Mil [Lesson1 7]
Mil [Lesson1 7]
MEDIA AND
INFORMATION LITERACY
MOREH ACADEMY
RIGHTEOUSNESS AND EXCELLENCE
Blk 52, Lot 31, Purok 2, A. Bonifacio Avenue, cor Ricahuerta St., Upper Bicutan Taguig City
Tel. Nos.: 839-0135; 838-9077 Email: [email protected]
Cave paintings (35,000 BC) Dibao in China (2nd Century) Transistor Radio Mainframe computers - i.e. IBM 704
Clay tablets in Mesopotamia (1960)
Acta Diurna in Rome (130 BC Television (1941) Personal computers - i.e. Hewlett
(2400 BC)
Codex in the Mayan region Packard 9100A (1968), Apple 1 (1976)
Papyrus in Egypt (2500 BC) OHP, LCD projectors Large electronic computers- i.e.
(5th Century)
Printing press using wood EDSAC
blocks (220 AD)
✓ Information Age (1900s-2000s)
✓ Industrial Age (1700s-1930s) • The Internet paved the way for faster communication and the
• People used the power of steam, developed machine tools, creation of the social network. People advanced the use of
established iron production, and the manufacturing of various microelectronics with the invention of personal computers, mobile
products (including books through the printing press). devices, and wearable technology. Moreover, voice, image,
Examples: sound and data are digitalized. We are now living in the
information age.
Printing press for mass Commercial motion pictures Examples:
production (19th century) (1913) ✓ SEARCH ENGINES- e.g Google (1996), Yahoo! (1995)
Newspaper- The London ✓ SOCIAL NETWORK- e.g Facebook (2004)
Telegraph
Gazette (1640) ✓ VIDEO SHARING- e.g YouTube (2005), Tiktok (2016)
Motion picture ✓ PORTABLE COMPUTERS- e.g SmartPhones (1992), Laptops (1980)
Telephone (1876)
photography/projection (1890)
Commercial motion pictures
Typewriter (1800)
(1913)
Motion picture with sound
(1926)
MOREH ACADEMY
RIGHTEOUSNESS AND EXCELLENCE
Blk 52, Lot 31, Purok 2, A. Bonifacio Avenue, cor Ricahuerta St., Upper Bicutan Taguig City
Tel. Nos.: 839-0135; 838-9077 Email: [email protected]
2. PLAGIARISM CYBERCRIME
An act or instance of using or closely imitating the language and • It is also called computer crime, the use of a computer as an instrument to
thoughts of another author without authorization and the representation further illegal ends, such as committing fraud, trafficking in child
of that author's work as one's own, as by not crediting the original author. pornography and intellectual property, stealing identities, or violating
3. PATENT privacy.
It is an exclusive right granted for an invention. It provides the patent CYBERBULLYING
owner with the right to consent to the invention or a way for others to • It is the use of digital means of communication that could hurt or harass a
use it. person.
4. TRADEMARK DIGITAL DIVIDE
It is a distinguished sign of goods or services of one enterprise from those • The digital divide is a term that refers to the gap between demographics
of other enterprises. and regions that have access to modern information and communications
5. INDUSTRIAL DESIGN technology (ICT), and those that don't or have restricted access.
It defines as an ornamental or aesthetic aspect of an item. FAKE INFORMATION
6. GEOGRAPHICAL INDICATIONS AND APPLICATIONS OF ORIGIN • False information is news, stories, or hoaxes created to deliberately
These are signs used on products possessing qualities, a status, or misinform or deceive readers.
characteristics that are essentially attributable to that location of origin. NETIQUETTE
COMMON ISSUES ON DATA PRIVACY • Netiquette or network etiquette is a set of rules for behaving properly
1. Hacking- it involves activities that seek to compromise digital online.
devices, such as computers, smartphones, tablets, and even entire VIRTUAL SELF
networks. • It Is how you present yourself on online platforms. Whatever you say or do
2. Phishing- it is a type of social engineering attack often used to steal on the Internet can be viewed and others can easily pass judgment
user data, including login credentials and credit card numbers. without even knowing who you are outside the virtual environment.
3. Identity Theft- it occurs when a criminal obtains or uses the personal DIGITAL FOOTPRINT
information of someone else to assume their identity or access their • It is any data record of the things you do online. Anything on the Internet
account for the purpose of committing fraud, receiving benefits or with your name creates a trail of data about you.
gaining financially in some way COMPUTER ADDICTION
• It is the “over-dependence or a damaging need to do something on
computer or internet”
MOREH ACADEMY
RIGHTEOUSNESS AND EXCELLENCE
Blk 52, Lot 31, Purok 2, A. Bonifacio Avenue, cor Ricahuerta St., Upper Bicutan Taguig City
Tel. Nos.: 839-0135; 838-9077 Email: [email protected]