Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

EMPOWERMENT TECHNOLOGY - 2017: Internet Connection Population

Penetration
Reviewer o 119M Mobile Phone Subscriptions
in the Country (117% Penetration
FIRST SEMESTER: Rate)
o 95% Prepaid
MODULE 1 o Greater 10% Broadband
Subscription
• ICT (INFORMATION AND o 55% Mobile Broadband
COMMUNICATIONS TECHNOLOGY) Subscription
o 80% Subscribed to the Lowest
- deals with the use of different
Speed Plans (1-3 MBPS)
communication technologies such s phones,
- TODAY IN ICT: THE TIME WE SPEND ONLINE
Internet to locate, save, send, and edit
o 3.2 HOURS ON MOBILE PHONES
information
o 5.2 HOURS ON DESKTOP / TABLETS
- having a unified way to communicate is one
of its goals • The Evolution of The Internet
- “C” reflects the important role that - Web 1.0 (Static Web)
computers now play in communications o first generation
- has saved companies a lot of resources o based on Hypertext Markup
(time and money) with the kind of Language (html/htm)
communication technology they use o Static websites - worked on a
• ICT IN THE PHILIPPINES ready-only principle and the visitor
is only an observer
- 1993: Birth of the Philippine Internet
o Web 1.0 website was basically a
o With the support of DOST
single file saved in the server and
(Department of Science and
displayed in its entirety when a
Technology) and IRF (Industrial
visitor entered the address from
Research Foundation), the Philnet
their browser
project (now PHNET) was born
o the URL (Uniform Resource Locator)
- 1994: Our First Internet Connection
address remained unchanged
o Benjie Tan, working for ComNet,
regardless of the user’s location
established the PH’s first
o only displayed text and images
connection to the Internet at a
o “readable” phrase of the World
PLDT network center in Makati
Wide Web
- 2013: The Massive Growth of the Country’s
- Web 2.0 (Dynamic Web)
Mobile Networks
o participation principle
o Mobile Cellular Subscriptions reach
o user and the website worked on a
102 million
give-and-take relationship
- 2014: Fastest Growing Connection
o website provided a set of
o The Philippines named fastest
information, the user could work on
growing internet population in the
and add to it
last five years with a growth of
o real-life interactive communication
531%
that paved the way for media
o Number of Philippine Internet users
sharing and online banking and
at 38 million out of a population of
shopping
100 million
o “writable” phase of the World
Wide Web
o Vagueness - Certain words are
imprecise. The words "old" and
- Web 3.0 (Semantic Web)
"small" would depend on the user
o Semantic Web - a movement led by
o Logic - Since machines use logic,
the World Wide Web Consortium
there are certain limitations for a
(W3C)
computer to be able to predict
o W3C standard encourages web
what the user is referring to at a
developers to include semantic
given time
content in their web pages
o term (Semantic) was coined by the • Trends in ICT
inventor of the World Wide Web, - the industry has focused on several
Tim Berners-Lee innovations
o Lee also noted that the Semantic - these trends are the current front runners
Web is a component for Web 3.0. in the innovation of ICT
o current generation o Convergence
o All available information is based on  is the synergy of technological
real-time events advancements to work on a
o Users stay connected to live similar goal or task
internet at all times  besides using your personal
o let digital devices suggest probable computer, you can now use your
actions based on your previous smartphone
decisions  use cloud technologies to sync
o “executable” phase of the internet files from one device to another
o We experience the features of Web while also using LTE technology
3.0 internet every day. For instance, which means you can access
consider the live stream feature of your files anytime, anywhere
Facebook and YouTube  uses several technologies to
o aim of Web 3.0 is to have machines accomplish a task conveniently
(or servers) understand the user's o Social Media
preferences to be able to deliver  website, application, or online
web content specifically targeting channel to create, co-create,
the user discuss, modify, and exchange
o The search engine then labels it the user-generated content
most common answer to the search  According to Nielsen, a global
query information and measurement
o The Internet is able to predict the company, Internet users spend
best possible answers to your more time on social media sites
question by "learning" from your than on any other type of site
previous choices  There are 6 types of social media
- Web 3.0 is yet to be fully realized because 1. Social Networks
of: » connect with other
o Compatibility - HTML files and people with the same
current web browsers could not interests or
support Web 3.0 background
o Security - The user's security is also » Facebook and
in question since the machine is Google+
saving his or her preferences 2. Bookmarking sites
o Vastness - The World Wide Web » allow you to store
already contains billions of web and manage links to
pages various websites and
resources
» create a tag that  devices' capability to do tasks that
allows you and others were originally found in personal
to easily search or computers
share them  high-speed Internet
» StumbleUpon and  latest mobile devices use 4G
Pinterest Networking (LTE), which is currently
3. Social News the fastest mobile network
» allow users to post their  mobile devices use different
own news items or links operating systems
to other news sources 1. iOS - used in Apple devices such
» voting on these news as the iPhone and iPad
articles 2. Android - an open source
» users can also comment operating system developed by
on the post and Google. Being open source
comments may also be means several mobile phone
ranked companies use this OS for free
» most amount of votes 3. Blackberry OS - Blackberry
are shown most devices
prominently 4. Windows Phone OS - closed
» reddit and Digg source and proprietary
4. Media Sharing operating system developed by
» upload and share media Microsoft®
content like images, 5. Symbian - the original
music, and video smartphone OS; used by Nokia
» liking, commenting, and devices
having user profiles 6. WebOS - originally used for
» Flicker, YouTube, and smartphones; now used for
Instagram smart TVs
5. Microblogging 7. Windows Mobile - developed by
» focus on short updates Microsoft® for smartphones and
from the user pocket PCs
» Twitter and Plurk o Assistive Media
6. Blogs and Forums  nonprofit service designed to help people
» These websites allow who have visual and reading impairments
users to post their  A database of audio recordings is used
content
» Other users are able to
comment on the said
topic
MODULE 2
» forums are typically • Online Safety and Security
part of a certain
- The Internet is one of the most
website or web service
dangerous places, especially if you do
» Blogger, WordPress,
and Tumblr not know what you are doing with it
o Mobile Technologies • Type of Information and Its Risks
 The popularity of smartphones and 1. First Name - a hacker may already know
tablets has taken a major rise over plenty of stuff about you even if you
the years only give out your first name
2. Last Name - vulnerable to being
searched for using search engines,
which include image search. Matching a - While you may not experience the threat
name with a face is a modus in now, whatever information we share today
cybercrimes like identity theft. could affect our future
3. Middle Name - Sharing your middle
name alone is probably not the most
• Tips to Stay Safe Online
1. Be mindful of what you share online
risky of these share information, but
and what site you share it to. Think
sharing your full name would be
before you click.
4. Current and previous school(s) - Most
2. Do not just accept terms and
people who steal identities study their
conditions; read it.
subject. They can use this information
3. Check out the privacy policy page of a
for verification purposes.
website to learn how the website
5. Your cellphone number - should never
handles the information you share.
be posted over the Internet. You would
4. Know the security features of the social
not want random strangers to text or
networking site you use. By keeping
call you, or worse, pretend that they
your profile private, search engines will
are someone else.
not be able to scan your profile.
6. The name of your mother and father -
5. Do not share your password with
Not as risky as posting their full names,
anyone.
especially your mother's maiden name.
6. Avoid logging in to public networks/Wi-
Websites require your mother's maiden
Fi. Browsing in "incognito (or private)
name as an answer to a secret question
mode," a feature of the browser, will
whenever you lose your password.
not protect you from hackers.
7. The name of your siblings - Strangers
7. Do not talk to strangers whether online
may pretend or use their identity to
or face-to-face.
dupe you.
8. Never post anything about a future
8. Your address - It would be much easier
vacation. It is similar to posting, "Rob
for criminals to find you
my house at this date."
9. Your home phone number - This shared
9. Add friends you know in real life.
information is riskier than sharing your
10. Avoid visiting untrusted websites.
personal phone number. Scams usually
11. Install and update an antivirus software
use this information to deceive you,
on your computer. Use only one
one of which is when a stranger
antivirus software to avoid conflicts.
pretends to know your parents or
12. If you have a Wi-Fi at home, make it a
pretends to be you.
private network by adding a password.
10. Your birthday - having it in your profile
13. Avoid downloading anything from
makes you vulnerable to identity theft
untrusted websites. You are most
• The Internet vulnerable in peer-to-peer downloads
- defined as the information superhighway (torrents) as the download is most likely
- anyone has access to this highway, can not monitored by the site owner.
place information, and can grab that 14. Buy the software; do not use pirated
information ones.
- Any information, even things that you have 15. Do not reply or click links from
set privately, can be accessed one way or suspicious emails.
another • Internet Threats
- This is why social networking sites like o Malware - stands for malicious
Facebook continue to improve their security software
features a) Virus - designed to replicate itself
- The threat of cybercrime is very real and transfers one computer to
another either through the
Internet and local networks or • Online Research
data storage like flash drives and - The information that we need is more likely
CDs already on the Internet. It is just a matter of
b) Worm - transfers from one how to look for it and how to use
computer to another by any type information from the most credible source.
of means. Often, it uses a
computer network to spread itself. 1. Have a question in mind
For example, the ILOVEYOU worm
2. Narrow it down
(Love Bug Worm) created by a
Filipino. 3. Advanced Search
c) Trojan - is disguised as a useful
4. Look for credible sources
program but once downloaded or
installed, leaves your PC 5. Give credit
unprotected and allows hackers to
get your information • Cybercrime - a crime committed or assisted
d) *Rogue security software - tricks through the use of the Internet
the user into posing that it is a • Privacy policy – tells the user how the
software. It asks the user to pay to website will handle its data
improve his/her security but in
• Copyright – a part of the law, wherein you
reality, they are not protected at
have the rights to your work, and anyone who
all.
uses it without your consent is punishable by
e) Spyware - a program that runs in
law
the background without you
knowing it (thus called "spy"). It • Fair use – an intellectual property may be
has the ability to monitor what you used without a consent as long as it is used in
are currently doing and typing commentaries, criticisms, search engines,
through keylogging. parodies, news reports, research, library
f) *Keyloggers - used to record the archiving, teaching, and education
keystroke done by the users. This
is done to steal their password or
any other sensitive information. It
can record email, messages, or any
information you type using your
keyboard.
g) Adware - a program designed to
send you advertisements, mostly
as pop-ups
o Spam - unwanted email mostly from bots
or advertisers. It can be used to send
malware
o Phishing - Its goal is to acquire sensitive
personal information like passwords and
credit card details. This is done by sending
you an email that will direct the user to
visit a website and be asked to update
his/her username, password, credit card,
or personal information
o *Pharming - a more complicated way of
phishing where it exploits the DNS
(Domain Name Service) system.

You might also like