional support. This information can then be used to personalize the learning experience for each
student.

Artificial intelligence (AI): AI can be used to create intelligent tutoring systems that can provide
personalized instruction to students.

Online learning platforms: Online learning platforms offer a variety of courses and resources that can be
accessed at any time. This can be a great option for students who want to learn at their own pace or who
cannot attend traditional classes.

E-books and audiobooks: E-books and audiobooks can be a great way for students to access learning
materials without having to carry around heavy textbooks. They can also be customized to the student's
needs, such as font size and reading speed.

Social media: Social media can be used to connect with students and teachers, share learning materials,
and collaborate on projects. It can also be used to provide feedback and support to students.

Webcams and video conferencing: Webcams and video conferencing can be used to connect with
students and teachers in real time. This can be a great way for students to participate in class discussions
or to get help from a teacher.

Digital whiteboards: Digital whiteboards can be used to present information, conduct activities, and
collaborate with students. They can also be used to record lessons for students to review later.

WEEK 3 4 Basic Computers Period


EVOLUTION OF TECHNOLOGY

PREMECHANICAL AGE (3000 BC - 1450 AD): This is the period before the invention of the
abacus. Humans used simple tools and techniques to perform calculations, such as counting on
their fingers, using stones or sticks, or drawing pictures.

MECHANICAL AGE (1450 - 1840): This period saw the invention of the abacus, the first
mechanical calculator. Other notable inventions during this period include the logarithm, the
slide rule, and the difference engine.

ELECTRO MECHANICAL AGE (1840 - 1940): This period saw the development of
electromechanical computers, which used electric motors and switches to perform calculations.
The most famous electromechanical computer is the Analytical Engine, designed by Charles
Babbage in the 19th century

ELECTRONIC AGE (1940 - PRESENT): This is the current period, which is characterized by
the use of electronic components, such as vacuum tubes and transistors, to build computers. The
first electronic computer, the ENIAC, was built in 1946. Since then, computers have become
smaller, faster, and more powerful.
5 GENERATIONS OF COMPUTER

The first generation of computers used vacuum tubes as their main components. 1946-1959

The second generation of computers used transistors instead of vacuum tubes. 1959-1965

The third generation of computers used integrated circuits (ICs). 1965-1971

The fourth generation of electronic computers uses microprocessors. Microprocessors are ICs
that contain the entire central processing unit (CPU) on a single chip. 1971-Present

The fifth generation of computers is still in development, but it is expected to use artificial
intelligence (AI) technology. AI computers will be able to learn and make decisions on their
own, without human intervention. 1980-Present

WEEK # 4 ICT SECURITY

ICT security, or information and communication technology security, is the protection of


information systems and networks from unauthorized access, use, disclosure, disruption,
modification, or destruction.

ASPECTS OF ICT SECURITY

PHYSICAL SECURITY This includes protecting the physical infrastructure of IT systems,


such as servers, routers, and switches.

NETWORK SECURITY This includes protecting the networks that connect IT systems, such
as firewalls and intrusion detection systems.

APPLICATION SECURITY This includes protecting the software that runs on IT systems,
such as web applications and databases

DATA SECURITY This includes protecting the data that is stored on IT systems, such as
passwords, credit card numbers, and medical records.

OPERATIONAL SECURITY This includes the policies and procedures that are put in place to
protect IT systems, such as user training and incident response plans.

DIFFERENT THREATS IN THE CYBER-WORLD

PROGRAM THREATS This includes protecting the physical infrastructure of IT systems, such
as servers, routers, and switches.

SECURITY THREATS This includes protecting the networks that connect IT systems, such as
firewalls and intrusion detection systems.

PROGRAM THREATS
Viruses are programs that replicate themselves and spread to other computers. They can damage
files, steal data, or even lock up a computer.

Worms are similar to viruses, but they do not need to attach themselves to other files to spread.
They can spread through email, instant messaging, or other network connections.
Trojan horses are programs that appear to be harmless, but they actually contain malicious code.
They can steal data, install other malware, or even take control of a computer.

Ransomware is a type of malware that encrypts a computer's files and demands a ransom
payment to decrypt them.

Spyware is a type of malware that collects information about a user's computer activity, such as
browsing history and keystrokes. This information can then be used to steal personal data or
track a user's online activity.

SECURITY THREATS

A human error is an action or decision which was not intended. A violation is a deliberate
deviation from a rule or procedure.

Technical vulnerabilities are weaknesses in your operating systems, infrastructure, or software.


When attackers detect a vulnerability, they can exploit it with malicious code to gain access
privileges.

Natural disasters can severely damage the computer system directly, or avoid its operations.
These includes are as follows − It can be local flooding such as fracture of air conditioning or
water cooling equipment. It can be local landslide, earth quake, subsidence.

Data breaches are incidents in which sensitive data is stolen or lost. This can include personal
information, financial data, or intellectual property.

Malware attacks are attempts to infect a computer system with malware. This can be done
through a variety of ways, such as downloading a file from an untrusted source or opening an
infected attachment in an email.

Phishing attacks are attempts to trick people into revealing their personal information, such as
passwords and credit card numbers.

Denial-of-service attacks are attempts to make a computer system or network unavailable to its
users. This can be done by flooding the system with traffic or by exploiting a vulnerability in the
system.

Social engineering attacks are attempts to trick people into doing something that they should
not do, such as clicking on a malicious link or giving out their personal information.

FUNDAMENTALS OF CYBERSECURITY

Non-repudiation ensures that the sender of a message cannot deny sending it, and the recipient
cannot deny receiving it.

Risk management is the process of identifying, assessing, and mitigating risks to information
systems and networks.

Authentication is the process of verifying the identity of a user or system.

Accountability ensures that actions can be traced back to the individuals who performed them.

Authorization is the process of granting users or systems the right to access resources.

Confidentiality refers to the protection of information from unauthorized access. Only


authorized individuals should be able to access confidential information.
Integrity refers to the accuracy and completeness of information. Information should not be
modified without authorization.

Availability refers to the accessibility of information when it is needed. Information should be


available to authorized users when they need it.

Security controls are the measures that are put in place to protect information systems and
networks. Security controls can be technical, physical, or procedural.

Incident response is the process of responding to security breaches and other incidents.

Contingency planning is the process of developing plans for responding to unexpected events,
such as natural disasters or cyberattacks.

SPECIFIC SECURITY CONTROL FOR SECURITY TRIAD

CONFIDENTIALITY

Access control: This is the process of restricting access to information to authorized individuals.
Encryption: This is the process of converting information into a form that cannot be read
without a special key.

Data masking: This is the process of obscuring sensitive information, such as credit card
numbers or social security numbers.

INTEGRITY

Checksums: This is a mathematical value that is calculated from a file and used to verify the
accuracy of the file.

Digital signatures: This is a mathematical technique that allows the sender of a message to
verify its authenticity and integrity.

Change management: This is the process of tracking and controlling changes to information
systems.

AVAILABILITY

Backups: This is the process of creating copies of information in case of a disaster.

Disaster recovery planning: This is the process of developing plans for recovering from a
disaster.

Fault tolerance: This is the ability of a system to continue to function even if some of its
components fail.

RISK ASSESSMENT AND RISK MANAGEMENT

RISK ASSESSMENT is the process of identifying, evaluating, and prioritizing risks. It involves
identifying the potential threats to an organization's assets, assessing the likelihood and impact of
each threat, and then prioritizing the risks based on their potential impact.

RISK MANAGEMENT is the process of taking steps to reduce or eliminate risks. It involves
implementing controls to mitigate the risks that have been identified, monitoring the
effectiveness of those controls, and adjusting the controls as needed.

You might also like