It Era
It Era
It Era
A reviewer
Presented to
Ms. Baby Ruth M. Par
Living in the IT Era
Philippine Christian University - Dasmariñas
By
Louissa Arwen P. Aguila
BSN 2A
2024, September 24
DIGITAL LITERACY TYPES OF SOFTWARE
1. System software:
Digital literacy is the ability to access, manage, Manages computer hardware and provides essential
understand, integrate, communicate, evaluate and services (e.g., operating systems like windows, macos,
create information safely and appropriately through linux).
digital technologies for employment, decent jobs and 2. Application software:
entrepreneurship. It includes competences that are Specific programs designed for various tasks (e.g.,
variously referred to as computer literacy, ICT literacy, word processors, web browsers, games)
information literacy and media literacy.
SYSTEM SOFTWARE EXAMPLES
WHAT IS DIGITAL LITERACY?
Digital Literacy refers to the ability to understand 1. MICROSOFT WINDOWS OS
information and perform tasks in digital environments. 2. MacOS
3. Raspberry Pi OS
FUNDAMENTAL IT CONCEPTS 4. Linux OS
Hardware, Software, Networks, and Data
APPLICATION SOFTWARE EXAMPLES
What is Computer?
A computer is a programmable device that processes 1. Web browsers
data and performs various tasks by executing 2. Office application
instructions given to it in the form of programs or 3. Graphic & multimedia software
software. 4. Entertainment applications
Hardware NETWORKS
Refers to the physical components of a computer A network is a collection of interconnected
system or its infrastructure. These components can devices(computers, servers, routers) that can
be touched and seen. Function: Hardware performs communicateand share data with each other. It
the actual processing, storage, and input/output enable data sharing,remote communication, and
functions in a computing system. access to resources like the internet.
KEY ASPECTS OF CYBER SECURITY AWARENESS: MULTI- KEY ASPECTS OF CYBER SECURITY AWARENESS: REGULAR
FACTOR AUTHENTICATION (MFA) UPDATES AND PATCHING:
Promote the use of MFA wherever possible. Emphasize the importance keeping software, of
MFA adds an extra layer of security by requiring users operating systems, and applications up-to- date with
to provide multiple forms of verification, such as a the latest security patches and updates.
password and a one-time code sent to their mobile
device. KEY ASPECTS OF CYBER SECURITY AWARENESS: BYOD
(BRING YOUR OWN DEVICE) POLICIES
KEY ASPECTS OF CYBER SECURITY AWARENESS: SECURE Establish clear BYOD policies and educate employees
FILE SHARING on the security measures they should follow when
Encourage the use of secure file sharing methods and using personal devices for work purposes.
tools, such as encrypted file transfer and secure cloud
storage services. KEY ASPECTS OF CYBER SECURITY AWARENESS: SECURE
FILE SHARING
CYBER SAFETY TIPS PERSONAL INFORMATION Encourage the use of secure file sharing methods and
Do not give out details such as your name, age, tools, such as encrypted file transfer and secure cloud
birthday, address or phone number to individual storage services.
Internet users in settings like chat rooms or on social
networking sites such as Twitter and Facebook. When
filling out online forms -such as surveys, email
KEY ASPECTS OF CYBER SECURITY AWARENESS: REGULAR
SECURITY AWARENESS ASSESSMENTS
Conduct simulated phishing exercises and other
security awareness assessments to gauge the
effectiveness of your training programs and identify
areas that need improvement.