Top-Rated Free Essay
Preview

Overview of Ict

Good Essays
864 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Overview of Ict
Lesson 1: OVERVIEW OF INFORMATION AND COMMUNICATION TECHNOLOGY (5 hours) 1.1 Computer Literacy for All What is a computer? A computer is an electronic device that performs tasks based on instructions given by the user. Why do we need computers? The answer is clear, in all aspects of daily living – education work, pleasure, entertainment, communication, marketing, business and the like, computer is always present. There are three measurements to assess the level of computer literacy. These are: a. Awareness (be aware of their importance, versatility and pervasiveness in our society) b. Knowledge (learn what computers are and how they function, this requires knowing some technical jargons in order to understand the computer language) c. Interaction (Usage of some simple applications, like doing research via the internet, mailing and chatting electronically) 1.2 Nature of Computers Advantages of Computer a. Speed b. Storage c. Reliability d. Consistent e. Communicate Disadvantages of Computer a. Safety b. Health Risks c. Environment d. Use of Power e. Privacy Violation 1.3 Use of Computers

Principal Areas of Computer Use a. Graphics (picture representation of statistical reports) b. Retailing (barcode) c. Energy (energy companies use computers to locate oil, coal natural gas, and uranium, and to monitor vast power networks) d. Paperwork (printing is minimized because of online processing, final reports) e. Transportation (run rapid transit, safeguard airport take-offs and landings, monitor air traffics and schedule travel) f. Law enforcement (fingerprint, DNA, match traces such as blood on crime scene) g. Money (cashless money through the use of credit and debit cards) h. Agriculture (billing, crop information, cost per acre, feed combinations and market price checks0 i. Government (forecast weather, process immigrants, elections) j. Education (DepEd and CHED requires the integration of computer subjects in every school level from nursery to tertiary) k. Home (usage of personal computers) l. Health and medicine (monitoring of patient from the ICU, diagnosis etc) m. Robotics (opening packages believed to contain bombs) n. Sciences (used for scientific researches) o. Connectivity (allows a person to communicate with other people) p. Human connection (children in particular consider the computer their main educator tool, disabled persons with the help of computers can be productive and more capable) 1.4 History of Computer *refer to PowerPoint Pesentation 1.5 Password Protection When working in a networked environment you will use a user ID and password to access the system. These are use to identify you so that appropriate rights are made available to you while you work. These rights give you access to the drives that you need to use to read and/or write to files. Levels of Password Protection a. User level (can be assigned through the use of operating system, with this type of password protection the computer will boots up and you need to enter your identification and password before you can go any further) Considerations on creating passwords: * Don’t use things someone can associate with you (e.g. your name or your child’s), your date of birth or car registration * Use a mixture of letters and numbers that you can remember but difficult for someone to guess * Don’t tell anyone your password – and change is regularly b. Folders/Directories (some folders on the file server will be shared – several users may have access to them. To ensure that authorized users only access these folders, passwords may be used). c. Files If you have files on any PC that you don’t want other users to be able to view or edit, you may be able to view or edit, you may be able to password-protect them. By using the password-protection features available, the following security features could be available on a networked PC: * A password to access the system * A password to access a shared folder on the network server * A password to access a file * A password to access to allow editing of a file

d. USB/Flash Drives e. Screen Savers 1.6 Hardware and Software Security Hardware can be protected through a. Insurance policies b. Lock on your office/room c. Security cables Threats to Data * Power cuts (where any unsaved data will be lost) * Serious hardware fault * Physical damage (flood or fire) * Theft or other malicious act. 1.7 Computer Viruses A computer virus is software that has been written with the specific purpose of causing havoc on computer systems. It is called a virus because it has been programmed to spread through the system and on to other computer systems. havoc noun. | devastation - destruction - ravage - desolation - ruin |

verb. | ravage - destroy - devastate - ruin - harry - demolish | Other virus can: * Delete files * Corrupt disk/files Basic safety precautions to limit the chances of infection * Install liable anti-virus software on your computer and update it regularly * Use the anti-virus software to scan your system for viruses regularly * Use the anti-virus software to scan any removable disk before you open files on them * Scan any files downloaded from the internet before you open them – viruses are often transmitted in attachments to email * Install only genuine software from reputable sources. * Don’t open attachments to emails or the email messages themselves, from sources that you don’t recognize.

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1330 Unit 4

    • 3225 Words
    • 13 Pages

    Because wireless technology has advanced at such a rapid pace, the earliest WLANs are now essentially obsolete.…

    • 3225 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    A computer can be defined as a set of tools that helps you perform information-processing tasks.…

    • 663 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Chapter 3 Answers

    • 1622 Words
    • 7 Pages

    9) A (n) ________ system requires a program, such as Microsoft Outlook, to be installed…

    • 1622 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    The Outsiders

    • 538 Words
    • 3 Pages

    The Outsiders book by S.E Hinton was eventually made into a movie. They were so much alike because they both were very good from the start. Some things that happened in the book, although they didn’t happen in the movie. You could really tell in both the book and movie the friendship and love with some people.…

    • 538 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Computer –Definition: A computer is a machine which stores data that has been put on there; you are the controller of this machine.…

    • 1181 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Internet - websites (for selling, for promoting organisation and products or services, for obtaining information, for providing services); social media as used by businesses (Facebook, twitter, email); software (word processing, spreadsheets, databases, presentation software, accounting software, customised software designed for specific industries or organisations, email software with calendar, contact list, copying people in, attachments); printers (colour or black and white); storage media…

    • 717 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    ch1 testbank

    • 1626 Words
    • 7 Pages

    3. Convenient, quick access to digital information has the ability to transform all of the following except ________.…

    • 1626 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Computer – The computer can be used for many different things. There are many different purposes for a computer, they can vary from producing documents, sending information to the printer, browsing the internet and managing applications. At work, one of the main reasons we use a computer every day is that we can monitor the security surveillance through the PC and we can see who enters and leaves the building with a magnetic key which must be scanned to use the doors to the building.…

    • 1681 Words
    • 7 Pages
    Satisfactory Essays
  • Powerful Essays

    mindsets

    • 1161 Words
    • 8 Pages

    computing behavior, information privacy, and computer security. Class time and open lab are used to…

    • 1161 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Computer is the aid that created to help people in doing their task. A computer is a type of machine that can process the data according to a list of commands. The word of computer itself was recorded in 1613. It was being associated to a person who does calculations, or computations, and it continued to be used in that manner until the middle of the 20th century. Starting from the end of the 19th century, the word began to describing more common connotation, which means a machine that carries out computations. Based on this connotation, the first computing device that can be found is tally stick and after that Roman Abascus also used in Babylonia as early as 2400BC. Since that, a lot of computing devices have been invented.…

    • 4235 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    The whole glade was even more silent than usual. It was so weird. Normally all of the gladers would sit by the fire, talk and laugh and joke about their day. They would eat and drink a little bit but tonight everything was different. Thomas – the new greenie – ran into the maze to help one of the runners – Minho – to get Alby who was stung out of the maze. But he was too late. The doors closed just a second after the greenie entered the maze. They were dead and everybody knew it.…

    • 540 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The term computer _____ best describes the level of technology skills needed in today’s business.…

    • 550 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    People, who have different types of computers with different operating systems and applications, often need to transfer files and programs among their computers.…

    • 1591 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Introduction to Ict

    • 296 Words
    • 2 Pages

    Information and communication technologies (ICT) is an umbrella term that covers all advanced technologies in manipulating and communicating information. The term is sometimes used in preference to information technology (IT), particularly on these two communities: education and government. The common usage ICT is synonymous assumed the fact that IT or ICT encompasses all mediums, to record information (magnetic disk/tape, optical disks (CD/DVD), flash memory etc. and arguably also paper records); technology for broadcasting information - radio, television; and technology for communicating through voice and sound or images - microphone, camera, loudspeaker, telephone to cellular phones. It includes the wide varieties of computing hardware (PCs, servers, mainframes, networked storage).…

    • 296 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    A computer is a programmable machine. The two principal characteristics of a computer are: it responds to a specific set of instructions in a well-defined manner and it can execute a prerecorded list of instructions (a program).…

    • 884 Words
    • 4 Pages
    Satisfactory Essays