This document discusses various topics related to information communication and technology (ICT), including the different eras of the World Wide Web (Web 1.0, 2.0, 3.0), trends in ICT, examples of social media and web browsers, online safety, security and crimes, and internet ethics and etiquette. It provides information on key aspects of ICT such as communication technologies, information sources, and how technology enables communication and spreads information.
This document discusses various topics related to information communication and technology (ICT), including the different eras of the World Wide Web (Web 1.0, 2.0, 3.0), trends in ICT, examples of social media and web browsers, online safety, security and crimes, and internet ethics and etiquette. It provides information on key aspects of ICT such as communication technologies, information sources, and how technology enables communication and spreads information.
This document discusses various topics related to information communication and technology (ICT), including the different eras of the World Wide Web (Web 1.0, 2.0, 3.0), trends in ICT, examples of social media and web browsers, online safety, security and crimes, and internet ethics and etiquette. It provides information on key aspects of ICT such as communication technologies, information sources, and how technology enables communication and spreads information.
Information Communication and Technology - a. It has user-generated contents.
deals with different communication technologies b. It has emphasis on user experience.
Information - the knowledge obtained from reading, c. It has improved interoperability. investigation, study or research d. Website pages are dynamic. Communication - act of transmitting messages 3. Web 3.0 Technology - use of scientific knowledge to create a. It adheres to minimalist design. processes and products that fulfill human needs b. It uses the semantic web framework. 1. Aiding Communication c. It is an ever-present website. 2. Spreading Information d. It applies and uses artificial Example and Application of ICT intelligence. 1. Attending online classes Trends in ICT 2. Attending Webinar session 1. Convergent Technologies - theoretical 3. Virtual conferencing perspective where different technologies are 4. Sending E-mail & text messaging unified in one technology. 5. Using social media platforms 2. Mobile Technologies - primary devices that ICT in the Philippines are used to utilize the power of this technology. ● ICT Hub of Asia 3. Social Media Platforms - process of ● 106.8 cell phones per 100 Filipinos in 2012 connecting people and bringing relevant ● ICT shares 19.3% in total employment information population here in the Philippines 4. Assistive Media Technology - devices that ● The selfiest cities around the world are adaptive, assistive to the elderly and to WWW (World Wide Web) - or Web is an information people with special needs. system enabling documents and other web resources 6 Types of Social Media to be accessed over the Internet 1. Social Networks - these are sites that allows ● Invented by English computer scientist Tim you to connect with other people Berners-Lee at CERN started in 1989 until 2. Bookmarking SItes - sites that allow you to the end of 1990 store and manage links to various websites ● The technology was released outside CERN to 3. Social News - these are sites that allow users other research institutions starting in January to post their own news items 1991, and then to the general public on 23 4. Media Sharing - sites that allow you to upload August 1991. He was considered the Father and share media content of the World Wide Web. 5. Microblogging - these are sites that focus on Eras of WWW short update from the user 1. Web 1.0 6. Blogs and Forums - websites that allows a. Website pages are static. users to post their contents and other user are b. Website contents and layouts are able to comment inseparable. Example of Web Browsers c. Website contents are stored in files. 1. Google Chrome d. Websites do not embed guestbooks in 2. Microsoft Edge the content page. 3. Mozilla Firefox e. Websites use proprietary tags. 4. Safari f. Website forms are usually sent by 5. Bing email. *** 2. Web 2.0 Online Safety - or E-Safety; Maximization of users ● Cautious on giving information online knowledge and awareness online ● Be alert Online Security - rules that are followed and actions that are taken to make sure that the users and data 4. Plagiarism and Copyright Infringement - privacy aren’t compromised by cybercriminals presenting someone else’s work as your own Online Crimes - violations that harms others w/out their consent Standards that applies fair use 1. Cyberbullying ● Purpose of use a. Flaming - online fight ● Proportion or Extent of materials used b. Harassment - repeatedly sending ● The effect of marketability nasty messages Common Internet Security Threats c. Denigration - sending or gossiping 1. Malware - malicious software about someone to damage their 2. Computer Worm - programs that replicate reputation themselves d. Impersonation - when someone 3. Spam - harmless messages sent in your pretends to be someone else emails that sometimes contains link that put us e. Outing - act of sharing someone’s to risk information 4. Phishing - scams created by cyber criminals f. Trickery - when someone talks to a to ask for private informations person to let them reveal an Internet Security Strategies embarrassing information 1. Browser Selection - control settings that g. Exclusion - intentionally excluded protects the user from an online group 2. Email Security - increases protection with h. Cyberstalking - act of repeated email use harassment that includes threats that 3. Multi Factor Authentication - which the creates fear computer access is controlled by several Best to do when Cyberbullying is Observed authentications ● Inform a trusted person 4. Firewall - first in line of defense ● Try not to investigate Online Ethics and Etiquettes ● Block connection with the bully Ethics - deals with what is good or bad ● Always be aware Internet Ethics - analysis of the role that the internet ● Log out from online account plays ● Don’t be a cyberbully Online Etiquettes 1. Be courteous 2. Identity Theft - or Identity Fraud; someone 2. Don’t use foul language obtains and uses another person’s data 3. Appropriate your humor and avoid sarcasm Practical Tips to Avoid Identity Theft 4. Don’t share offensive materials ● Use a Good Password 5. Acknowledge owner’s of ideas and materials ● Report Identity Theft used 6. Try to be understanding 3. Phishing - sending emails to reveal personal 7. Respects others’ opinions information Ways to be secured from Phishing Attack ● Scrutinize the Website
ChatGPT & Social Media Marketing - The Ultimate Guide To Succeeding On Social Media. Discover How Artificial Intelligence Can Make You The World - S Best Social Media Manager.