You are on page 1of 17

WHAT IS INFORMATION AND COMMUNICATION TECHNOLOGY?

Over a century ago, Alexander Graham Bell revolutionized the


communications field by inventing the telephone. At the same time, the
telecommunication network - a support facility composed of wires and equipment
- was built to support telephone services. Since the, telephone networks grew
and expanded throughout the globe. Other forms of technology and methods of
communication also stem from breakthroughs and innovations anchored on
telephone networks. Such technologies include the internet and mobile phones
which also use basic telephone networks. These technologies and
methodologies are now collectively referred to as Information Communication
Technology or ICT

Information and Communications Technology (ICT) often deals with


the use of different technologies such as mobile phones, telephones, computer,
Internet, and other devices, as well as software and applications to locate, save,
send, and manipulate information. Empowering ICT is important for its innovative
uses impacts our daily lives. It has affected our ways of communicating, made
our lives more convenient, and assisted countries towards their modernization
plans. Thus, there is a need to create a foundation of understanding in the world
of ICT.

By the end of this lesson, you are expected to:

 Identify varied online platforms and sites.

 Compare and contrast the nuances of varied online platforms, sites, and
content to best achieve specific class objectives or address situational
challenges.

 Evaluate existing online creation tools, platforms and applications in


developing ICT content.

1|P a g e
Information and Communication Technology

Information and Communications Technology (ICT)

Collectively refers to the technologies, both hardware and software, that


enables humans to communicate with one another. It is a common
misconception that ICT is Internet or Computer alone. Basically, it is any form of
technology that enables you to communicate.

Gadgets have become part of our necessity that we check on them after we
wake up. It made communication easier. We can use cellular phones that are
designed for communicating with other people even they are miles away from us.
It has also assisted us in our work since there are Internet-based jobs. It has
revolutionized our education and in the modernization of our economy.

ICT in the Philippines

Philippines is dub as the ‘’ICT Hub of Asia” because of huge growth of ICT-
related jobs, one of which is BPO, Business Process Outsourcing, or call centers.

ICT Department in the Philippines is responsible for the planning,


development and promotion of the country’s information and communications
technology (ICT) agenda in support of national development.

When the internet was fully commercialized in 1995 , it has tremendously


impacted culture and commerce, including the rise of near instant communication
by email, instant messaging, telephony (Voice over Internet Protocol or VoIP),
two-way interactive video calls, and the World Wide Web with its discussion
forums, blogs, social networking, and online shopping sites.

Internet is the global system of 67 interconnected computer networks that uses


the Internet protocol suite (TCP/IP) to communicate between networks and
devices.

2|P a g e
The World Wide Web (www)

The World Wide Web is an information system on the Internet that allows
documents to be connected to other documents by hypertext links, enabling the
user to search for information by moving from one document to another. It was
invented by Tim-Berners Lee. The World Wide Web browser software, such as
Microsoft's Internet Explorer/Edge, Mozilla Firefox, Opera, Apple's Safari, and
Google Chrome,
let users navigate from one web page to another via the hyperlinks embedded in
the documents. These documents may also contain any combination of computer
data, including graphics, sounds, text, video, multimedia and interactive content
that runs while the user is interacting with the page. The Web has enabled
individuals and organizations to publish ideas and information to a potentially
large audience online at greatly reduced expense and time delay.

Types of Web Pages

Web 1.0 or The Web. It is the first stage of the World Wide Web evolution. It is a
flat or stationary page since it cannot be manipulated by the user.

Web 2.0 or The Social Web allows users to interact with the page, the user
may be able to comment or create a user account. Most website that we visit
today are Web 2.0.

Web 3.0 or Semantic Web.The semantic web provides a framework that


allows data to be shared and reuse to deliver web content specifically
targeting the user. Search Engine will learn about you and your habits from
each search you perform and will gather details about you from your previous
activities like likes and social postings and present the answers as per your
preferences.

Below is a comparison of Web 1.0, Web 2.0 and Web 3.0:


https://lcy0210.wordpress.com/2019/01/11/web-3-0-to-5-0-is-coming-soon/

CRITERIA Web 1.0 Web 2.0 Web 3.0


Communication Broadcast Interactive Engaged/ Invested
Information Static/ Read-only Dynamic Portable & Personal
Focus Organization Community Individual
Content Ownership Sharing Immersion
Interaction Web Forms Web Application Smart Applications
Search Directories Tags/ Keywords Context/ Relevance
Metrics Page Views Cost per Click User Engagement
Advertising Banners Interactive Behavioral
Technologies HTML/ FTP Flash/ Java/ XML RDF/ RDFS/ OWL
3|P a g e
Feature of Web 2.0

Allows users to collectively classify and find information


using freely chosen keywords (e.g. "tagging" by
FOLKSONOMY
facebook). Tagging uses the pound sign #, often referred
to as hastag.
Dynamic content that is responsive to user input (e.g., a
RICH USER
user can "click" on an image to enlarge it or find out more
EXPERIENCE
information)
The owner of website is not the only one who is able to
put
USER
content. Others are able to place a content on their own
PARTICIPATION
by
means of comments, reviews, and evaluation.
Services that are offered on demand rather than on a
one-time purchase. This is synonymous to subscribing to
LONG TAIL a data plan that charges you for the amount of time you
spent in the Internet, or a data plan that charges you for
the amount of bandwidth you used.
SOFTWARE AS Users will subscribe to a software only when needed
A SERVICE rather than purchasing them.

PLATFORMS AND SITES

Because of the wide capacity of Web 2.0, it has helped in creating dynamic

4|P a g e
online platform sites. Online platform is a specially developed platform using
Internet technology. Online platforms have revolutionized access to any
information.

Online platforms currently include, but are not limited to:

Presentation or Visualization
Cloud Computing
File Management
Mapping
Social Media

Presentation or Visualization Platform - allows you to present and share


presentations, infographics and videos with other people. It is used to
communicate information clearly and efficiently.

Cloud Computing Platform - is also called as “The cloud.” It is the practice of


using a network of remote servers hosted on the internet. Instead of using
your computer’s hard drive, you store and access your data and programs
over the Internet.

TYPES OF CLOUDS

PUBLIC CLOUD allows systems and services to be easily accessible to the


general public. Public cloud may be less secured because of its openness,
e.g. e-mail

PRIVATE CLOUD allows systems and services to be accessible within an


organization. It offers increased security because of its private nature.

COMMUNITY CLOUD allows systems and services to be accessible by


group of organizations.

HYBRID CLOUD is a mixture of public and private cloud. However, the


critical activities are performed using private cloud while the non-critical
activities are performed using public cloud.

5|P a g e
File Management Platform - is used for the storing, naming, sorting, and
handling of computer files. Allows you to convert and manage files without
download in the software tool.

Mapping Platform - is a transformation taking the points of one space into the
points of the same or another space. Uses GPS to detect location and used
for navigation.

Social Media – is a website, application, or online channel that enables web


users web users to create , co-create, discuss modify, and exchange user
generated content.

Six types of Social Media:

Social Networks – These are sites that allows you to connect with other
people with the same interests or background. Once the user creates his/her
account, he/she can set up a profile, add people, share content, etc

Example: Facebook and Google+

Bookmarking Sites – Sites that allow you to store and manage links to
various website and resources. Most of the sites allow you to create a tag to
others.

Example: Stumble Upon, Pinterest

Social News – Sites that allow users to post their own news items or links to
other news sources. The users can also comment on the post and comments
may also be rank.

Ex. Reddit and Digg

Media Sharing – sites that allow you to upload and share media content like
images, music and video.

Ex. Flickr, YouTube and Instagram

6|P a g e
Microblogging – focus on short updates from the user. Those that
subscribed to the user will be able to receive these updates.

Ex. Twitter and Plurk

Blogs and Forums – allow user to post their content. Other users
are able to comment on the said topic.

Ex. Blogger, WordPress and Tumblr

RESEARCH AND INFORMATION SEEKING

One of the ideal applications laid down for ICT and the World Wide Web is
for research and education.

There are a number of information sources over the internet, some of which
are present below.

 Web search engines – these are programs designed to search or mine


the World Wide Web based on key words provided by the user.
Ex. Bing, Google, Duckduckgo and Yahoo

 Research indexing sites – these are Web sites dedicated to compile and
index researches done by the academic researchers, engineers, social
science, and so on.
Ex. Google scholar, Researchgate, IEEEXplore

 Massive Online Open Course (MOOC) – ainformative site dedicated to


inform and teach users focused on different areas.
Ex. Coursearea, edX and Udemy

 Employment Web sites – a site that enable companies to post job


vacancies and also accommodate job seekers by providing a resume-
submission facility.
Ex. Bestjobs, Jobstreet and JobsDB

 Electronic commerce (e-commerce) – a site that enable user to trade


procucts and currencies by the use of electronic technology.

7|P a g e
What social media application affect your day-to-day activities,
and how did it improve your life?

Activity 1

Directions: Read each item carefully and choose the letter of the correct answer.
Write your answers on a separate sheet of paper or in your notebook.

1. What type of web provides a framework that allows data to be shared and reuse to
deliver web content specifically targeting the user?
A. Web 1.0 C. Web 3.0
B. Web 2.0 D. Website

2. Which of the following is an example of sites under web 2.0?


A. Facebook C. Wikipedia
B. YouTube D. All of the above

3. What type of web page is classified as flat or stationary?


A. Web 1.0 C. Web 2.0
B. Internet D. Web 3.0

4. Marisa wants to publish her collections of original poems online. Which online
platform must she do this?
A. Social News C. YouTube
B. Bookmarking Site D. Blogs

5. Watson is creating a cover video of his favorite song. Which online platform must
he publish this?
A. Social News C. YouTube
B. Bookmarking Site D. Blogs

8|P a g e
6. Cathy has created a very good slideshow presentation on a certain topic, and she
wants to share it to other teachers around the world. Which online platform must
she publish this?
A. Presentation Platforms C. File Management Platforms
B. Cloud Computing Platforms D. Social Media Platforms

7. What is the name of the symbol that is used to classify and categorize
information?
A. Hashtag C. Asterisk
B. Question Mark D. At sign

8. It allows you to store and manage links to various website and resources.
A. Website C. World Wide Web
B. Bookmarking site D. Blogs

9. The developer who invented the Worl Wide Web.


A. Alexander Graham Bell C. Tim-Berners Lee
B. Sir Charles Wheatstone D. Charles Babbage

10. Allows systems and services to be accessible within an organization.


A. Cloud Computing Platform C. Private Cloud
B. Media sharing D. Multimedia

Test II True or False

Directions: Write True if the statement is correct if it is not write the Correct
answer. Write your answer on the space provided.

__________ 1. Long tail is a term for network & etiquette.


__________ 2. Web 3.0 aims to understand user’s preference.
__________ 3. Employment Websites uses electronic means to trade product
__________ 4. ICT deals with the different communication technology.
__________ 5. Interactive Multimedia is a technology that let users interact with
the content of an application or website. T
__________ 6. URL means “Uniform Resource Locator”
__________ 7. Text is a multimedia capture via camera and scanners.

9|P a g e
__________ 8. Facebook is the media platform used to influence others towards
social change during the time of the People Power Revolution.
Radio Broadcast
__________ 9.Lazada and Shoppe are example of search engines.
__________ 10. ISP means Interactive Service Provider

ASSIGNMENT:

Create a Social media Blog containing your day-to-day activity.

At least 1 minute minimum and must contain Online ethics and Etiquette.

Online Safety, Security and Netiquette

The internet is the guiding technology of the Information Technology Age just
as the electrical engine was of the Industrial Age. In these times, more and more

10 | P a g e
people are already engaged in the use of technology. These people who are
raised in a digital, media-saturated world are called digital natives. No doubt,
the Internet has been very useful to us but with the rise of instant messaging,
chat rooms, emails and social networking sites, it can also bring trouble - from
cyberbullying to more serious Internet dangers, including exposure to sexual
predators. Thus, internet safety is always our primaryconcern.

By the end of this lesson, you are expected to:

1. Identify what constitutes appropriate and inappropriate onlinebehavior.


2. Apply internet online safety, security ethics and etiquette
standards and practice in the use ofICTs.
3. Discern possible deceptive information and wrongly evaluateddata.

ONLINE SAFETY

It refers to the practices and precautions that should be observedwhen using


the internet to ensure that the users as well as their computers and personal
information are safe from crimes associated with using the internet.

Below are personal information that must be kept confidential.

There are numerous delinquencies that can be committed


on the internet such as stalking, identity theft, privacy violations,

11 | P a g e
andharassment.

To avoid these online crimes, follow the following online safety measures:

 Never give any personal information out about yourself over theinternet.

 Do not give any banking or sensitive information unless you


are sure that it is a reputable business having a secure
service. To make sure that you are in a secured network,
the website address should begin with “https://’ as
opposed to “http://”. Never access your accounts by
following an email link, instead type your URL byyourself.

 Never open messages or attachments from someone you do notknow.

 Regularly review your privacy settings in your online


accounts to make sure you are not sharing important
personalinformation.
 When using a public computer terminal, be sure to delete
your browsing data beforeleaving.

 Keep your software updated to avoid securityholes.

 Do not download or install software or anything on your


computer or cellphone that is unknown to you.

DANGERS ON THE INTERNET

 EMAIL SPAM
Also known as junk emails, it is usually unsolicited commercial email sent
from one source with identical message sent to multiple recipients. Dangerous
spams carry virus like Trojan horse and other malicious software (Malware).

 EMAIL SPOOFING

12 | P a g e
This refers to deceitful email practice in which the sender address is
changed, so that it would appear to have come from a different source usually
someone you know.

 PHISHING
This is a deceitful practice of trying to get confidential information such as
password and usernames, and credit card details by making it appear as if it
comes from trustworthy source.

 PHARMING
This is a dangerous hacker attack on a website which directs all traffic to that
web site to another fictitious websites.

 SPYWARE
This is a computer program that is installed covertly on a personal computer
to collect information or even take control over the computer without the
knowledge of the user.

 COMPUTER WORM
This is a dangerous computer program that replicates itself through a
network. Some worms delete files, others send junk mail from infected computer.

 TROJAN HORSE
This is a form of malware fronting to perform a good task, but covertly
performs undesirable function with the intention of entering the computer without
user consent.

 COMPUTER VIRUS
This is a program that duplicates itself and infecting other computer. It spread
like a real biological virus, wherein it attaches itself to a host program and infect
other computers if it is received by a computer through the internet.

 HACKER
This is a person who is able to enter and control other people’s computer
without authorization.

 COPYRIGHT
A part of law, wherein you have the rights to work, anyone who uses it w/o
your consent is punishable by law.

 FAIR USE
This means that an intellectual property may be used w/o consent as long as
it is used in commentaries, criticism, parodies, research and etc.

13 | P a g e
 KEYLOGGERS
Used to record the keystrokes done by user. This is done to steal passwords
or any other sensitive information.

 ROGUE SECURITY SOFTWARE


This is a form of malicious software and internet fraud that misleads users
into believing there is a virus on their computer, and manipulates them into
paying money for a fake malware removal tool.

WINDOWS SECURITY

It is sometimes necessary to protect important work and personal information


stored in the computer.

Changing and adding User Account

Windows operating system provides user account in your operating system


to determine and manage the different kinds of user in one computer. This is to
ensure the security and privacy of each user who will use the computer.

Creating a Secure Password

When creating password make sure that it is case sensitive, this means that
letters that are capital or small must be typed as they are when you enter them
on the first time. A secure password ideally should not be a real word that
anyone can easily guess, and it could be a combination of uppercase and
lowercase letters, symbols and numbers.

Security Center
The security center of windows is the place where you can set additional
protection from the threat to your computer, especially when using the internet.
There are three important security settings available; Firewall, Automatic
updates, and Virus Protection.

1. Firewall helps in protecting your computer from unauthorized entries,


viruses, or worms from the internet or network. It is recommended that you
keep this setting turned on.
2. Automatic Updates is another feature of windows which when turned on
will automatically downloads updates from Microsoft website.

14 | P a g e
3. Virus Protection is usually about the current antivirus software installed
in your computer. Antivirus meant to locate, find and remove virus threats
that are already In your computer.

NETIQUETTE

The term “Netiquette” is a coined or portmanteau term of network and


ethiquette. The term “netizen” refers to the person who is a member or e part of
the online community.

Netiquette is a network etiquette, the do’s and don’ts of online community that
thenetizen should observe in communicating and/or publishing information and
materials over the World Wide Web and in ICT in general.

TEN RULES OF NETIQUETTE

1: Remember the human


 You need to remember that you are talking to a real person when you are
online.
 The internet brings people together who would otherwise never meet.
 Remember this saying when sending an email: Would I say this to the
person’s face.

2: Adhere to the same standards online that you follow in real life.
 You need to behave the same way online that you do in real life.
 You need to remember that you can get caught doing things you should
not be doing online just like you can in real life.
 You are still talking to a real person with feelings even though you can’t
see them.

3: Know where you are in cyberspace.


 Always take a look around when you enter a new domain when surfing the
web.
 Get a sense of what the discussion group is about before you join it.

4: Respect other people’s time and bandwidth.


 Remember people have other things to do besides read your email. You
are not the center of their world.

15 | P a g e
 Keep your post and emails to minimum by saying what you want to say.
 Remember everyone won’t answer your questions.

5: Make yourself look good online.


 Be polite and pleasant to everyone.
 Always check your spelling and grammar before posting.
 Know what you are talking about and make sense saying it.

6: Share expert knowledge


 Ask questions online
 Share what you know online.
 Post the answers to your questions online because someone may have
the same question you do.

7: Help keep flame wars under control


 Netiquette does not forgive flaming.
 Netiquette does however forbid people who are flaming to hurt discussion
 groups by putting the group down.

8: Respect other people’s privacy.


 Do not read other people’s mail without their permission.
 Going through other people’s things could cost you, your job or you could
even go to jail.
 Not respecting other people’s privacy is a bad netiquette.

9: Don’t abuse your power.


 Do not take advantage of other people just because you have more
knowledge or power than them.
 Treat others as you would want them to treat you if the roles were
reversed.

10: Be forgiving of other people’s mistake.


 Do not point out mistakes to people online.
 Remember that you were once the new kid on the block.
 You still need to have a good manners even though you are online and
cannot see the person face to face.

Activity

16 | P a g e
Direction: Read each item carefully and circle the letter of the correct
answer.

1. What type of social media allows you to manage links to various websites?
A. Blogs and Forums C. Media Sharing
B. Social Networks D. Bookmarking Sites

2. Twitter is an example of what specific type of social media?


A. Microblogging C. Media Sharing
B. Social Networks D. Social News

3. What type of web page is classified as flat or stationary?


A. Web 1.0 C. Web 3.0
B. Web 2.0 D. Web 4.0

4. What type of web page is classified as a dynamic page?


A. Web 1.0 C. Web 2.0
B. Internet D. Web 3.0

5. Invented the Analytical Engine, which is considered the first programmable


mechanical computer.
A. Alexander Graham Bell C. Blaise Pascal
B. Charles Babbage D. William Cooke

Assignment

Create a secure password on a desired social media platform and apply the
security techniques. Send a screenshot of the procedure and send it through
email.

17 | P a g e

You might also like