G4.2 - Trends and Issues in ICT
G4.2 - Trends and Issues in ICT
G4.2 - Trends and Issues in ICT
2-1
Learning Objectives:
- a broad range of technology resources that used for transmitting, storing, sharing, and
exchanging of information.
What is Trend?
ahead of time.
What is Issue?
- are the issues that require resolution. These are extremely delicate subjects.
1. Social Media
- used by people to connect and interact with their friends, family, and other
Social Networks
- these are the apps that allow you to interact with other individuals with a common
Bookmarking Sites
- these are the websites that let you to arrange and manage of links to various sites
and resources. You could make tag on most of these websites so that other users
- these websites allow users to post their own reports or articles to other news
sources and allowing users to leave their opinions or comments, which can also be
evaluated.
Media Sharing
- these websites you may post and share media assets, such as pictures, music, and
videos. The majority of these websites include extra social features like user profiles
- these are websites that highlight short user updates. These updates will be available
- users can publish their content on these websites and can leave comments or
opinions. Additionally, forums are usually a part of a certain website or web service.
- over the past few years, tablets and smartphones have become much more popular.
previously only found in personal computers. Some of these gadgets can connect to
which is the fastest mobile network available right now. Additionally, mobile devices
Mobile Devices:
iOS - the operating system for the iPhone, iPad, and other Apple mobile devices is
called Apple iOS. Apple iOS, which is based on Mac OS, the operating system that
powers Apple's lineup of desktop and laptop computers, is made to make networking
Android - the Android operating system has been available for mobile devices for
almost 15 years. It is mostly used as the default operating system on phones and
tablets around the globe. In addition, Windows 11 and Chrome OS are among the
Window Phone OS - microsoft created the exclusive mobile operating system known
as Windows Phone. Metro UI, the design language that Windows Phone initially
Symbian - early in the new millennium, Symbian, a mobile operating system (OS) for
Nokia, Motorola, and Ericsson, three of the biggest producers of mobile phones.
WebOS - an open source Linux-based operating system for TVs and appliances by
LG is also referred to as a Web OS, as is any operating system created specifically for
Web use. See ChromeOS. Web technologies including JavaScript, CSS, and HTML5
are supported by webOS, a touchscreen operating system that Palm developed and
particularly for Pocket PCs and cellphones. It was first made available with the Pocket
PC 2000 operating system, using the Windows CE kernel as its foundation. Windows
by Microsoft, along with basic applications created using the Microsoft Windows
purchase.
3. Assistive Media
- was a nonprofit organization that is created to benefit those with vision and reading
- abbreviated to AI, is a space of computer science that seeks to provide software the
ability to analyze its environment using models of machine learning that recognizes
patterns and established rules and search algorithms, and formulate choices based on
those analyses. It is a system that can comprehend, learn, predict, and react to a
control characters that are not players in a computer game, a robot in the real world,
- the engineering disciplines of robotics and automation are concerned with the
creation, operation, and maintenance of machines, or robots, that carry out tasks that
are typically completed by humans. They are utilized to improve productivity and
6. Metaverse
- the term "metaverse" describes a virtual reality environment where users can
communicate in real time with one other and the surroundings in the metaverse. They
are also capable of creating their own worlds, things, and experiences.
and confirm transactions by storing data across numerous platforms. Its potential
applications are well beyond cryptocurrency like Bitcoin, for which it is most well-
8. Spatial Computing
- one kind of computing technology called spatial computing makes use of the spaces
where people move and behave. It allows computers to see and react to human
allows for real-time interaction and communication. This is especially crucial for
1. Faster Speeds
2. Lower Latency
3. Increased Capacity
4. Enhanced Connectivity
ISSUES IN ICT
Copyright
original intellectual work may be used. Since the original work has been protected by
Copyright Infringement/Violation
- when someone uses significant parts of a work without permission and without
establishing fair use of them, or copies a work protected by copyright and passes it off
as their own, that is considered copyright infringement. You must demonstrate both
the work's ownership and its suitability for copyright protection in order to establish a
copyright violation. This indicates that the necessary degree of uniqueness is present
in your work. The validity of the copyright is demonstrated if you register and receive
your certificate of copyright within five years after producing the work.
Demonstrating that your work has been copied is the second requirement. When a
work is made accessible for use without the owner of the copyright's consent, it is said
that they are "in the public domain" is that their copyrights have run out.
Plagiarism
- means "to steal and pass off ideas or words of another as one's own." It occurs when
Hacking
SOCIAL ISSUES
Cybercrime
- criminal action that involves the intentional use or targeting of a computer, computer
looking to profit from their crimes commit the majority of cybercrime. On certain
TYPES OF CYBERCRIME:
1. Internet fraud - the term "internet fraud" refers to any kind of fraud scheme that
presents bogus requests to potential victims through email, websites, chat rooms, or
Cyberbullying
- bullying using digital platforms, such as computers, tablets, and cell phones, is
gaming where users can read, interact with, or exchange content. It can also happen
individual in a way that makes them feel embarrassed or degraded. Cyberbullying can
Online Harassment
licenses. This may involve contacting the original content owners, purchasing a
2. Fair use
- a legal principle known as fair use permits the restricted use of copyrighted content
for specific uses, like commentary, news reporting, and teaching. Take into account
the reason for your use, the type of copyrighted work, the quantity used, and the
possible effect on the original work's market value to determine whether your use of
- when use content protected by copyright, always give due credit to the original
author.
Plagiarism
1. Paraphrasing or quoting from your sources (by using a paraphrasing tool and
2. Crediting the original author in an in-text citation and in your reference list.
- don’t Click the link or attachment if you have any doubts about the source.
- certain phone functions can be used by hackers to access your data, location, or
connection. Therefore, only turn on your GPS, wireless network, and geo tracking
Cybercrime
- avoid using the same passwords across many websites, and make sure you change
them frequently. Give them complexity. This requires the use of a minimum of ten
different letters, numbers, and symbols. Your passwords may be kept secure with the
- when it comes to your operating systems and internet security software, this is quite
cybercriminals to access your system. By fixing such vulnerabilities and exploits, you
your personal information with only a few data points. For example, posting the name
of your pet or disclosing your mother's maiden name might expose the answers to two
information, usually with the intention of making money. How? For example, you
intercept your mail and use it to access account information. It is crucial to protect
your personal information because of this. Virtual private networks, or VPNs, can
also aid in safeguarding the information you send and receive online, particularly
Cyberbullying
- look into the steps you may take to protect private material on the websites you visit.
You may change your privacy settings on Facebook and other social networking sites
to limit who can view your posts and personal information to those you want. It's
crucial to regularly check these privacy settings since websites occasionally alter their
rules.
be taken down. Don't say anything online if you wouldn't say it in front of a group of
strangers. There may be unintended effects even if you send someone private or
- don't post any personally identifiable information online, such as your address,
phone number, school, credit card number, etc. There's a reason password is used;
exposing them to others is similar to giving out duplicates of your home key to both
acquaintances and total strangers. Your parents alone should be the only people who
Online Harassment
- make sure your social media accounts have stringent privacy settings to prevent
harassment in the future. Make sure to keep your personal information private by
setting your accounts on social media sites like Facebook and Twitter to "friends
only" or "private." Posting your home address, phone number, name from school or
2. Report Threats/Dangers
- inform the police about any threats of physical harm. Report anything to the
authorities right once if someone phones or contacts your place of work, distributes
safety.
Multiple Choice: Read and analyze the statement carefully. Choose the best answer
a. Social Media
b. Spatial Computing
c. Convergence
d. Assistive Media
2. Type of social media that allow you to interact with other individuals with a
a. Media Sharing
b. Microblogging
c. Social Networks
d. Social News
3. One kind of computing technology that makes use of the spaces where people
a. 5G Networks
b. Metaverse
4. Refers to the ownership of the whole right to decide how and to what degree one's
a. Plagiarism
b. Hacking
c. Copyright
d. Copyright Infringement/Violation
a. Networking over 3G
b. LTE 4G networking
c. Networking with 5G
d. Cutting-Edge Communications
c. Claiming credit for someone else's work and passing it off as your own
8. What is the main objective of fair usage since it relates to copyright law?
9. Which safety phase restricts access to location data and personal information to
b. When not in use, turn off your wi-fi network, GPS, and geo tracking.
c. Metaverse
d. Blockchain
11. It describes a virtual reality environment where users can communicate with each
c. Metaverse
d. Blockchain
12. A criminal action that involves the intentional use or targeting of a computer,
a. Cyberbullying
b. Hacking
c. Cybercrime
d. Harassment
a. Cyberbullying
b. Hacking
c. Cybercrime
d. Harassment
a. Blockchain
c. Social Networks
d. Social News
1. C.
2. C.
3. C.
4. C.
5. B.
6. C.
7. C.
8. C.
9. B.
10. A.
11. C.
12. C.
13. B.
14. B.
15. A.