0% found this document useful (0 votes)
27 views48 pages

1 Q1 Emp Technology

The document discusses the role of information and communication technologies (ICT) in enhancing learning and collaboration. It covers topics such as web interactivity, online safety, netiquette, and copyright laws, emphasizing the importance of responsible internet use. Additionally, it highlights trends in ICT, including technological convergence and the rise of mobile technologies.

Uploaded by

julz.sanchez1991
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views48 pages

1 Q1 Emp Technology

The document discusses the role of information and communication technologies (ICT) in enhancing learning and collaboration. It covers topics such as web interactivity, online safety, netiquette, and copyright laws, emphasizing the importance of responsible internet use. Additionally, it highlights trends in ICT, including technological convergence and the rise of mobile technologies.

Uploaded by

julz.sanchez1991
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 48

Empowerment

Technologies
Subject Description:
Information and
communication technologies
as a tool for curating,
contextualizing,
collaborating, and creating
content and experiences for
learning in the professional
Multiple Choice: Write the letter of your answer on a
separate sheet of paper.

1.Which of the following web pages allows


interaction from the user?
A.Comment B. Social C. Dynamic D. Static

2. Which of the following features where users can


categorize and locate information through
tagging?
A. Folksonomy . C. Rich user experience
B. Hashtags D. Taxonomy

3. The following are features of a dynamic website.


Which of them allows users to put their own
content?
4.Which provides a common framework to allow
data to be shared and reused across platform,
enterprise, and community boundaries?
A. Semantic Web C.Web 1.0
B.W3C D.Web2.0

5.What magazine declares that two Philippine


cities are part of the top 10 in their research
about “The Selfiest Cities around the World”?
A.Candy C.Reader’s
Digest
B.People D.Time
6.Which of the following replicates and can
transfer from one computer to another?
A.Adware C.Rogue
7.Which of the following tricks the user into posing
that it is a security software?
A.Adware C.Rogue
B.Private D. Spam
8.Which of the following used to record the
keystrokes done by the user?
A.Keylogger C.Phishing
B.Malware D.Spam
9.What has been designed to send you
advertisements?
A.Adware C.Spyware
B.Malware D.Trojan
10.What do you call an unwanted email mostly
from bots?
A.Adware C.Spam
Empowerment
Technologies
Quarter 1
Lesson 1:
Introduction to Information and
Communication Technologies and
Rules of Netiquette
Introduction to Information
and Communication
Technologies
Information and
Communication
Technology (ICT) deals
with the use of different
communication technologies
such as mobile phones,
telephone, and internet to
locate, save, send, and edit
information.
Example

Example
Web 3.0 and the
Semantic Web -is a
movement led by the World Wide Web
Consortium (W3C). The term was
coined by the inventor of the World
Wide Web, Tim Berners-Lee. It
provides a common framework that
allows data to be shared and reused
across application, enterprise, and
Several Problems in using
Web 3.0
HTM
1. Compatibility -HTML files and current web L
browsers could not support Web 3.0.

2. Security -the user’s security is also in question


since the machine is saving his or her preferences.

3. Vastness -the World Wide Web already


contains billions of web pages.

4. Vagueness -certain words are imprecise.


5. Logic -since machines use logic, there are
certain limitations for a computer to be able to predict
what the user is referring to at a given time.
TRENDS in ICT As the world of ICT continues to
grow, the industry has focused on several
innovations which cater to the needs of the people
who benefit most out of it. The following trends are
the current front runners in the innovation of ICT.

1. Convergence. Technological
convergence is the synergy of technological
advancements to work on a similar goal or task. It
is the use of several technologies to accomplish a
task conveniently.

2. Social Media. Social media is a


website, application, or online channel that enables
web users to create, co-create, discuss, modify, and
exchange user-generated content.
3. Mobile
Technologies. The popularity
of smartphones and tablets has taken a
major rise over the years because of the
devices’ capability to do tasks that were
originally found in personal computers.
Today, the latest mobile devices use 5G
Networking (LTE), which is currently the
Rules of Netiquette
This lesson discusses the appropriate and
inappropriate online behavior that you as
users need to know and appreciate. It
helps you understand the social nature of
digital media and later you discover the
status of your own digital life. Moreover,
this lesson gives emphasis on the
importance to act properly and
responsibly to possible consequences on
engaging these digital tools.
Cite situations where
Information and
Communication Technologies
have improved the lives of
people.
Teenagers like you are exposed to
many things powered by the
internet because they are mostly
into socializing, playing games,
reading sports news, shopping, etc.
The internet has given you the most
powerful tools that your parents did
not enjoy during their early days.
For this reason, you must
observe proper internet usage.
Online Safety and
Security Internet is a powerful
tool used to promote business, gain new
friends, and stay in touch with the old ones. It
is also a source of entertainment through
games, online communities, and everything in
between. But there is always the “other side of
the coin”. Internet is one of the most
dangerous places especially if you are
unaware of what you are doing with it.
Internet is defined as the information
superhighway means that anyone has
access to this highway, can place
information, and can grab that
information. Therefore, everyone is a
prospect to cybercrime threats. We may
not experience it now but whatever
information we share today could affect
our future. With this reason, social
networking sites like Facebook continue
to improve their security features.
Internet
Threats
Here are
some of the
threats you
should be
aware of
when using
the internet.
2. Spam – unwanted email
mostly from bots or advertisers. It can
be used to send malware.
3. Phishing – its goal is to
acquire sensitive personal information
like passwords and credit card details.
Pharming – a more complicated way of
phishing where it exploits the DNS
(Domain Name Service) system.
Protecting
Reputations Online
Embarrassing moments nowadays
can be captured using any device
you could imagine. Unlike the old
days, doing something
embarrassing was not much a big
deal. Worst is that anyone can easily
upload it over the internet and
cannot be undone. This puts you in
a traumatic situation and risk the
lives of your family. So, before
posting something over the internet,
think first before you click.
Think Before You Click Things you
might want to consider before internet posting.
1. Once you post something on the web, you have
no control of who sees your posts.
2. Your friends depend on you to protect their
reputation online.
3. Set your post to “private”.
4. Avoid using names. Names are easy for search
engines to scan. 5. If you feel that a post can
affect you or other’s reputation, ask the one who
posted it to pull it down or report it as
inappropriate.
Copyright Infringement -
If you create something like an idea, an
invention, a form of literary work, or a
research, you have the right as to how it
should be used by others. This is called
“intellectual property”. The copyright
law includes your rights over your work,
and anyone who uses it without your
consent is punishable by law.
Tips to avoid copyright
infringement
1. Understand. Copyright protects literary works, photographs,
paintings, drawings, films, music (and lyrics), choreography, and
sculptures, but it does not protect underlying ideas and facts.
2. Be responsible enough to know if something has a copyright.
3. Be creative. Ask yourself whether what you are making is
something that came from you, or something made from
somebody else’s creativity. It is important to add your own
creative genius in everything that will be credited to you.
4. Know the law. There are limitations to copyright laws. For
instance, in the Philippines, copyrights only last a lifetime (of the
author) plus 50 years. There are also provisions for “fair use”
which mean that an intellectual property may be used without a
consent as long as it is used in commentaries, criticisms, search
engines, parodies, news reports, research, library archiving,
1.Do you agree or disagree with the
provisions of the copyright law? Defend
your answer.
2. How would you feel if someone posted
something embarrassing about you?
What would you do?
3. Make your own three (3) Do’s and
Don’ts in a table form when using social
networking site like Facebook.
I have learned that:
1.To stay safe online, I must
_________________________________________.
2. There are several internet threats which
include ____________________.
3. Malwares could be in the form of a
_________________________________.
4. It is our responsibility to protect other’s
reputation online so we should be ___________.
5. It is important for everyone to understand
the laws particularly on Copyright
Infringement in order to _________________.
BACK
BACK
BACK
HTML Code

Browser
Output

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy