app 001 Flashcards
It is a variety of technologies that facilitate communications
INFORMATION and COMMUNICATION TECHNOLOGY (ICT)
There is a growing demand for educational institutions to use ICT to teach the skills and knowledge students need for the 21st century
The Function of ICT
Is the raw material of any ICT system and this is proccessed by the system to provide the information which is the output produced by the system
DATA
These are the physical components that make up the ICT system. If you can touch it then t is a
HARDWARE
These are the computer programs which provide step by step information to the hardware
SOFTWARE
The results from processing data. It is the output of an ICT system.
INFORMATION
There are the series of actions conducted in a specific order to make sure that the system runs smoothly. It determine what needs to be done
PROCEDURE
Are needed to supply data to the ICT system and also to make judgements and decisions from the output supplied from the system.
PEOPLE
Improve communication with suppliers and customers
FOR BUSINESS AND ORGANIZARTIONS
It is use to technology as a mental instrument by the students, which supports their learning and promotes the achievement of their learning goals
FOR EDUCATION
People use technology to gratify their information needs
FOR INDIVIDUAL
networking websites
Facebook, yt, WhatsApp, ig, tiktok, tblr, twt, pins, reddit, snapc
search engines
google, yahoo, Bing, Baidu, DuckDuckGo
online storage
Dropbox, OneDrive, google drive
collaborative tools nd web apps
google apps, Prezi, office 365, flow dock, slack
are a system of moral principles or rules that say what is and is not acceptable. It came from the Greek word ‘ethos’, which means “custom”, “habit”, and “way of living”.
ETHICS
it is a set of moral principles that regulate the use of computers
COMPUTER ETHICS
Computers create a false sense of security
- People do not realize how vulnerable information stored on computers are
PRIVACY
- Intellectual property
- Data as property
PROPERTY
Access to computing technology
- Access to data
ACCESS
Accuracy of information stored
ACCURACY
THE TEN COMMANDMENTS OF COMPUTER ETHICS
Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people’s computer work.
3. Thou shalt not snoop around in other people’s files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not use or copy software for which you have not paid.
7. Thou shalt not use other people’s computer resources without authorization.
8. Thou shalt not appropriate other people’s intellectual output.
9. Thou shalt think about the social consequences of the program you write.
10. Thou shalt use a computer in ways that show consideration and respect
is a kind of malicious computer program, which when executed, replicates itself and inserts its own code. When the replication is done, this code infects the other files and program present on your system.
COMPUTER VIRUS
Is a person who breaks into a computer system
HACKER