Professional Documents
Culture Documents
COMMUNICATIONS
TECHNOLOGY TODAY
Information and Communications
Technology (ICT)
Collectively refers to the
technologies, both hardware and
software, that enable humans to
communicate with one another.
Basically, it is any form of
technology that enables you to
communicate.
Did you know
that ICT began
along with the
rise of humans?
Evolution of ICT
The beginning of ICT can be traced back when
humans started to use objects to
communicate with one another.
There are 4 main periods that divide the era of
ICT:
1.premechanical
2.mechanical
3.electromechanical
4. electronic
Pre-Mechanical Age
(3000B.C.E - 1450 C.E.)
PREMECHANICAL
During this time, humans started communicating with one
another using words and pictograms curved in rocks.
The telephone
converts sounds
into electricity and
enables the
telephone network
to transmit it over
copperwires.
Electromechanical Age
AUTHENTICITY VERIFICATION OF
INFORMATION FROM THE WEB
Ways on how to verify if the information
is trustworthy or legitimate
1. Published authors name
Publishing the name of the one who wrote the
article or information is one sign that the
information is valid and credible.(to avoid
responsibility)
2. Credible Web sites
- error-free articles are more likely published by
credible Web sites.
Ways on how to verify if the information
is trustworthy or legitimate
3.Rating, number of viewers, and number of
shares
- this is the collective rating of past viewers of
the site.
- low rating if contains false information
4. Referenced and related articles
- Most of the credible articles include a list of
references or articles related to the published
ones.
Online Safety and
Security
Each individual when accessing the World
Wide Web is concerned with safety of his
or her computer and the information that
will be transmitted or received.
Online 1.Spam
Safety and This refers to the transmission
of unsolicited messages from
Security various origins using
electronic messaging system
Here are a such as e-mail and chat
number of messengers.
threats that can 2. Phishing
- This is defined as a software or
be acquired a program used by an attacker
from connecting to obtain personal
to the World information. Attackers
Wide Web commonly target user
passwords to hack and take
control of a user account.
Online 3. Malware
Safety and This is the short term for
malicious software, which is a
Security computer software sent by an
attackers to inflict chaos on a
Here are a
computers operation and
number of processes.
threats that can Disguised as enticing Web
be acquired sites
from connecting This are used to spy upon the
to the World activity of the computer and
Wide Web steal information.
Assignment: Write a 2
paragraph with 5 sentences
each about a social media
applications that affect your
day-to-day activities and how
did it improve your life.