You are on page 1of 4

Empowerment Technologies - Notes & Activities

Quarter 1 - Module 1 (Grade 11)

Lesson 1: Introduction to Information and Communication


Technologies

Vocabularies/ Glossary of Terms:

Information and Communication Technology - Deals with the use of


different communication technologies such as mobile phones, telephone,
Internet to locate, save, send and edit information. 

Computer - an electronic device for storing and processing data, typically in


binary form, according to instructions given to it in a variable program. 
Internet - is a worldwide system of computer networks which the users at any
one computer can use to get information from any other computer. 

World Wide Web - an information system on the internet that allows


documents to be connected to other documents by hypertext links, enabling
the user to search for information by moving from one document to another. 

Web page - is a hypertext document connected to the World Wide Web. It is


a document that is suitable for the World Wide Web. 

Web 1.0 - static websites without interactivity. 

Web 2.0 - websites that contain dynamic content. 

Web 3.0 - a concept of the World Wide Web that is designed to cater to the
individual user.

Static - refers to web pages that are the same regardless of the user. 
Dynamic - refers to web pages that are affected by user input or preference.
Hashtag - used to "categorize" posts in website. 

Convergence - the synergy of technological advancements to work on a


similar goal or task.
Social media - websites, applications, or online channels that enable users to
create, co-create, discuss, modify, and exchange user-generated content.

Features of Web 2.0

1. Folksonomy - allows users to categorize and classify/arrange information.


2. Rich User Experience - content is dynamic and is responsive to user's
input.
3. User Participation - the owner of the website is not the only one who is
able to put content. Others are able to place a content of their own by means
of comments, reviews, and evaluation, Some websites allow readers to
comment on an article, participate in a poll, or review a specific product.
4. Long Tail - services that are offered on demand rather than on a one-time
purchase.
5. Software as a Service - users will subscribe to a software only when
needed rather than purchasing them.
6. Mass Participation - diverse information sharing through universal web
access. The content is based on people from various cultures.

Tim Berners-Lee - the inventor of the World Wide Web.

Semantic Web - provides a common framework that allows data to be shared


and reused across application, enterprise, and community boundaries.

Trends in ICT

1. Convergence - is the synergy of technological advancements to work on a


similar goal or task.
2. Social media - a website, application, or online channel that enables web
users to create, co-create, discuss, and exchange user-generated content.

a) Social Networks - these are sites that allow you to connect with other
people with the same interests or background. Examples: Facebook and
Google+ b)
b) Bookmarking Sites - these are sites that allow you to store and manage
links to various websites and resources. Most of these sites allow you to
create a tag that allows you and others to easily search or share them.
Examples: StumbleUpon and Pinterest
c) Social News - these are sites that allow users to post their own news items
or links to other news sources. The users can also comment on the post and
comments may also be ranked. They are also capable of voting on these
news articles of the website. Those who get the most amount of votes are
shown most prominently. Examples: reddit and Digg
d) Media Sharing - These are sites that allow you to upload and share media
content like images, music, and video. Most of these sites have additional
social features like liking, commenting, and having user profiles. Examples:
Flicker, YouTube, and Instagram.
e) Microblogging - these are sites that focus on short updates from the user.
Those subscribed to the user will be able to receive these updates.
Examples: Twitter and Plurk
f) Blogs and Forums - these websites allow users to post their content. Other
users are able to comment on the said topic. There are several free blogging
platforms like Blogger, WordPress, and Tumblr.

3. Mobile Technologies

Smartphones and tablets - devices with capability to do tasks that were


originally found in personal computers. Several of these devices are capable
of using high-speed Internet. Today, the latest mobile devices use 4G
Networking (LTE), which is currently the fastest mobile network.
Different mobile devices Operating Systems:
a) iOS - used in Apple devices such as the iPhone and iPad.
b) Android — an open source operating system developed by Google.
c) Blackberry OS - used in Blackberry devices
d) Windows Phone OS - a closed source and proprietary operating system
developed by Microsoft
e) Symbian - the original smartphone OS; used by Nokia devices
f) WebOS - originally used for smartphones; now used for smart TVs
g) Windows Mobile - developed by Microsoft for smartphones and pocket
PCs

Open Source - means several mobile phone companies use this OS for free.

4. Assistive Media - a service to help people who have visual and reading
impairments.

Internet Threats
1. Malware - stands for malicious software.
a) Virus - a malicious program designed to replicate itself and transfer from
one computer to another either through the Internet and local networks or
data storage like flash drives and CDs.
b) Worm - a malicious program that transfers from one computer to another
by any type of means. Often, it uses a computer network to spread itself. For
example, the ILOVEYOU worm (Love Bug Worm) created by a Filipino.
c) Trojan - a malicious program that is disguised as a useful program but
once downloaded or installed, leaves your PC unprotected and allows
hackers to get your information.

*Rogue security software - tricks the user into posing that it is a security
software, It asks the user to pay to improve his/her security but in reality, they
are not protected at all.

d) Spyware - a program that runs in the background without you knowing it


(thus called "spy"). It has the ability to monitor what you are currently doing
and typing through keylogging.

*Keyloggers - used to record the keystroke done by the users. This is done
to steal their password or any other sensitive information. It can record email,
messages, or any information you type using your keyboard.
e) Adware - a program designed to send you advertisements, mostly as pop-
ups.

2. Spam - unwanted email mostly from bots or advertisers. It can be used to


send malware.
3. Phishing - Its goal is to acquire sensitive personal information like
passwords and credit card details. This is done by sending you an email that
will direct the user to visit a website and be asked to update his/her
username, password, credit card, or personal information.
*Pharming - a more complicated way of phishing where it exploits the DNS
(Domain Name Service) system.

Activities

Activity 1: Visiting Websites Part 1


Directions: List down three (3) websites that you have browsed.

No. Website

Activity 2: Visiting Websites Part 2


Directions: Based on the list of websites you have written in activity 1, identify
the version of the web of each website and defend your answer by writing on
the Reason column.

No. Website Web version Reason


1.
2.
3.

Activity 3: Social Media


Directions: List down five (5) social media that you have been used.

No. Social Media Used


1.
2.
3.
4.
5.

Activity 4: Generalization
In what way is ICT very useful in your studies?
______________________________________________________________
______________________________________________________________
______________________________________________________________

Activity 5: Let Me Join!


Instructions:
1. Visit the www.facebook.com and create account.
2. Login in your Facebook account.
3. Search for “ICT 101” group and join.
4. Take a selfie and post your picture in the group.

You might also like