You are on page 1of 2

Information Communication and Technology - a. It has user-generated contents.

deals with different communication technologies b. It has emphasis on user experience.


Information - the knowledge obtained from reading, c. It has improved interoperability.
investigation, study or research d. Website pages are dynamic.
Communication - act of transmitting messages 3. Web 3.0
Technology - use of scientific knowledge to create a. It adheres to minimalist design.
processes and products that fulfill human needs b. It uses the semantic web framework.
1. Aiding Communication c. It is an ever-present website.
2. Spreading Information d. It applies and uses artificial
Example and Application of ICT intelligence.
1. Attending online classes Trends in ICT
2. Attending Webinar session 1. Convergent Technologies - theoretical
3. Virtual conferencing perspective where different technologies are
4. Sending E-mail & text messaging unified in one technology.
5. Using social media platforms 2. Mobile Technologies - primary devices that
ICT in the Philippines are used to utilize the power of this technology.
● ICT Hub of Asia 3. Social Media Platforms - process of
● 106.8 cell phones per 100 Filipinos in 2012 connecting people and bringing relevant
● ICT shares 19.3% in total employment information
population here in the Philippines 4. Assistive Media Technology - devices that
● The selfiest cities around the world are adaptive, assistive to the elderly and to
WWW (World Wide Web) - or Web is an information people with special needs.
system enabling documents and other web resources 6 Types of Social Media
to be accessed over the Internet 1. Social Networks - these are sites that allows
● Invented by English computer scientist Tim you to connect with other people
Berners-Lee at CERN started in 1989 until 2. Bookmarking SItes - sites that allow you to
the end of 1990 store and manage links to various websites
● The technology was released outside CERN to 3. Social News - these are sites that allow users
other research institutions starting in January to post their own news items
1991, and then to the general public on 23 4. Media Sharing - sites that allow you to upload
August 1991. He was considered the Father and share media content
of the World Wide Web. 5. Microblogging - these are sites that focus on
Eras of WWW short update from the user
1. Web 1.0 6. Blogs and Forums - websites that allows
a. Website pages are static. users to post their contents and other user are
b. Website contents and layouts are able to comment
inseparable. Example of Web Browsers
c. Website contents are stored in files. 1. Google Chrome
d. Websites do not embed guestbooks in 2. Microsoft Edge
the content page. 3. Mozilla Firefox
e. Websites use proprietary tags. 4. Safari
f. Website forms are usually sent by 5. Bing
email. ***
2. Web 2.0
Online Safety - or E-Safety; Maximization of users ● Cautious on giving information online
knowledge and awareness online ● Be alert
Online Security - rules that are followed and actions
that are taken to make sure that the users and data 4. Plagiarism and Copyright Infringement -
privacy aren’t compromised by cybercriminals presenting someone else’s work as your own
Online Crimes - violations that harms others w/out their consent
Standards that applies fair use
1. Cyberbullying ● Purpose of use
a. Flaming - online fight ● Proportion or Extent of materials used
b. Harassment - repeatedly sending ● The effect of marketability
nasty messages Common Internet Security Threats
c. Denigration - sending or gossiping 1. Malware - malicious software
about someone to damage their 2. Computer Worm - programs that replicate
reputation themselves
d. Impersonation - when someone 3. Spam - harmless messages sent in your
pretends to be someone else emails that sometimes contains link that put us
e. Outing - act of sharing someone’s to risk
information 4. Phishing - scams created by cyber criminals
f. Trickery - when someone talks to a to ask for private informations
person to let them reveal an Internet Security Strategies
embarrassing information 1. Browser Selection - control settings that
g. Exclusion - intentionally excluded protects the user
from an online group 2. Email Security - increases protection with
h. Cyberstalking - act of repeated email use
harassment that includes threats that 3. Multi Factor Authentication - which the
creates fear computer access is controlled by several
Best to do when Cyberbullying is Observed authentications
● Inform a trusted person 4. Firewall - first in line of defense
● Try not to investigate Online Ethics and Etiquettes
● Block connection with the bully Ethics - deals with what is good or bad
● Always be aware Internet Ethics - analysis of the role that the internet
● Log out from online account plays
● Don’t be a cyberbully Online Etiquettes
1. Be courteous
2. Identity Theft - or Identity Fraud; someone 2. Don’t use foul language
obtains and uses another person’s data 3. Appropriate your humor and avoid sarcasm
Practical Tips to Avoid Identity Theft 4. Don’t share offensive materials
● Use a Good Password 5. Acknowledge owner’s of ideas and materials
● Report Identity Theft used
6. Try to be understanding
3. Phishing - sending emails to reveal personal 7. Respects others’ opinions
information
Ways to be secured from Phishing Attack
● Scrutinize the Website

You might also like