You are on page 1of 12

Lesson 1: Empowerment Technology

InformationandCommunicationTechnology
ICT deals with the use of different communication technologies such as mobile phones,
telephone,Internet, etc. to locate, save, send, and edit information.

These are digital forms of communication including tools available in the internet , such as
blogging ande-mail, as well as computer software, such as Microsoft PowerPoint and WordTake note:
ICT focuses on communication
Internet
- Connections with different networks: global system of interconnected networks or devices.

EmpowermentTechnologies
To create foundation in understanding the world if ICT (Information and CommunicationTechnologies),
understand and demonstrate the proper etiquette in using ICT and more. With the help
ofempowerment technologies, students and other millennials will be able to understand the real value
oftechnology; that with it, they can make their lives and future a better one.
WWW(WorldWideWeb)

Composed of many web pages that are accessible anytime.

Website -

location where there are many web pages.

Web browser-
search engine: a tool for searching.

Web 1.0 or Static Webpage


Static (also known as flat page or stationary page) in the same that the page “as is” and cannot be
manipulated by the user. This referred to as Web 1.0.
It contains Web pages with fixed content. Each page is coded in HTML and displays the sameinformation
to every visitor. Static sites are the most basic type of website and are the easiest to create.

Web2.0orDynamicWebpage
Web 2.0 allows the user to interact with the page known as DYNAMIC PAGE; instead of justreading a
page, the user may be able to comment or create a user account. Dynamic page refers tothe web pages
that are affected by user input or preference.

It is a webpage that displays different content each time it’s viewed. For example, the page may
change with the time of day. The user that accesses the webpage, or the type of user interaction.

Key Features of Web 2.0


Folksonomy

allows users to categorize and classify/arrange information using freely chosen keywords(e.g. tagging).
Popular social networking sites such as Twitter, Instagram, Facebook, etc. use tags thatstart with a
pound sign (#) or hashtag. It is also known as social tagging, collaborative tagging, socialclassification
and social bookmarking. It is the process of using digital content tags for categorization or

annotation to classify websites, pictures, documents and other forms of data so that the content may
beeasily categorized and located by users.

Rich User Interface


content is dynamic and is responsive to user’s input. An example would be a


website that shows local content. In the case of social networking sites, when logged on, your account
isused to modify what you see in their website.

User Participation

the owner of website is not the only one who is able to put content. Others are ableto place content on
their own by means of comments, reviews, and evaluation.

Long Tail

services are offered on demand rather than on a one-time purchase. This is synonymous tosubscribing
to a data plan that charges you for the amount of time you spent on Internet or a data planthat charges
you for the amount of bandwidth you used.

Software as a service

Mass Participation- sharing through universal web access.


Semantic Web

It is a movement led by the World Wide Web Consortium (W3C). The semantic web
provides aframework that allows data to be shared and reuse to deliver web content specifically
targeting the user.
Factors for not fully recognizing semantic as web 3.0:

Compatibility-HTML files and current web browsers could not support Web 3.0.

Security

The user’s security is also question since the machine is saving his or her preferences.

Vastness-The World Wide Web already contains billions of web pages.

Vagueness

Certain words are imprecise. The words “old” and “small” would depend to the user.

Logic- since machines use logic, there are certain limitations for a computer to be able to predict
whatthe user is referring to at a given time.
Trends in ICT
1.

Convergence-
It is the synergy of technological advancements to work on a similar goal or task. Forexample, besides
using your personal computer to create word documents, you can now use your smart phone. It is a
platform that can create multiple tasks.

2.
Social Media

is a website, application, or online channel that enables web users to create, co-create,discuss, modify,
and exchange user generated content.
Six types of social media:
a.

Social Networks

These are sites that allow you to connect with other people with the sameinterests or background.
Once the user creates his/her account, he/she can set up a profile, add people, share content, etc.
Example : Facebook and Google+ b.

Bookmarking Sites

These are sites that allow you to store and manage links to various website andresources. Ex. :
StumbleUpon/Pinterestc.

Social News

These are sites that allow users to post their own news items or links to other newssources. The users
can also comment on the post and comments may also be rank. Example: redditand Diggd.

Media Sharing

These are sites that allow you to upload and share media content like images, musicand video. Example:
Flickr, Youtube and Instagram.e.

Microblogging

These are sites that focus on short updates from the user. Those that subscribed tothe user will be able
to receive these updates. Example: Twitter and Plurk

f.

Blogs and Forums



These websites allow user to post their content. Other users are able to commenton the said topic.
Example: Blogger, WordPress and Tumblr3.

Mobile Technologies


The popularities of smart phones and tablets has taken a major rise over theyears. This is largely
because of the devices capability to do the tasks that were originally found in PCs.Several of these
devices are capable of using high-speed internet. Today the latest model devices use
4GNetworking (LTE)
, which is currently the
fastest mobile network.

Mobile OS
o

iOS

use in apple devices such as iPhone and iPad.
o

Android

an open source OS developed by Google. Being open source means mobile phone companiesuse this OS
for free.
o

Blackberry OS

It is use in Blackberry devices.
o

Windows Phone OS

a closed source and proprietary operating system developed by Microsoft.
o

Symbian

the original smart phone OS; used by Nokia devices.
o

Web OS

originally used in smart phones; now used in smart TVs.
o

Windows Mobile

developed by Microsoft for smart phones and pocket PCs.4.

Assistive Media


is a non- profit service designed to help people who have visual and readingimpairments. A database of
audio recordings is used to read to the user.
Status of ICT in the Philippines
Philippines as the “ICT Hub of Asia”.

Huge growth of ICT related jobs around the country, one of which is call center or BPO (BusinessProcess
Outsourcing) centers.

According to 2013 edition of Measuring the Information Society by the InternationalTelecommunication


Union, there are 106.8 cellphones per 100 Filipinos in the year 2012.

In a data gathered by the Annual Survey of Philippines Business and Industries in 2010, the ICTindustry
shares 19.3% of the total employment population.

Time magazines declared Makati City, Philippines-


Rank 1 as the “Selfiest Cities around the world and
Rank 9 is Cebu City.

LESSON 2: ONLINE SAFETY, SECURITY AND RULES OF


NETIQUETTE

INTERNET SAFETY- it refers to the online security or safety of people and their information
when using internet.

NETIQUETTE- is network etiquette, the do’s and don’ts of online communication.


TEN RULES OF NETIQUETTE

Rule No. 1: Remember the human


 You need to remember that you are talking to a real person when you are
online.
 The internet brings people together who would otherwise never meet.
 Remember this saying when sending an email: Would I say this to the person’s
face.

Rule No. 2: Adhere to the same standards online that you follow in real life.
 You need to behave the same way online that you do in real life.
 You need to remember that you can get caught doing things you should not be
doing online just like you can in real life.
 You are still talking to a real person with feelings even though you can’t see
them.

Rule no. 3: Know where you are in cyberspace.


 Always take a look around when you enter a new domain when surfing the
web.
 Get a sense of what the discussion group is about before you join it.

Rule no. 4: Respect other people’s time and bandwidth.


 Remember people have other things to do besides read your email. You are
not the center of their world.
 Keep your post and emails to minimum by saying what you want to say.
 Remember everyone won’t answer your questions.
Rule no. 5: Make yourself look good online.
 Be polite and pleasant to everyone.
 Always check your spelling and grammar before posting.
 · Know what you are talking about and make sense saying it.

Rule no. 6: Share expert knowledge


 Ask questions online
 Share what you know online.
 Post the answers to your questions online because someone may have the
same question you do.

Rule no. 7: Help keep flame wars under control


 Netiquette does not forgive flaming.
 Netiquette does however forbid people who are flaming to hurt discussion
groups by putting the group down.

Rule no. 8: Respect other people’s privacy.


 Do not read other people’s mail without their permission.
 Going through other people’s things could cost you, your job or you could even
go to jail.
 Not respecting other people’s privacy is a bad netiquette.

Rule no. 9: Don’t abuse your power.


 Do not take advantage of other people just because you have more knowledge
or power than them.
 Treat others as you would want them to treat you if the roles were reversed.

Rule no. 10: Be forgiving of other people’s mistake.


 Do not point out mistakes to people online.
 Remember that you were once the new kid on the block.
 You still need to have a good manners even though you are online and cannot
see the person face to face.
Internet security
Security Requirement Triad

Confidentiality
Data confidentiality
Privacy
 Integrity
Data integerity System integrity
 Availability

Threat Consequence Threat Action ( Attack)

Unauthorized Disclosure Exposure: Sensitive data are directly released to


A circumstance or event whereby an an unauthorized entity.
entity gains access to data for which Interception: An unauthorized entity directly
the entity is not authorized. accesses sensitive data traveling between
authorized sources and destinations.
Inference: A threat action whereby an
unauthorized entity indirectly accesses sensitive
data by reasoning from characteristics or
byproducts of communications.
Intrusion: an unauthorized entity gains access
to sensitive data by circumventing a system's
security protections.
Disruption Incapacitation: prevents or interrupts system
A circumstances or even that operation by disabling a system component.
interrupts or prevents the correct Corruption: Undesirably alters system operation
operation of system services and by adversely modifying system functions or data.
functions. Obstruction: A threat action that interrupts
delivery of system services by hindering system
Deception operation.
A circumstance or event that may Masquerade: An unauthorized entity gains
result in an authorized entity access to a system or performs a malicious act
receiving false data and believing it to by posing as an authorized entity.
be true. Falsification: False data deceive an authorized
entity.
Repudiation: An entity deceives another by
falsely denying responsibility for an act.

Usurpation Misappropriation: An entity assumes


A circumstances or event that results unauthorized logical or physical control of a
in control of system services or system resource.
functions by an unauthorized entity.
Misuse: Causes a system component to perform
a function or service that is detrimental to system
security.

Types of System Intruders


 Masquerader
 Hackers
 Clandestine user
Parts of Virus
 Infection mechanism
 Trigger
 Payload

Virus stages
 Dormant
phase Vir
us is idle.
 Propagation phase
Virus places an identical copy of itself into other programs or into certain
system areas on t the disk.
 Triggering
phase Viru
s is activated to perform the function for which it was
intended. Caused by a variety of system events
 Execution
phase Fun
ction is performed

Key Terms

Cyber crime- a crime committed or assisted through the use of the Internet.
Privacy Policy/Terms of Services (ToS) - tells the user how the website will handle its
data.
Malware- stands for malicious software.
Virus- a malicious program designed to transfer from one computer to another in any
means possible.
Worms- a malicious program designed to replicate itself and transfer from one file folder to
another and also transfer to other computers.
Trojan-a malicious program designed that is disguised as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hacker to get your
information.
Spyware- a program that runs in the background without you knowing it. It has the ability to
monitor what you are currently doing and typing through key logging.
Adware- a program designed to send you advertisement, mostly pop-ups.
Spam- unwanted email mostly from bots or advertisers.
Phishing- acquires sensitive personal information like passwords and credits card details.
Pharming- a more complicated way of phishing where it exploits the DNS system.
Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your
consent is punishable by law.
Fair Use- means that an intellectual property may be used w/o consent as long as it is used
in commentaries, criticism, parodies, research and etc.
Keyloggers- used to record the keystrokes done by user. This is done to steal passwords
or any other sensitive information.
Rogue security softwares- is a form of malicious software and internet fraud that misleads
users into believing there is a virus on their computer, and manipulates them into paying
money for a fake malware removal tool.

Four search strategies


 Keyword searching
Enter terms to search
Use quotation marks to search as a phrase and keep the words linked together
Common words are ignored (That, to, which, a, the ...)
+ and – can be used to include or exclude a word
 Boolean
AND - enter words connect with AND- it will include sites where both words and found
Uses: joining different topics (i.e. global warming AND California)
OR - requires at least one of the terms is found.
Uses: join similar or synonymous topics (i.e. global warming OR greenhouse
effect)
NOT - searches for the first term and excludes sites that have the second term.
(i.e. Washington NOT school)

 Question

a question may be entered in the search field of search engine

 Advanced

Features are offered on many engines by going to an "Advanced search" page


and making selections. Effective in narrowing search returns to a specific topic or phrase.

Lesson 03 – Advanced Word Processing Skills

You might also like