LM Ict Computer 10 4th Q
LM Ict Computer 10 4th Q
LM Ict Computer 10 4th Q
ONLINE INFLUENCE IN
THE DIGITAL SECURITY AND
TECHNOLOGY HEALTH AND
TRENDS AND DATA
AND OTHER ENVIRONEMNTAL
CAMERAS PROTECTION
TRENDS IN IMPACT OF ICT
ICT
MODULE PRETEST:
Before learning on this module, let’s have first an initial activity in which it will
recall about your previous experiences and will assess your background/previous knowledge related
to the topic.
MULTIPLE CHOICE: Read each item carefully. Choose the BEST answer among the choices given. Write
your answer on the provided worksheet. Write only the letter of the correct answer on the worksheet provided.
1. It is the practice of storing and managing data using network and remote servers over the Internet.
a. Analytics b. Cloud Computing c. Mobile Application d. User Interfaces
2. It is the process which helps in discovering the informational patterns with data.
a. Analytics b. Cloud Computing c. Mobile Application d. User Interfaces
3. He is considered as one of the most important pillars of Information Technology. He is responsible for
building Microsoft, the most popular software company in the world.
a. Steve Jobs b. Larry Page c. Mark Zuckerberg d. Bill Gates
4. It signifies the process of making a copy of the original data (files or programs) into other storage.
a. User authentication b. Anti-Virus c. Backup d. Firewall
5. It records and stores photographic image in digital form.
a. Digital Camera b. Memory Card c. Monitor d. Scanner
6. This type of digital camera can be found in smartphones.
a. Point-and-shoot b. Camera phone c. Bridge camera d. DSLR
7. This element of ergonomics means alternating tasks within a job minimizes repetitive activities and
reduces wear and tear on the body.
a. Appropriate work pace b. Training and education c. Task variety d. Work breaks
8. This is an offense against the confidentiality, integrity, and availability of information or computer data.
a. cybersecurity b. cybercrime c. perjury d. libel
9. In ergonomics, this pertains to the acquisition of appropriate skills to do a job.
a. Training and education b. Appropriate work pace c. Work breaks d. Task variety
10. Possess the ability of self-replication; however, they cannot infect other programs.
a. Malware b. Worms c. Trojan d. Virus
11. This is the act of publishing false statements.
a. serendipity b. pardony c. perjury d. libel
12. This program secretly collects sensitive data about computer users.
LESSON NO. 1
ONLINE TECHNOLOGY AND OTHER
TRENDS IN ICT
EXPLORE!
ACTIVITY 1: TRUE OF FALSE?
Direction: Write TRUE if the statement is correct, otherwise write FALSE. Write your
answer on the provided worksheet.
1. An online system is a state of connectivity to the cyberspace through the Internet or computer network.
2. The service industry uses online systems to attract clients and customers.
3. Social gaming is only played on mobile devices.
4. A person uses the mobile banking when he or she withdraws over the counter.
5. Hotel reservations can be done through an online system.
LESSON DISCUSSION
ONLINE TECHNOLOGY
Almost a hundred years since the first modern computer was created, we not only have
more powerful mobile computers, but we also have constant interconnectivity with millions
of people through our computers and mobile devices. We acquire and share information in
real time. This is the current reality of ICT – a world with exponentially increasing connectivity. We are users of
an online system.
As a person who reads or receives messages, it is an important skill to know how to deconstruct those
messages. This means that we should examine and think about them so we can understand the messages
very clearly and not misunderstand them. We need to learn how to construct them so people can easily
understand the messages we wish to send.
Media and information literacy is defined as a set of competencies that empowers people to access,
retrieve, understand, evaluate and use, create, as well as share information and media content in all formats,
using various tools, in a critical, ethical and effective way in order to participate and engage in personal,
professional, and social activities. The different types of media are print media, broadcast media, new media,
movies (films), and advertising.
Types of Media
1. Print media is the oldest form of medium. This
medium relies on the technology involving the
2. Broadcast Media can be defined as media that distribute audio and video content to a mass audience.
Examples are radio and television.
3. New media are those information and entertainment providers accessed via Internet or through mobile
communication. Examples are online newspapers, independent and alternative online news sources,
informational websites, and blogs.
4. Movies (films) are the oldest form of motion picture technology. They have been a popular entertainment
medium capable of capturing life-like video style images.
5. Advertising is the mass media content intended to persuade a targeted audience to take action toward a
product, service, or idea.
FIRM
UP!
ACTIVITY 2: WHO AM I?
Learning Competency: Know people behind ICT; (Critical Thinking, Computing
Technology-ICT)
Career Pathing: Researcher
I. IDENTIFICATION
Direction: Identify what is described in each item. Write directly your answer on the provided worksheet.
1. He is the co-founder of Google.
2. His tech company is the most popular software company in the world.
3. He has helped social media grow into a very powerful front that promotes connectivity and information
sharing.
4. He invented the World Wide Web.
5. He revolutionized the cellphone industry when he introduced smartphones to the world.
II. TABLE COMPLETION
Direction: List at least five notable IT innovators that you’ve known already. Write also their innovations and
contributions through filling out the table below. Use the worksheet provided in answering this activity.
INNOVATORS INNOVATIONS/CONTRIBUTIONS DESCRIPTION OF THEIR
INNOVATIONS/CONTRIBUTIONS
TRANSFER!
EXPLORE!
ACTIVITY 1: WHAT AM I?
Direction: Picture was presented below. Identify what is it and its uses based on your
own understanding and prior knowledge. Use the worksheet provided in answering this
activity.
LESSON DISCUSSION
DIGITAL CAMERA
A digital camera records and stores photographic
image in digital form. Many current models are also able to
capture sound or video, in addition to still images. Capture is
usually accomplished by the use of a photosensor, using a charged coupled device (CCD). Theses stored
images can be uploaded into a computer immediately or stored in the camera to be uploaded into a computer
or printer at a later time. Images may be archived on photographic compact disc or external hard disk. It can
also be shared via social media like Instagram, and Facebook.
There are many things you can do with a digital camera. Here are just a few examples:
5. DSLR – Short for digital single-lens reflex, this is a large camera with
interchangeable lenses that can take very high-quality photos.
SPECIAL FEATURES
Digital cameras have special features designed to help you take better photos. Depending on what
types of photos you want to take, some of these features can be quite useful. Below are some things you may
want to look for:
1. Red-eye Correction: This automatically removes red-eye, which is useful if you’re taking photos with
the flash on.
2. Sports/Active Child Mode: This allows the camera to focus more quickly to capture action shots.
3. Anti-blink: This feature automatically detects whether someone has blinked and displays a warning
after the photo is taken so you can retake it.
4. Smile Detection: This uses face-recognition technology to take the photo right when the subject
smiles.
5. Blemish Reduction: This automatically retouches your photos to reduce blemishes and wrinkles.
FIRM UP!
ACTIVITY 2: IDENTIFICATION
Direction: Identify what is described in each statement. Choose your answer from
the options inside the box. Write only the letter of the correct answer on the worksheet provided.
Learning Competency: Identify the different types of cameras;
(Critical Thinking, Computing Technology-ICT)
Career Pathing: Photographer, Camera Expert
1. This feature takes multiple shots at different exposures and combines the shots into a single image.
2. This is a type of camera that is something between a point-and-shoot and a DSLR.
3. This camera is very common and convenient to use because it is always with you.
4. This is a compact camera that is affordable, convenient, and easy to use.
5. This provides a guide so you can take photos following the rule of thirds.
6. This makes your skin appear younger and more radiant.
7. This allows you to take photos of fast-moving subjects.
8. This device captures images and stores them digitally.
DEE
P EN!
ACTIVITY 3: QUESTIONS TO ANSWER
Direction: Read each question/statement carefully. Answer it concisely and
comprehensively.
Learning Competency: Explain the importance of camera and its features; (Critical Thinking, Computing
Technology-ICT)
Career Pathing: Spokesperson, Photographer
1. What can you do with a digital camera?
________________________________________________________________________________________
____________________________________________________________________________
2. What do you mean when someone says “against the light” to your snapshot?
________________________________________________________________________________________
____________________________________________________________________________
3. Which do you prefer for taking pictures? Common digital camera or smartphone? Why?
________________________________________________________________________________________
____________________________________________________________________________
4. Compare the features of digital and smartphone cameras.
________________________________________________________________________________________
____________________________________________________________________________
LOVERS OF LIFE
“Life is like a camera. Focus on what's important. Capture the good times. And if things
don't work out, just take another shot.” - Ziad K. Abdelnour
TRANSFER!
ACTIVITY 4: PICTURE PERFECT
Direction: Using a digital camera or smartphone, take two (2) photos of the following area of
photography and make sure to apply filter or just camera settings to add effects to the image. You can also use
editing tools or apps for photo enhancement.
EXPLORE!
ACTIVITY 1: MULTIPLE CHOICE
Direction: Write only the letter of the correct answer on the worksheet provided.
1. This program infiltrates an operating system in a seamless manner, with the intent of inflicting harm on the
computer or user.
a. system interference b. illegal access c. malware d. virus
2. This is a malicious program with the possibility of self-replication. In a computer, it seeks other files trying to
infect them and the ultimate goal is to spread to other computers.
a. Trojan horse b. spyware c. adware d. virus
3. This is a program that secretly collects data about computer users, typically to gain access to information
such as passwords, credit card numbers, etc.
a. intelligence theft b. Trojan horse c. spyware d. worm
4. This type of malware possesses the ability of self-replication; however, they cannot infect other programs.
Their usual intent is to take control of your computer and allow rernote control through backdoor methods.
a. adware b. spyrus c. worm d. virus
5. This is a program that uses collected data about a user in order to display advertisements in a way regarded
as intrusive. It usually manifests itself in the form of many pop-up windows that display ads.
a. adware b. spyrus c. Worm d. virus
6. This is the act of obtaining or retrieving information from a computer system without right.
a. system interference b. illegal access c. trespassing d. virus
7. This is the act of receiving electronic transmissions before they reach the intended recipient made by
technical means (such as hacking) and without right, of any private computer data.
a. illegal interception b. data interference c. cybercrime d. libel
8. This is the intentional acquisition and use of an identity belonging to another person without right.
a. computer-related identity theft b. computer-related forgery
c. computer-related posing d. computer-related theft
9. This is the act of using or manipulating computer data for the purpose of perpetuating fraudulent or
dishonest design.
a. computer-related identity theft b. computer-related forgery
c. computer-related posing d. computer-related theft
10. This is the act of publishing false statements with the use of computers or computer systems.
a. fake news b. perjury c. gossip d. libel
LESSON DISCUSSION
Now more than ever, people are more connected digitally with the aid of computers and mobile
communications technology. Computers are becoming smarter and more powerful, a new reality that
must be supported with the right platforms to advance a digitally connected world.
MALWARE
Malware, short for malicious software, is a program that do unwanted actions or damage to an
operating system in a seamless manner, with the intent of harming the computer or user. It is a product of
cybercrimes, particularly by data interference and
system interference. The following are the
different types of malware.
VIRUS – is a malicious program with the
possibility of self-replication. In a
computer, it seeks other files trying to
infect them and the ultimate goal is to
spread to other computers. Depending on what
malicious code it contains, it may cause more
or less damage to your computer.
WORMS – like viruses, possess the ability of
self-replication; however, they cannot
infect other programs. Their usual intent is to
take control of your computer and allow
remote control through backdoor methods.
TROJAN HORSE OR TROJAN – is a program that supports to be useful or good to mislead users of
its true intent. It can be presented in a form of games or files in e-mail attachments. It infiltrates the
computer that deals negative effects, such as controlling your computer, deleting data, spreading
viruses, sending spam, ect. It does not replicate and it needs to be executed. Users need to download
or install Trojans for them to take effect.
SPYWARE – is a program that secretly collects data about computer users (passwords, credit card
numbers, ect.); therefore, it spies on users. The most common spyware infections usually occur while
visiting suspicious sites.
ADWARE – is a program that uses collected data about user in order to display advertisements in a
way regarded as intrusive. It usually manifests itself in the form of many pop-up windows that display
ads.
Other Guidelines
While the aforementioned guidelines help protect you from cyber-attacks, the following guidelines will
help keep you from violating the Cybercrime Prevention Act.
1. Never read chat messages that are not yours. Unless you were given the permission to view these
messages, it is against the law to access the private messages of another person without their permission.
2. Always verify the source of information. Be very critical or doubtful of any information or news that you
see on the Internet. Only rely on reputable and veritable sources, and not on blog sites pretending to be news
sites.
3. Never spread false information. Do not share information that did not pass a thorough critical analysis. If
you are baited by a sensational headline, take time to read the whole content of the news, only then should
you make an objective, informed opinion about it.
4. Never malign the dignity or reputation of anyone. Treat everyone with respect. Never pick a fight in
cyberspace, especially on social media.
FIRM UP!
ACTIVITY 2: IDENTIFICATION
Direction: Identify what cybercrime is committed in the following situations.
Choose your answer from the options in the box. Write only the letter of the correct answer on the worksheet
provided.
Learning Competency: Identify what cybersecurity and cybercrime is; (Critical Thinking, Computing
Technology-ICT)
Career Pathing: IT Expert
a. libel e. system interference
b. illegal access f. computer-related forgery
c. data interference g. computer-related identity theft
d. illegal interception
1. Someone accessed your personal computer without permission and copied some personal information.
2. Using social media, your friend spreads rumors about someone but you know this is false.
3. Hackers used signal jammers to prevent government computers from accessing the Internet.
4. Without your knowledge, someone created a profile on social media using your pictures.
5. A hacker designed a website to make it look like a government website. It aims to lure users to provide
personal information.
SNI Self-Learning Module in ICT-Computer-10_Fourth Quarter_S.Y.2021-2022 14 | P a g e
6. Without your knowledge, your friend installed an app on your smartphone so that all messages you send
and receive are also sent to your friend's phone.
7. Someone passed you a USB flash drive knowing it has a virus so your computer will get infected.
8. A friend you met online whom you have gotten close to but never met turned out to be a different person
who used another person's pictures.
9. Someone hacked and stole your social media account and deleted it.
10. Someone hacked and stole your social media account and uses it, while you no longer have access to it.
DEE
P EN!
ACTIVITY 3: QUESTIONS TO ANSWER
Direction: Read each question/statement carefully. Answer it concisely and
comprehensively.
Learning Competency: Explain the importance of protecting oneself and computer data from any
cyber-attacks and hackers; (Critical Thinking, Computing Technology-ICT)
Career Pathing: Spokesperson
1. How can you protect yourself and your computer data from cyber attacks or hackers?
________________________________________________________________________________________
____________________________________________________________________________
2. What things can you do to avoid the loss of data or file?
________________________________________________________________________________________
____________________________________________________________________________
3. What is the significance of always logging out of your different accounts?
__________________________________________________________________________________
__________________________________________________________________________________
4. What steps can you take to protect your privacy in case your smartphone is stolen?
__________________________________________________________________________________
__________________________________________________________________________________
5. Why is it important to avoid posting false information online, especially if this false information is about a
person?
__________________________________________________________________________________
__________________________________________________________________________________
TRANSFER!
ACTIVITY 4: MY CYBERSECURITY POSTER
Direction: Create a poster that raises awareness on cybersecurity and data protection.
Illustrate different malicious software and cybercrimes you want to emphasize. Use the space on the provided
worksheet.
Learning Competency: Create a cybersecurity poster that raises awareness on cybersecurity and data
protection. (Critical Thinking, Computing Technology-ICT, Creativity and Innovation)
LESSON NO. 4
INFLUENCE IN HEALTH AND
ENVIRONMENTAL IMPACT OF ICT
EXPLORE!
ACTIVITY 1: LET ME KNOW!
I. TRUE OR FALSE
Direction: Write TRUE on the worksheet provided if the statement is correct. Otherwise, write FALSE.
1. Ergonomics is the study of designing and positioning computer equipment to reduce health problems.
2. Electronic waste or e-waste includes all electronic and electronic products that are no longer wanted or
useful.
3. Smart card is a device used to keep track of energy use minute by minute
4. Flexibility is a major component of economics and an important feature of computer devices.
5. Alternating tasks within a job minimizes repetitive activities and reduces wear and tear on the body.
Column A Column B
1. Recovery time between repetitive or a. Appropriate work pace
forceful movements in every pace of work
2. Acquiring the appropriate skills to do a job b. Rest breaks
safely and efficiently
3. Stopping work for a period of time during the day c. Training and education
4. Alternating tasks within a job d. Task variety
5. Resting stretching or changing position between tasks e. Work breaks
LESSON DISCUSSION
The computer is a vital tool in many different jobs and activities, for adults and children. However, long
periods of using a computer can increase your chance of developing an injury. Inappropriate computer use can
cause muscle and joint pain and eyestrain. Many of the technologies use a lot more resources and power.
Using and manufacturing them can create problems in the environment. However, technology takes the lead in
solving this issue to avoid complications.
ELEMENTS IN ERGONOMICS
Many computer components can be recycled. Specialized companies that recycle computers sell
usable materials and safely dispose of hazardous materials. Some computer manufacturers offer recycling
possibility by offering old for new computer exchanges.
In case you have electronic trash, you can search online to find out which companies offer electronic
waste management services. All you need to do is type the words "electronic waste" or "disposal of electronic
waste" in the search field. We should also consider minimizing the use of paper. We can use electronic
documentation in order to save on paper. Toners and ink cartridges should also be excluded from regular
rubbish, since they can be reused.
Energy Management
Today, there is an estimated 7 billion people. We consume a lot of energy and resources. Without
energy, it would be difficult to imagine today's society. It is one of the key factors in our survival and way of life.
Therefore, effective energy management needs special emphasis and it is done on both macro and micro
levels. In terms of computers, energy management is integrated into an operating system, which allows users
to make adjustments in order to save energy.
Building Management
Modern buildings have computer-controlled environment systems in place.
An air-conditioning system keeps the temperature at a reasonable level. There may also be
automatic window openers and sun screens to control the effect of sunlight and cool down the
building.
Solar panels reduce the consumption of electricity from the national grid.
Energy monitoring displays help staff know what is using up the power.
LED lighting uses only a fraction of energy without sacrificing luminance or brightness.
Water conservation systems are designed to reuse water, especially in industrial factories.
Smart Meters
In general, people at home do not know how much energy is being used at any moment and what is
using it. The idea of a smart energy consumption meter is to keep track of energy use minute by minute. A
display in the home then shows what is going on.
E-Waste
Electronic waste or e-waste can include all electronic and electronic products that are no longer
wanted or useful. Computers and computer equipment including printers, scanners, keyboards, mouse,
monitors, as well as televisions, are the most common forms of e-waste. Other e-waste includes DVD and CD
players, stereo and sound systems, photocopiers, fax machines, digital cameras, game consoles, and mobile
phones.
FIRM UP!
ACTIVITY 2: QUESTIONS TO ANSWER
Direction: Answer the questions briefly. Use the worksheet provided for this
activity.
Learning Competency: Identify ergonomics, its objectives and components; (Critical Thinking,
Computing Technology-ICT)
Career Pathing: Spokesperson, IT Expert
DEE
P EN!
ACTIVITY 3: ESSAY
Direction: Read the question carefully. Answer it concisely and comprehensively. Make
an essay composed of 7-10 sentences. Use the worksheet provided in answering this
activity.
Learning Competency: Explain his/her understanding on the impact of technology in the environment;
(Critical Thinking, Computing Technology-ICT)
Career Pathing: Spokesperson, Debater, IT Expert
TRANSFER!
ACTIVITY 4: DRAWING
Direction: Draw the proper ergonomics when handling ICT. Use the space provided in your
worksheet.
MULTIPLE CHOICE: Read each item carefully. Choose the BEST answer among the choices given. Write
your answer on the provided worksheet. Write only the letter of the correct answer on the worksheet provided.
1. It is the practice of storing and managing data using network and remote servers over the Internet.
a. Analytics b. Cloud Computing c. Mobile Application d. User Interfaces
2. It is the process which helps in discovering the informational patterns with data.
a. Analytics b. Cloud Computing c. Mobile Application d. User Interfaces
3. He is considered as one of the most important pillars of Information Technology. He is responsible for
building Microsoft, the most popular software company in the world.
a. Steve Jobs b. Larry Page c. Mark Zuckerberg d. Bill Gates
4. It signifies the process of making a copy of the original data (files or programs) into other storage.
a. User authentication b. Anti-Virus c. Backup d. Firewall
5. It records and stores photographic image in digital form.
a. Digital Camera b. Memory Card c. Monitor d. Scanner
6. This type of digital camera can be found in smartphones.
a. Point-and-shootb. Camera phone c. Bridge camera d. DSLR
7. This element of ergonomics means alternating tasks within a job minimizes repetitive activities and
reduces wear and tear on the body.
a. Appropriate work pace b. Training and education c. Task variety d. Work breaks
8. This is an offense against the confidentiality, integrity, and availability of information or computer data.
a. cybersecurity b. cybercrime c. perjury d. libel
9. In ergonomics, this pertains to the acquisition of appropriate skills to do a job.
a. Training and education b. Appropriate work pace c. Work breaks d. Task variety
10. Possess the ability of self-replication; however, they cannot infect other programs.
a. Malware b. Worms c. Trojan d. Virus
11. This is the act of publishing false statements.
a. serendipity b. pardony c. perjury d. libel
12. This program secretly collects sensitive data about computer users.
a. Spyware b. Malware c. Trojan d. Virus
13. A false message being spread by email in order to deceive users.
a. Spyware b. Malware c. Adware d. Hoax
14. Is used as protective measure to deter theft of laptops.
a. Security Cable b. Security Wire c. Antivirus d. Firewall
SNI Self-Learning Module in ICT-Computer-10_Fourth Quarter_S.Y.2021-2022 20 | P a g e
15. This is visual way to display and compare data, also known as graph.
a. Workbook b. Function c. Formula d. Chart
GUIDED GENERALIZATION
TEXT 1
“Technology can support administration in providing instructional leadership, managing learning environments
and professional learning communities, and making decisions that support proficiency in 21st century skills.
Networking technologies, for example, can support administrators in communicating with staff members,
parents and community members. Data management systems enable states, districts and schools to make
sense of the mountains of data they collect, monitor technology and other resources, and track trends in
student achievement. In this sense, technology is a “data tool for education to better understand and inform
educational and instructional decision making” (Maximizing the Impact, 2007, p. 13).
Process Questions:
1. What is the advantage and disadvantage of ICT?
2. In what way do these trends in ICT help you in your daily life?
3. How does ICT affect your personal life?
4. How should technology be used?
TEXT 2
“Such technologies as videoconferencing, online learning, networking, and instant messaging can support
professional development and professional learning communities. Using technologies like these, educators can
learn and collaborate with peers, mentors, experts and community members routinely. They can build ongoing
professional relationships, develop capacity in teaching 21st century skills, benefit from just-in-time
communications, and reduce the time and expense of travel” (Maximizing the Impact, 2007, p. 13).
Process Questions:
1. What is the advantage and disadvantage of ICT?
2. In what way do these trends in ICT help you in your daily life?
3. How does ICT affect your personal life?
4. How should technology be used?
TEXT 3
Technology ushers in fundamental structural changes that can be integral to achieving significant
improvements in productivity. Used to support both teaching and learning, technology infuses classrooms with
digital learning tools, such as computers and hand-held devices; expands course offerings, experiences, and
learning materials; supports learning 24 hours a day, 7 days a week; builds 21 st century skills; increases
student engagement and motivation; and accelerates learning. Technology also has the power to transform
teaching by ushering in a new model of connected teaching. This model links teachers to their students and to
professional content, resources, and systems to help them improve their own instruction and personalize
learning.
Process Questions:
1. What is the advantage and disadvantage of ICT?
2. In what way do these trends in ICT help you in your daily life?
3. How does ICT affect your personal life?
4. How should technology be used?
PERFORMANCE TASK
The ICT-Department of Sto. Niño Institute of Getafe, Bohol, Inc. informed everyone that they will have a
contest regarding the advantages and disadvantages of ICT and its possible impact to our society. This
contest would be a great help to everyone especially to the students, for them to realize how ICT works
nowadays. As a young influencer and a young student of Sto. Niño Institute who would like to be part of the
said event, you approached the department head to join the said contest since you found it more interesting
wherein the blog with vlog that you are going to make would be a great help in molding one’s individual. Your
task is to create a blog with a vlog about the advantages and disadvantages of ICT and its impact to our
society. Talk about its positive and negative impacts and the youth’s role in helping promote its responsible
use. It is optional to insert pictures, background music, subtitles, effects or ect. in your video. Your output will
be evaluated using these criteria: Content and Organization, Usefulness, Creativity and Elements of Design,
Grammar and Content, and Oral Presentation Skills.
ANALYTIC RUBRIC IN SCORING THE OUTPUT (VLOG WITH A BLOG POST)
GLOSSARY OF TERMS:
- Online System - is a state of connectivity to the cyberspace through the
Internet or computer network.
- Service Industry – it includes major sectors such as business process
outsourcing, hotel and restaurant services, and airline industry, all of which
are increasingly reliant on online systems to attract clients and customers.
- Digital Camera – records and stores photographic image in digital form
- Cybersecurity – the collection of tools, policies, actions, practices, and
technologies that can be used to protect the cyber environment.
- Information Security – is the preservation of information or computer data’s confidentiality, integrity,
and availability.
- Libel – is the act of publishing false statements with the use of computers or computer systems.
- Malware – is a program that do unwanted actions or damage to an operating system in a seamless
manner, with the intent of harming the computer or user.
- Ergonomics – an approach which puts human needs and capabilities at the focus of designing
technological systems.