You are on page 1of 5

EMPOWERMENT TECHNOLOGY (EMTECH) POINTERS

NEED TO REMEMBER (YELLOW)


IMPORTANT (BLUE)

INFORMATION AND COMMUNICATIONS SOCIAL MEDIA - A WEBSITE, APPLICATION, OR


TECHNOLOGY ONLINE CHANNEL THAT ENABLE WEB USERS TO
USE OF COMMUNICATIONAL CREATE, DISCUSS, MODIFY AND EXCHANGE USER
TECHNOLOGIES GENERATED CONTENT.
LORD DENNIS STEVENSON
THE MAN BEHIND THE WIDELY-USED OF ICT
NOWADAYS. TYPES OF SOCIAL MEDIA:

TIM BERNERS-LEE 1. SOCIAL NETWORK - ALLOW YOU TO


WWW (WORLD WIDE WEB) CONNECT WITH OTHER PEOPLE
2. BOOKMARKETING SITES - ALLOW YOU TO
WEB 1.0 (STATIC WEB) STORE AND MANAGE LINKS TO VARIOUS
 READ ONLY WEB WEBSITES AND RESOURCES
WEB 1.0 (DYNAMIC WEB) 3. SOCIAL NEWS - ALLOW USERS TO POST
 READ/WRITE/COLLABORATIVE THEIR OWN NEWS ITEMS OR LINKS TO
INTERACTIONS OTHER NEWS SOURCES.
FEATURES (WEB 2.0) 4. MEDIA SHARING - ALLOW YOU TO UPLOAD
1. FOLKSONOMY/HASHTAGS- ALLOW USERS AND SHARE MEDIA CONTENT LIKE IMAGES,
TO CATEGORIZE OR ARRANGE VIDEOS AND MUSIC.
INFORMATION. 5. MICROBLOGGING - SHORT UPDATES FROM
2. RICH USER EXPERIENCE- THE CONTENT IS THE USER.
DYNAMIC AND RESPONSIVE TO USER INPUT.
6. BLOGS AND FORUM - ALLOW USERS TO
3. USER PARTICIPATION- THE OWNER IF THE
POST THEIR CONTENT.
WEBSITE ALLOW TO POST THEIR COMMENT,
REVIEW OR EVALUATE THE CONTENT. MOBILE TECHNOLOGIES:
4. LONGTAIL SERVICE - OFFERED TO USER ON
DEMAND RATHER THAN A ONE TIME 1. IOS – APPLE DEVICES
PURCHASE. 2. ANDRIOD – DEVELOPED BY GOOGLE
5. SOFTWARE AS A SERVICE - ONE TIME 3. BLACKBERRY OS – USED IN BLACKBERRY
PURCHASE OF THE SOFTWARE THAT YOU DEVICES
NEEDED. 4. WINDOW PHONE OS – DEVELOPED BY
6. MASS PARTICIPATION - DIVERSE MICROSOFT
INFORMATION SHARING THROUGH 5. SYMBIAN – USED Y NOKIA
UNIVERSAL WEB ACCESS. 6. WEBOS – ORIGINALLY USED IN
SMARTPHONES BUT NOW ON SMART TV
WEB 3.0 (SEMATIC WEB)
 AI INTELLIGENCE (FUTURE) ASSISTIVE MEDIA - NON-PROFIT SERVICE
CONVERGENCE - TECHNOLOGICAL ADVANCEMENT DESIGNED TO HELP PEOPLE WHO HAVE VISUAL
TO WORK ON A SIMILAR GOAL OR TASK. AND READING IMPAIRMENTS
ONLINE SAFETY AND NETIQUETTE
WAYS TO CHECK IF A WEBSTE IS TRUSTWORTHY:
DIGITAL DIGITAL NATIVES
IMMIGRANTS RELIABLE WEBSITE UNRELIABLE WEBSITE
ADOPTERS BORN DURING .EDU OR .GOV MIGHT END
WITH .COM
PREFER TO TALK IN ALWAYS ON DEVICES
PERSON DON’T HAVE ERROR HAVE ERROR
LOGICAL LEARNER INTUITIVE LEARNER ARE UP TO DATE OUTDATED
ONE TASK AT A TIME MULTITASKER USE FACTS USE OPINION
INTERACTION WITH EXTREMELY SOCIAL USE EXPERTS USE UNRELIABLE
FEW PEOPLE SOURCE
TRADITIONAL SITES MULTIMEDIA
ORIENTED

GIVING INFORMATION AND RISK (DIGTAL


NATIVES)
 FIRST NAME RISK: CANNOT WALK IN
A ROOM AND START INTRODUCING
YOURSELF TO EVERYONE
 LAST NAME RISK: BOTH YOUR FIRST KINDS OF ONLINE THREATS
AND LAST IS A MORE RISKY FLAME WAR - FLAME WAR WHEN OTHER USERS
 MIDDLE NAME RISK: NOT THE MOST RESPOND TO THE THREAD WITH THEIR OWN
RISKY FLAME MESSAGE.
 CURRENT AND PREVIOUS SCHOOL
RISK: VERIFICATION PURPOSE PHISHING - HAPPENS WHEN AN EMAIL IS SENT
 CELLPHONE NUMBER RISK: NEVER FROM AN INTERNET CRIMINAL DISGUISED AS AN
BE POSTED IN THE INTERNET EMAIL FROM A LEGITIMATE SOURCE.
 MOTHER AND FATHER’S NAME RISK:
RISKY, YET NOT RISKY, NEVER POST PHARMING - HAPPENS WHEN A HACKER (OR
THEIR FULL NAME “PHARMER”) DIRECTS AN INTERNET USER TO A
 SIBLINGS NAME RISK: PRETEND TO FAKE WEBSITE INSTEAD.
BE THEM, TO DUPE YOU INTERNET SCAMS - SOMEONE USING INTERNET
 YOUR ADDRESS RISK: MUCH EASIER SERVICES OR SOFTWARE TO DEFRAUD OR TAKE
TO THE CRIMINALS TO FIND YOU
ADVANTAGE OF VICTIMS.
 BIRTHDAY RISK: VULNERABLE TO
IDENTITY THEF INTERNET ROBOTS - IT IS A SOFTWARE
APPLICATION THAT IS PROGRAMMED TO DO
CERTAIN TASKS
ONLINE SAFETY, SECURITY AND NETIQUETTE -
ONLINE SAFETY REFERS TO THE PRACTICES AND
PRECAUTIONS

S M A R T
STAY DON’ ACCEPTIN RELIABL TELL
SAF T G FILES E SOMEON
E MEET E
UP
MALWARE OR MALICIOUS SOFTWARE - IS ANY
PROGRAM OR FILE THAT IS HARMFUL TO A
COMPUTER USER.
ANATOMY OF A URL:
ADWARE – ADVERTISING SUPPORTED SOFTWARE
URL (UNIFORM RESOURCE LOCATOR)
SPYWARE - SECRETLY OBSERVES THE COMPUTER
USER’S ACTIVITIES URI (UNIFORM RESOURCE IDENTIFIER)
VIRUS AND WORM - THAT ATTACH TO ANOTHER

PROGRAM AND REPLICATES ITSELF BY

MODIFYING OTHER COMPUTER PROGRAMS


TROJAN OR TRROJAN HORSE- MOST DANGEROUS
MALWARE TYPES, CAN BE USED TO STEAL
FINANCIAL INFORMATION OR INSTALL THREATS
LIKE VIRUSES AND RANSOMWARE.
PROTOCOL OR SCHEME: HTTP:// OR HTTPS:// -
RANSOMWARE - LOCKS YOU OUT OF YOUR DEVICE
TELLS THE ADDRESS.
AND/OR ENCRYPTS YOUR FILES, THEN FORCES YOU
TO PAY A RANSOM TO GET THEM BACK. DOMAIN NAME: TELLS WHAT KIND OF WEBSITE.
SPAMS - UNSOLICITED EMAILS, INSTANT MESSAGES SUBDOMAIN: WWW. – SOME NEEDS TO BE
COMING FROM RECIPIENTS INCLUDE AND SOME DON’T.
CYBERSTALKING - USE OF THE INTERNET TO POPULAR DOMAIN:
HARASS OR STALK INDIVIDUALS OR
TOP LEVEL DOMAIN COUNTRY CODE TOP
ORGANIZATIONS.
LEVEL DOMAIN
CYBERBULLYING - THE ACT OF TORMENTING, .EDU – EDUCATIONAL .PH – PHILIPPINES
HARASSING, OR EMBARRASSING ANOTHER INST.
PERSON USING THE INTERNET. .ORG – NON- PROFIT .EU – EUROPEIAN
ORGANIZATION UNION
SPOOFING - SOMEONE OR SOMETHING PRETENDS .GOV – GOVERNMENT .UK – UNITED
TO BE SOMETHING ELSE TO GAIN OUR SITE KINGDOM
CONFIDENCE. .COM – COMMERCIAL .AU - AUSTRALIA
SITE
.NET - NETWORK
SEARCH ENGINE - RETRIEVAL OF DATA, FILES, OR
DOCUMENTS FROM DATA BASES
FILE PATH/ FILE FOLDER: DIRECTS THE BROWSER IN
A SPECIFIC PAGE OR FILE IN A WEBSITE.
PAGE: DIRECT YOUR BROWSER IN A SPECIFIC WEB
PAGE.
NAMED ANCHOR: STARTS FROM A HASHTAG AND  CONTACT INFO
IT BRINGS YOUR BROWSER TO A SPECIFIC PART OF  CREDENTIALS
A LONG PAGE.  SUPPORTED BY AN ORGANIZATION OR A
COMMERCIAL BODY
PURPOSE: THE INFORMATION PRESENTED IN THE
BINIARY: A NUMERIC SYSTEM THAT ONLY USES SITE SHOULD BE CLEAR.
TWO DIGITS — 0 AND 1  PURPOSE OF THE SITE
BIT – BINARY DIGIT, EASY TO PROCESS  SPECIFIT AUDIENCE
INFORMATION  SITE ORGANIZED AND FOCUSED
 OUTSIDE LIKE APPROPRIATE
 SITE EVLUATE THE LINKS
SEARCH SKILLS AND TOOLS
COVERAGE: HOW COMPREHENSIVE THE WEBSITE
BOOLEAN LOGIC:
IS IN THEIR DISCUSSION OF CERTAIN TOPICS.
A. BOOLEAN “OR” – THIS OPERATOR WILL  SELECTIVE OR COMPREHENSIVE
FIND PAGES THAT INCLUDE EITHER OF THE  EXPLORED IN DEPTH
SEARCH TERMS. EX. A OR B  COMPARE
B. . BOOLEAN “AND” – THIS OPERATOR WILL  OUTSIDE SITES
RETRIEVE ONLY PAGES CONTAINING BOTH  PROVIDES INFORMATION WITH NO
TERMS EX. A AND B RELEVANT OUTSIDE LINKS
C. BOOLEAN “NOT” – THIS OPERATOR WILL
FIND PAGES THAT DO NOT INCLUDE SEARCH
TERM IMMEDIATELY FOLLOWING IT. EX. A CURRENCY: HOW CURRENT THE INFORMATION
NOT B PRESENTED IS, AND HOW OFTEN THE SITE IS
UPDATED OR MAINTAINED.
PHASE SEARCHING - FOR FAMOUS QUOTES,
PROPER NAMES, RECOMMENDATIONS, ETC.
OBJECTIVITY: PRESENT INFORMATION WITH A
PLUS (+): MUST BE FOUND IN SEARCH MINIMUM OF BIAS.
MINUS (-): NOT REQUIRED ON THE RESULT  PRESENTED
 TRY TO SWAY THE AUDIENCE
AMPERSAND (@): USED TO FIND SOCIAL TAGS  ADVERSITING CONFLICT THE CONTENT
HASTAG (#): USED TO FIND POPULAR HASHTAGS  EXPLAIN, INFORM, PURSUADE, OR SEE
SOMETHING
FINDING DOCUMENTS - FILETYPE REFINES THE
SEARCH FOR DOCUMENTS ON THE WEB.
FILETYPE:PDF , FILETYPE:DOC , FILETYPE:XLS ACCURACY: THE CREDIBILITY OF THE WEBSITE.
 REABILITY
SEACHING SITES: THE SITES FIND WEBPAGE FROM  REFERENCES
A WEBSITE.  INFORMATION COMPARABLE
 FOLLOW BASIC RULE
 BIBLOGRAPHY OR RREFERENCE
EVALUATING SITES
AUTHORITY: THAT THE PERSON HAS THE
QUALIFICATIONS AND KNOWLEDGE TO DO SO.
 AUTHORSHIP
MAIL MERGE: ALLOWS YOU TO EASILY CREATE
MULTIPLE LETTERS, LABELS, ENVELOPES,
NAMETAGS, DOCUMENTS TO GROUP OF PEOPLE AS
STORED IN A LIST.

3 MAIN COMPONENT:

1. MAIN DOCUMENT - CONTAIN THE EMAIL


INFORMATION FOR EACH OF THE MERGED
DOCUMENT.
2. DATA SOURCE - ALSO CALLED DATA FILE
WHICH COMPRISES THE INFORMATION TO
BE MERGED INTO A DOCUMENT SUCH AS
THE LIST OF NAMES AND ADDRESSES TO BE
USED IN A MAIL MERGE
3. MERGE DOCUMENT - THIS IS ALSO A WORD
PROCESSING DOCUMENT THAT IS THE
GENERATED OUTPUT AFTER EXECUTING
THE MERGE PROCESS.

ADVANCE TECHNIQUES IN PPT:

ANIMATION - ILLUSION OF MOTION

You might also like