0% found this document useful (0 votes)
39 views8 pages

Empowerment Technology Notes Jmaeb.

The document discusses various topics related to digital technology including digital natives, ICT, online platforms like news websites, social media, online shopping, educational websites and personal blogs. It also discusses concepts like the world wide web, web pages, web 1.0, web 2.0 and features of web 2.0. The document provides information on computer systems, the internet, internet threats, cybercrime and cyberbullying.

Uploaded by

borerandre011507
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views8 pages

Empowerment Technology Notes Jmaeb.

The document discusses various topics related to digital technology including digital natives, ICT, online platforms like news websites, social media, online shopping, educational websites and personal blogs. It also discusses concepts like the world wide web, web pages, web 1.0, web 2.0 and features of web 2.0. The document provides information on computer systems, the internet, internet threats, cybercrime and cyberbullying.

Uploaded by

borerandre011507
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

EMPOWERMENT TECHNOLOGY

Digital Native and linked to each other that


contain text, graphics, multimedia
A person born or brought up files, hyperlinks, etc..
during the age of digital
technology and therefore News Website
familiar with computers and
• Provide timely news coverage,
the Internet from an early expert opinion, and other
age. information about recent and
important events.
• News sites may integrate audio
clips, video clips, slideshows, and
other multimedia files with text-
based stories.
• News sites that feature live-
streaming videos are also
available.

Social Media Platforms


-Social media platforms allow users to
ICT (Information And Communication
have conversations, share information,
Technology)
and create web content.
•Refers to the technologies, Online Shopping Website
both software and hardware,
that enable humans to Customers can purchase items from the
comfort of their own homes or
communicate with one workplaces. Why shop Online?
another • Saves time and effort.
•It also refers to the use of • The convenience of shopping at home.
• A wide variety/range of products are
communication technology available.
such as laptops, smartphones, • Good discounts / lower prices.
tablets, telephones, the • Get detailed information about the
product.
internet, etc. to send, save, • We can compare various
and edit Information models/brands.

World Wide Web Educational Websites

-It is also known as WWW or W3 •An educational website is a


introduced by Tim Berners-Lee website that was made for
in 1989. It consists of different education and to research some
pages that are formatted in a facts in education, especially for
markup language called HTML students.
(Hypertext Markup Language)
Personal Blogs World Wide Web
-An information system on the
•An online platform where internet that allows documents to
individuals share their thoughts, be connected to other documents
experiences, interests, and by hypertext links, enabling the
hobbies. user to search for information by
•It serves as a personal diary or moving from one document to
commentary in a digital format, another.
often written in a conversational
and informal tone. Web Pages
- Web page is a hypertext
ICT (Information and Communication document connected to the
Technology)
World Wide Web. It is a
• It deals with the use of different document that is suitable for the
communication technologies such as
mobile phones, telephone, Internet to
World Wide Web.
locate, save, send and edit information
• Is a study of computers as data The Different Online Platforms
processing Of World Wide Web:
tools.
1. Web 1.0 – refers to the first
ICT In The Philippines stage in the World Wide Web,
• ‘’ICT Hub of Asia” which was entirely made up of the
• DICT is responsible for the Web pages connected by
planning, development and hyperlinks.
promotion of the country’s Static Web Page- is known as a
Information and Communications flat page or stationary age in the
Technology (ICT) agenda in sense that the page is ‘’as is’’ and
support of national development. cannot be manipulated by the user.

Computer 2. Web 2.0 – is the evolution of


• an electronic device for storing Web 1.0 by adding dynamic
and processing data, typically in pages. The user is able to see a
binary form, according to website differently than others.
instructions given to it in a
Dynamic Web Pages– The user is
variable program.
able to see website differently than
others e.g. social networking sites,
Internet
wikis, video sharing sites.
-is the global system of
interconnected computer
3. Web 3.0 – this platform is all
networks that use the internet
about semantic web.
protocol suite (TCIP/IP) to link
billions of devices worldwide.
Features Of Web 2.0
1. Folksonomy- allows user to Collaborative Platforms
categorize and classify -is a category of business software
information using freely chosen that adds broad social networking
keywords e.g. tagging by FB, capabilities to work processes.
Twitter, use tags that start with the
sign #, referred to as hashtag. Convergent Technologies
2. Rich User Experience – -is an extension of the term
content is dynamic and is convergence which
responsive to user’s input means a “coming together of two
3. User Participation- The owner or more
of the website is not the only one disparate disciplines or
who is able to put content. e.g. technologies.
Lazada, Amazon.
4. Long Tail– services that are Mobile Media
offered on demand rather than on -This refers to “media devices
a one-time purchase. This is such as mobile
synonymous to subscribing to a phones and Personal Digital
data plan that charges you for the Assistants (PDA’s) were the
amount of time you spent in the primary source of portable
internet. media from which we could
obtain information and
communicate with one another.

5. Software as a services- users Online Systems


will be subscribe to a software -are online versions of
only when needed rather than information systems that are the
purchasing them e.g. Google docs process of and tools for storing,
used to create and edit word managing, using, and gathering
processing and spread sheet. data and communications in an
6. Mass Participation– diverse organization. An example of
information sharing through information systems are tools for
universal web access. Web 2.0’s sending out
content is based on people from communications and storing files
various cultures. in a business.
Social Media
Assistive Media -are computer-mediated tools
-a component under Assistive that allow people or companies to
technology (AT), a create, share, or exchange
generic term used to refer to a information, career interests, ideas,
group of software or hardware and pictures/videos in virtual
devices by which people with communities and networks.
disabilities can access computers.
Online Safety,
Security, Ethics and Internet Threats
Malware
Etiquette – also known as Malicious Software.
Tips on how to be safe online
 Do not share your password Spam
- Also known as junk email or unwanted
with anyone. email send by advertiser or bot. It can be
 Add friends you know in real used to send malware.
life. Phishing
 Do not visit untrusted -A cyberattack method using deceptive
websites. Add password to emails and websites to acquiring
your WIFI at home to make it sensitive personal information.
private.
Cybercrime
 Install and update antivirus in -A crime in which computer is used as
your computer. object and tool in committing a crime
 Do not give your personal such hacking, phishing, spamming, child
information to anyone pornography, libel, hate crimes, identity
 Think before you click. thief and others.
 Never post about your future
vacation Cybercrime Law
-A law that deals with all forms of
cybercrime.
Internet Risk
Cyberbullying Types of Malware
-It happens when someone 1. Virus
intentionally abused, harass, and – a malicious program that replicate
mistreated by other person using itself by copying itself to another
electronic communication. program.

Identity Theft 2. Trojan Horse


It is a crime of stealing personal – a malicious program that disguised as
information for the purpose of legitimate program that user will accept
assuming that person’s name or identity and use but take control of your
to make any form of transactions. computer.

Cyber Stalking 3. Worm


-A criminal practice where electronic – malicious program that copy’s
communication is used to stalk or itself and spreads to other
harass individual or group.

Sexting 4. Spyware
-The act of sending sexually explicit – A malicious program that
text messages, images, and videos. gathers information from
victim’s computer and send it back
to the hacker.
in interacting with other netizen
5. Adware online, we need to maintain good
– An unwanted advertisement behavior which is acceptable to
that will pop-up several times on others in online community
victim’s computer then behave
abnormally and tedious to close
them.

6. Keylogger
– A program that runs in the The Core Rules of
background and steals user Netiquette
credentials and confidential 1. Remember the human.
information and send back to hack
by recording
2. Adhere to the same
standards of behavior online
7. Botnet that you
– A collection of infected follow in real life.
internet–connected devices such 3. Know where you are in
as PC and mobile phone that are cyberspace.
controlled by a common type of
malware.
4. Respect other people's time
and bandwidth.
8. Rootkit 5. Make yourself look good
– A software tools used by online.
hackers to gain control over a 6. Share expert knowledge.
computer on a network without
7. Help keep flame wars under
being exposed.
control.
9. Ransomware 8. Respect other people's
– A ransom virus that block the privacy.
user from accessing the programs 9. Don't abuse your power.
or files and demands to pay the 10. Be forgiving of other
ransom through online method for people's mistakes.
the removal of the virus.

Netiquette
It is a word that came from the two
words “net” and “etiquette”. It is
an etiquette applied online that
shows proper manner and
behavior. If you are a member of
an online society through social
media you are called netizen. And
Online Research Skills by
Hannah Trierweiler Hudson

1. Check Your Sources


2. Ask Good Questions
3. Go Beyond the Surface
4. Be Patient
5. Respect Ownership
6. Use Your Networks
Contextualized Online Search
and Research Skills Copyright
Internet Research is a protection given to the owner
is a research method in collecting of the rights in an original work
and gathering information via such as books, musical works,
internet by using search engine films, paintings, and other works,
such as google. and computer programs. This
original work is called intellectual
Search Engene property which is protected under
is a program that allows users to Republic Act 8293 known as the
search for content on internet. “Intellectual Property Code of the
Philippines”.
Tips for Effective Internet
Research by George Mathews Copyright Infringement
This happens when the
1. Know what kind of
copyrighted work is use by other
research you want to do. person without permission of the
2. Make a list of keywords author or copyright holder. Any
you will use in person who is infringing the right
your search. protected work would be liable
3. Enclose keywords in under the law.
quotation marks.
4. Use the minus sign (-). Fair Use
Fair use is the use of copyrighted
5. Try specialized search
material for comment, teaching,
engines.(PubMed criticism, news reporting, research,
or Google Scholar ) scholarship, and other similar
6. Skim through search results purpose is not an infringement of
web pages. copyright.
7. Bookmark
8. Review your bookmarks.
Guidelines for Fair Use
1. Majority of the contents created
must be yours.
2. Give credit to the owner.
3. Don’t make profit of the File Menu
copyrighted work. - The File tab will bring you into
the Backstage View. The
Backstage View is where you
manage your files and the data
about them – creating, opening,
printing, saving, inspecting for
hidden metadata or personal
information, and setting options.

Productivity and Software


Applications

Software Application
-An application program (software
application, or application, or app RIBBON
for short) is a computer program - An area across the top of the
designed to carry out a specific screen that makes almost all the
task other than one relating to the capabilities of Word available in a
operation of the computer itself, single area.
typically to be used by end-users.
TABS
Word Processing - An area on the Ribbon that
- Microsoft Word is a text contains buttons that are organized
processing application. It allows in groups. The default tabs are
the user to configure the attributes Home, Insert, Design, Layout,
of a document, such as layout and References, Mailings, Review,
the styles of content, and to add View and EndNote X5.
their content in a variety of ways
and formats to produce TITLE BARS
documents. - A horizontal bar at the top of an
active document. This bar displays
Microsoft Word 2016 the name of the document and
application. At the right end of the
Title Bar is the Minimize,
Maximize and Close buttons.

GROUPS
- A group of buttons on a tab that to find help about what you're
are exposed and easily accessible. looking for, or to use Smart
Lookup to research or define the
DIALOG BOX LAUNCHER term you entered.
- A button in the corner of a group
that launches a dialog box
containing all the options within
that group. Spreadsheets
- Microsoft Excel is an application
STATUS BAR used for creating and editing
- A horizontal bar at the bottom of spreadsheets. Spreadsheets are
an active window that gives details commonly used to working with
about the document. sets of data
containing text and numbers and
VIEW TOOLBAR for generating
- A toolbar that enables, adjusts, graphs and charts.
and displays
different views of a document.

ZOOM
- Magnifies or reduces the
contents in the document window.

QUICK ACCESS TOOLBAR


- A customizable toolbar at the top
of an active document. By default
the Quick Access Toolbar displays
the Save, Undo, and Repeat
buttons and is used for easy access
to frequently used commands. To
customize this toolbar, click on the
dropdown arrow and select the
commands you want to add.

TELL ME
- This is a text field where you can
enter words and phrases about
what you want to do next and
quickly get to features you want to
use or actions you want to
perform. You can also use Tell Me

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy