0% found this document useful (0 votes)
28 views72 pages

Living in The IT Era - Module 2

Uploaded by

Florenz Dacillo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views72 pages

Living in The IT Era - Module 2

Uploaded by

Florenz Dacillo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 72

GEC ELEC 1 –

LIVING IN THE IT
ERA
The Web and the Internet
The Web and the
Internet
The Web
The Web (World Wide Web) consists of information organized
into Web pages containing text and graphic images. The world wide
web is larger collection of interconnected documents or content. It
contains hypertext links, or highlighted keywords and images that lead
to related information.
A collection of linked Web pages that has a common theme or
focus is called a Web site.
The main page that all of the pages on a particular Web site are
organized around and link back to is called the site’s home page.
The Web
Sir Timothy John Berners-Lee OM KBE FRS FREng FRSA FBCS,
also known as TimBL, is an English engineer and computer scientist
best known as the inventor of the World Wide Web.
Web 1.0
Web 1.0 (Read Only Static Web)
It is an old internet that
only allows people to read from
the internet. First stage worldwide
linking web pages and hyperlink.
Web is use as “information
portal”. It uses table to positions
and align elements on page.
Web 1.0
Example of Web 1.0
• Mp3.com
• Home Page
• Directories
• Page Views
• HTML/Portals.
Web 1.0
Web 2.0
Web 2.0 (Read-write interactive
web)
A term used to describe a
new generation of Web services
and applications with an
increasing emphasis on human
collaboration.
Web 2.0
Examples of Web 2.0
Social Networking - is the use of
Internet-based social media sites
to stay connected with friends,
family, colleagues, customers,
or clients.

Example:
Facebook, Twitter, LinkedIn, Google+, Pinterest,
Tumblr, Instagram, Page
Web 2.0
Examples of Web 2.0
Blogs - is a discussion or
informational website published
on the world wide web consisting
of discrete, often informal diary-
style text entries (posts).

Example:
WordPress, Blogger, Tumbler
Web 2.0
Examples of Web 2.0
Wikis - is a hypertext publication
collaboratively edited and
managed by its own audience
directly using a web browser.

Example:
WordPress, Blogger, Tumbler
Web 2.0
Examples of Web 2.0
Video Sharing Sites - a website
that lets people upload and share
their video clips with the public at
large or to invited guests.

Example:
YouTube, Facebook, LinkedIn, Flickr,
Photobucket, LinkedIn, Flickr
Web 2.0
Key Features of Web 2.0
• Folksonomy – allows users to categorize and classify/arrange information
using freely chosen keywords (e.g. tagging).
• Rich User Interface – content is dynamic and is responsive to user’s input. An
example would be a website that shows local content.
• User Participation – the owner of website is not the only one who is able to
put content. Others are able to place a content on their own by means of
comments, reviews, and evaluation.
• Long Tail – services are offered on demand rather than on a one-time
purchase. This is synonymous to subscribing to a data plan that charges you
for the amount of time you spent on Internet or a data plan that charges you
for the amount of bandwidth you used.
Web 3.0
Web 3.0: (Read-write intelligent web)
Suggested name by John Markoff of the New York Times for the
third generation of the web.
In this generation, all the application on web or mobile will be
upgraded with more features. It applies same principles as Web 2.0:
two-way interaction.
Web 3.0 will be more connected, open, and intelligent, with
semantic web technologies, distributed databases, natural language
processing, machine learning, machine reasoning and autonomous
agents.
Web 2.0 vs Web 3.0
Web 2.0 Web 3.0
Centralized Application delivery, cloud services, and Decentralized Edge computing, peer-to-peer, and
platforms are governed and operated by centralized distributed consensus increasingly become the norm
authorities. in Web 3.0.
Fiat currency Payments and transactions occur with Cryptocurrency Transactions can be funded with
government-issued currency such as $USD. encrypted digital currencies such as Bitcoin and
Ethereum.
Cookies Using cookies helps to track users and provide NFTs Users can get unique tokens that are assigned
personalization. value or provide some form of perk.
CSS and Ajax Web 2.0 is defined by layout AI Smarter, autonomous technologies, including
technologies that provide more dynamic control than machine learning and AI, will define Web 3.0.
Web 1.0.
Relational databases Databases underpin the content Blockchain Web 3.0 makes use of blockchain
and applications of Web 2.0. immutable ledger technology.
Social networks Web 2.0 ushered in the era of social Metaverse worlds With Web 3.0, metaverse worlds
networking, including Facebook. will emerge to meld physical, virtual, and augmented
reality.
Types of Websites
• eCommerce Website • Nonprofit Website
• Business Website • Educational Website
• Entertainment Website • Infopreneur Website
• Portfolio Website • Personal Website
• Media Website • Web Portal
• Brochure Website • Wiki
Types of Websites
eCommerce Website
is a website people can directly
buy products from you’ve probably
used a number of eCommerce
websites before, most big brands and
plenty of smaller ones have one.
Types of Websites
Business Website
is any website that’s devoted to
representing a specific business. It
should be branded like the business
(the same logo and positioning) and
communicate the types of products
and/or services the business offers.
Types of Websites
Entertainment Website
If you think about your internet
browsing habits, you can probably
think of a few websites that you visit
purely for entertainment purposes.
Types of Websites
Portfolio Website
are sites devoted to showing
examples of past work. Service
providers who want to show potential
clients the quality of the work they
provide can use a portfolio website to
collect some of the best samples of
past work they’ve done.
Types of Websites
Media Website
collect news stories or other
reporting. There’s some overlap here
with entertainment websites, but
media websites are more likely to
include reported pieces in addition to
or instead of content meant purely for
entertainment.
Types of Websites
Brochure Website
are a simplified form of business
websites. For businesses that know
they need an online presence, but
don’t want to invest a lot into it, a
simple brochure site that includes just
a few pages that lay out the basics of
what you do and provide contact
information may be enough for you.
Types of Websites
Nonprofit Website
A nonprofit website is the
easiest way for many potential donors
to make donations and will be the first
place many people look to learn more
about a nonprofit and determine if
they want to support it
Types of Websites
Educational Website
These websites have the primary
goal of either providing educational
materials to visitors or providing
information on an educational
institution to them.
Types of Websites
Infopreneur Website
websites overlap a bit with
business and eCommerce websites,
but they represent a unique type of
online business. Infopreneurs create
and sell information products. That
could be in the form of courses,
tutorials, videos or eBooks.
Types of Websites
Personal Website
Not all websites exist to make
money in some way or another. Many
people find value in creating personal
websites to put their own thoughts out
into the world. This category includes
personal blogs, vlogs, and photo
diaries people share with the world.
Types of Websites
Wiki or Community Forum Website
A wiki is any website where
various users are able to collaborate on
content and all make their own tweaks
and changes as they see fit. There are
wikis for fan communities, for business
resources, and for collecting valuable
information sources.
The Internet
The Internet
The Internet or “net” (network of network) is the largest computer
network in the world that connects billions of computer user.
The word internet comes from combination between
“interconnection” and “network”.
Network is a collection of computers and devices connected via
communication channels and transmission media allow to share
resources (hardware, software, data, information).
The Internet
Brief History of the Internet
ARPA – Advanced Research Project Agency January 2, 1969 –
started an experimental computer network. Concept – No server, but
equal importance/participation to every computer in the network.
In 1982 the word internet started. 1986 – First “free net”
created in Case Western Reserve University 1991: US government
allowed business agencies to connect to internet.
Vinton Gray Cerf ForMemRS is an American Internet pioneer and
is recognized as one of "the fathers of the Internet", sharing this title
with TCP/IP co-developer Bob Kahn.
Major Component of the
Internet
Server - is a computer program that provides service to another
computer program and its user.
Servers are a key component of the client-server model that
forms the backbone of internet communication.
Major Component of the
Internet
Type of Servers
• Application Server – a program in computer that provides the
business logic for an application program.
• Web Server – a computer program that serves requested HTML pages
or files.
• Proxy Server – is a software that acts as an intermediary between an
endpoint device, such as computer and another server from which a
user is requesting.
Major Component of the
Internet
Type of Servers
• Mail Server – is an application that receives incoming e-mail from
local users and remote senders and forward outgoing e-mail for
delivery
• File Server – is a computer responsible for central storage and
management of data files so that another computer on the same
network can access them.
• Policy Server – is a security component of a policy – based network
that provides authorization services and facilities tracking and control
of files.
Major Component of the
Internet
IP Address (Internet Protocol) – is a numerical label assigned to each
device. This provides identity to a network device.
Browser – is an application program that provides a way to look
information on the web.
Example of browsers: Google chrome, safari, internet explorer, Opera,
Mozilla
Major Component
of the Internet Name Entity

Domain Name System .com commercial

(DNS) – is the phonebook .org organization


of internet. We access .net network
information online
through domain names. .edu education

Example of DNS: .gov National and State Government Agencies

www.facebook.com, .ph Philippines


www.lspu.edu.ph. .au Australia
Major Component of the
Internet
Internet Service Provide (ISP) – is an organization that provides
services for accessing, using or participating in the internet.
Two types of ISP:
National ISP – provided internet access to a specific geographic area.
Regional ISP – business that provides internet access in cities and
towns nationwide.

Example of ISP: Sky Broadband, PLDT, Converge


How do you feel when someone
behaves rudely or
disrespectfully online?
Why do you think it’s important
to follow certain rules when
communicating online?
What is Netiquette?
Netiquette and Computer Ethics
Netiquette, or "network etiquette," refers to the set of rules and
guidelines for proper behavior and conduct when communicating over
the internet. It’s essentially the etiquette of online interactions, helping
to ensure that communication remains respectful, clear, and effective
across various platforms like emails, forums, social media, and other
online communities.
Remember the Golden Rule
Even though you may be interacting with a computer screen, you
are communicating with a real person who will react to your message.
Make a good impression - treat others with the same respect that you
would like to receive and avoid confrontational or offensive language.
To help convey meaning when creating messages, it is sometimes
acceptable to include appropriate emoticon symbols, such as a smiley
face :) However, for professional communications these would be
inappropriate.
Avoid Slang, Acronyms, and Text
Talk
Communicating effectively
in college and business
environments requires the use of
correct terminology, spelling, and
grammar that can easily be
understood.
For example, use “your”
instead of “ur”.
Avoid “Screaming” in Typed
Messages
Typing an entire message using all capital letters is known as
“screaming”. It is distracting and generally frowned upon in
professional environments. It is better to draw emphasis to selected
words or phrases by using italic or bold text; using a different color for
text or background color; or denoting emphasis using special characters
(Example: **Important**).
Proofread Your Messages Before
Sending Them
Proofreading your messages before you send them is a best practice for
effective and efficient communication. Strive to make your
communications concise and free of any:
• Spelling and grammar errors
• Confusing terms or phrases that could be misunderstood
• Errors of omission, such as missing content or recipients
• Errors in accuracy of information
Exercise Good Judgement When
Sharing Information With Others
To protect your privacy and safety, do not share online any sensitive
personal information such as:
• Your home address or phone number
• Personal conversations
• Social plans, such as vacations
• Financial information
• Usernames, passwords, or hints
• Anything personal that you would not want shared by others over the
Internet
Respect Diversity in Viewpoints

Be constructive and respectful when sharing opinions, beliefs,


and criticisms, or responding to those of others in the conversation.
When sharing a viewpoint that differs from someone else’s, it is a
best practice to first acknowledge the other person by briefly restating
what he or she said, but in your own words. This lets the person know
that you are listening and trying to understand them.
Ten Commandments of Computer Ethics

Rule 1: Treat people kindly online – Remember, you're communicating


with real humans. Be respectful and polite, just as you would in person.
Rule 2: Follow real-world rules online – Act online the same way you
would in real life. Don’t behave rudely or break laws just because
you’re behind a screen.
Rule 3: Adapt to different online environments – What’s appropriate in
one online space might not be in another. Know the tone and
expectations of each space you're in.
Ten Commandments of Computer Ethics

Rule 4: Be considerate of others’ time – Keep your messages clear and


to the point. Avoid wasting people’s time with unnecessary content.
Rule 5: Present yourself well online – Your words reflect who you are.
Write clearly, check your spelling and grammar, and be polite.
Rule 6: Share your knowledge – If you know something that could help
others, share it! Contributing useful information helps the entire online
community.
Ten Commandments of Computer Ethics

Rule 7: Control online arguments – Avoid angry or emotional


exchanges. If things get heated, help steer the conversation back to a
respectful tone.
Rule 8: Respect privacy – Don’t share personal or private information
without permission. Always handle sensitive data with care.
Rule 9: Don’t misuse power – If you have special skills or knowledge,
don’t use them to take advantage of others.
Rule 10: Be forgiving of mistakes – People make mistakes online. Be
kind and understanding, and help others learn without embarrassing
them.
Cybercrime
What is Cyber?
It is the Characteristics of the culture of computers, information,
technology and virtual reality
Cybercrime is defined as a crime in which a computer is the object of
the crime (hacking, phishing, spamming and child pornography) is used
as a tool to commit an offense.
Cybercriminals may use computer technology to access personal
information, business trade secrets or use the internet for exploitative
or malicious purposes
Cybercrime
Republic Act No. 10175 Cybercrime Prevention Act of 2012 is a law in
the Philippines approved on September 12,2012 which aims to address
legal issues concerning online interactions and internet.
Republic Act No. 10173 Data Privacy Act of 2012 is an act protecting
individual personal information.
Common Form of Cybercrime
Copyright
The exclusive legal right, given to an originator or an assignee to print,
publish, perform, film, or record literary, artistic, or musical material,
and to authorize others to do the same.
Copyright infringement is the violation, piracy or theft of a copyright
holder's exclusive rights through the unauthorized use of a copyrighted
material or work.
Plagiarism
An act or instance of using or closely imitating the language and
thoughts of another author without authorization.
Common Form of Cybercrime
Computer Addiction
• Offline: generally used when speaking about excessive gaming
behavior, which can be practiced both offline and online.
• Online: Also known as “Internet Addiction”, gets more attention in
general from scientific research than offline computer addiction,
mainly because most cases of computer addiction are related to the
excessive use of the Internet.
• Virtual Self -The persona you create about yourself virtually
Criminal Activities
Hacking
Unauthorized access of or interference with computer systems,
servers, or other information and communication systems
Unauthorized access to corrupt, alter, steal, or destroy electronic
data using computers or other information and communication systems
without the computer or system owner’s knowledge and consent
Criminal Activities
Hacking
Infection of IT Systems with Malware – if the act is committed
against critical infrastructure of the Philippines the, penalty is between
12-20 years reclusion temporal
Six years up to twelve years of imprisonment also known as prison
mayor.
Illegal Access Illegal Interception
Data Interference System Interference
Misuse of Devices
Criminal Activities
Electronic theft
Obtaining files that you do not have the right to use from the internet.
Practice of illegally copying and selling digital music, video, computer
software, etc.
Penalty of Php 50,000 – 500, 000 and or prison mayor
Illegal Downloading
Digital Piracy
Copyright Infringement
Criminal Activities
Cyberbullying
The use of electronic communication to bully a person, typically
by sending a message of an intimidating or threatening nature.
The Anti-Bullying Act of 2013 (RA 10627)
Criminal Activities
Cybersex
Willful engagement, maintenance, control, or operation, directly or
indirectly of any lascivious exhibition of sexual organs or sexual activity
with the aid of a computer system for favor or consideration.
There is a discussion on this matter if it involves “couples” or “people in
relationship” who engage in cybersex.
Penalty at least Php 200,000 and or prison mayor
Criminal Activities
Child Pornography
Is a form of child sexual exploitation.
Unlawful or prohibited acts defined and punishable by Republic Act No.
9775 or the Anti- Child Pornography Act of 2009, committed through a
computer system.
Penalty of 12-20 years of imprisonment or reclusion temporal
Criminal Activities
Cyber Defamation
Is an unprivileged false statement of fact which tends to harm the
reputation of a person or company.
Penalty of 6-12 years of imprisonment or prison mayor.
Internet Theats
Hacking
Hacking is a term used to describe actions taken by someone to gain
unauthorized access to a computer. The availability of information
online on the tools, techniques, and malware makes it easier for even
non-technical people to undertake malicious activities.
The process by which cyber criminals gain access to your computer.
Malware
Malware is one of the more common ways to infiltrate or damage your
computer. Malicious software that infects your computer, such as
computer viruses, worms, Trojan horses, spyware, and adware.
Internet Theats
Pharming
Pharming is a common type of online fraud.
A means to point you to a malicious and illegitimate website by
redirecting the legitimate URL. Even if the URL is entered correctly, it
can still be redirected to a fake website.
Internet Theats
Phishing
Phishing is used most often by cyber criminals because it's easy to
execute and can produce the results they're looking for with very little
effort.
Fake emails, text messages and websites created to look like they're
from authentic companies. They're sent by criminals to steal personal
and financial information from you. This is also known as “spoofing”.
Internet Theats
Ransomware
Ransomware is a type of malware that restricts access to your
computer or your files and displays a message that demands payment
in order for the restriction to be removed. The two most common
means of infection appear to be phishing emails that contain malicious
attachments and website pop-up advertisements.
Internet Theats
Ransomware
There are two common types of ransomware:
Lockscreen ransomware: displays an image that prevents you from
accessing your computer
Encryption ransomware: encrypts files on your system's hard drive and
sometimes on shared network drives, USB drives, external hard drives,
and even some cloud storage drives, preventing you from opening
them
Internet Theats
Spam
Spam is one of the more common methods of both sending
information out and collecting it from unsuspecting people.
The mass distribution of unsolicited messages, advertising or
pornography to addresses which can be easily found on the Internet
through things like social networking sites, company websites and
personal blogs.
Internet Theats
Spyware (Spyware & Adware)
Spyware and adware are often used by third parties to infiltrate your
computer.
What it is:
Software that collects personal information about you without you
knowing. They often come in the form of a ‘free' download and are
installed automatically with or without your consent. These are difficult
to remove and can infect your computer with a virus.
Internet Theats
Viruses
Most people have heard of computer viruses, but not many know
exactly what they are or what they do.
Malicious computer programs that are often sent as an email
attachment or a download with the intent of infecting your computer,
as well as the computers of everyone in your contact list. Just visiting a
site can start an automatic download of a virus.
Internet Theats
Viruses
How will you know if your computer is infected?
Here are a few things to check for:
• It takes longer than usual for your computer to start up, it restarts on its own
or doesn't start up at all.
• It takes a long time to launch a program.
• Files and data have disappeared.
• Your system and programs crash constantly.
• The homepage you set on your web browser is different (note that this could
be caused by Adware that has been installed on your computer).
• Web pages are slow to load.
Internet Theats
Wi-Fi Eavesdropping
WiFi eavesdropping is another method used by cyber criminals to
capture personal information.
Virtual “listening in” on information that's shared over an unsecure (not
encrypted) WiFi network.
Internet Theats
Worms
Worms are a common threat to computers and the Internet as a whole.
A worm, unlike a virus, goes to work on its own without attaching itself
to files or programs. It lives in your computer memory, doesn't damage
or alter the hard drive and propagates by sending itself to other
computers in a network – whether within a company or the Internet
itself.
Thank you!

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy