Thursday, February 10, 2011

Information and communications technology

             ◙ Information and communications technology ◙

The main purpose of ICT in Education means implementing of ICT Equipments and Tools in Teaching-Learning process as a media and methodology. The purpose of ICT in education is generally to familiarize students with the use and workings of computers, and related social and ethical issues.
ICT has also enabled learning through multiple intelligence as ICT has introduced learning through simulation games; this enables active learning through all senses.

ICT is not taught as a subject in primary school. It is taught as an added advantage to some schools. In high school, the ICT is an optional subject. In the university level students are offered several options to choose from. One may either take Bachelor of Science in Information Technology, Bachelor of Science in Computer Science, Bachelor of Business Information Technology or Bachelor of Science in Computing Technology. All these courses are inter-related in terms of course work but differ in the majors that a student wants to take or Master. ICT is much broken down into deeper details compared to IT. It is more advantageous compared to ICT.



Other countries, such as the Philippines, also have integrated ICT in their curriculum. In fact, as early as pre-elementary education in some schools, pupils are having their computer subjects. Other non-computer degree courses in tertiary also incorporated Computer Technology as part of their curriculum.


Information and Communication Technology (ICT) is a subject in education, and a part of the National Curriculum. Most students can choose to study Information and Communication Technology to GCSE level.
The ICT programmed in the United Kingdom is co-ordinate by Becta. A major initiative was the Curriculum Online scheme, which was closed in 2008 and which was produced to accelerate the uptake of technology amongst schools. Becta took over the running of this scheme from the Department for Education and Skills in 2005. Becta worked closely with the Joint Information Systems Committee to develop strategy.
Students are taught to use software such as office suites, desktop publishers; they are also taught about ICT theory, and how ICT can be used to solve problems. Computer programming is not taught at GCSE level.
Students also study the Data Protection Act, the Computer Misuse Act, and other legal and ethical issues related to ICT.
Many schools have specialist school status in technology and, more recently, in maths and computing, and these schools champion the use of ICT to enhance teaching and learning.

    It is usually called ICT, is often used as an extended synonym for information technology (IT) but is usually a more general term that stresses the role of unified communications and the integration of telecommunicationsmiddleware as well as necessary software. In other words, ICT consists of IT as well as telephony, broadcast media, all types of audio and video processing and transmission and network based control and monitoring functions. The expression was first used in 1997[3] in a report by Dennis Stevenson to the UK government and promoted by the new National Curriculum documents for the UK in 2000. (telephone lines and wireless signals), intelligent building management systems and audio-visual systems in modern information technology. ICT consists of all technical means used to handle information and aid communication, including computer and network hardware, communication
ICT is often used in the context of "ICT roadmap" to indicate the path that an organization will take with their ICT needs.
The term ICT is now also used to refer to the merging (convergence) of audio-visual and telephone networks with computer networks through a single cabling or link system. There are large economic incentives (huge cost savings due to elimination of the telephone network) to merge the audio-visual, building management and telephone network with the computer network system using a single unified system of cabling, signal distribution and management. See VOIP and Intelligent Infrastructure Management (IIM). This in turn has spurred the growth of organizations with the term ICT in their names to indicate their specialization in the process of merging the different network systems.









Information and communications technology

Sunday, January 30, 2011

five latest gadgets :

Latest gadget: The Video Watch



Stainless Steel Video Watch has 8GB of internal flash memory and a full color 1.8″ screen.It is one of the latest gadgets available on the market.
 I this kind of the gadgets because this watch has a built-in voice recorder, a built-in high quality speaker and a earphone jack, the ability to view JPEG pictures and listen to music at the same time, and much more.

Gadget With a View


This part of the gadgets it was getting harder to dial the minuscule buttons on ever-smaller cell phones; he couldn’t see what he was tapping on the keypad while he was holding the phone. What he really needed, he decided, was fingers he could see through.
 
 

Cool Concepts - The Curved iMac

 
It features two screens, the main one is a large curved LCD display at the front. There is a second LCD screen built into the back, and there are also two web-cams one front and back.

1GB Camcorder Pen


This quite discrete “secret agent pen” features a built-in 1GB flash memory and it is capable or recording almost 3 hours of video with audio.
Sitting in your shirt pocket, standing in the pen cup or lying on the desk no-one will ever notice as you secretly capture their every move. The built in flash stores the video until it is ready to be downloaded to a computer via USB, and with 1GB of memory you’ll get almost 3 hours of recording time.

Cyborg Gaming Keyboard


Saitek launched the Cyborg Keyboard which is fully customisable, can backlight the gaming keys in three different colors and brightness.
The red, green or amber backlights can be programmed to highlight the keys most often used in gaming - the WASD, cursor, ‘C‘ and Numpad keys.
It has a touch-sensitive control panel that allows the user to quickly convert the keyboard from normal mode to gaming mode by pressing the Cyborg button.

 

Monday, December 6, 2010

ßååååå ASSIGNMENTôô♪♠♦↓╔

ASSIGNMENT:
 
  1. Why was there been dramatic increase in the number of computer related security incedents in recent years? (Src. Ethics in Information Technology 2nd Edition by George Reynoldds p. 68)
     The dramatic increase in computing speeds has added to the dilemma because ... Peter Stephenson has been a network consultant and lecturer for 18 years, special- ..... of a Computer Security Incident.” Here we will be very specific about the ... There is no single, easy profile of cyber crime or the cyber criminal. ...
2. What are Some Characteristics of Common Computer Criminals.
   Including their objectives including their?
 This is the characteristics of Computer Criminals :\
           Spam ,Fraud ,Obscene or offensive content ,Harassment ,Drugtrafficking, Cyberterrorism,
    Cyber warfare.

3. What action must be taken in response to a security incedents.

      A great deal of damage has been done to organizational reputations and a great deal of information has been lost in organizations that do not have fully effective incident response programs in place.  Without an incident response plan, an organization may not discover an attack in the first place, or, if the attack is detected, the organization may not follow proper procedures to contain damage, eradicate the attacker’s presence, and recover in a secure fashion.  Thus, the attacker may have far higher impact on the target organization, causing more damage, infecting more systems, and possibly exfiltrating more sensitive data than would otherwise be possible with an effective incident response plan.

What is FIREWALL? ♫







WHAT IS FIREWALL?

Firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices that is configured to permit or deny network transmissions based upon a set of rules and other criteria.
Firewalls can be implemented in either hardware or software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which inspects each message and blocks those that do not meet the specified security criteria.

There are several types of firewall techniques:
  1. Packet filter: Packet filtering inspects each packet passing through the network and accepts or rejects it based on user-defined rules. Although difficult to configure, it is fairly effective and mostly transparent to its users. It is susceptible to IP spoofing.
  2. Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation.
  3. Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking.
  4. Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.