Professional Documents
Culture Documents
Empowerment Technology
Empowerment Technology
Empowerment Technology
Social Media
is a collection of internet based communication tools and computer-assisted channels dedicated
to allow users to interact, communicate, and share information in a virtual community and
network.
Is a website, application, or online channel that enables web users to create, co-create, discuss,
modify, and exchange user-generated content. According to Nielsen, a global information and
measurement company, Internet users spend more time in social media sites than in any other
type of site. With this, more and more advertisers use social media to promote their product.
Mobile Technologies/Media
With the growing Mobile media, the smart phone has dominated sales growth of the digital
world, outpacing laptops and personal computers. Smartphone is an integration of various technologies
rolled into one, such as the cellular phone, PDA (portable digital assistant), photo, and video camera.
Mobile devices use different operating systems:
1. iOS – used in Apple devices such as iPhone and iPad.
2. Android – an open source operating system developed by Google. Being open source means
several mobile phone companies use this OS for free.
3. Blackberry OS – used in Blackberry devices.
4. Windows Phone OS – a closed source and proprietary operating system developed by
Microsoft.
5. Symbian – the original smartphone OS; used by Nokia devices.
6. WebOS – originally used for smartphones; now used for smart TV’s
7. Windows Mobile - developed by Microsoft for smart phones and pocket PC’s
Assistive Media
Assistive Media is a nonprofit organization founded in 1996 in Ann Arbor, Michigan, USA. The
organization was the first internet-based reading service for persons with visual and reading
impairments, as echoed from the word of its founder David H. Erdody:
“Assistive Media was the first internet-based audio reading service for persons with print
reading barriers thereby operating a unique avenue of accessibility for many individuals with cognitive,
physical, and communication disabilities. Our narrators provide an engaging solution that allows access
to previously inaccessible reading materials leading to greater independence and integration into the
mainstream of society and community life”.
Following are some of the online platforms and applications that you can use to create online
presentation, web page, newsletter, info graphics, music, video, and other multimedia contents:
Presentation tools- Prezi, Zoho Show, MS Powerpoint
Newsletter, ICT content platforms-Dropbox, Tumblr, Wix
Photo editing tools- Picasa, Adobe Photoshop, MS Paint
Photo uploading and hosting tools- DropBox, Flickr
Online collaborative tools- Google Drive, Viber, Facebook
Cloud computing- DropBox, Google Drive, Microsoft One Drive
Blog tools- Blogger, WordPress, LiveJournal
Mapping tools- Google Maps, Wikimapia
Music production- Sibelius
Survey and forms- Google Forms
ICT projects and contents publishing and uploading platforms- WordPress, MS Office Project
Server, File Manager
Internet Threats
1. MALWARE – stands for malicious software
a. Virus – a malicious program designed to replicate itself and transfer from one computer to
another either through the Internet or local networks or data storage like flash drives.
b. Worm – a malicious program that transfers from one computer to another by any type of
means. Often, it uses a computer network to spread itself. For example: the ILOVEYOU worm
(Love Bug Worm) created by a Filipino.
c. Trojan – a malicious program that is disguised as a useful program but once downloaded or
installed, leaves your PC unprotected and allows hackers to get your information.
d. Spyware – a program that runs in the background without you knowing it (thus called “spy”). It
has the ability to monitor what you are currently doing and typing through key logging.
e. Adware – a program designed to send you advertisement, mostly as pop-ups.
2. SPAM – unwanted e-mail mostly from bots or advertisers. It can be used to send malware
3. PHISHING – Its goal is to acquire sensitive personal information like passwords and credit card
details. This is done by sending you an e-mail that will direct to user to visit a website and asked
to update his/her username, password, credit card, or personal information.
4. PHARMING - a more complicated way of phishing where it exploits the DNS (Domain Name
Service) system. This is a dangerous hacker attack on a website which directs all traffic to that
web site to another fictitious website. The main object of pharming is to obtain username and
passwords, as well as credit card and financial information, use these to steal their many
electronically or use the credit card of the victims.
5. EMAIL SPAM - also known as junk email, it is usually unsolicited commercial email sent from one
source with identical message sent to multiple recipients. Although some of them are not
harmful, deleting them one by one will eat up your time and can clog your email. Dangerous
spams carry virus like Trojan horse and other malicious software (malware).
Spammer is the term used to refer to a person who creates electronic spam. Spamming is
projected to continue because it is a cheap means of advertising. In addition, many countries do
not have laws to punish spammers.
6. EMAIL SPOOFING - this refers to deceitful email practice in which the sender address is
changed, so that it would appear to have come from a different source usually someone you
know. Usually, the reply to address is the source of email, and when you unknowingly reply to it
you would be replying to the one who spoofed you. Email spoofing is usually used by spammers
to hide the origin of the spam.
Copy Infringement
Here are some tips that could help you avoid copyright infringement.
1. UNDERSTAND – Copyright protects literary works, photographs, paintings, drawings, films,
music (and lyrics), choreography, and sculptures, but it generally does NOT protect underlying
ideas and facts. This means that you can express something using your own words, but you
should give credits to the source.
2. BE RESPONSIBLE – Even if the material does not say that it is copyrighted, it is not a valid
defense against copying. Be responsible enough to know if something has a copyright.
3. BE CREATIVE – Ask yourself whether what you are making is something that came from you or
something made from somebody else’s creativity. It is important to add your own creative
genius in everything that will be credited to you.
4. LOOK FOR CREDIBLE SOURCE – Some wikis, though filled with updated information, are not a
credible source. This is due to the fact that anyone can edit its content. When using wikis, check
out the link of the cited text (indicated by superscript number) to be navigated to the footnote
where the list of sources is located. Click the source of the information and see if it is credible.
5. GIVE CREDIT – If you are going to use the information from a source for educational purposes,
give credit to the original author of the page or information.