Professional Documents
Culture Documents
Et Notes
Et Notes
TECHNOLOGIES
SAINT LOUIS UNIVERSITY
LABORATORY HIGH SCHOOL
SENIOR HIGH
EMPOWERMENT
TECHNOLOGY
SAINT LOUIS UNIVERSITY
LABORATORY HIGH SCHOOL - SENIOR HIGH
1. Google Form – Personal Profile with 2x2 picture
2. Introduction
3. Mobile Application
4. Assignment: Emerging Technologies
5. Canva ( Logo/Poster)
6. Social Media for Social Change
1. Labels
2. Songbook / Magazine
3. Questionnaire
1. Commercial /Advertisement
2. Game / Short animation
3. Lyric Video
LESSON 1: INTRODUCTION TO ICT
• Lesson Objectives
• Demonstrate an understanding of ICT in the
context of global communication
Information and
Communications
Technology
INFORMATION
• Symbian • WebOS
• Android • Windows Mobile
• iOS
ICT TODAY
?
THE WEB
• Folksonomy • Software as a
• Rich User Experience Service (SaaS)
• User Participation • Mass Participation
• Long Tail
WEB 3.0 AND SEMANTIC WEB
• Targets users preferences
• Look and feel
• Allows data to be shared and reused
across application, enterprise and
community boundaries
WEB 3.0 NOT YET FULLY REALIZED
• Compatibility • Vagueness
• Security • Logic
• Vastness
LESSON 2: ONLINE SYSTEMS: PLATFORMS
• B2B (business to business) – This involves companies doing business with each
other.
• B2C (business to consumer) – B2C consists of businesses selling to the public
through shopping cart software, without needing any human interaction.
• C2B (consumer to business) – In C2B e-commerce, consumers post a project
with a set budget online, and companies bid on the project. The consumer
reviews the bids and selects the company.
• C2C (consumer to consumer) – This takes place within online classified ads,
forums or marketplaces where individuals can buy and sell their goods.
HOW SAFE ARE YOU?
TYPE OF INFORMATION SHARED NOT SHARED
1. First name
2. Last Name
3. Middle Name
4. Current and Previous School(s)
5. Cellphone Number
6. The name of your mother and Father
7. The name of your siblings
8. Your Address
9. Your Home Phone number
10. Your Birthday
LESSON 3: ONLINE SAFETY AND SECURITY
Online Ethics – acceptable use of online
resources in an online environment
Netiquette
- combination of Net (internet) + etiquette
- focuses on the acceptable behavior of the
person while using the internet resource
INTERNET THREATS
1.MALWARE
2.SPAM
3.PHISHING
INTERNET THREATS
MALWARE
a)VIRUS d) SPYWARE
b)WORM Keyloggers
c)TROJAN e) ADWARE
ROGUE SECURITY SOFTWARE
INTERNET THREATS
2. SPAM
3. PHISHING & PHARMING
USE OF ONLINE RESOURCES
Privacy Policy – tells the user how website handle its data
ISSUES AND CRIMES ON THE INTERNET
• Cyberbullying
• Hacking
• Identity Theft
• Plagiarism
• Copyright Infringement
GOVERNMENT PROVISIONS FOR ONLINE
COURTESY & ETIQUETTE
• Republic Act 10627 (Anti-Bullying Act of 2013)
Protection of individuals from bullying through electronic
means
TOPIC: TO BE ANNOUNCED
WHAT IS INTELLECTUAL PROPERTY?
• Understand
• Be Responsible
• Be Creative
• Know the Law
ASSIGNMENT
• http://www.clickandcopyright.com/copyright-infringement.aspx
• http://www.pcworld.com/article/112364/music_labels_declare_war_on_file_swappers.ht
ml
• http://news.bbc.co.uk/2/hi/technology/5220406.stm
• http://www.pdinfo.com/copyrt.php
• http://chronicle.com/article/Music-Industry-Will-Stop-Ma/42156/
• Scott, Brian. "Definition of Copyright Infringement."
http://www.researchcopyright.com/article-definition-of-copyright-infringement.php