Professional Documents
Culture Documents
Empowerment Technologies: Teachers Reference Guide
Empowerment Technologies: Teachers Reference Guide
Empowerment Technologies: Teachers Reference Guide
Empowerment Technologies
FEBRUARY 2022
Computer– an electronic device for storing and processing data, typically in binary form,
according to instructions given to it in a variable program.
Internet– is the global system of interconnected computer networks that use the internet protocol
suite (TCIP/IP) to link billions of devices worldwide.
Web Pages
Web page is a hypertext document connected to the World Wide Web. It is a
document that is suitable for the World Wide Web.
The different online platforms of World Wide Web:
1. Web 1.0 – refers to the first stage in the World Wide Web, which was entirely made up of the Web pages connected
by hyperlinks.
2. Web 2.0 – is the evolution of Web 1.0 by adding dynamic pages. The user is able to see a website differently than
others.
3. Web 3.0 – this platform is all about semantic web.Aims to have machines (or servers) understand the user’s
preferences to be able to deliver web content.
Static Web Page- is known as a flat page or stationary age in the sense that the page is ‘’as is’’ and cannot be manipulated by the
user. The content is also the same for all users that is referred to as Web 1.0
Dynamic Web Pages– web 2.0 is the evolution of web 1.0 by adding dynamic web pages. The user is able to see website differently
than others e.g. social networking sites, wikis, video sharing sites.
FEATURES OF WEB 2.0
1. Folksonomy- allows user to categorize and classify information using freely chosen keywords e.g. tagging by FB,
Twitter, use tags that start with the sign #, referred to as hashtag.
2. Rich User Experience – content is dynamic and is responsive to user’s input
3. User Participation- The owner of the website is not the only one who is able to put content. Others are able to place
a content of their own by means of comments, reviews and evaluation e.g. Lazada, Amazon.
4. Long Tail– services that are offered on demand rather than on a one-time purchase. This is synonymous to
subscribing to a data plan that charges you for the amount of time you spent in the internet.
5. Software as a services- users will be subscribe to a software only when needed rather than purchasing them e.g.
Google docs used to create and edit word processing and spread sheet.
TRENDS IN ICT
Convergence– is the synergy of technological advancements to work on a similar goal or task. For example, besides using
your personal computer to create word documents, you can now use your smartphone
Social Media– is a website, application, or online channel that enables web users web users to create, co-create, discuss
modify, and exchange user generated content.
WEEK 3-4
TOPIC ONLINE SAFETY, SECURITY AND RULES OF NETIQUETTE
Internet security
Security Requirement Triad
ConfidentIality
Data confidentiality Privacy
Integrit
Data integerity System integrity
Availability
Usurpation
A circumstances or event that results Misappropriation: An entity assumes
in control of system services or unauthorized logical or physical control of a
functions by an unauthorized entity. system resource.
Misuse: Causes a system component to perform a function or service that is detrimental to system security.
Types of System Intruders
Masquerader
Hackers
Clandestine user
Parts of Virus
Infection mechanism
Trigger
PayloaD
Virus stages
Dormant phase Virus is idle.
Propagation phase Virus places an identical copy of itself into other programs or into certain system areas on the
disk.
Triggering phase Virus is activated to perform the function for which it was intended. Caused by a variety of system
events
Execution phase Function is performed
Key Terms
Cyber crime- a crime committed or assisted through the use of the Internet.
Privacy Policy/Terms of Services (ToS) – tells the user how the website will handle its data.
Malware- stands for malicious software.
Virus- a malicious program designed to transfer from one computer to another in any means possible.
Worms– a malicious program designed to replicate itself and transfer from one file folder to another and also transfer to other
computers.
Trojan-a malicious program designed that is disguised as a useful program but once downloaded or installed, leaves your PC
unprotected and allows hacker to get your information.
Spyware– a program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing
and typing through key logging.
Adware- a program designed to send you advertisement, mostly pop-ups.
Spam– unwanted email mostly from bots or advertisers.
Phishing- acquires sensitive personal information like passwords and credits card details.
Pharming- a more complicated way of phishing where it exploits the DNS system.
Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your consent is punishable by law.
Fair Use- means that an intellectual property may be used w/o consent as long as it is used in commentaries, criticism, parodies,
research and etc.
Keyloggers- used to record the keystrokes done by user. This is done to steal passwords or any other sensitive information.
REFERENC https://www.slideshare.net/eniam27/stratification-in-the-political-environment
E: https://www.slideshare.net/AltheaTiu1/social-and-political-stratification-125060884