0% found this document useful (0 votes)
34 views6 pages

EM-TECH - Handouts 1

Uploaded by

aziel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views6 pages

EM-TECH - Handouts 1

Uploaded by

aziel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

LESSON 1: INTRODUCTION TO ICT 

resources are identified by URLs,  interlinked


by hypertext links, and can be accessed via the
ICT– Information and Communication-  Internet. 
• Invented by Tim-Berners Lee 
• It deals with the use of different communication
technologies such as mobile phones, Web Pages 
telephone, Internet  to locate, save, send and
edit information  • Web page is a hypertext document connected to
• Is a study of computers as data processing tools. the World Wide Web. It is a document that is
It introduces students to the fundamental of suitable  for the World Wide Web. 
using  computer systems in an internet
environment.  The different online platforms of World Wide
Web: 

ICT in the Philippines  1. Web 1.0 – refers to the first stage in the World
Wide Web, which was entirely made up of the
• Philippines is dub as the ‘’ICT Hub of Asia” Web pages  connected by hyperlinks. 
because of huge growth of ICT-related jobs,
one  of which is BPO, Business Process 2. Web 2.0 – is the evolution of Web 1.0 by
Outsourcing, or call centers.  adding dynamic pages. The user is able to see
• ICT Department in the Philippines is responsible a website  differently than others. 
for the planning, development and promotion
of  the country’s information and – Allows users to interact with the page; instead
communications technology (ICT) agenda in of just reading the page, the user may be able to
support of national  development.  comment or  create user account. 

3. Web 3.0 – this platform is all about semantic


Computer– an electronic device for web. 
storing and processing data, typically in
binary form, according to  instructions – Aims to have machines (or servers)
given to it in a variable program.  understand the user’s preferences to be able to
Internet– is the global system of deliver web  content.
interconnected computer networks that
use the internet protocol suite  (TCIP/IP)
to link billions of devices worldwide.  Static Web Page- is known as a flat page or
stationary age in the sense that the page is ‘’as is’’
• Means of connecting a computer to any other and cannot be  manipulated by the user. The
computer anywhere in the world via content is also the same for all users that is
dedicated  routers and servers.  referred to as Web 1.0 
• Sometimes called simply ‘’the Net’’, is a
worldwide system of computer networks- a
network of  networks in which the users at any Dynamic Web Pages– web 2.0 is the evolution of
one computer can get information from any web 1.0 by adding dynamic web pages. The user
other computer.  is able to see  website differently than others e.g.
social networking sites, wikis, video sharing sites. 

World Wide Web 

• An information system on the internet that FEATURES OF WEB 2.0 


allows documents to be connected to other
documents  by hypertext links, enabling the
user to search for information by moving from
one document to another. • Is an information
space where documents and other web
1. Folksonomy- allows user to categorize and Social Networks – These are sites that
classify information using freely chosen allows you to connect with other people with
keywords e.g.  tagging by FB, Twitter, use the same interests or  background. Once the
tags that start with the sign #, referred to as user creates his/her account, he/she can set up
hashtag. a profile, add people, share content, etc 
 
2. Rich User Experience – content is dynamic Example: Facebook and Google+ 
and is responsive to user’s input 
Bookmarking Sites – Sites that allow you to
3. User Participation- The owner of the website store and manage links to various website and
is not the only one who is able to put content. resources. Most of  the sites allow you to create
Others are  able to place a content of their a tag to others. 
own by means of comments, reviews and
evaluation e.g. Lazada, Amazon. Stumble Upon, Pinterest 

4. Long Tail– services that are offered on


demand rather than on a one-time purchase. Social News – Sites that allow users to post their
This is synonymous  to subscribing to a data own news items or links to other news sources.
plan that charges you for the amount of time The users can  also comment on the post and
you spent in the internet. comments may also be rank. 

5. Software as a services- users will be Ex. Reddit and Digg 


subscribe to a software only when needed
rather than purchasing  them e.g. Google docs d) Media Sharing – sites that allow you to
used to create and edit word processing and
spread sheet.  upload and share media content like images,
6. Mass Participation– diverse information
sharing through universal web access. Web music and video. Ex. Flickr, YouTube and
2.0’s content is  based on people from various
cultures.  Instagram 

TRENDS IN ICT 
e) Microblogging – focus on short updates from
the user. Those that subscribed to the user will be
able to receive  these updates. 
1. Convergence– is the synergy of technological Ex. Twitter and Plurk 
advancements to work on a similar goal or
task. For  example, besides using your
personal computer to create word documents,
f) Blogs and Forums – allow user to post their
you can now use your  smartphone. 
content. Other users are able to comment on the
said  topic. 
2. . Social Media– is a website, application, or
Ex. Blogger, WordPress and Tumblr
online channel that enables web users web
users to create ,  co-create, discuss modify,
and exchange user generated content. 

3. Mobile Technologies– The popularity of


smartphones and tablets has taken a major rise
over the years.  This is largely because of the
devices capability to do the tasks that were
Six types of Social Media: 
originally found in PCs. Several  of these
devices are capable of using a high-speed
internet. Today the latest model devices use
4G  Networking (LTE), which is currently the 3. Datacenters – It is collection of servers
fastest.  where application is placed and is accessed via
Internet. 
MOBILE OS 

• iOS – use in apple devices such as iPhone TYPES OF CLOUDS 


and iPad 
PUBLIC CLOUD allows systems and services to
• Android – an open source OS developed by be easily accessible to the general public. Public
Google. Being open source means mobile cloud may be  less secured because of its
phone companies  use this OS for free.  openness, e.g. e-mail 
• Blackberry OS – use in blackberry devices 
PRIVATE CLOUD allows systems and services
to be accessible within an organization. It offers
• Windows phone OS – A closed increased  security because of its private nature. 
source and proprietary operating
system developed by Microsoft.
COMMUNITY CLOUD allows systems and
services to be accessible by group of
• Symbian– the original smartphone organizations. 
OS. Used by Nokia devices 
HYBRID CLOUD is a mixture of public and
• WebOS- originally used in smartphone; now private cloud. However, the critical activities are
in smart TVs.  performed using  private cloud while the non-
• Windows Mobile – developed by Microsoft critical activities are performed using public
for smartphones and pocket PCs  cloud.
LESSON 2: ONLINE SAFETY, SECURITY
4. Assistive Media– is a non- profit service AND RULES OF NETIQUETTE 
designed to help people who have visual and 
reading impairments. A database of audio
recordings is used to read to the user. 
INTERNET SAFETY- it refers to the online
5. e.g. Yahoo!, Gmail, HotmailCloud security or safety of people and their information
computing-distributed computing on internet when using  internet. 
or delivery of  computing service over the NETIQUETTE- is network etiquette, the do’s
internet.  and don’ts of online communication. 

-Instead of running an e-mail program on your


computer, you log in to a Web  TEN RULES OF NETIQUETTE 
e-mail account remotely. The software and Rule No. 1: Remember the human 
storage for your account doesn’t exist 
• You need to remember that
on your computer – it’s on the service’s computer you are talking to a real
cloud.  person when you are online. •
The internet brings people
It has three components  together who would
otherwise never meet. 
1. Client computers – clients are the device • Remember this saying when
that the end user interact with cloud. 2.
Distributed Servers – Often servers are in sending an email: Would I say this to
geographically different places, but server acts
as if they are  working next to each other.  the person’s face. Rule No. 2:
Adhere to the same standards online Rule no. 7: Help keep flame wars under control 

that you follow in real life.  • Netiquette does not forgive flaming. 
• Netiquette does however forbid people who are
• You need to behave the same way online that flaming to hurt discussion groups by putting
you do in real life.  the  group down. 
• You need to remember that you can get caught
doing things you should not be doing online  Rule no. 8: Respect other people’s privacy. 
just like you can in real life. 
• You are still talking to a real • Do not read other people’s mail without their
permission. 
person with feelings even though • Going through other people’s things
could cost you, your job or you could
you can’t see them. Rule no. 3: even go to jail. • Not respecting other
people’s privacy is a bad netiquette.
Know where you are in Rule no. 9: Don’t abuse your power. 

cyberspace.  • Do not take advantage of other people just


because you have more knowledge or power
• Always take a look around than them. • Treat others as you would want
when you enter a new them to treat you if the roles were reversed. 
domain when surfing the
web. • Get a sense of what Rule no. 10: Be forgiving of other people’s
the discussion group is about mistake. 
before you join it. 
• Do not point out mistakes to people online. 
Rule no. 4: Respect other people’s time and • Remember that you were once the new kid
bandwidth.  on the block. 
• You still need to have a good manners even
• Remember people have other things to do though you are online and cannot see  the
besides read your email. You are not the person face to face. 
center of their  world. 
• Keep your post and emails to minimum by
saying what you want to say. 
• Remember everyone won’t answer your
questions. 

Rule no. 5: Make yourself look good online. 

• Be polite and pleasant to everyone. 


• Always check your spelling and grammar Internet security 
before posting. 
• · Know what you are talking about and make Security Requirement Triad 
sense saying it. 

Rule no. 6: Share expert knowledge  ConfidentIality 


Data confidentiality 
• Ask questions online  Privacy 
• Share what you know online. 
• Post the answers to your questions online • Integrity 
because someone may have the same  question Data integerity System integrity 
you do. 
• Availability 
Threat Consequence Threat Action ( Attack)  Masquerade: An unauthorized entity gains access
Exposure: Sensitive data are directly released to a system or  performs a malicious act by posing
to an unauthorized   as an authorized entity. 
entity. 
Falsification: False data deceive an authorized
entity. 

Unauthorized Disclosure  Repudiation: An entity deceives another by


falsely denying  responsibility for an act. 
A circumstance or event whereby an  entity gains
access to data for which the  entity is not Misappropriation: An entity assumes 
authorized. unauthorized logical or physical control of a 
system resource.
Disruption 
Misuse: Causes a system component to
A circumstances or even that interrupts  or
prevents the correct operation of  system services perform a function or service that is
and functions. 
detrimental to system security. Types of
Deception 
System Intruders 
A circumstance or event that may result  in an
authorized entity receiving false  data and • Masquerader 
believing it to be true.  • Hackers 
• Clandestine user 

Usurpation 

A circumstances or event that results in  control of


system services or functions  by an unauthorized
entity. 
Interception: An unauthorized entity directly
accesses sensitive  data traveling between Parts of Virus 
authorized sources and destinations. 
• Infection mechanism 
Inference: A threat action whereby an • Trigger 
unauthorized entity  indirectly accesses sensitive • PayloaD 
data by reasoning from characteristics  or
byproducts of communications.  Key Terms 

Intrusion: an unauthorized entity gains access to Cyber crime- a crime committed or assisted
sensitive data by  circumventing a system’s through the use of the Internet. 
security protections. 
Incapacitation: prevents or interrupts system Privacy Policy/Terms of
operation by  disabling a system component. 
Services (ToS) – tells the user
Corruption: Undesirably alters system operation
by adversely  modifying system functions or data.  how the website will handle its

Obstruction: A threat action that interrupts data. Malware- stands for


delivery of system  services by hindering system
operation.  malicious software. 
Virus- a malicious program designed to transfer Rogue security softwares– is a form of malicious
from one computer to another in any means software and internet fraud that misleads users
possible.  into believing  there is a virus on their computer,
and manipulates them into paying money for a
Worms– a malicious program designed to fake malware removal tool.
replicate itself and transfer from one file folder to
another and also  transfer to other computers. 

Trojan-a malicious program designed that is


disguised as a useful program but once
downloaded or installed,  leaves your PC
unprotected and allows hacker to get your
information. 

Spyware– a program that runs in the background


without you knowing it. It has the ability to
monitor what you  are currently doing and typing
through key logging. 

Adware- a program designed to send you


advertisement, mostly pop-ups. 

Spam– unwanted email mostly from bots or


advertisers. 

Phishing- acquires

sensitive personal

information like passwords

and credits card details.

Pharming- a more

complicated way of

phishing where it exploits

the DNS system. 

Copyright- a part of law, wherein you have the


rights to work, anyone who uses it w/o your
consent is punishable  by law. 

Fair Use- means that an intellectual property may


be used w/o consent as long as it is used in
commentaries,  criticism, parodies, research and
etc. 

Keyloggers- used to record the keystrokes done


by user. This is done to steal passwords or any
other sensitive  information. 

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy