Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

EMPOWERMENT TECHONOLOGY REVIEWER

(First Quarter)
LESSON 1: Information in the Context of Global Communication

Information and Communication Technology (ICT)

 Refers to all technology that is used to handle telecommunication and


access information.

Philippines

 ICT Hub of Asia

1995

 Internet was fully commercialized

Internet

 A global system of interconnected computer networks that uses the


Internet protocol suite to communicate between network and devices.

Tim Berners Lee

 Invented World Wide Web

World Wide Web

 Is an information system on the internet that allows documents to connect


to other documents by hyperlinks, enabling user to search for information
by moving from one document to another.

TYPES OF WEB PAGES

Web 1.0 or The Web

 The contents are the same for all users. It is a flat stationary page since it
cannot be manipulated by the user in the sense that the page is static.

Web 2.0 or the Dynamic Web pages

 Is the evolution of the Web 1.0 that allows users to interact with the page.
User may be able to manipulate the page.
 Examples; Twitter, Lazada, Skype, Youtube
KEY FEATURES OF WEB 2.0

Folksonomy

 Allows user to categorized or arranged information using keywords (e.g.


tagging).

Rich User Experience

 Responsive to users’ input because of its dynamic content.

User Participation

 The user of the website is not the only one who is able to put content.

Long Tail

 Services that are offered on demand rather than on a onetime purchase. This
is synonymous to subscribing to a data plan.
 Example; Netflix

Software as a Service

 Users will subscribe to a software only when needed rather than purchasing
them.

Mass Participation

 Various information sharing through universal web access.

Web 3.0 and the Semantic Web

 Provides a common framework that allows data to be shared and reuse cross
application to be able to deliver web content targeting the user.

COMMON ONLINE PLATFORMS

- Online is a state of being connected to the cyberspace through a medium of


internet. Platforms are group of technologies that are used as a base upon
which other applications or technologies are developed.
- Sites are defined as one or more internet addresses at which an individual or
organization provides information to others.

E-Commerce platform

 It is a collection of software technologies that allows businessman to create a


storefront on the cyberspace or internet.
Online Learning Platform

 It is an incorporated set of interactive online services that provides educators,


students, parents and others involved in the education department.

Online Video Platform

 It is a service that provides an end-to-end tool that is used to create,


customize, publish and manage videos online.

Social Media Platform

 It is a web based technology that allows the deployment and management of


social media services such as creating social media websites.
 It is a computer-mediated tool that allow large group of people to create and
share information.

SIX TYPES OF SOCIAL MEDIA

Social Networks

 These sites allow you to connect with other people with the same interests or
background.
 Example; Facebook

Bookmarking Sites

 These are sites that allow you to store and manage links to various websites
and resources.
 Example; twitter, pinterest

Social News

 These are sites that allow users to post their own news items or links to other
news sources.
 Example; reddit, digg

Media Sharing

 These are sites that allow you to upload and share media content like images,
music, and video.
 Example; flickr, YouTube, Instagram

Microblogging

 These are sites that focus on short updates from the user.
 Example; twitter
Blogs and Forums

 These are websites that allow users to post their content.


 Example; tumblr, blogger

LESSON 2: Online Safety, Security, and Netiquatte

Common issues on the internet are the following:

 Cyber bullying
 Hacking
 Identity theft
 Plagiarism
 Intellectual rights and property issues

Netiquette

 Is the combination of the words “net” from the word internet and
“etiquette”, that focuses on the acceptable behaviour of the users using the
internet.

CORE RULES OF NETIQUETTE

Rule 1- Remember the human

 When communicating electronically, whether through email, instant message


discussion post, text or another method, practice the golden rule. “Do unto
others as you would have other do unto you”.

Rule 3- Know where you are in cyberspace.

 “Netiquette varies from domain to domain” (Shea, 1994). Depending on where


you are in the virtual world, the same written communication can be
acceptable in one area, where it might be considered inappropriate.

Rule 4- Respect other people’s time and bandwidth.

 Electronic communication takes time: time to read and time in which to


respond.

Rule 5- Make yourself look good online

 The quality of your writing will judge you, so keep the following tips in mind:
 Always check for spelling and grammar errors.
 Know what you’re talking about and state it clearly.
 Be pleasant and polite.
Rule 6- Share expert knowledge

 Share what you know! When you post a question and receive intelligent
answers, share the results with others. Are you an expert at something? Post
resources and references for your subject matter. You have recently expanded
your knowledge about a subject that might be of interest to others? Share that
as well.

Rule 7 - Help keep flame wars under control.

 Flaming is what people do when they express a strongly held opinion without
holding back any emotion." (Shea, 1994). "Flame wars," when two or three
people exchange angry posts between one another, must be controlled, or the
camaraderie of the group could be compromised. Don't feed the flames;
extinguish them by guiding the discussion back to a more productive
direction.

Rule 8 - Respect other people’s privacy

 Depending on what you are reading in the virtual world, be it an online class
discussion forum, Facebook page, or an email, you may be exposed to some
private or personal information that needs to be handled with care.

Rule 9 - Don’t abuse your power

 Like in face-to-face situations, there are people in cyberspace who have more
"power" than others. They have more expertise in technology or have years of
experience in a particular skill or subject matter. Maybe it is you who
possesses all of this knowledge and power! Just remember: knowing more
than others do or having more power than others does not give you the right
to take advantage of anyone. Think of Rule 1: Remember the human.

Rule 10 - Be forgiving of other people’s mistakes.

 Not everyone has the same amount of experience working in the virtual world.
And not everyone knows the rules of Netiquette. At some point, you will see a
stupid question, read an unnecessarily long response, or encounter misspelled
words; when this happens, practice kindness and forgiveness as you would
hope someone would do if you had committed the same offense.

INTERNET/ONLINE THREATS

Online Threat

 Is any malicious act that attempts to gain access to a computer network


without permission from the owner.
EXAMPLE OF ONLINE THREATS

Spams

 Are unwanted emails, instant messages coming from advertisers that are not
allowed for the message to be sent.

Phishing

 Occurs when an email is sent from an internet criminal disguised as an email


from a legitimate source. The message is meant to direct you to reveal
confidential information.

Pharming

 Is a way of phishing that happens when a hacker directs an internet user to a


false website instead of a real one.

Malware

 Or malicious software is any program or file that is harmful to a computer


user.

Common types of malware

Virus

 A malicious program intended to reproduce itself and transfer from one


computer to another.

Worms

 Are malicious software that attach to another program and when executed-
unintentionally by the user-replicates itself by modifying other computer
programs and infecting them with its own bits of code.

Trojan

 Is one of the most dangerous malware types. It usually represents itself as


something useful in order to trick you.

Spyware

 Is malware that runs in a background without you knowing it.

Keylogger

 Used to record the keystroke done by the users to steal their password or any
confidential information while typing on a keyboard.
Adware

 Is unwanted software intended to send advertisements up on your screen such


as pop-ups

LESSON 3: Effective Online Research

Search Engines

 Are websites used for retrieval of data, files, or documents from databases.
These are software systems that designed to search on WWW.

http://thinkzaratke.com/author/amty.html#posts
Method URI location resources

URL (Uniform Resource Locator)

 Is one type of Uniform Resource Identifier (URI). It is a generic term for all
types of names and addresses that refers to objects on the WWW.

Examples of Search Engines

Google

 With over 75% of the search market share.


 Provides the search results for a wide array of engines, including ASK.

YouTube

 Was founded in 2005 by veterans of Paypal and was purchased just over a
year later by Google.

You might also like