Empowerment Technologies: Teachers Reference Guide

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

..

Empowerment Technologies

Accessible Teachers Materials


TEACHERS REFERENCE GUIDE

STUDENT LEARNING GUIDE

Headwaters College – Elizabeth Campus


Academic Department

FEBRUARY 2022

Prepared by: Ms. Mary Ann Palad


Ms. Mary Jeane Mirano
1|P a g e
..

HEADWATERS COLLEGE INC.


Understanding Culture Society and Politics
(STUDENT LEARNING GUIDE)

FEBRUARY WEEK 1-2

TOPIC INTRODUCTION TO ICT


SCOPE ICT IN THE PHILIPPINES

ICT– Information and Communication


 It deals with the use of different communication technologies such as
mobile phones, telephone, Internet to locate, save, send and edit
information
 Is a study of computers as data processing tools. It introduces students
to the fundamental of using computer systems in an internet
environment.

ICT in the Philippines


 Philippines is dub as the ‘’ICT Hub of Asia” because of huge growth of ICT-related jobs, one of which is BPO,
Business Process Outsourcing, or call centers.
 ICT Department in the Philippines is responsible for the planning, development and promotion of the country’s
information and communications technology (ICT) agenda in support of national development.

Computer– an electronic device for storing and processing data, typically in binary form,
according to instructions given to it in a variable program.
Internet– is the global system of interconnected computer networks that use the internet protocol
suite (TCIP/IP) to link billions of devices worldwide.

World Wide Web


 An information system on the internet that allows documents to be connected to
other documents by hypertext links, enabling the user to search for information
by moving from one document to another.
  Is an information space where documents and other web resources are identified
by URLs, interlinked by hypertext links, and can be accessed via the Internet.
 Invented by Tim-Berners Lee

Web Pages
 Web page is a hypertext document connected to the World Wide Web.    It is a
document that is   suitable for the World Wide Web.
The different online platforms of World Wide Web:
1. Web 1.0 – refers to the first stage in the World Wide Web, which was entirely made up of the Web pages connected
by hyperlinks.
2. Web 2.0 – is the evolution of Web 1.0 by adding dynamic pages. The user is able to see a  website differently than
others.
3. Web 3.0 –  this platform is all about semantic web.Aims to have machines (or servers) understand the user’s
preferences to be able        to deliver web content.
Static Web Page- is known as a flat page or stationary age in the sense that the page is ‘’as is’’ and cannot be manipulated by the
user. The content is also the same for all users that is referred to as Web 1.0
Dynamic Web Pages– web 2.0 is the evolution of web 1.0 by adding dynamic web pages. The user is able to see website differently
than others e.g. social networking sites, wikis, video sharing sites.
FEATURES OF WEB 2.0
1. Folksonomy- allows user to categorize and classify information using freely chosen keywords e.g. tagging by FB,
Twitter, use tags that start with the sign #, referred to as hashtag.
2. Rich User Experience – content is dynamic and is responsive to user’s input
3. User Participation- The owner of the website is not the only one who is able to put content. Others are able to place
a content of their own by means of comments, reviews and evaluation e.g. Lazada, Amazon.
4. Long Tail– services that are offered on demand rather than on a one-time purchase. This is synonymous to
subscribing to a data plan that charges you for the amount of time you spent in the internet.
5. Software as a services- users will be subscribe to a software only when needed rather than purchasing them e.g.
Google docs used to create and edit word processing and spread sheet.

Prepared by: Ms. Mary Ann Palad


Ms. Mary Jeane Mirano
2|P a g e
..
6. Mass Participation– diverse information sharing through universal web access. Web 2.0’s content is based on
people from various cultures.

TRENDS IN ICT
 Convergence– is the synergy of technological advancements to work on a similar goal or task. For example, besides using
your personal computer to create word documents, you can now use your smartphone
 Social Media– is a website, application, or online channel that enables web users web users to  create, co-create, discuss
modify, and exchange user generated content.

Six types of Social Media:


a) Social Networks – These are sites that allows you to connect with other people with the same interests or background.
Once the user creates his/her account, he/she can set up a profile, add people, share content, etc Example: Facebook and
Google+
b) Bookmarking Sites – Sites that allow you to store and manage links to various website and resources. Most of the sites
allow you to create a tag to others.Example: Stumble Upon, Pinterest
c) Social News – Sites that allow users to post their own news items or links to other  news sources. The users can also
comment on the post and comments may also be rank.Ex. Reddit and Digg
d) Media Sharing – sites that allow you to upload and share media content like images, music and  video.
e) Microblogging – focus on short updates from the user. Those that subscribed to the user will be able to receive these
updates. Ex. Twitter and Plurk
f) Blogs and Forums – allow user to post their content. Other               users are able to comment on the said topic.Ex.
Blogger, WordPress and Tumblr
 Mobile Technologies– The popularity of smartphones and tablets has taken a major rise over the years. This is largely
because of the devices capability to do the tasks that were originally found in PCs. Several of these devices are capable of
using a high-speed internet. Today the latest model devices use 4G Networking (LTE), which is currently the fastest.
MOBILE OS Android
 iOS – use in apple devices such as iPhone and iPad
 Android – an open source OS developed by Google. Being open source means mobile phone companies use this OS
for free.
 Blackberry OS – use in blackberry devices
 Windows phone OS – A closed source and proprietary operating system developed by Microsoft.
 Symbian – the original smartphone OS. Used by Nokia devices
 WebOS- originally used in smartphone; now in smart TVs.
 Windows Mobile – developed by Microsoft for smartphones and pocket PCs
 Assistive Media–   is a non- profit service designed to help people who have visual and reading  impairments. A database
of audio recordings is used to read to the user
 e.g. Yahoo!, Gmail, HotmailCloud computing-distributed computing on internet or delivery of computing service over
the internet. -Instead of running an e-mail program on your computer, you log in to a Web e-mail account remotely. The
software and storage for your account doesn’t exist on your computer – it’s on the service’s computer cloud.
It has three components
1. Client computers   –   clients are the device that the end user interact with cloud.
2. Distributed Servers – Often servers are in geographically different places, but server acts as if they are working next
to each other.
Datacenters – It is collection of servers where application is placed and is accessed via Internet.
TYPES OF CLOUDS
PUBLIC CLOUD allows systems and services to be easily accessible to the general public. Public cloud may be less secured
because of its openness, e.g. e-mail
PRIVATE CLOUD allows systems and services to be accessible within an organization. It offers increased security because of its
private nature.
COMMUNITY CLOUD allows systems and services to be accessible by group of organizations.
HYBRID CLOUD is a mixture of public and private cloud. However, the critical activities are performed using private cloud while
the non-critical activities are performed using public cloud.

WEEK 3-4
TOPIC ONLINE SAFETY, SECURITY AND RULES OF NETIQUETTE

SCOPE INTERNET SAFETY


INTERNET SAFETY- it refers to the online security or safety of people and their information when using internet.
NETIQUETTE- is network etiquette, the do’s and don’ts of online communication.
Prepared by: Ms. Mary Ann Palad
Ms. Mary Jeane Mirano
3|P a g e
..
TEN RULES OF NETIQUETTE
Rule No. 1: Remember the human
  You need to remember that you are talking to a real person when you are online.
   The internet brings people together who would otherwise never meet.
   Remember this saying when sending an email: Would I say this to the person’s face.
Rule No. 2: Adhere to the same standards online that you follow in real life.
   You need to behave the same way online that you do in real life.
   You need to remember that you can get caught doing things you should not be doing       online just like you can in
real life.
   You are still talking to a real person with feelings even though you can’t see them.
Rule no. 3: Know where you are in cyberspace.
   Always take a look around when you enter a new domain when surfing the web.
   Get a sense of what the discussion group is about before you join it.
Rule no. 4: Respect other people’s time and bandwidth.
  Remember people have other things to do besides read your email. You are not the center of their world.
   Keep your post and emails to minimum by saying what you want to say.
   Remember everyone won’t answer your questions.
Rule no. 5: Make yourself look good online.
   Be polite and pleasant to everyone.
   Always check your spelling and grammar before posting.
   Know what you are talking about and make sense saying it.
Rule no. 6: Share expert knowledge
   Ask questions online
   Share what you know online.
   Post the answers to your questions online because someone may have the same question       you do.
Rule no. 7: Help keep flame wars under control
  Netiquette does not forgive flaming.
  Netiquette does however forbid people who are flaming to hurt discussion groups by putting the group down.
Rule no. 8: Respect other people’s privacy.
  Do not read other people’s mail without their permission.
  Going through other people’s things could cost you, your job or you could even go to jail.
  Not respecting other people’s privacy is a bad netiquette.
Rule no. 9: Don’t abuse your power.
 Do not take advantage of other people just because you have more knowledge or power than them.
 Treat others as you would want them to treat you if the roles were reversed.
Rule no. 10: Be forgiving of other people’s mistake.
 Do not point out mistakes to people online.
 Remember that you were once the new kid on the block.
 You still need to have a good manners even though you are online and cannot see the    person face to face.

  Internet security
   Security Requirement Triad

 ConfidentIality 
 Data confidentiality Privacy
          Integrit
 Data integerity                                                        System integrity
         Availability

Prepared by: Ms. Mary Ann Palad


Ms. Mary Jeane Mirano
4|P a g e
..
Threat Consequence Threat Action ( Attack)

Exposure: Sensitive data are directly released to an


unauthorized entity.
Interception: An unauthorized entity directly accesses
sensitive data traveling between authorized sources
and destinations.
Inference: A threat action whereby an unauthorized
entity indirectly accesses sensitive data by reasoning
Unauthorized Disclosure from characteristics or byproducts of communications.
A circumstance or event whereby an Intrusion: an unauthorized entity gains access to
entity gains access to data for which sensitive data by circumventing a system’s security
the entity is not authorized. protections.

Disruption Incapacitation: prevents or interrupts system operation


A circumstances or even that by disabling a system component.
interrupts or prevents the correct Corruption: Undesirably alters system operation by
operation of system services and adversely modifying system functions or data.
functions. Obstruction: A threat action that interrupts delivery of
system services by hindering system operation.
Masquerade: An unauthorized entity gains access to a
Deception system or performs a malicious act by posing as an
A circumstance or event that may authorized entity.
result in an authorized entity Falsification: False data deceive an authorized entity.
receiving false data and believing it Repudiation: An entity deceives another by falsely
to be true. denying responsibility for an act.

Usurpation
A circumstances or event that results Misappropriation: An entity assumes
in control of system services or unauthorized logical or physical control of a
functions by an unauthorized entity. system resource.
Misuse: Causes a system component to perform a function or service that is detrimental to system security.
Types of System Intruders
          Masquerader
          Hackers
          Clandestine user
Parts of Virus 
  Infection mechanism
  Trigger
   PayloaD
Virus stages
 Dormant phase Virus is idle.
 Propagation  phase Virus places an identical copy of itself into other programs or into certain system areas on the
disk.
 Triggering phase Virus is activated to perform the function for which it was intended. Caused by a variety of system
events
 Execution phase Function is performed
Key Terms
Cyber crime- a crime committed or assisted through the use of the Internet.
Privacy Policy/Terms of Services (ToS) – tells the user how the website will handle its data.
Malware- stands for malicious software.
Virus- a malicious program designed to transfer from one computer to another in any means possible.
Worms– a malicious program designed to replicate itself and transfer from one file folder to another and also transfer to other
computers.
Trojan-a malicious program designed that is disguised as a useful program but once downloaded or installed, leaves your PC
unprotected and allows hacker to get your information.
Spyware– a program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing
and typing through key logging.
Adware- a program designed to send you advertisement, mostly pop-ups.
Spam– unwanted email mostly from bots or advertisers.
Phishing- acquires sensitive personal information like passwords and credits card details.
Pharming- a more complicated way of phishing where it exploits the DNS system.
Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your consent is punishable by law.
Fair Use- means that an intellectual property may be used w/o consent as long as it is used in commentaries, criticism, parodies,
research and etc.
Keyloggers- used to record the keystrokes done by user. This is done to steal passwords or any other sensitive information.

Prepared by: Ms. Mary Ann Palad


Ms. Mary Jeane Mirano
5|P a g e
..
Rogue security softwares– is a form of malicious software and internet fraud that misleads users into believing there is a virus on
their computer, and manipulates them into paying money for a fake malware removal tool.

REFERENC https://www.slideshare.net/eniam27/stratification-in-the-political-environment
E: https://www.slideshare.net/AltheaTiu1/social-and-political-stratification-125060884

Prepared by: Ms. Mary Ann Palad


Ms. Mary Jeane Mirano
6|P a g e

You might also like