Professional Documents
Culture Documents
InformationandCommunicationTechnology
ICT deals with the use of different communication technologies such as mobile phones,
telephone,Internet, etc. to locate, save, send, and edit information.
These are digital forms of communication including tools available in the internet , such as
blogging ande-mail, as well as computer software, such as Microsoft PowerPoint and WordTake note:
ICT focuses on communication
Internet
- Connections with different networks: global system of interconnected networks or devices.
EmpowermentTechnologies
To create foundation in understanding the world if ICT (Information and CommunicationTechnologies),
understand and demonstrate the proper etiquette in using ICT and more. With the help
ofempowerment technologies, students and other millennials will be able to understand the real value
oftechnology; that with it, they can make their lives and future a better one.
WWW(WorldWideWeb)
Website -
Web browser-
search engine: a tool for searching.
Web2.0orDynamicWebpage
Web 2.0 allows the user to interact with the page known as DYNAMIC PAGE; instead of justreading a
page, the user may be able to comment or create a user account. Dynamic page refers tothe web pages
that are affected by user input or preference.
It is a webpage that displays different content each time it’s viewed. For example, the page may
change with the time of day. The user that accesses the webpage, or the type of user interaction.
annotation to classify websites, pictures, documents and other forms of data so that the content may
beeasily categorized and located by users.
User Participation
–
the owner of website is not the only one who is able to put content. Others are ableto place content on
their own by means of comments, reviews, and evaluation.
Long Tail
–
services are offered on demand rather than on a one-time purchase. This is synonymous tosubscribing
to a data plan that charges you for the amount of time you spent on Internet or a data planthat charges
you for the amount of bandwidth you used.
Software as a service
It is a movement led by the World Wide Web Consortium (W3C). The semantic web
provides aframework that allows data to be shared and reuse to deliver web content specifically
targeting the user.
Factors for not fully recognizing semantic as web 3.0:
Compatibility-HTML files and current web browsers could not support Web 3.0.
Security
–
The user’s security is also question since the machine is saving his or her preferences.
Vagueness
–
Certain words are imprecise. The words “old” and “small” would depend to the user.
Logic- since machines use logic, there are certain limitations for a computer to be able to predict
whatthe user is referring to at a given time.
Trends in ICT
1.
Convergence-
It is the synergy of technological advancements to work on a similar goal or task. Forexample, besides
using your personal computer to create word documents, you can now use your smart phone. It is a
platform that can create multiple tasks.
2.
Social Media
–
is a website, application, or online channel that enables web users to create, co-create,discuss, modify,
and exchange user generated content.
Six types of social media:
a.
Social Networks
–
These are sites that allow you to connect with other people with the sameinterests or background.
Once the user creates his/her account, he/she can set up a profile, add people, share content, etc.
Example : Facebook and Google+ b.
Bookmarking Sites
–
These are sites that allow you to store and manage links to various website andresources. Ex. :
StumbleUpon/Pinterestc.
Social News
–
These are sites that allow users to post their own news items or links to other newssources. The users
can also comment on the post and comments may also be rank. Example: redditand Diggd.
Media Sharing
–
These are sites that allow you to upload and share media content like images, musicand video. Example:
Flickr, Youtube and Instagram.e.
Microblogging
–
These are sites that focus on short updates from the user. Those that subscribed tothe user will be able
to receive these updates. Example: Twitter and Plurk
f.
Mobile Technologies
–
The popularities of smart phones and tablets has taken a major rise over theyears. This is largely
because of the devices capability to do the tasks that were originally found in PCs.Several of these
devices are capable of using high-speed internet. Today the latest model devices use
4GNetworking (LTE)
, which is currently the
fastest mobile network.
Mobile OS
o
iOS
–
use in apple devices such as iPhone and iPad.
o
Android
–
an open source OS developed by Google. Being open source means mobile phone companiesuse this OS
for free.
o
Blackberry OS
–
It is use in Blackberry devices.
o
Windows Phone OS
–
a closed source and proprietary operating system developed by Microsoft.
o
Symbian
–
the original smart phone OS; used by Nokia devices.
o
Web OS
–
originally used in smart phones; now used in smart TVs.
o
Windows Mobile
–
developed by Microsoft for smart phones and pocket PCs.4.
Assistive Media
–
is a non- profit service designed to help people who have visual and readingimpairments. A database of
audio recordings is used to read to the user.
Status of ICT in the Philippines
Philippines as the “ICT Hub of Asia”.
Huge growth of ICT related jobs around the country, one of which is call center or BPO (BusinessProcess
Outsourcing) centers.
In a data gathered by the Annual Survey of Philippines Business and Industries in 2010, the ICTindustry
shares 19.3% of the total employment population.
INTERNET SAFETY- it refers to the online security or safety of people and their information
when using internet.
Rule No. 2: Adhere to the same standards online that you follow in real life.
You need to behave the same way online that you do in real life.
You need to remember that you can get caught doing things you should not be
doing online just like you can in real life.
You are still talking to a real person with feelings even though you can’t see
them.
Virus stages
Dormant
phase Vir
us is idle.
Propagation phase
Virus places an identical copy of itself into other programs or into certain
system areas on t the disk.
Triggering
phase Viru
s is activated to perform the function for which it was
intended. Caused by a variety of system events
Execution
phase Fun
ction is performed
Key Terms
Cyber crime- a crime committed or assisted through the use of the Internet.
Privacy Policy/Terms of Services (ToS) - tells the user how the website will handle its
data.
Malware- stands for malicious software.
Virus- a malicious program designed to transfer from one computer to another in any
means possible.
Worms- a malicious program designed to replicate itself and transfer from one file folder to
another and also transfer to other computers.
Trojan-a malicious program designed that is disguised as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hacker to get your
information.
Spyware- a program that runs in the background without you knowing it. It has the ability to
monitor what you are currently doing and typing through key logging.
Adware- a program designed to send you advertisement, mostly pop-ups.
Spam- unwanted email mostly from bots or advertisers.
Phishing- acquires sensitive personal information like passwords and credits card details.
Pharming- a more complicated way of phishing where it exploits the DNS system.
Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your
consent is punishable by law.
Fair Use- means that an intellectual property may be used w/o consent as long as it is used
in commentaries, criticism, parodies, research and etc.
Keyloggers- used to record the keystrokes done by user. This is done to steal passwords
or any other sensitive information.
Rogue security softwares- is a form of malicious software and internet fraud that misleads
users into believing there is a virus on their computer, and manipulates them into paying
money for a fake malware removal tool.
Question
Advanced