Professional Documents
Culture Documents
Empowerment Techonology Reviewer
Empowerment Techonology Reviewer
(First Quarter)
LESSON 1: Information in the Context of Global Communication
Philippines
1995
Internet
The contents are the same for all users. It is a flat stationary page since it
cannot be manipulated by the user in the sense that the page is static.
Is the evolution of the Web 1.0 that allows users to interact with the page.
User may be able to manipulate the page.
Examples; Twitter, Lazada, Skype, Youtube
KEY FEATURES OF WEB 2.0
Folksonomy
User Participation
The user of the website is not the only one who is able to put content.
Long Tail
Services that are offered on demand rather than on a onetime purchase. This
is synonymous to subscribing to a data plan.
Example; Netflix
Software as a Service
Users will subscribe to a software only when needed rather than purchasing
them.
Mass Participation
Provides a common framework that allows data to be shared and reuse cross
application to be able to deliver web content targeting the user.
E-Commerce platform
Social Networks
These sites allow you to connect with other people with the same interests or
background.
Example; Facebook
Bookmarking Sites
These are sites that allow you to store and manage links to various websites
and resources.
Example; twitter, pinterest
Social News
These are sites that allow users to post their own news items or links to other
news sources.
Example; reddit, digg
Media Sharing
These are sites that allow you to upload and share media content like images,
music, and video.
Example; flickr, YouTube, Instagram
Microblogging
These are sites that focus on short updates from the user.
Example; twitter
Blogs and Forums
Cyber bullying
Hacking
Identity theft
Plagiarism
Intellectual rights and property issues
Netiquette
Is the combination of the words “net” from the word internet and
“etiquette”, that focuses on the acceptable behaviour of the users using the
internet.
The quality of your writing will judge you, so keep the following tips in mind:
Always check for spelling and grammar errors.
Know what you’re talking about and state it clearly.
Be pleasant and polite.
Rule 6- Share expert knowledge
Share what you know! When you post a question and receive intelligent
answers, share the results with others. Are you an expert at something? Post
resources and references for your subject matter. You have recently expanded
your knowledge about a subject that might be of interest to others? Share that
as well.
Flaming is what people do when they express a strongly held opinion without
holding back any emotion." (Shea, 1994). "Flame wars," when two or three
people exchange angry posts between one another, must be controlled, or the
camaraderie of the group could be compromised. Don't feed the flames;
extinguish them by guiding the discussion back to a more productive
direction.
Depending on what you are reading in the virtual world, be it an online class
discussion forum, Facebook page, or an email, you may be exposed to some
private or personal information that needs to be handled with care.
Like in face-to-face situations, there are people in cyberspace who have more
"power" than others. They have more expertise in technology or have years of
experience in a particular skill or subject matter. Maybe it is you who
possesses all of this knowledge and power! Just remember: knowing more
than others do or having more power than others does not give you the right
to take advantage of anyone. Think of Rule 1: Remember the human.
Not everyone has the same amount of experience working in the virtual world.
And not everyone knows the rules of Netiquette. At some point, you will see a
stupid question, read an unnecessarily long response, or encounter misspelled
words; when this happens, practice kindness and forgiveness as you would
hope someone would do if you had committed the same offense.
INTERNET/ONLINE THREATS
Online Threat
Spams
Are unwanted emails, instant messages coming from advertisers that are not
allowed for the message to be sent.
Phishing
Pharming
Malware
Virus
Worms
Are malicious software that attach to another program and when executed-
unintentionally by the user-replicates itself by modifying other computer
programs and infecting them with its own bits of code.
Trojan
Spyware
Keylogger
Used to record the keystroke done by the users to steal their password or any
confidential information while typing on a keyboard.
Adware
Search Engines
Are websites used for retrieval of data, files, or documents from databases.
These are software systems that designed to search on WWW.
http://thinkzaratke.com/author/amty.html#posts
Method URI location resources
Is one type of Uniform Resource Identifier (URI). It is a generic term for all
types of names and addresses that refers to objects on the WWW.
YouTube
Was founded in 2005 by veterans of Paypal and was purchased just over a
year later by Google.