0% found this document useful (0 votes)
110 views2 pages

3rd Grading Emtech Handout

The document discusses the current state of information and communication technologies (ICT). It covers the evolution of the World Wide Web from static Web 1.0 to today's interactive Web 2.0 and the emerging semantic Web 3.0. It also discusses social media, mobile media, assistive media, online safety threats like malware and phishing, and common online platforms in areas like social media, search engines, communications, payments, advertising, and creative content.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
0% found this document useful (0 votes)
110 views2 pages

3rd Grading Emtech Handout

The document discusses the current state of information and communication technologies (ICT). It covers the evolution of the World Wide Web from static Web 1.0 to today's interactive Web 2.0 and the emerging semantic Web 3.0. It also discusses social media, mobile media, assistive media, online safety threats like malware and phishing, and common online platforms in areas like social media, search engines, communications, payments, advertising, and creative content.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
You are on page 1/ 2

EMPOWERMENT TECHNOLOGIES

THE CURRENT STATE OF ICT TECHNOLOGIES


Technology - The application of scientific knowledge for practical purposes, especially in industry. A machinery and equipment developed from the application of
scientific knowledge.
ICT – Information and Communications Technology.
 It is an extended term of Information Technology (IT).
 It stresses the role of unified communications and the integration of telecommunications, computers, as well as necessary enterprise software, middleware,
storage, and audio-visual systems, which enable users to access, store, transmit, and manipulate information.
WEB 1.0
 Read Only web - Because there was no user interaction available. You can only read text and look at the pictures.
 It is a term coined to differentiate the first stage of the World Wide Web (www) in comparison with the present stage of the internet technology.
 At the beginning, there were few web content creators.
 Webpages were static and were called read only web.
 The only available feedback mechanism was through private emails.
WEB 2.0
 The term Web 2.0 was first used around 2004.
 Internet technology became more and more interactive.
 The internet became more available for everyone.
 The users can now interact, contribute, and create their own internet space and content (Explosion of Information & Social Media).
WEB 3.0
 It is described by Time Berners-Lee (Father of the WWW) as the read-write-execute web.
 It is referred to as the semantic web or data driven web content and response.
 The context of the search of the user is processed by a programming language to help the user by presenting options of what the person is interested in.
 It will not make Web 2.0 obsolete.
 Technology Convergence
 It is an evolution of technological developments that merge into a new system bringing together different types of applications and media.
SOCIAL MEDIA
 It is a collection of internet-based communication tools and computer assisted channels dedicated to allow users to interact, communicate, and share
information in a virtual community and network.
MOBILE MEDIA
 A range of handheld devices, from mobile phones, tablets, and e-readers to game consoles, primarily used as personal, interactive, Internet-enabled and
user-controlled portable platforms that allow interconnected users to exchange personal and nonpersonal information ( Wei, 2013 ).
ASSISTIVE MEDIA
 It is a nonprofit organization founded in 1996 in Michigan, USA. It was founded by David H. Harvey.
 The organization was the first internet-based reading service for persons with visual and reading impairments.
 The produce and publish voice-recorded written materials on cassettes, cds, and in the internet.

ONLINE SAFETY
Internet
 defined as the information superhighway.
 This means that anyone has access to this highway, can place info, and can grab that info.
Some Tips to Stay Safe Online:
 Be mindful on what you share online.
 Do not just accept terms and conditions, read it.
 Do not share your password with anyone.
 Avoid visiting untrusted websites.
 If you have WiFi at home, make it private by adding a password.
 Install and update an antivirus software on your computer.
INTERNET THREATS
1.Malware
 stands for “malicious software”.
 software that is intended to damage or disable computers and computer systems.
5 Types of Malware
a. Computer Virus
 It is a program that duplicates itself and then infects the computer. It spreads like a biological virus.
 It can be transferred by the use of removable storage media devices.
 Damages may be mild to severe.
b. Computer Worm
 It is a dangerous computer program that replicates itself through a network.
 It spreads by exploiting weaknesses in operating systems
c. Trojan Horse
 A malware fronting to perform a good task, but covertly performs undesirable function with the intention of entering the computer without the user’s
consent.
 It can disable the computer’s defenses, opening it to unauthorized entry. It can erase data, can corrupt files, allow access to computer, and
d. Spyware – a program that runs in the background without you knowing it (thus called “spy”). It has the ability to monitor what you are currently doing and
typing through keylogging.
e. Adware – a program designed to send you advertisements, mostly as pop-ups.
2. Spam
 an unwanted email mostly from bots or advertisers. It can be used to send malware.
3. Phishing
 It is a deceitful practice of trying to get confidential information such as passwords and usernames, and credit card details by making it appear as if it comes
from a trustworthy source.
 It is usually done through emails or using popular entity such as Microsoft, Yahoo, Google, Amazon, and financial institutions.
EMPOWERMENT TECHNOLOGIES
4. Pharming
 This is a dangerous hacker attack on a website which directs all traffic to that website to another fictitious website.
 The main objective is to obtain username and passwords, as well as credit cards and financial information
5. Botnet – group of compromised computer connected to a network ("zombie")
6. Denial of Service Attack - disrupts computer access to internet services

Online Systems, Functions, and Platforms


Online Platform Categories
 Social Media
 Search Engines
 Communication Services
 Payment Systems
 Advertising Platforms
 Creative Content Outlets

Web Search Engines


 It is a software system that is designed to search for information on the World Wide Web (WWW). The search results are generally presented in a line of results
referred to as Search Engine Results Page (SERPs).
 The information may be a mix of webpages, images, and other types of files.
Top 10 Search Engines (2016)
1. Google
2. Bing (Microsoft)
3. Yahoo (No. 1 email provider)
4. Ask.com (Ask Jeeves)
5. AOL.com (America Online)
6. Baidu (China)
7. Wolframalpha (Computational Knowledge Engine)
8. DuckDuckGo (simple)
9. Internet Archive (histories of a domain)
10. ChaCha.com (similar to Ask.com)
Communication Services
These are outsourced enterprise communications solutions that can be leased from a single vendor or provider.
A Communications Service Provider (CSP) is a provider that transports information electronically and can encompass public and private companies in telecom,
internet, cable, satellite, and managed services business. See examples below

Payment System
It is any system used to settle financial transactions through transfer of monetary value, and includes the institutions, instruments, people, rules,
procedures, standards, and technologies. See examples below

Advertising Platforms
It allows users to create and manage advertising campaigns, generate reports, and retrieve information about the ads, campaigns, and organizations that
are associated with an account.
Creative Content Outlets
 It is content that needs to be translated creatively.
 Topic/concept  Creative presentation it
ONLINE PLATFORMS
1. Presentation Tools – Prezi, Zoho Shows, MS PowerPoint.
2. Newsletter, ICT Content Platforms – Dropbox, Tumblr, Wix
3. Photo Editing Tools – Picasa, Adobe Photoshop, GIMP
4. Video Editing Tools – Sony Vegas Pro, Windows Movie Maker, Adobe Premier Pro
5. Photo uploading and hosting Tools – Dropbox, Flickr
6. Online Collaborative Tools – Google Drive, Viber, Facebook
7. Cloud Computing – Dropbox, Google Drive, Microsoft One Drive
8. Blog Tools – Blogger, WordPress, LiveJournal
9. Mapping Tools – Google Maps, Waze, Wikimapia
10. Music Production – Sony Vegas Pro, Audacity, Virtual DJ
11. Survey and Forms – Google Forms
12. ICT Projects and Content Publishing and Uploading Platforms – WordPress, MS Office Project Server, File Manager
13. Web Design Platforms – Wix, Weebly, Adobe Dreamweaver
14. Web Management Platforms – Drupal, WordPress, Joomla

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy