SlideShare a Scribd company logo
1 of 23
NAME: ENIMIL KWEKU BOATENG
COURSE: ELECTIVE ICT
TOPIC: DIGITAL TECHNOLOGY CULTURE 1
EMAIL: KWEKUBOATENG38@GMAIL.COM
WEB: HTTP://ENIMIL.000WEBHOSTAPP.COM
Lesson quote
Set your goals high, and don’t stop
till you get there.
Bo Jackson
LESSON OBJECTIVES
At the end of this lesson, the student should be able to:
Explain general issues concerning information technology
Understand computer and information security and
distinguish between computer crime and cybercrime
Analyze the role and impact of information technology
on everyday life.
Digital technology culture
Digital culture refers to culture shaped by the emergence
and use of digital technologies. It can also be said of how
people use and interact with technology in their works and
lives. It describes the idea that technology and the
Internet significantly shape the way we interact behave,
think, and communicate as human beings in a societal
setting.
THE INTERNET
The Internet is a globally connected network system that
usesTransmission Control Protocol and Internet Protocol
(TCP/IP) to transmit data through various types of media
like coaxial cable, twisted pair cable, fiber-optic cable and
wireless.TCP/IP is a set of standardized rules that allow
computers to communicate on a network such as the
Internet.
Source: https://milcom.edu.au/different-types-
coaxial-cables/
Source: https://www.dreamstime.com/stock-
photo-ethernet-wire-cable-yellow-patch-
cord-twisted-pair-isolated-image88784783
Source: https://www.optcore.net/the-
difference-between-optical-fiber-and-
optical-fiber-cable/
Coaxial
Cable
Twisted
pair cable
Fibre optic
cable
THE INTERNET
It is worth knowing thatWWW which meansWorld
WideWeb is not the same as the Internet.TheWorld
WideWeb however is a collection of information
which is accessed through the Internet.The web has
matured through three generations, commonly called
Web 1.0, 2.0, and 3.0.
COMPUTER & INFORMATION SECURITY
Information security involves protecting individuals
and organizations information from theft and danger.
Computer security focuses on protecting information,
hardware, and software from unauthorized use, as
well as preventing or limiting the damage from
intrusions, sabotage, and natural disasters.
COMPUTER CRIME
Computer crime is an act performed by a knowledgeable
computer user, sometimes referred to as a hacker that
illegally browses or steals a company's or individuals private
information. It can also be defined as the use of information
technology for illegal purposes or for unauthorized access
of a computer system where the intent is to damage, delete
or alter the data present on the computer.
TYPES OF COMPUTER CRIME
Cracking
Unauthorized access
Computer malware
Denial-of-service attack
CYBERCRIMECRIME
Cybercrime is any criminal activity that involves a
computer, a networked device or a network.
Cybercrimes happen in the cyberspace in that the
computer is used as a tool alright but the target is not
the computer unlike a computer crime where the tool
used and the target happens to be the computer.
TYPES OF CYBERCRIME
Identity theft
Social engineering
Malvertising
Cyberstalking
EFFECTS OF COMPUTER & CYBERCRIMES
It can lead to job loss.
It damages brand image and company or individual’s
reputation.
There is high cost in mitigation strategies and recovery
from cyber and computer crimes.
It can lead to loss of trade and competitiveness.
ROLEAND IMPACT OF
TECHNOLOGY
Computer based training
Computer-based training is a learning method in which a
computer program is used as the primary mode of teaching.
With this type of training, you are able to teach yourself with
little or no outside help from a teacher.As you use the program,
you can study at your own pace and the program tracks your
progress. It involves the use of a personal or networked
computer for the delivery and access of training programs.
IMPORTANCE OF COMPUTER BASED
TRAINING
There is immediate feedback on work.
It respects one learning pace whether fast or slow learner.
It uses a multimedia approach to teaching like sound, sight
and interactive activities, therefore it works for all learning
types, whether you learn through reading, seeing or doing.
IMPORTANCE OF COMPUTER BASED
TRAINING
It allows for consistency in the training since the same
materials are used and there is no need to account for
individual teaching styles of instructors.
It is easy to track and analyze progress of trainees.
It is flexible and efficient
Computer AIDED DESIGN
Computer Aided Design (CAD) is the use of computer
software to design and document a product’s design process.
CAD is used to design, develop and optimize products. While
it is very versatile, CAD is extensively used in the design of
tools and equipment required in the manufacturing process
as well as in the construction domain. CAD enables design
engineers to layout and to develop their work on a computer
screen, print and save it for future editing.
IMPORTANCE OF Computer AIDED
DESIGN
It is very easy to edit design work.
There is a decrease in error percentage.
There is a decrease in design effort.
It is easy to share design work.
There is improvement in accuracy.
Computer ASSISTED MANUFACTURING
Computer assisted manufacturing (CAM) can be
defined as the use of computer systems to plan,
manage, and control the operations of a
manufacturing plant through either direct or
indirect computer interface with the plant’s
production resources.
IMPORTANCE OF Computer ASSISTED
MANUFACTURING
There is improvement in the manufacturing process.
It is very efficient and produces items quicker.
It is reliable, accurate and flexible.
It eliminates errors that may arise in the manual way
of manufacturing.
It is good for complex manufacturing processes.
Try thy hands on
Define the following:
A. Computer based learning.
B. Computer aided design.
C. Computer assisted manufacturing
List four (4) importance of the following:
A. Computer based learning.
B. Computer aided design.
C. Computer assisted manufacturing
Thanks 4 READING
Next tutorials will be on;
E-business, E-health, E-learning, E-mail, etc.
Subscribe and keep the channel active.

More Related Content

What's hot

ERP and related technology
ERP and related technology ERP and related technology
ERP and related technology Usman Tariq
 
Business Information & ICT - ICT In Business
Business Information & ICT - ICT In BusinessBusiness Information & ICT - ICT In Business
Business Information & ICT - ICT In BusinessRobbieA
 
WEB-SYSTEM-AND-TECHNOLOGIES-INTRODUCTION-1.pptx
WEB-SYSTEM-AND-TECHNOLOGIES-INTRODUCTION-1.pptxWEB-SYSTEM-AND-TECHNOLOGIES-INTRODUCTION-1.pptx
WEB-SYSTEM-AND-TECHNOLOGIES-INTRODUCTION-1.pptxjwhuqyqtayaw
 
Decision Making and Information Systems
Decision Making and  Information SystemsDecision Making and  Information Systems
Decision Making and Information SystemsAriful Saimon
 
Lesson One: Learning the Computer Basics
Lesson One: Learning the Computer BasicsLesson One: Learning the Computer Basics
Lesson One: Learning the Computer Basicsuarkgradstudentetec
 
Types & Fundamentals of Information System
Types & Fundamentals of Information SystemTypes & Fundamentals of Information System
Types & Fundamentals of Information SystemAwais Mansoor Chohan
 
Cheerdance
CheerdanceCheerdance
CheerdanceHome
 
Game thinking - Differences Between Games, Serious Games, Gamification and More.
Game thinking - Differences Between Games, Serious Games, Gamification and More.Game thinking - Differences Between Games, Serious Games, Gamification and More.
Game thinking - Differences Between Games, Serious Games, Gamification and More.Andrzej Marczewski
 
Information System & Business applications
Information System & Business applicationsInformation System & Business applications
Information System & Business applicationsShubham Upadhyay
 
BASIC COMPUTER PERIPHERALS/DEVICES/SYSTEMS
BASIC COMPUTER PERIPHERALS/DEVICES/SYSTEMSBASIC COMPUTER PERIPHERALS/DEVICES/SYSTEMS
BASIC COMPUTER PERIPHERALS/DEVICES/SYSTEMSNeve Deschanel
 
ERP Chapter 1 : Business functions and business processes
ERP Chapter 1 : Business functions and business processesERP Chapter 1 : Business functions and business processes
ERP Chapter 1 : Business functions and business processesRey-an Baricanosa
 
Mis & Decision Making
Mis & Decision MakingMis & Decision Making
Mis & Decision MakingArun Mishra
 
Managing information technology
Managing information technologyManaging information technology
Managing information technologyPrafull Johri
 
Unit 3 Management Information System
Unit 3 Management Information SystemUnit 3 Management Information System
Unit 3 Management Information SystemAbhishek Iyer
 

What's hot (20)

ERP and related technology
ERP and related technology ERP and related technology
ERP and related technology
 
Information Systems
Information SystemsInformation Systems
Information Systems
 
Business Information & ICT - ICT In Business
Business Information & ICT - ICT In BusinessBusiness Information & ICT - ICT In Business
Business Information & ICT - ICT In Business
 
WEB-SYSTEM-AND-TECHNOLOGIES-INTRODUCTION-1.pptx
WEB-SYSTEM-AND-TECHNOLOGIES-INTRODUCTION-1.pptxWEB-SYSTEM-AND-TECHNOLOGIES-INTRODUCTION-1.pptx
WEB-SYSTEM-AND-TECHNOLOGIES-INTRODUCTION-1.pptx
 
Decision Making and Information Systems
Decision Making and  Information SystemsDecision Making and  Information Systems
Decision Making and Information Systems
 
Lesson One: Learning the Computer Basics
Lesson One: Learning the Computer BasicsLesson One: Learning the Computer Basics
Lesson One: Learning the Computer Basics
 
Zachman Framework
Zachman FrameworkZachman Framework
Zachman Framework
 
ICT in Business
ICT in BusinessICT in Business
ICT in Business
 
Types & Fundamentals of Information System
Types & Fundamentals of Information SystemTypes & Fundamentals of Information System
Types & Fundamentals of Information System
 
Cheerdance
CheerdanceCheerdance
Cheerdance
 
Game thinking - Differences Between Games, Serious Games, Gamification and More.
Game thinking - Differences Between Games, Serious Games, Gamification and More.Game thinking - Differences Between Games, Serious Games, Gamification and More.
Game thinking - Differences Between Games, Serious Games, Gamification and More.
 
Information System & Business applications
Information System & Business applicationsInformation System & Business applications
Information System & Business applications
 
Evolution of ERP Systems
Evolution of ERP SystemsEvolution of ERP Systems
Evolution of ERP Systems
 
Information management
Information managementInformation management
Information management
 
Information systems in the enterprise
Information systems in the enterpriseInformation systems in the enterprise
Information systems in the enterprise
 
BASIC COMPUTER PERIPHERALS/DEVICES/SYSTEMS
BASIC COMPUTER PERIPHERALS/DEVICES/SYSTEMSBASIC COMPUTER PERIPHERALS/DEVICES/SYSTEMS
BASIC COMPUTER PERIPHERALS/DEVICES/SYSTEMS
 
ERP Chapter 1 : Business functions and business processes
ERP Chapter 1 : Business functions and business processesERP Chapter 1 : Business functions and business processes
ERP Chapter 1 : Business functions and business processes
 
Mis & Decision Making
Mis & Decision MakingMis & Decision Making
Mis & Decision Making
 
Managing information technology
Managing information technologyManaging information technology
Managing information technology
 
Unit 3 Management Information System
Unit 3 Management Information SystemUnit 3 Management Information System
Unit 3 Management Information System
 

Similar to Digital Technology Culture - Anti-Dote Series

Why Computer Science.pptx
Why Computer Science.pptxWhy Computer Science.pptx
Why Computer Science.pptxslidecell212100
 
Kirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics ProjectKirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics ProjectKirtesh Khandelwal
 
Modern Technology
Modern TechnologyModern Technology
Modern TechnologyMd Saylab
 
Can body write an essay for me on dream job in Computer Engineerin.pdf
Can body write an essay for me on dream job in Computer Engineerin.pdfCan body write an essay for me on dream job in Computer Engineerin.pdf
Can body write an essay for me on dream job in Computer Engineerin.pdfmanjan6
 
Informati̇on technology 1
Informati̇on technology 1Informati̇on technology 1
Informati̇on technology 1Enes Bolfidan
 
Information Technology (IT)
Information Technology (IT)Information Technology (IT)
Information Technology (IT)Malik Afzaal
 
goldeninstituterup-blogspot-com-2024-01-diploma-in-computer-application-html ...
goldeninstituterup-blogspot-com-2024-01-diploma-in-computer-application-html ...goldeninstituterup-blogspot-com-2024-01-diploma-in-computer-application-html ...
goldeninstituterup-blogspot-com-2024-01-diploma-in-computer-application-html ...goldeneducation28
 
Bachelor of Information Technology Sydney
Bachelor of Information Technology SydneyBachelor of Information Technology Sydney
Bachelor of Information Technology Sydneyvitseo1
 
Bachelor of Information Technology Melbourne
Bachelor of Information Technology MelbourneBachelor of Information Technology Melbourne
Bachelor of Information Technology Melbournevitseo1
 
Top machine learning trends for 2022 and beyond
Top machine learning trends for 2022 and beyondTop machine learning trends for 2022 and beyond
Top machine learning trends for 2022 and beyondArpitGautam20
 
fields of technology and computer .pptx
fields of technology and computer  .pptxfields of technology and computer  .pptx
fields of technology and computer .pptxHome
 
Web Development SEO Expate Bangladesh Limited .pdf
Web Development SEO Expate Bangladesh Limited .pdfWeb Development SEO Expate Bangladesh Limited .pdf
Web Development SEO Expate Bangladesh Limited .pdfSeo Expate BD LTD
 

Similar to Digital Technology Culture - Anti-Dote Series (20)

Why Computer Science.pptx
Why Computer Science.pptxWhy Computer Science.pptx
Why Computer Science.pptx
 
Kirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics ProjectKirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics Project
 
Aplication of comp
Aplication of compAplication of comp
Aplication of comp
 
It project
It projectIt project
It project
 
IT Fundamentals
IT FundamentalsIT Fundamentals
IT Fundamentals
 
Modern Technology
Modern TechnologyModern Technology
Modern Technology
 
Notes1
Notes1Notes1
Notes1
 
Can body write an essay for me on dream job in Computer Engineerin.pdf
Can body write an essay for me on dream job in Computer Engineerin.pdfCan body write an essay for me on dream job in Computer Engineerin.pdf
Can body write an essay for me on dream job in Computer Engineerin.pdf
 
Informati̇on technology 1
Informati̇on technology 1Informati̇on technology 1
Informati̇on technology 1
 
Act te 335 corrected
Act te 335 correctedAct te 335 corrected
Act te 335 corrected
 
Information Technology (IT)
Information Technology (IT)Information Technology (IT)
Information Technology (IT)
 
goldeninstituterup-blogspot-com-2024-01-diploma-in-computer-application-html ...
goldeninstituterup-blogspot-com-2024-01-diploma-in-computer-application-html ...goldeninstituterup-blogspot-com-2024-01-diploma-in-computer-application-html ...
goldeninstituterup-blogspot-com-2024-01-diploma-in-computer-application-html ...
 
Bachelor of Information Technology Sydney
Bachelor of Information Technology SydneyBachelor of Information Technology Sydney
Bachelor of Information Technology Sydney
 
Bachelor of Information Technology Melbourne
Bachelor of Information Technology MelbourneBachelor of Information Technology Melbourne
Bachelor of Information Technology Melbourne
 
Recent trends in cloud computing articles
Recent trends in cloud computing articlesRecent trends in cloud computing articles
Recent trends in cloud computing articles
 
Top machine learning trends for 2022 and beyond
Top machine learning trends for 2022 and beyondTop machine learning trends for 2022 and beyond
Top machine learning trends for 2022 and beyond
 
fields of technology and computer .pptx
fields of technology and computer  .pptxfields of technology and computer  .pptx
fields of technology and computer .pptx
 
Ic3
Ic3Ic3
Ic3
 
Web Development SEO Expate Bangladesh Limited .pdf
Web Development SEO Expate Bangladesh Limited .pdfWeb Development SEO Expate Bangladesh Limited .pdf
Web Development SEO Expate Bangladesh Limited .pdf
 
EmergingTrend.pdf
EmergingTrend.pdfEmergingTrend.pdf
EmergingTrend.pdf
 

More from Enimil Kweku Boateng

E-ICT TYPES OF COMPUTER NETWORKS 2 ANTI-DOTE SERIES.pptx
E-ICT TYPES OF COMPUTER NETWORKS 2 ANTI-DOTE SERIES.pptxE-ICT TYPES OF COMPUTER NETWORKS 2 ANTI-DOTE SERIES.pptx
E-ICT TYPES OF COMPUTER NETWORKS 2 ANTI-DOTE SERIES.pptxEnimil Kweku Boateng
 
E-ICT TYPES OF COMPUTER NETWORKS 1 ANTI-DOTE SERIES.pptx
E-ICT TYPES OF COMPUTER NETWORKS 1 ANTI-DOTE SERIES.pptxE-ICT TYPES OF COMPUTER NETWORKS 1 ANTI-DOTE SERIES.pptx
E-ICT TYPES OF COMPUTER NETWORKS 1 ANTI-DOTE SERIES.pptxEnimil Kweku Boateng
 
E-ICT COMPUTER NETWORK CONCEPTS ANTI-DOTE SERIES
E-ICT COMPUTER NETWORK CONCEPTS ANTI-DOTE SERIESE-ICT COMPUTER NETWORK CONCEPTS ANTI-DOTE SERIES
E-ICT COMPUTER NETWORK CONCEPTS ANTI-DOTE SERIESEnimil Kweku Boateng
 
E-ICT MULTIMEDIA IN EDUCATION ANTI-DOTE SERIES.pptx
E-ICT MULTIMEDIA IN EDUCATION ANTI-DOTE SERIES.pptxE-ICT MULTIMEDIA IN EDUCATION ANTI-DOTE SERIES.pptx
E-ICT MULTIMEDIA IN EDUCATION ANTI-DOTE SERIES.pptxEnimil Kweku Boateng
 
E-ICT APPLICATION SOFTWARE ANTI-DOTE SERIES.pptx
E-ICT APPLICATION SOFTWARE ANTI-DOTE SERIES.pptxE-ICT APPLICATION SOFTWARE ANTI-DOTE SERIES.pptx
E-ICT APPLICATION SOFTWARE ANTI-DOTE SERIES.pptxEnimil Kweku Boateng
 
E-ICT SYSTEM SOFTWARE ANTI-DOTE SERIES.pptx
E-ICT SYSTEM SOFTWARE ANTI-DOTE SERIES.pptxE-ICT SYSTEM SOFTWARE ANTI-DOTE SERIES.pptx
E-ICT SYSTEM SOFTWARE ANTI-DOTE SERIES.pptxEnimil Kweku Boateng
 
E-ICT INTRODUCTION TO COMPUTER SOFTWARE ANTI-DOTE SERIES.pptx
E-ICT INTRODUCTION TO COMPUTER SOFTWARE ANTI-DOTE SERIES.pptxE-ICT INTRODUCTION TO COMPUTER SOFTWARE ANTI-DOTE SERIES.pptx
E-ICT INTRODUCTION TO COMPUTER SOFTWARE ANTI-DOTE SERIES.pptxEnimil Kweku Boateng
 
E-ICT Data Representation 1 - Anti-Dote Series
E-ICT Data Representation 1 - Anti-Dote SeriesE-ICT Data Representation 1 - Anti-Dote Series
E-ICT Data Representation 1 - Anti-Dote SeriesEnimil Kweku Boateng
 
Hardware Components2 - Anti-Dote Series
Hardware Components2 - Anti-Dote SeriesHardware Components2 - Anti-Dote Series
Hardware Components2 - Anti-Dote SeriesEnimil Kweku Boateng
 
Hardware Components1 - Anti-Dote Series
Hardware Components1 - Anti-Dote SeriesHardware Components1 - Anti-Dote Series
Hardware Components1 - Anti-Dote SeriesEnimil Kweku Boateng
 
E-ICT Digital Technology Culture 2 - Anti-Dote Series
E-ICT Digital Technology Culture 2 - Anti-Dote SeriesE-ICT Digital Technology Culture 2 - Anti-Dote Series
E-ICT Digital Technology Culture 2 - Anti-Dote SeriesEnimil Kweku Boateng
 
Information Systems - Anti-Dote Series
Information Systems - Anti-Dote SeriesInformation Systems - Anti-Dote Series
Information Systems - Anti-Dote SeriesEnimil Kweku Boateng
 

More from Enimil Kweku Boateng (12)

E-ICT TYPES OF COMPUTER NETWORKS 2 ANTI-DOTE SERIES.pptx
E-ICT TYPES OF COMPUTER NETWORKS 2 ANTI-DOTE SERIES.pptxE-ICT TYPES OF COMPUTER NETWORKS 2 ANTI-DOTE SERIES.pptx
E-ICT TYPES OF COMPUTER NETWORKS 2 ANTI-DOTE SERIES.pptx
 
E-ICT TYPES OF COMPUTER NETWORKS 1 ANTI-DOTE SERIES.pptx
E-ICT TYPES OF COMPUTER NETWORKS 1 ANTI-DOTE SERIES.pptxE-ICT TYPES OF COMPUTER NETWORKS 1 ANTI-DOTE SERIES.pptx
E-ICT TYPES OF COMPUTER NETWORKS 1 ANTI-DOTE SERIES.pptx
 
E-ICT COMPUTER NETWORK CONCEPTS ANTI-DOTE SERIES
E-ICT COMPUTER NETWORK CONCEPTS ANTI-DOTE SERIESE-ICT COMPUTER NETWORK CONCEPTS ANTI-DOTE SERIES
E-ICT COMPUTER NETWORK CONCEPTS ANTI-DOTE SERIES
 
E-ICT MULTIMEDIA IN EDUCATION ANTI-DOTE SERIES.pptx
E-ICT MULTIMEDIA IN EDUCATION ANTI-DOTE SERIES.pptxE-ICT MULTIMEDIA IN EDUCATION ANTI-DOTE SERIES.pptx
E-ICT MULTIMEDIA IN EDUCATION ANTI-DOTE SERIES.pptx
 
E-ICT APPLICATION SOFTWARE ANTI-DOTE SERIES.pptx
E-ICT APPLICATION SOFTWARE ANTI-DOTE SERIES.pptxE-ICT APPLICATION SOFTWARE ANTI-DOTE SERIES.pptx
E-ICT APPLICATION SOFTWARE ANTI-DOTE SERIES.pptx
 
E-ICT SYSTEM SOFTWARE ANTI-DOTE SERIES.pptx
E-ICT SYSTEM SOFTWARE ANTI-DOTE SERIES.pptxE-ICT SYSTEM SOFTWARE ANTI-DOTE SERIES.pptx
E-ICT SYSTEM SOFTWARE ANTI-DOTE SERIES.pptx
 
E-ICT INTRODUCTION TO COMPUTER SOFTWARE ANTI-DOTE SERIES.pptx
E-ICT INTRODUCTION TO COMPUTER SOFTWARE ANTI-DOTE SERIES.pptxE-ICT INTRODUCTION TO COMPUTER SOFTWARE ANTI-DOTE SERIES.pptx
E-ICT INTRODUCTION TO COMPUTER SOFTWARE ANTI-DOTE SERIES.pptx
 
E-ICT Data Representation 1 - Anti-Dote Series
E-ICT Data Representation 1 - Anti-Dote SeriesE-ICT Data Representation 1 - Anti-Dote Series
E-ICT Data Representation 1 - Anti-Dote Series
 
Hardware Components2 - Anti-Dote Series
Hardware Components2 - Anti-Dote SeriesHardware Components2 - Anti-Dote Series
Hardware Components2 - Anti-Dote Series
 
Hardware Components1 - Anti-Dote Series
Hardware Components1 - Anti-Dote SeriesHardware Components1 - Anti-Dote Series
Hardware Components1 - Anti-Dote Series
 
E-ICT Digital Technology Culture 2 - Anti-Dote Series
E-ICT Digital Technology Culture 2 - Anti-Dote SeriesE-ICT Digital Technology Culture 2 - Anti-Dote Series
E-ICT Digital Technology Culture 2 - Anti-Dote Series
 
Information Systems - Anti-Dote Series
Information Systems - Anti-Dote SeriesInformation Systems - Anti-Dote Series
Information Systems - Anti-Dote Series
 

Recently uploaded

BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 

Recently uploaded (20)

BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 

Digital Technology Culture - Anti-Dote Series

  • 1. NAME: ENIMIL KWEKU BOATENG COURSE: ELECTIVE ICT TOPIC: DIGITAL TECHNOLOGY CULTURE 1 EMAIL: KWEKUBOATENG38@GMAIL.COM WEB: HTTP://ENIMIL.000WEBHOSTAPP.COM
  • 2. Lesson quote Set your goals high, and don’t stop till you get there. Bo Jackson
  • 3. LESSON OBJECTIVES At the end of this lesson, the student should be able to: Explain general issues concerning information technology Understand computer and information security and distinguish between computer crime and cybercrime Analyze the role and impact of information technology on everyday life.
  • 4. Digital technology culture Digital culture refers to culture shaped by the emergence and use of digital technologies. It can also be said of how people use and interact with technology in their works and lives. It describes the idea that technology and the Internet significantly shape the way we interact behave, think, and communicate as human beings in a societal setting.
  • 5. THE INTERNET The Internet is a globally connected network system that usesTransmission Control Protocol and Internet Protocol (TCP/IP) to transmit data through various types of media like coaxial cable, twisted pair cable, fiber-optic cable and wireless.TCP/IP is a set of standardized rules that allow computers to communicate on a network such as the Internet.
  • 6. Source: https://milcom.edu.au/different-types- coaxial-cables/ Source: https://www.dreamstime.com/stock- photo-ethernet-wire-cable-yellow-patch- cord-twisted-pair-isolated-image88784783 Source: https://www.optcore.net/the- difference-between-optical-fiber-and- optical-fiber-cable/ Coaxial Cable Twisted pair cable Fibre optic cable
  • 7. THE INTERNET It is worth knowing thatWWW which meansWorld WideWeb is not the same as the Internet.TheWorld WideWeb however is a collection of information which is accessed through the Internet.The web has matured through three generations, commonly called Web 1.0, 2.0, and 3.0.
  • 8. COMPUTER & INFORMATION SECURITY Information security involves protecting individuals and organizations information from theft and danger. Computer security focuses on protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.
  • 9. COMPUTER CRIME Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a hacker that illegally browses or steals a company's or individuals private information. It can also be defined as the use of information technology for illegal purposes or for unauthorized access of a computer system where the intent is to damage, delete or alter the data present on the computer.
  • 10. TYPES OF COMPUTER CRIME Cracking Unauthorized access Computer malware Denial-of-service attack
  • 11. CYBERCRIMECRIME Cybercrime is any criminal activity that involves a computer, a networked device or a network. Cybercrimes happen in the cyberspace in that the computer is used as a tool alright but the target is not the computer unlike a computer crime where the tool used and the target happens to be the computer.
  • 12. TYPES OF CYBERCRIME Identity theft Social engineering Malvertising Cyberstalking
  • 13. EFFECTS OF COMPUTER & CYBERCRIMES It can lead to job loss. It damages brand image and company or individual’s reputation. There is high cost in mitigation strategies and recovery from cyber and computer crimes. It can lead to loss of trade and competitiveness.
  • 15. Computer based training Computer-based training is a learning method in which a computer program is used as the primary mode of teaching. With this type of training, you are able to teach yourself with little or no outside help from a teacher.As you use the program, you can study at your own pace and the program tracks your progress. It involves the use of a personal or networked computer for the delivery and access of training programs.
  • 16. IMPORTANCE OF COMPUTER BASED TRAINING There is immediate feedback on work. It respects one learning pace whether fast or slow learner. It uses a multimedia approach to teaching like sound, sight and interactive activities, therefore it works for all learning types, whether you learn through reading, seeing or doing.
  • 17. IMPORTANCE OF COMPUTER BASED TRAINING It allows for consistency in the training since the same materials are used and there is no need to account for individual teaching styles of instructors. It is easy to track and analyze progress of trainees. It is flexible and efficient
  • 18. Computer AIDED DESIGN Computer Aided Design (CAD) is the use of computer software to design and document a product’s design process. CAD is used to design, develop and optimize products. While it is very versatile, CAD is extensively used in the design of tools and equipment required in the manufacturing process as well as in the construction domain. CAD enables design engineers to layout and to develop their work on a computer screen, print and save it for future editing.
  • 19. IMPORTANCE OF Computer AIDED DESIGN It is very easy to edit design work. There is a decrease in error percentage. There is a decrease in design effort. It is easy to share design work. There is improvement in accuracy.
  • 20. Computer ASSISTED MANUFACTURING Computer assisted manufacturing (CAM) can be defined as the use of computer systems to plan, manage, and control the operations of a manufacturing plant through either direct or indirect computer interface with the plant’s production resources.
  • 21. IMPORTANCE OF Computer ASSISTED MANUFACTURING There is improvement in the manufacturing process. It is very efficient and produces items quicker. It is reliable, accurate and flexible. It eliminates errors that may arise in the manual way of manufacturing. It is good for complex manufacturing processes.
  • 22. Try thy hands on Define the following: A. Computer based learning. B. Computer aided design. C. Computer assisted manufacturing List four (4) importance of the following: A. Computer based learning. B. Computer aided design. C. Computer assisted manufacturing
  • 23. Thanks 4 READING Next tutorials will be on; E-business, E-health, E-learning, E-mail, etc. Subscribe and keep the channel active.