0% found this document useful (0 votes)
82 views8 pages

Earth and Science

The document discusses various topics related to information and communication technology (ICT) including computers, the internet, the world wide web, trends in ICT like social media and mobile technologies, online safety, and netiquette guidelines. Key aspects covered include definitions of ICT, the role of ICT in the Philippines, components and types of computers, the internet and how it connects devices, the evolution of the world wide web from static to dynamic pages, features of web 2.0, types of social media, mobile operating systems, cloud computing models, and rules for safe and polite online communication.

Uploaded by

Aj Laraya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
82 views8 pages

Earth and Science

The document discusses various topics related to information and communication technology (ICT) including computers, the internet, the world wide web, trends in ICT like social media and mobile technologies, online safety, and netiquette guidelines. Key aspects covered include definitions of ICT, the role of ICT in the Philippines, components and types of computers, the internet and how it connects devices, the evolution of the world wide web from static to dynamic pages, features of web 2.0, types of social media, mobile operating systems, cloud computing models, and rules for safe and polite online communication.

Uploaded by

Aj Laraya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Empowerment Technology – Quarter 1

ICT– Information and Communication technology


 It deals with the use of different communication technologies such as mobile phones,
telephone, and the Internet to locate, save, send, and edit information
 It is a study of computers as data processing tools. It introduces students to the
fundamentals of using computer systems in an internet environment.
ICT in the Philippines
 Philippines is dub as the ‘’ICT Hub of Asia” because of huge growth of ICT-related
jobs, one of which is BPO, Business Process Outsourcing, or call centers.
 ICT Department in the Philippines is responsible for the planning, development and
promotion of the country’s information and communications technology (ICT) agenda in
support of national development.

Computer– an electronic device for storing and processing data, typically in binary form,
according to instructions given to it in a variable program.
Internet– is the global system of interconnected computer networks that use the internet protocol
suite (TCIP/IP) to link billions of devices worldwide.
 Means of connecting a computer to any other computer anywhere in the world via
dedicated routers and servers.
 Sometimes called simply ‘’the Net’’, is a worldwide system of computer networks- a
network of networks in which the users at any one computer can get information from any
other computer.
World Wide Web
 An information system on the internet that allows documents to be connected to other
documents by hypertext links, enabling the user to search for information by moving from
one document to another.
 Is an information space where documents and other web resources are identified by
URLs, interlinked by hypertext links, and can be accessed via the Internet.
 Invented by Tim-Berners Lee

Web Pages
 Web page is a hypertext document connected to the World Wide Web. It is a document
that is suitable for the World Wide Web.
The different online platforms of World Wide Web:
1. Web 1.0 – refers to the first stage in the World Wide Web, which was entirely made up of
the Web pages connected by hyperlinks.
2. Web 2.0 – is the evolution of Web 1.0 by adding dynamic pages. The user is able to see a
website differently than others.
– Allows users to interact with the page; instead of just reading the page, the user may be able to
comment or create user account.
3. Web 3.0 – this platform is all about semantic web.
– Aims to have machines (or servers) understand the user’s preferences to be able to deliver
web content.
Static Web Page- is known as a flat page or stationary age in the sense that the page is ‘’as is’’
and cannot be manipulated by the user. The content is also the same for all users that is referred
to as Web 1.0

Dynamic Web Pages– web 2.0 is the evolution of web 1.0 by adding dynamic web pages. The
user is able to see website differently than others e.g. social networking sites, wikis, video sharing
sites.
FEATURES OF WEB 2.0
4. Folksonomy- allows user to categorize and classify information using freely chosen
keywords e.g. tagging by FB, Twitter, use tags that start with the sign #, referred to as
hashtag.
5. Rich User Experience – content is dynamic and is responsive to user’s input
6. User Participation- The owner of the website is not the only one who is able to put content.
Others are able to place a content of their own by means of comments, reviews and
evaluation e.g. Lazada, Amazon.
7. Long Tail– services that are offered on demand rather than on a one-time purchase. This
is synonymous to subscribing to a data plan that charges you for the amount of time you
spent in the internet.
8. Software as a services- users will be subscribe to a software only when needed rather than
purchasing them e.g. Google docs used to create and edit word processing and spread sheet.
9. Mass Participation– diverse information sharing through universal web access. Web 2.0’s
content is based on people from various cultures.
TRENDS IN ICT
1. Convergence– is the synergy of technological advancements to work on a similar goal or
task. For example, besides using your personal computer to create word documents, you can
now use your smartphone.
2. Social Media– is a website, application, or online channel that enables web users web users
to create , co-create, discuss modify, and exchange user generated content.
Six types of Social Media:
a)Social Networks – These are sites that allows you to connect with other people with the same
interests or background. Once the user creates his/her account, he/she can set up a profile, add
people, share content, etc
Example: Facebook and Google+
b)Bookmarking Sites – Sites that allow you to store and manage links to various website and
resources. Most of the sites allow you to create a tag to others.
Stumble Upon, Pinterest
c) Social News – Sites that allow users to post their own news items or links to other news
sources. The users can also comment on the post and comments may also be rank.
Ex. Reddit and Digg
d) Media Sharing – sites that allow you to upload and share media content like images, music
and video.
Ex. Flickr, YouTube and Instagram
e) Microblogging – focus on short updates from the user. Those that subscribed to the user will
be able to receive these updates.
Ex. Twitter and Plurk
f) Blogs and Forums – allow user to post their content. Other users are able to comment on the
said topic.
Ex. Blogger, WordPress and Tumblr
3. Mobile Technologies– The popularity of smartphones and tablets has taken a major rise over
the years. This is largely because of the devices capability to do the tasks that were originally
found in PCs. Several of these devices are capable of using a high-speed internet. Today the
latest model devices use 4G Networking (LTE), which is currently the fastest.
MOBILE OS
 iOS – use in apple devices such as iPhone and iPad
 Android – an open source OS developed by Google. Being open source means mobile
phone companies use this OS for free.
 Blackberry OS – use in blackberry devices
 Windows phone OS – A closed source and proprietary operating system developed by
Microsoft.
 Symbian – the original smartphone OS. Used by Nokia devices
 WebOS- originally used in smartphone; now in smart TVs.
 Windows Mobile – developed by Microsoft for smartphones and pocket PCs
4. Assistive Media– is a non- profit service designed to help people who have visual and reading
impairments. A database of audio recordings is used to read to the user.
5. Yahoo!, Gmail, HotmailCloud computing-distributed computing on internet or delivery of
computing service over the internet.

-Instead of running an e-mail program on your computer, you log in to a Web


e-mail account remotely. The software and storage for your account doesn’t exist
on your computer – it’s on the service’s computer cloud.

It has three components


1. Client computers – clients are the device that the end user interact with cloud.
2. Distributed Servers – Often servers are in geographically different places, but server acts
as if they are working next to each other.
3. Datacenters – It is collection of servers where application is placed and is accessed via
Internet.
TYPES OF CLOUDS
PUBLIC CLOUD allows systems and services to be easily accessible to the general public.
Public cloud may be less secured because of its openness, e.g. e-mail
PRIVATE CLOUD allows systems and services to be accessible within an organization. It offers
increased security because of its private nature.
COMMUNITY CLOUD allows systems and services to be accessible by group of organizations.
HYBRID CLOUD is a mixture of public and private cloud. However, the critical activities are
performed using private cloud while the non-critical activities are performed using public cloud.

LESSON 2: ONLINE SAFETY, SECURITY AND RULES OF


NETIQUETTE

INTERNET SAFETY- it refers to the online security or safety of people and their information
when using internet.
NETIQUETTE- is network etiquette, the do’s and don’ts of online communication.
Rule No. 1: Remember the human
 You need to remember that you are talking to a real person when you are online.
 The internet brings people together who would otherwise never meet.
 Remember this saying when sending an email: Would I say this to the person’s face.
Rule No. 2: Adhere to the same standards online that you follow in real life.
 You need to behave the same way online that you do in real life.
 You need to remember that you can get caught doing things you should not be doing
online just like you can in real life.
 You are still talking to a real person with feelings even though you can’t see them.
Rule no. 3: Know where you are in cyberspace.
 Always take a look around when you enter a new domain when surfing the web.
 Get a sense of what the discussion group is about before you join it.
Rule no. 4: Respect other people’s time and bandwidth.
 Remember people have other things to do besides read your email. You are not the center
of their world.
 Keep your post and emails to minimum by saying what you want to say.
 Remember everyone won’t answer your questions.
Rule no. 5: Make yourself look good online.
 Be polite and pleasant to everyone.
 Always check your spelling and grammar before posting.
 Know what you are talking about and make sense saying it.
Rule no. 6: Share expert knowledge
 Ask questions online
 Share what you know online.
 Post the answers to your questions online because someone may have the same question
you do.
Rule no. 7: Help keep flame wars under control
 Netiquette does not forgive flaming.
 Netiquette does however forbid people who are flaming to hurt discussion groups by
putting the group down.
Rule no. 8: Respect other people’s privacy.
 Do not read other people’s mail without their permission.
 Going through other people’s things could cost you, your job or you could even go to jail.
 Not respecting other people’s privacy is bad netiquette.
Rule no. 9: Don’t abuse your power.
 Do not take advantage of other people just because you have more knowledge or power
than them.
 Treat others as you would want them to treat you if the roles were reversed.
Rule no. 10: Be forgiving of other people’s mistakes.
 Do not point out mistakes to people online.
 Remember that you were once the new kid on the block.
 You still need to have good manners even though you are online and cannot see the
person face to face.

Types of System Intruders


 Masquerader
 Hackers
 Clandestine user
Parts of Virus
 Infection mechanism
 Trigger
 PayloaD
Virus stages
 Dormant phase -Virus is idle.
 Propagation phase - Virus places an identical copy of itself into other programs or into
certain system areas on the disk.
 Triggering phase -Virus is activated to perform the function for which it was intended.
Caused by a variety of system events
 Execution phase-Function is performed
Key Terms
Cyber crime- a crime committed or assisted through the use of the Internet.
Privacy Policy/Terms of Services (ToS) – tells the user how the website will handle its data.
Malware- stands for malicious software.
Virus- a malicious program designed to transfer from one computer to another in any means
possible.
Worms– a malicious program designed to replicate itself and transfer from one file folder to
another and also transfer to other computers.
Trojan-a malicious program designed that is disguised as a useful program but once downloaded
or installed, leaves your PC unprotected and allows hacker to get your information.
Spyware– a program that runs in the background without you knowing it. It has the ability to
monitor what you are currently doing and typing through key logging.
Adware- a program designed to send you advertisement, mostly pop-ups.
Spam– unwanted email mostly from bots or advertisers.
Phishing- acquires sensitive personal information like passwords and credits card details.
Pharming- a more complicated way of phishing where it exploits the DNS system.
Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your
consent is punishable by law.
Fair Use- means that an intellectual property may be used w/o consent as long as it is used in
commentaries, criticism, parodies, research and etc.
Key loggers- used to record the keystrokes done by user. This is done to steal passwords or any
other sensitive information.
Rogue security software’s– is a form of malicious software and internet fraud that misleads users
into believing there is a virus on their computer, and manipulates them into paying money for a
fake malware removal tool.
Four search strategies
 Keyword searching
Enter terms to search
Use quotation marks to search as a phrase and keep the words linked together
Common words are ignored (That, to, which, a, the …)
+ and – can be used to include or exclude a word
 Boolean
AND – enter words connect with AND- it will include sites where both words and found
Uses: joining different topics (i.e. global warming AND California)
OR – requires at least one of the terms is found.
Uses: join similar or synonymous topics (i.e. global warming OR greenhouse effect)
NOT – searches for the first term and excludes sites that have the second term.
(i.e. Washington NOT school)
 Question a question may be entered in the search field of search engine
 Advanced Features are offered on many engines by going to an “Advanced search” page
and making selections. Effective in narrowing search returns to a specific topic or phrase.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy