You are on page 1of 9

EMPOWERMENT TECHNOLOGY

Lecture-Week 1

WHAT THEN IS ICT?


It deals with the use of different communication technologies such as mobile phones, telephone, Internet, etc. to
locate, save, and edit information.

When we make a video call, we use the Internet. When we send a text or make a call, we use cellular networks.

FAMOUS PERSONALITIES BEHIND THE ICT


a. BILL GATES – He introduced Microsoft
b. STEVE JOBS – He introduced Apple
c. MARK ZUCKERBERG – He pioneered Facebook and later bought Instagram
d. MARTHA LANE FOX – developed last-minute.com., an online booking site for airlines, hotels, restaurant
and everything under the sun. Her website relied heavily on online systems which other websites soon
followed suit.
e. TIM BERNERS-LEE – invented the World Wide Web, an Internet-based hypermedia initiative for global
information sharing.
ICT IN THE PHILIPPINES
• More ICT-related jobs and companies are established.
• Owning multiple phones/gadgets at the same time.
• Increase in text messages, chat messages and emails sent each day.
• Different services, news and new information are easily access through the internet.
• A lot of selfies are taken and posted in social media each day.

WHAT IS INTERNET?
• Is the global system of interconnected computer networks that use the Internet protocol suite to link billions of
devices worldwide;
• Means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers.

Top Internet Service Providers in the Philippines


1. Converge ICT Solutions
2. One SKY
3. PLDT
4. Globe Broadband
5. Rise

WHAT IS WORLD WIDE WEB (WWW)?


• Is an information space where documents and other web resources are identified by URLs, interlinked by
hypertext links, and can be accessed via the Internet.
• Invented by Tim-Berners Lee.

Examples of WWW
1. www.google.com
2. www.facebook.com
3. www.youtube.com

WHAT IS WEB PAGE?


• Web page is a hypertext document connected to the World Wide Web.
• It is a document that is suitable for the World Wide Web.

WHAT IS WEBSITE?
• A location connected to the Internet that maintains one or more pages on the World Wide Web.
• It is a related collection of World Wide Web (WWW) files that includes a beginning file located a home page.

WHAT IS WEB BROWSER?


• It displays a web page on a monitor or mobile device.
• It is a software application for retrieving, presenting, and traversing information resources on the World Wide
Web.

LET US ASSESS HOW AWARE ARE YOU ON THE BASICS OF WORLD WIDE WEB.

Name the following logo:

1.

2.

3.

4.

5.

Remember, ICT is one of the best ways to improve business sales and it is important for you to know how to use
it your advantage. One advantage is for customers to share their thoughts with you online, directly on your web page.
That way, the customers would feel that you are responsive and very open in listening to their thoughts. But in order to
do that, you have to make your website dynamic.

NOW, LET US DIG DEEPER INTO THE HISTORY OF WORLD WIDE WEB.

WHAT IS WEB 1.0 STATIC?


When the World Wide Web was invented, most web pages were static. It is also known as flat page or stationary page
because the page is “as is” and cannot be manipulated by the user.
 The content is also the same for all users.

WHAT IS WEB 2.0?


 It allows users to use web browsers instead of just using their operating system.
 Browsers can now be used for their user interface, application software (or web applications), and even for file
storage.
 Examples of Web 2.0 include social networking sites, blogs, wikis, video sharing sites, hosted services, and
web applications.
WHAT ARE THE FEATURES OF WEB 2.0?
1. Folksonomy – allows users to categorize and classify/arrange information using freely chosen keywords (e.g.,
tagging). Popular social networking sites such as Twitter, Instagram, Facebook, etc. use tags that start with
the pound sign (#). This is also referred to as hashtag
2. Rich User Experience – content is dynamic and is responsive to user’s input. An example would be a website
that shows local content. In the case of social networking sites, when logged on, your account is used to
modify what you see in their website.
3. User Participation – the owner of the website is not the only one who is able to put content. Others are able to
place a content of their own by means of comments, reviews, and evaluation. Some websites allow readers to
comment on an article, participate in a poll, or review a specific product. (e.g., Amazon.com, online stores.)
4. Long Tail – services that are offered on demand rather than on a one-time purchase. In certain cases, time-
based pricing is better than file-sized pricing or vice-versa. This is synonyms to subscribing to a data plan that
charges you for the amount of time you spent in the Internet, or a data plan that charges you for the amount of
bandwidth you used.
5. Software as a Service – users will subscribe to a software only when needed rather than purchasing them. This
is a cheaper option if you do not always need to use a software. Software as a service allows you to “rent” a
software for a minimal fee.

WHAT IS WEB 3.0 AND THE SEMANTIC WEB?


• SEMANTIC WEB is a movement led by the World Wide Web Consortium (W3C).
• The W3C standard encourages web developers to include semantic content in their web pages.
• Tim Berners Lee – inventor of World Wide Web, noted that the Semantic Web is a component of Web 3.0.

Web 3.0 is yet to be fully realized because of several problems:


1. Compatibility. HTML files and current web browsers could not support Web. 3.0.
2. Security. The user’s security is also in question since the machine is saving his or her preferences.
3. Vastness. The World Wide Web already contains billions of web
4. Vagueness. Certain words are imprecise. The words “old” and “small” would depend on the user.
5. Logic. Since machines use logic, there are certain limitations for a computer to be able to predict what the user
is referring to at a given time.

GOING FURTHER, LET US DIG DEEPER ON THE TRENDS IN ICT

1) CONVERGENCE
a) Technological convergence is the synergy of technological advancements to work on a similar goal or task.
b) Convergence is using several technologies to accomplish a task conveniently.
2) SOCIAL MEDIA
a) is a website, application, or online channel that enables web users to create, co-create, discuss, modify, and
exchange user-generated content.
b) There are six types of Social Media
i) Social Networks. These are sites that allow you to connect with other people with the same interests or
background.
ii) Bookmarking Sites. These are sites that allow you to store and manage links to various websites and
resources. Most of these sites allow you to create a tag that allows you and others to easily search or share
them. Examples: Twitter and Pinterest
iii) Social News. These are sites that allow users to post their own news items or links to other news sources.
The users can also comment on the post and comments may also be ranked. They are also capable of
voting on these news articles of the website. Examples: Reddit and Digg
iv) Media Sharing. These are sites that allow you to upload and share media content like images, music, and
video. Most of these sites have additional social features like liking, commenting, and having user
profiles. Examples: Flicker, Youtube, and Instagram.
v) Microblogging. These are sites that focus on short updates from the user. Those subscribe to the user will
be able to receive these updated. Examples: Twitter and Plurk
vi) Blogs and Forums. These websites allow users to post their content. Other users are able to comment on
the said topic. There are several free blogging platforms like Blogger, WordPress, and Tumblr. On the
other hand, forums are typically part of a certain website or web service.
3) MOBILE TECHNOLOGIES
a) The popularity of smartphones and tablets has taken a major rise over the years. Several of these devices
are capable of using high-speed Internet. Today, the latest mobile devices use 4G Networking (LTE),
which is currently the fastest mobile network
b) iOS – used in Apple devices such as the iPhone and iPad. Android – an open source operating system
developed by Google. Being open source means several mobile phone companies use this OS for free.
c) Blackberry OS – used in Blackberry devices.
d) Windows Phone OS – a closed source and proprietary operating system developed by Microsoft®.
e) Symbian – the original smartphone OS; used by Nokia devices.
f) WebOS – originally used for smartphones; now used for smart TVs. e. Windows Mobile– developed by
Microsoft for smartphones and pocket PCs.
4) ASSISTIVE MEDIA
a) is a nonprofit service designed to help people who have visual and reading impairments. A database audio
recordings is used to read to the user

NOW LET US TALK ABOUT SAFETY

RULES OF NETIQUETTE

• Online security, safety and ethics


• Internet threats
• Protecting reputations online
• Copyright
• Contextualized online search and research skills

BEFORE WE GO FURTHER, LET US HAVE ANOTHER ASSESSMENT ON BASIC RULES OF NETIQUETTE

Write YES if you agree with the statement and NO if you disagree on the blank before each number.
___1. My computer has an antivirus so it is okay to open most email attachments like e-cards and video files.
___2. Your friend told you that his college application was rejected due to the fact that you posted a video of him
doing crazy stuff at a party. You posted the video several years ago but later took it diwn to protect your friend’s
reputation. Can your friend be right that the college found the video?
___3. You and your best friend play a lot of video games. One time, she asks you for your password so she can help
you level up and get in-game money. She promises to keep your password a secret. Is it okay to give away your
password?
___4. You received an email stating that your mother’s bank account is going to be forfeited if you do not respond to
the email. Is it safe to reply?
___5. You forgot that your essay for English class is due tomorrow. While doing your research, you found a website
offering free essays. Is it okay to use the essays from this free essay website?
___6. A virus is a malware that multiplies and infects other computers through flash drives.
___7. Keyloggers are software that show pop-up ads even if you are not using your browser.
___8. Search engines scan websites for search results even if you have set your post to “private”
___9. There is a danger in posting information about a future vacation.
___10. Letting people know your birthday is probably a must if you want to get as many gifts as possible. But having
it in your profile makes you vulnerable to identify theft.

If you got perfect score, CONGRATULATIONS, if you misses even one item, you have all the right to continue with
this lesson.

10 Best Rules of Netiquette


 The Golden Rule
o (treat others as you would like to be treated)
 No Flaming
o (Flame is a personal insult communicated through the internet
 Don’t type in ALL CAPS
o (people may misinterpret)
 Don’t SPAM
o (it is any unsolicited e-mail from unknown sources
 Don’t talk with people you do not know.
o (do not arrange to meet anyone you meet online)
 Obey Copyright Laws
o (Don’t steal someone else’s idea, property and rights)
 Use proper Grammar and Spelling
o (errors diminishes the credibility of the message)
 Be honest/Be yourself
o (tell the truth, do not pretend to be someone else)
 Follow the TOS (TOS-Term of Service)
o (Rules and policy of the sites)
 Shop Secure Sites
o (these are sites with transport layer security TLS or SLS Socket Layer Security

What is internet Safety?


It refers to the online security or safety of people and their information when using the internet.

As teenagers, you are all exposed to many things powered by the Internet. Whether it is socializing, playing games,
reading sports news, shopping, etc., the Internet years, did not have.

The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with
the old ones. It is also a source of entertainment. But like most things in this world, there is always “another side of the
coin.” The Internet is one of the most dangerous places, especially if you do not know what you are doing.

Are you Safe and Secured online?


How Safe and Secured are you online?

Types of Information with Risk:


Some Tips to Stay Safe Online:
• Be mindful on what you share online.
• Do not just accept terms and conditions, read it.
• Do not share your password with anyone.
• Do not talk to strangers whether online or face-to-face.
• Never post anything about a future vacation.
• Avoid visiting untrusted websites.
• If you have WiFi at home, make it private by adding a password.
• Install and update an antivirus software on your computer.
• Add friends you know in real life.
• Avoid downloading anything from untrusted websites.
• Buy the software, do not use pirated ones.
• Do not reply or click links from suspicious emails.

Antivirus:
 Windows Defender
 BitDefender
 ESET NOD32
 F-Secure
 Kaspersky
 Norton
 AVAST
 SMADAV

INTERNET THREATS

A. Malware – stands for malicious software; It is a set of instructions that run on your computer and make your
system do something that an attacker wants it to do.
Virus - a malicious program designed to replicate itself and transfer from one computer to another (internet, local
networks, FDs, CDs, etc.)

Spyware - a program that runs in the background without you knowing it (thus called “spy”). It has the ability to
monitor what you are currently doing and typing through keylogging.

Adware - A program designed to send your advertisement, mostly as pop-ups; SPAM- Refers to the transmission of
unsolicited messages from various origins using electric messaging systems
A. Spam – unwanted email mostly from bots or advertisers. It can be used to send malware.
B. Phishing – Its goal is to acquire sensitive personal information like passwords and credit card details.

Click this for related topics for reading: https://luminet.co.uk/top-10-common-internet-threats/

Dangers on the Internet

Email Spam- Also known as junk email, it is usually unsolicited commercial email sent from one source with identical
message sent to multiple recipients. Although some of them are not harmful, deleting them one by one will eat up your
time and can clog your email. Dangerous spams carry virus like Trojan horse and other malicious software (malware).
Spamming is projected to continue because it is a cheap means of advertising. In addition, many countries do not have
laws to punish spammers.

Phishing- This is a deceitful practice of trying to get confidential information such as passwords and usernames and
credit card details by making it appear as if it comes from a trustworthy source. Phishing is usually done by email or
other similar means using a popular entity such as Microsoft, Yahoo, Google, Amazon and financial institutions to lure
you to their website. Internet users would think that they are accessing genuine website and through this way, a
phisher would be able to gather sensitive information from internet account user.

Pharming - This is a dangerous hacker attack on a website which directs all traffic to that website to another fictitious
website. The main object of pharming is to obtain username and passwords as well as credit card and financial
information and use these to steal their money electronically or use the credit card of the victims. Pharming is a major
concern of many online banking and electronic commerce transactions, which would comprise many of their client
accounts as well as the business. Antivirus and anti-spyware software cannot prevent and protect one from pharming.

Spyware - It is known that spyware programs also affect the performance and settings of the computer. Major
antivirus companies have incorporated in their products anti-spyware programs and many internet-based companies
have offered anti-spyware programs for a fee and some are free. But you must be careful which one to use to ensure
your protection.

Computer worm - This is a dangerous computer program that replicates itself through a network. Some worms delete
files, others disrupt the network function and still, others send junk mail from infected computer.

Trojan Horse - it can erase data, can allow access of the victim’s computer, can corrupt files, and can be used in
Phishing for bank accounts.

Hacker - This is a person who is able to enter and control other people’s computer without authorization. A hacker is
able to enter another’s computer, usually vandalizes the victim’s website, steals personal information, obtains
intellectual property, and performs credit card fraud. Firewalls are able to prevent entry by hackers.

Click this for further reading: https://www.voicesofyouth.org/blog/dangers-internet-beyond-cyberbullying

IN ORDER TO BE SAFE ALL THE TIME, TAKE THE NETIQUETTE “GOLDEN RULE”:

You might also like