You are on page 1of 6

INFORMATION AND COMMUNICATION TECHNOLOGY

-Information and Communication Technology


(ICT) deals with the use of different communication technologies such as mobile phones, tele
phone, Internet, etc. to locate, save, send and edit information.

WEB 1.0
-When the World Wide Web
was invented, most web pages were static. Static (also known as flat page or stationary
page) in the sense that the page is “as is” and cannot be manipulated by the user. The content is
also the same for all users. This is referred to as Web 1.0.

WEB 2.0: DYNAMIC WEB PAGES


-Web 2.0 is the evolution of Web 1.0 by adding dynamic web pages—the user is able to see a
website differently
than others. Examples of Web 2.0 include social networking sites, blogs, wikis, video sharing
sites, hosted services, and web applications.

-Web 2.0 allows users to interact with the page: instead of just reading a page, the
user may be able to comment or create a user account. Web 2.0 also allows users to
use web browsers instead of just using their operating system. Browsers can now be used for
their user interface, application software (or web applications), and even for file storage.

-Most websites that we visit today are Web 2.0.

FEATURES OF WEB 2.0

1. Folksonomy - It allows users to categorize and classify/arrange information using


freely chosen keywords (e.g., tagging).
Popular social networking sites such as Twitter, Instagram, Facebook, etc. use tags
that start with the pound sign (#).This is also referred to as hashtag.

2. Rich User Experience - Content is dynamic and is responsive to user’s input. An


example would be a website that shows local content. In the case of social
networking sites, when logged on, your account is used to modify
what you see in their website.

3. Long Tail - Services are offered on demand rather than on a one-time purchase.
In certain cases, time-based pricing is better than file-size-based pricing or vice
versa.This is synonymous to subscribing to a data plan that charges you
for the amount of time you spent in the Internet,
or a data plan that charges you for the amount of bandwidth you used.
4. User Participation - The owner of the website is not the only one who is able to
put content. Others are able to place a content of their own by means of comment,
reviews, and evaluation. Some websites allow readers to comment on
an article, participate in a poll, or review a specific product (e.g., Amazon.com, on
line stores).

5. Software as a Service - Users will subscribe to a software only when needed


rather than purchasing them. This is a cheaper option if you do not always need to
use a software. For instance, Google Docs is a free web-based application that allows
the user to create and edit word processing and spreadsheet documents online.

6. Mass Participation -It is a diverse information sharing through universal web


access. Since most users can use the Internet, Web 2.0’s content is based on people
from various cultures.

WEB 3.0 AND THE SEMANTIC WEB


-The Semantic Web is a movement led by
the World Wide Web Consortium (W3C).

-The W3C standard encourages web developers to include semantic content


in their web pages.

-According to the W3C, “The Semantic Web provides a common framework


that allows data to be shared and reused
across application, enterprise, and community boundaries.”

-The aim of Web 3.0 is to have


machines (or servers) understand the user’s preferences to be able to d
eliver web content specifically targeting the user.

Several problems of Web 3.0


1. Compatibility - HTML files and current web browsers could not support Web 3.0.

2. Security - The user’s security is also in question since the machine is saving his
or her preferences.

3. Vastness - The World Wide Web already contains billions of web pages.

4. Vagueness - Certain words are imprecise.

5. Logic -
Since machines use logic, there are certain limitations for a computer to be able to predict w
hat the user is referring to at a given time.
TRENDS IN ICT
1. Convergence - Technological convergence is the synergy of technological
advancements to work on a similar goal or task.

2. Social Media - Social media is a website, application, or online channels that


enable web users to create, co-create, discuss, modify, and exchange user-
generated content.

SIX TYPES OF SOCIAL MEDIA

a. Social Networks
- These are sites that allow you to connect with other people with the same interests or
background. (Facebook & Google+)

b. Bookmarking Sites
- These are sites that allow you to store and manage links to various websites and
resources. (StumbleUpon & Pinterest)

c. Social News -
These are sites that allow users to post their own news items or links to other news
sources. (Reddit & Digg)

d. Media Sharing -
These are sites that allow you to upload and share media content like images, music, and vide
o. (Flicker,Youtube & Instagram)

e. Microblogging - These are sites that focus on short updates from the user. (Twitter & Plurk)

f. Blogs and Forums -


These websites allow users to post their content. (Blogger,Wordpress & Tumbler)

3. Mobile Technologies

-The popularity of smartphones and tablets has taken a major rise over the

years.This is

largely because of the devices’ capability to do tasks that were originally found i

n personal computers.
KINDS OF OPERATING SYSTEM:
a. iOS Apple devices like iPhone & iPad
b. Android free OS developed by Google
c. Blackberry OS Blackberry devices
d. Windows Phone OS closed source developed by Microsoft
e. Symbian OS for smartphones and Nokia devices
f. WebOS smartphones and smart TVs
g. Windows Mobile developed by Microsoft for smartphones and pocket PCs

4. Assistive Media

-Assistive media is a nonprofit service designed to help people who have visual

and reading impairments. A database of audio

recordings is used to read to the user.

NETIQUETTE
-Set of guidelines for courteous communication in the online environment. It includes
proper manners for sending e-mail, conversing online, and so on.

PURPOSE OF NETIQUETTE
-help construct and maintain
a pleasant, comfortable, and efficient environment for online communication,
as well as to avoid placing strain on the system and generating conflict among users.

TYPEOF INFORMATIO
N POSIBLE RISK

1. First Name

2. Last Name

3. Middle Name Identity Theft

4. Current and Previous School(s) Identity Theft with the purpose of verification
5. Your Cellphone Number
Same as posting your number on a billboard

6. Who your Mother and Father


are
Verification of passwords over various websites

7. Who your siblings are Pretending to dupe you

8. Your Address Access to scam and prank you would be easier

9. Your Strangers might pretend to be someone who belongs to your family c


Home Phone Number ircle

10. Your Birthday Identity Theft

Rules of Netiquette
l Online security, safety, and ethics
l Internet threats
l Protecting reputations online
l Copyright
l Contextualized online search and research skills

Internet Threats:
Malware - malicious software
Types: Virus, Worm, Trojan, Ransomware, Bots or
Botnets, Spyware, Adware, Rootkits, Fileless malware, and Malvertising.

Spam – unwanted email mostly from


bots or advertisers. It can be used to send malware.

Phishing – Its goal is to acquire


sensitive personal information like passwords and credit card details.

HOW TO AVOID COPYRIGHT INFRINGEMENT?


-CI occurs when a copyrighted work is reproduced, distributed, performed, publicly
displayed, or made into a derivative work without the permission of the copyright owner.
If you create something—an idea, an invention, a form of literary work, or a research,
you have the right of how it should be used by others. This is called intellectual property.

Think Before You Click


1. Before you post something on the web, ask these questions to yourself:

-Would you want your parents or grandparents to see it?


-Would you want your future boss to see it?
Once you post something on the web, you have no control of who sees your posts.

2. Your friends depend on you to protect their reputation online. Talk to your friends about
this serious responsibility.

3. Set your post to “private.” In this way, search engines will not be able to scan that post.

4. Avoid using names. Names are easy for search engines to scan.

5. If you feel that a post can affect you or other’s reputation, ask the one who posted
it to pull it down or report it as inappropriate.

You might also like