Professional Documents
Culture Documents
Compare and contrast the nuances of varied online platforms, sites, and
content to best achieve specific class objectives or address situational
challenges.
1|P a g e
Information and Communication Technology
Gadgets have become part of our necessity that we check on them after we
wake up. It made communication easier. We can use cellular phones that are
designed for communicating with other people even they are miles away from us.
It has also assisted us in our work since there are Internet-based jobs. It has
revolutionized our education and in the modernization of our economy.
Philippines is dub as the ‘’ICT Hub of Asia” because of huge growth of ICT-
related jobs, one of which is BPO, Business Process Outsourcing, or call centers.
2|P a g e
The World Wide Web (www)
The World Wide Web is an information system on the Internet that allows
documents to be connected to other documents by hypertext links, enabling the
user to search for information by moving from one document to another. It was
invented by Tim-Berners Lee. The World Wide Web browser software, such as
Microsoft's Internet Explorer/Edge, Mozilla Firefox, Opera, Apple's Safari, and
Google Chrome,
let users navigate from one web page to another via the hyperlinks embedded in
the documents. These documents may also contain any combination of computer
data, including graphics, sounds, text, video, multimedia and interactive content
that runs while the user is interacting with the page. The Web has enabled
individuals and organizations to publish ideas and information to a potentially
large audience online at greatly reduced expense and time delay.
Web 1.0 or The Web. It is the first stage of the World Wide Web evolution. It is a
flat or stationary page since it cannot be manipulated by the user.
Web 2.0 or The Social Web allows users to interact with the page, the user
may be able to comment or create a user account. Most website that we visit
today are Web 2.0.
Because of the wide capacity of Web 2.0, it has helped in creating dynamic
4|P a g e
online platform sites. Online platform is a specially developed platform using
Internet technology. Online platforms have revolutionized access to any
information.
Presentation or Visualization
Cloud Computing
File Management
Mapping
Social Media
TYPES OF CLOUDS
5|P a g e
File Management Platform - is used for the storing, naming, sorting, and
handling of computer files. Allows you to convert and manage files without
download in the software tool.
Mapping Platform - is a transformation taking the points of one space into the
points of the same or another space. Uses GPS to detect location and used
for navigation.
Social Networks – These are sites that allows you to connect with other
people with the same interests or background. Once the user creates his/her
account, he/she can set up a profile, add people, share content, etc
Bookmarking Sites – Sites that allow you to store and manage links to
various website and resources. Most of the sites allow you to create a tag to
others.
Social News – Sites that allow users to post their own news items or links to
other news sources. The users can also comment on the post and comments
may also be rank.
Media Sharing – sites that allow you to upload and share media content like
images, music and video.
6|P a g e
Microblogging – focus on short updates from the user. Those that
subscribed to the user will be able to receive these updates.
Blogs and Forums – allow user to post their content. Other users
are able to comment on the said topic.
One of the ideal applications laid down for ICT and the World Wide Web is
for research and education.
There are a number of information sources over the internet, some of which
are present below.
Research indexing sites – these are Web sites dedicated to compile and
index researches done by the academic researchers, engineers, social
science, and so on.
Ex. Google scholar, Researchgate, IEEEXplore
7|P a g e
What social media application affect your day-to-day activities,
and how did it improve your life?
Activity 1
Directions: Read each item carefully and choose the letter of the correct answer.
Write your answers on a separate sheet of paper or in your notebook.
1. What type of web provides a framework that allows data to be shared and reuse to
deliver web content specifically targeting the user?
A. Web 1.0 C. Web 3.0
B. Web 2.0 D. Website
4. Marisa wants to publish her collections of original poems online. Which online
platform must she do this?
A. Social News C. YouTube
B. Bookmarking Site D. Blogs
5. Watson is creating a cover video of his favorite song. Which online platform must
he publish this?
A. Social News C. YouTube
B. Bookmarking Site D. Blogs
8|P a g e
6. Cathy has created a very good slideshow presentation on a certain topic, and she
wants to share it to other teachers around the world. Which online platform must
she publish this?
A. Presentation Platforms C. File Management Platforms
B. Cloud Computing Platforms D. Social Media Platforms
7. What is the name of the symbol that is used to classify and categorize
information?
A. Hashtag C. Asterisk
B. Question Mark D. At sign
8. It allows you to store and manage links to various website and resources.
A. Website C. World Wide Web
B. Bookmarking site D. Blogs
Directions: Write True if the statement is correct if it is not write the Correct
answer. Write your answer on the space provided.
9|P a g e
__________ 8. Facebook is the media platform used to influence others towards
social change during the time of the People Power Revolution.
Radio Broadcast
__________ 9.Lazada and Shoppe are example of search engines.
__________ 10. ISP means Interactive Service Provider
ASSIGNMENT:
At least 1 minute minimum and must contain Online ethics and Etiquette.
The internet is the guiding technology of the Information Technology Age just
as the electrical engine was of the Industrial Age. In these times, more and more
10 | P a g e
people are already engaged in the use of technology. These people who are
raised in a digital, media-saturated world are called digital natives. No doubt,
the Internet has been very useful to us but with the rise of instant messaging,
chat rooms, emails and social networking sites, it can also bring trouble - from
cyberbullying to more serious Internet dangers, including exposure to sexual
predators. Thus, internet safety is always our primaryconcern.
ONLINE SAFETY
11 | P a g e
andharassment.
To avoid these online crimes, follow the following online safety measures:
Never give any personal information out about yourself over theinternet.
EMAIL SPAM
Also known as junk emails, it is usually unsolicited commercial email sent
from one source with identical message sent to multiple recipients. Dangerous
spams carry virus like Trojan horse and other malicious software (Malware).
EMAIL SPOOFING
12 | P a g e
This refers to deceitful email practice in which the sender address is
changed, so that it would appear to have come from a different source usually
someone you know.
PHISHING
This is a deceitful practice of trying to get confidential information such as
password and usernames, and credit card details by making it appear as if it
comes from trustworthy source.
PHARMING
This is a dangerous hacker attack on a website which directs all traffic to that
web site to another fictitious websites.
SPYWARE
This is a computer program that is installed covertly on a personal computer
to collect information or even take control over the computer without the
knowledge of the user.
COMPUTER WORM
This is a dangerous computer program that replicates itself through a
network. Some worms delete files, others send junk mail from infected computer.
TROJAN HORSE
This is a form of malware fronting to perform a good task, but covertly
performs undesirable function with the intention of entering the computer without
user consent.
COMPUTER VIRUS
This is a program that duplicates itself and infecting other computer. It spread
like a real biological virus, wherein it attaches itself to a host program and infect
other computers if it is received by a computer through the internet.
HACKER
This is a person who is able to enter and control other people’s computer
without authorization.
COPYRIGHT
A part of law, wherein you have the rights to work, anyone who uses it w/o
your consent is punishable by law.
FAIR USE
This means that an intellectual property may be used w/o consent as long as
it is used in commentaries, criticism, parodies, research and etc.
13 | P a g e
KEYLOGGERS
Used to record the keystrokes done by user. This is done to steal passwords
or any other sensitive information.
WINDOWS SECURITY
When creating password make sure that it is case sensitive, this means that
letters that are capital or small must be typed as they are when you enter them
on the first time. A secure password ideally should not be a real word that
anyone can easily guess, and it could be a combination of uppercase and
lowercase letters, symbols and numbers.
Security Center
The security center of windows is the place where you can set additional
protection from the threat to your computer, especially when using the internet.
There are three important security settings available; Firewall, Automatic
updates, and Virus Protection.
14 | P a g e
3. Virus Protection is usually about the current antivirus software installed
in your computer. Antivirus meant to locate, find and remove virus threats
that are already In your computer.
NETIQUETTE
Netiquette is a network etiquette, the do’s and don’ts of online community that
thenetizen should observe in communicating and/or publishing information and
materials over the World Wide Web and in ICT in general.
2: Adhere to the same standards online that you follow in real life.
You need to behave the same way online that you do in real life.
You need to remember that you can get caught doing things you should
not be doing online just like you can in real life.
You are still talking to a real person with feelings even though you can’t
see them.
15 | P a g e
Keep your post and emails to minimum by saying what you want to say.
Remember everyone won’t answer your questions.
Activity
16 | P a g e
Direction: Read each item carefully and circle the letter of the correct
answer.
1. What type of social media allows you to manage links to various websites?
A. Blogs and Forums C. Media Sharing
B. Social Networks D. Bookmarking Sites
Assignment
Create a secure password on a desired social media platform and apply the
security techniques. Send a screenshot of the procedure and send it through
email.
17 | P a g e