Professional Documents
Culture Documents
Lecture-Week 1
When we make a video call, we use the Internet. When we send a text or make a call, we use cellular networks.
WHAT IS INTERNET?
• Is the global system of interconnected computer networks that use the Internet protocol suite to link billions of
devices worldwide;
• Means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers.
Examples of WWW
1. www.google.com
2. www.facebook.com
3. www.youtube.com
WHAT IS WEBSITE?
• A location connected to the Internet that maintains one or more pages on the World Wide Web.
• It is a related collection of World Wide Web (WWW) files that includes a beginning file located a home page.
LET US ASSESS HOW AWARE ARE YOU ON THE BASICS OF WORLD WIDE WEB.
1.
2.
3.
4.
5.
Remember, ICT is one of the best ways to improve business sales and it is important for you to know how to use
it your advantage. One advantage is for customers to share their thoughts with you online, directly on your web page.
That way, the customers would feel that you are responsive and very open in listening to their thoughts. But in order to
do that, you have to make your website dynamic.
NOW, LET US DIG DEEPER INTO THE HISTORY OF WORLD WIDE WEB.
1) CONVERGENCE
a) Technological convergence is the synergy of technological advancements to work on a similar goal or task.
b) Convergence is using several technologies to accomplish a task conveniently.
2) SOCIAL MEDIA
a) is a website, application, or online channel that enables web users to create, co-create, discuss, modify, and
exchange user-generated content.
b) There are six types of Social Media
i) Social Networks. These are sites that allow you to connect with other people with the same interests or
background.
ii) Bookmarking Sites. These are sites that allow you to store and manage links to various websites and
resources. Most of these sites allow you to create a tag that allows you and others to easily search or share
them. Examples: Twitter and Pinterest
iii) Social News. These are sites that allow users to post their own news items or links to other news sources.
The users can also comment on the post and comments may also be ranked. They are also capable of
voting on these news articles of the website. Examples: Reddit and Digg
iv) Media Sharing. These are sites that allow you to upload and share media content like images, music, and
video. Most of these sites have additional social features like liking, commenting, and having user
profiles. Examples: Flicker, Youtube, and Instagram.
v) Microblogging. These are sites that focus on short updates from the user. Those subscribe to the user will
be able to receive these updated. Examples: Twitter and Plurk
vi) Blogs and Forums. These websites allow users to post their content. Other users are able to comment on
the said topic. There are several free blogging platforms like Blogger, WordPress, and Tumblr. On the
other hand, forums are typically part of a certain website or web service.
3) MOBILE TECHNOLOGIES
a) The popularity of smartphones and tablets has taken a major rise over the years. Several of these devices
are capable of using high-speed Internet. Today, the latest mobile devices use 4G Networking (LTE),
which is currently the fastest mobile network
b) iOS – used in Apple devices such as the iPhone and iPad. Android – an open source operating system
developed by Google. Being open source means several mobile phone companies use this OS for free.
c) Blackberry OS – used in Blackberry devices.
d) Windows Phone OS – a closed source and proprietary operating system developed by Microsoft®.
e) Symbian – the original smartphone OS; used by Nokia devices.
f) WebOS – originally used for smartphones; now used for smart TVs. e. Windows Mobile– developed by
Microsoft for smartphones and pocket PCs.
4) ASSISTIVE MEDIA
a) is a nonprofit service designed to help people who have visual and reading impairments. A database audio
recordings is used to read to the user
RULES OF NETIQUETTE
Write YES if you agree with the statement and NO if you disagree on the blank before each number.
___1. My computer has an antivirus so it is okay to open most email attachments like e-cards and video files.
___2. Your friend told you that his college application was rejected due to the fact that you posted a video of him
doing crazy stuff at a party. You posted the video several years ago but later took it diwn to protect your friend’s
reputation. Can your friend be right that the college found the video?
___3. You and your best friend play a lot of video games. One time, she asks you for your password so she can help
you level up and get in-game money. She promises to keep your password a secret. Is it okay to give away your
password?
___4. You received an email stating that your mother’s bank account is going to be forfeited if you do not respond to
the email. Is it safe to reply?
___5. You forgot that your essay for English class is due tomorrow. While doing your research, you found a website
offering free essays. Is it okay to use the essays from this free essay website?
___6. A virus is a malware that multiplies and infects other computers through flash drives.
___7. Keyloggers are software that show pop-up ads even if you are not using your browser.
___8. Search engines scan websites for search results even if you have set your post to “private”
___9. There is a danger in posting information about a future vacation.
___10. Letting people know your birthday is probably a must if you want to get as many gifts as possible. But having
it in your profile makes you vulnerable to identify theft.
If you got perfect score, CONGRATULATIONS, if you misses even one item, you have all the right to continue with
this lesson.
As teenagers, you are all exposed to many things powered by the Internet. Whether it is socializing, playing games,
reading sports news, shopping, etc., the Internet years, did not have.
The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with
the old ones. It is also a source of entertainment. But like most things in this world, there is always “another side of the
coin.” The Internet is one of the most dangerous places, especially if you do not know what you are doing.
Antivirus:
Windows Defender
BitDefender
ESET NOD32
F-Secure
Kaspersky
Norton
AVAST
SMADAV
INTERNET THREATS
A. Malware – stands for malicious software; It is a set of instructions that run on your computer and make your
system do something that an attacker wants it to do.
Virus - a malicious program designed to replicate itself and transfer from one computer to another (internet, local
networks, FDs, CDs, etc.)
Spyware - a program that runs in the background without you knowing it (thus called “spy”). It has the ability to
monitor what you are currently doing and typing through keylogging.
Adware - A program designed to send your advertisement, mostly as pop-ups; SPAM- Refers to the transmission of
unsolicited messages from various origins using electric messaging systems
A. Spam – unwanted email mostly from bots or advertisers. It can be used to send malware.
B. Phishing – Its goal is to acquire sensitive personal information like passwords and credit card details.
Email Spam- Also known as junk email, it is usually unsolicited commercial email sent from one source with identical
message sent to multiple recipients. Although some of them are not harmful, deleting them one by one will eat up your
time and can clog your email. Dangerous spams carry virus like Trojan horse and other malicious software (malware).
Spamming is projected to continue because it is a cheap means of advertising. In addition, many countries do not have
laws to punish spammers.
Phishing- This is a deceitful practice of trying to get confidential information such as passwords and usernames and
credit card details by making it appear as if it comes from a trustworthy source. Phishing is usually done by email or
other similar means using a popular entity such as Microsoft, Yahoo, Google, Amazon and financial institutions to lure
you to their website. Internet users would think that they are accessing genuine website and through this way, a
phisher would be able to gather sensitive information from internet account user.
Pharming - This is a dangerous hacker attack on a website which directs all traffic to that website to another fictitious
website. The main object of pharming is to obtain username and passwords as well as credit card and financial
information and use these to steal their money electronically or use the credit card of the victims. Pharming is a major
concern of many online banking and electronic commerce transactions, which would comprise many of their client
accounts as well as the business. Antivirus and anti-spyware software cannot prevent and protect one from pharming.
Spyware - It is known that spyware programs also affect the performance and settings of the computer. Major
antivirus companies have incorporated in their products anti-spyware programs and many internet-based companies
have offered anti-spyware programs for a fee and some are free. But you must be careful which one to use to ensure
your protection.
Computer worm - This is a dangerous computer program that replicates itself through a network. Some worms delete
files, others disrupt the network function and still, others send junk mail from infected computer.
Trojan Horse - it can erase data, can allow access of the victim’s computer, can corrupt files, and can be used in
Phishing for bank accounts.
Hacker - This is a person who is able to enter and control other people’s computer without authorization. A hacker is
able to enter another’s computer, usually vandalizes the victim’s website, steals personal information, obtains
intellectual property, and performs credit card fraud. Firewalls are able to prevent entry by hackers.
IN ORDER TO BE SAFE ALL THE TIME, TAKE THE NETIQUETTE “GOLDEN RULE”: