You are on page 1of 6

EMPOWERMENT TECHNOLOGIES

Lesson 1 - Introduction to ICT

ICT

- Information and Communication Technology

- deals with the use of different communication technologies such as mobile


phones, telephone, and the internet to locate, save, send, and edit information

- a study of computers as data processing tools

- introduces students to the fundamentals of using computer systems in an internet


environment

ICT IN THE PHILIPPINES

- the Philippines is dubbed as the ‘’ICT Hub of Asia” because of huge growth of
ICT-related jobs (e.g. BPO, Business Process Outsourcing, or call centers)

- the ICT Department in the Philippines is responsible for the planning,


development, and promotion of the country’s ICT agenda in support of national
development

COMPUTER

- an electronic device for storing and processing data, typically in binary form,
according to instructions given to it in a variable program

INTERNET

- the global system of interconnected computer networks that use the internet
protocol suite (TCIP/IP) to link billions of devices worldwide

- the means of connecting a computer to any other computer anywhere in the


world via dedicated routers and servers

- sometimes called ‘’the Net’’, a worldwide system of computer networks--a


network of networks in which the users at any one computer can get information
from any other computer
WORLD WIDE WEB

- invented by Tim-Berners Lee

- an information system on the internet that allows documents to be connected to


other documents by hypertext links, enabling the user to search for information
by moving from one document to another

- an information space where documents and other web resources are identified
by URLs, interlinked by hypertext links, and can be accessed via the Internet

● Web 1.0

- the “readable” phase of the World Wide Web with flat data

- there is only limited interaction between sites and web users

- an information portal where users passively receive information without


being given the opportunity to post reviews, comments, and feedback

● Web 2.0

- the “writable” phase of the World Wide Web with interactive data

- facilitates interaction between web users and sites, so it allows users to


interact more freely with each other

- encourages participation, collaboration, and information sharing

★ Features of Web 2.0


➢ Folksonomy - allows user to categorize and classify information
using freely chosen keywords (e.g. tagging by FB, Twitter, use tags
that start with the hashtag)

➢ Rich User Experience - content is dynamic and is responsive to


user’s input

➢ User Participation - The owner of the website is not the only one
who is able to put content. Others are able to place a content of
their own by means of comments, reviews and evaluation.

➢ Long Tail - Services that are offered on demand rather than on a


one-time purchase. This is synonymous to subscribing to a data
plan that charges you for the amount of time you spend on the
internet
.
➢ Software as Services - users can subscribe to a software when
needed rather than purchasing them

➢ Mass Participation - diverse information sharing through universal


web access

● Web 3.0

- the “executable” phrase of Word Wide Web with dynamic applications,


interactive services, and “machine-to-machine” interaction
- a semantic web which refers to the future

- computers can interpret information like humans and intelligently generate


and distribute useful content tailored to the needs of users

● Web Pages

- a hypertext document connected to and suitable for the World Wide Web

● Static Web Page

- known as a flat page or stationary age in the sense that the page is
‘’as is’’ and cannot be manipulated by the user

● Dynamic Web Page

- the user is able to see website differently than others (e.g. social
networking sites, wikis, video sharing sites)

TRENDS IN ICT

● Convergence - The synergy of technological advancements to work on a similar


goal or task. For example, besides using your personal computer to create word
documents, you can now use your smartphone.

● Social Media - a website, application, or online channel that enables web users
web users to create, co-create, discuss, modify, and exchange user-generated
content

★ 6 Types of Social Media

➢ Social Networks - Allow you to connect with other people with the
same interests or background. Once the user creates their account,
they can set up a profile, add people, share content, etc. (e.g.
Facebook, Google+)
➢ Bookmarking Sites - allow you to store and manage links to
various websites and resources. Most of the sites allow you to
create a tag for others. (e.g. StumbledUpon, Pinterest)

➢ Social News - allow users to post their own news items or links to
other news sources. The users can also comment on the post and
comments may also be ranked. (e.g. Reddit, Digg)

➢ Media Sharing - allow you to upload and share media content like
images, music, and videos (e.g. Flickr, YouTube, Instagram)

➢ Microblogging - focus on short updates from the user (e.g. Twitter,


Plurk)

➢ Blogs and Forums - allow users to post their content. Other users
are able to comment on the said topic. (e.g. Blogger, WordPress,
Tumblr)

● Mobile Technologies - The popularity of smartphones and tablets has taken a


major rise over the years. This is largely because of the device's capability to do
the tasks that were originally found in PCs. Several of these devices are capable
of using a high-speed internet. Today the latest model devices use 4G
Networking (LTE), which is currently the fastest.

★ Mobile Operating Systems (OS)

➢ iOS - used in Apple devices such as iPhone and iPad

➢ Android - an open source (free) OS developed by Google

➢ Blackberry OS - use in blackberry devices

➢ Windows Phone OS - a closed-source and proprietary OS


developed by Microsoft

➢ Symbian - the original smartphone OS; used by Nokia devices

➢ WebOS - originally used in smartphones, now in smart TVs

➢ Windows Mobile - developed by Microsoft for smartphones and


pocket PCs

● Assistive Media - Non-profit services designed to help people who have visual
and reading impairments. A database of audio recordings is used to read to the
user. (e.g. Yahoo!, Gmail, Hotmail)
● Cloud Computing - distributed computing on the internet or delivery of
computing service over the internet. Instead of running an email program on your
computer, you log in to a web email account remotely. The software and storage
for your account doesn’t exist on your computer--it’s on the service’s computer
cloud

★ 3 Components of Cloud Computing

➢ Client Computers - the device that the end user uses to interact
with the cloud

➢ Distributed Servers - often, servers are in geographically different


places, but the servers act as if they are working next to each other

➢ Data Centers - the collection of servers where application is placed


and is accessed via the Internet

★ Types of Clouds

➢ Public Cloud - Allows systems and services to be easily


accessible to the general public. May be less secured because of
its openness. (e.g. email)

➢ Private Cloud - Allows systems and services to be accessible


within an organization. Offers increased security because of its
private nature.

➢ Community Cloud - allows systems and services to be accessible


by a group of organizations

➢ Hybrid Cloud - a mixture of public and private cloud. The critical


activities are performed using a private cloud while the non-critical
activities are performed using a public cloud.

Lesson 2: Online Safety, Security, and Rules of Netiquette

Internet Safety - refers to the online security or safety of people and their information
when using internet

Netiquette - network etiquette, the do’s and don’ts of online communication.

★ 10 RULES OF NETIQUETTE
1.) Remember the human.
2.) Adhere to the same standards online that you follow in real life.
3.) Know where you are in cyberspace.
4.) Respect other people’s time and bandwidth.
5.) Make yourself look good online.
6.) Share expert knowledge.
7.) Help keep flame wars under control.
8.) Respect other people’s privacy.
9.) Don’t abuse your power.
10.) Be forgiving of other people’s mistakes.

Security Requirement Triad

Threat Action (Attack)

➢ Exposure - sensitive data are directly released to an unauthorized entity

➢ Unauthorized Disclosure - a circumstance or event whereby an entity gains


access to data for which the entity is not authorized

➢ Interception - an unauthorized entity directly accesses sensitive data traveling


between authorized sources and destinations

➢ Inference - a threat action whereby an unauthorized entity indirectly accesses


sensitive data by reasoning from characteristics or byproducts of
communications

➢ Intrusion - an unauthorized entity gains access to sensitive data by


circumventing a system’s security protections.

You might also like