Professional Documents
Culture Documents
St. Mary's College of Baliuag: Baliuag, Bulacan SY 2021-2022 ISO 9001:2015 Certified PAASCU Level III Accredited
St. Mary's College of Baliuag: Baliuag, Bulacan SY 2021-2022 ISO 9001:2015 Certified PAASCU Level III Accredited
I. INTRODUCTION
Philippines was dubbed as the ‘’ICT Hub of Asia” because of huge growth of ICT-related
jobs, one of which is BPO, Business Process Outsourcing, or call centers. ICT Department
in the Philippines is responsible for the planning, development and promotion of the country’s
Information and Communications Technology (ICT) agenda in support of national
development.
A connected world needs more than a network of computers and gadgets. It needs a
technology-enabled, confidently mindful, and compassionate digitally aware community of
lifelong learners.
This module will help you understand the importance of Information and Communication
Technology. Specifically, this will cover the following topics: Current State of ICT, Online
Safety, Security, Ethics, and Netiquette.
III. DISCUSSION
A. Presentation of the Lesson
1. The Current state of Technologies
1
directly to users at other computers). The World Wide Web (‘www’ or ‘web’ for short)
is a collection of webpages found on this network of computers. Your web browser uses
the internet to access the web. The World Wide Web has three versions:
• Web 1.0 – according to Berners-Lee, is the “read-only web.” In other words,
the early web allowed us to search for information and read it. There was very
little in the way of user interaction or content generation.
• Web 2.0 – can contribute content and interact with other web users or the
“read-and-write web”
• Web 3.0 – was envisioned to be a smarter access of hypertext files and a
version that would enable a wider range of search in a fast manner or the
“semantic and intelligent web”.
Static Web Page – is known as a flat page or stationary age in the sense that the
page is ‘’as is’’ and cannot be manipulated by the user. The content is also the same
for all users that are referred to as Web 1.0.
Dynamic Web Pages– is the evolution of web 1.0 by adding dynamic web pages. The
user can see website differently than others e.g. social networking sites, wikis, video
sharing sites.
There are number of different types of web 2.0 applications including wikis,
blogs, social networking, folksonomies, podcasting & content hosting services. Many
of the most popular websites are Web 2.0 sites such as Wikipedia, YouTube,
Facebook, Myspace, Flickr.
Wikis
A wiki is a collaborative website that anyone within the community of users can
contribute to or edit. A wiki can be open to a global audience or can be restricted to a
select network or community. Wikis can cover a specific topic or subject area.
Blogs
A blog is a contraction of the words web log. Blogs usually provide commentary or
information on an issue, event, or topic. In some cases, blogs can be about a person;
an online, public, personal diary. A blog is usually maintained by a single person or a
small group of contributors.
Social Networking
Social networking allows an individual to create a profile for themselves on the
service and share that profile with other users with similar interests to create a social
network. Users can choose to have public profiles which can be viewed by anyone or
private profiles which can only be viewed by people that the users allow. Users can
usually post photographs, music, and videos on their site.
Podcasting
Podcasting is a way of making audio or video files available on the internet that
can either be listened to or viewed on a PC or downloaded to a handheld device such
as an iPod or mp3 player. A podcast will be treated as a sound recording (audio
podcasts) or a film (video podcasts, as known as vodcasts). Podcasts may also include
images, including PowerPoint presentations.
Microblogging
Microblogging is also called as a mobile social networking and a form of blog that
limit the size of its content posted online. Twitter is the most popular micro blogging
2
service and usually used to announce offers or events, promote new blog posts, or
keep your readers in the know with links to important news and stories.
Folksonomy
Folksonomy allows user to categorize and classify information using freely chosen
keywords e.g. tagging by FB, Twitter, use tags that start with the sign #, referred to as
hashtag.
Image Source:
https://www.change.org/p/rankingz-incognito-online-safety-and-security-campaign
There is no doubt that you need to be vigilant online. As the World Wide Web has
evolved over the years, many internet nasties have been playing on vulnerabilities to
attack computers and retrieve sensitive data from individuals. Half the time, we are not
even aware it is happening until it is too late. Whilst the internet is a fantastic place for
communication and information, there are many malicious threats you need to dodge
along the way.
Spam – The fact that most of our emails accounts come with a ‘Spam’ or ‘Junk’ folder
insinuates that spam emails are a huge issue, with more than 50% of emails being
syphoned into these folders. Aside from being an annoyance, spam emails are not a
direct threat. However, many can contain malware.
Adware –is a type of malware software that displays unwanted ads when a user is
surfing the internet. The ads often redirect your searches to advertising websites and
collect marketing-type data about you, behind your back, which is considered
malicious.
3
Trojan – leave your computer completely unprotected, which can mean that hackers
can steal any data from your system. Trojans often present themselves as harmless
computer programmers so that hackers can penetrate your computer without being
detected.
Virus – one of the most talked-about internet threats is a virus. Viruses usually attach
themselves covertly to downloads as they are designed to spread at an alarming rate.
Viruses are often attached to files for download, shared via CDs, DVDs, and USB
sticks, or loaded on to computers by opening infected email attachments.
Worms – usually make their way onto a computer via a malicious email attachment or
USB stick. Once your computer has been infected by a worm, it will likely send itself
to every email address logged in your system. To the receiver, your email will appear
harmless, until they open it and are infected by the same worm.
Phishing – is a form of fraudulent activity. Often, official-looking emails are sent
impersonating a well-known provider, such as a bank. These emails are sent to
acquire people’s passwords and credit card details.
Spyware – Another form of malware is spyware. Spyware is an all-encompassing
internet nasty and is usually attached to pop-ups of downloadable files. Once installed
on your computer, spyware can monitor your keystrokes, read, and delete your files,
reformat your hard drive, and access your applications. Whoever is controlling the
spyware has access to your details without you even knowing.
Keyloggers – Similar to a part of spyware, keyloggers record a user’s keyboard
actions. Most keyloggers will be looking for distinguishable key entries, such as bank
card details and passwords. Keylogging is often linked to identity and intellectual
property theft.
Pharming – is a more complex version of phishing that exploits the DNS system.
Pharmers often create web pages mimicking that of a trustworthy business, such as
an online banking log-in page. Users will then enter their details, thinking they are
logging in to their usual service, and their details will be stolen by the pharmer.
Rogue Security Software – If you are ever downloading antivirus or antispyware
programmers, make sure you have purchased it from a legitimate source. Rogue
security software will often ask you to pay for extra protection, which is a huge con.
The security software is completely useless, and criminals have robbed you of your
money.
What is Ethics?
It refers to a set of moral principles that govern an individual or a group on what is
considered as acceptable behavior while using a computer.
What is Netiquette?
It is a combination of the words network and etiquette and is defined as a set of
rules for acceptable online behavior.
Both phrases are frequently interchanged and are often combined with the concept
of a ’netizen’ which itself is a contraction of the words internet and citizen and refers
to both a person who uses the internet to participate in society and an individual who
has accepted the responsibility of using the internet in productive and socially
responsible ways.
The Core Rules of Netiquette:
Rule 1: Remember the human
• You need to remember that you are talking to a real person when you are
online. The internet brings people together who would otherwise never meet.
Remember this saying when sending an email: Would I say this to the person’s
face.
4
Rule No. 2: Adhere to the same standards online that you follow in real life.
• You need to behave the same way online that you do in real life. You need to
remember that you can get caught doing things you should not be doing online
just like you can in real life. You are still talking to a real person with feelings
even though you can’t see them.
IV. REFERENCES
Berkman Center for Internet and Society. (2003). Introduction: Readiness for the
Networked World. Cyber Law. http://cyber.law.harvard.edu/readinessguide/intro.html
Choudhury, N. (2014). World Wide Web and Its Journey from Web 1.0 to Web 4.0. IJCSIT.
http://ijcsit.com/docs/Volume%205/vol5issue06/ijcsit20140506265.pdf
5
Getting, B. (2007). Basic Definitions: Web 1.0, Web 2.0, Web 3.0. Practical Commerce.
https://www.practicalecommerce.com/Basic-Definitions-Web-1-0-Web-2-0-Web-3-0
Luminet.co. (2020). The Top 10 Most Common Internet Threats. Luminet.
https://luminet.co.uk/top-10-common-internet-threats/
Regis J. (2018). Empowerment Technologies Lesson 1-15. WordPress.com.
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-
lessons-1-15/
Officialgazette.gov.ph. (2012). Republic Act No. 10175. Official Gazette.
https://www.officialgazette.gov.ph/2012/09/12/republic-act-no-10175/
Rouse, M. (2000). Internet. Search Windevelopment.
https://searchwindevelopment.techtarget.com/definition/Internet
Shea, V. (1994). The Core Rules of Netiquette. Albion.
http://www.albion.com/netiquette/introduction.html
TechoPedia.com. (2019). Information and Communication Technology. Techopedia.
https://www.techopedia.com/definition/24152/information-and-communications-
technology-ict
The University of Melbourne. (2008). Wikis, Blogs, & Web 2.0 technology. Copyright
Unimelb.
https://copyright.unimelb.edu.au/__data/assets/pdf_file/0011/1773830/wikisblogsweb
2blue.pdf