You are on page 1of 13

lOMoARcPSD|34111743

Empowerment Technology 1

Educational Technology (University of Perpetual Help System DALTA)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by justpassingby (minyoongles9375@gmail.com)
lOMoARcPSD|34111743

EMPTECH (reviewer)
THE CURRENT STATE OF ICT TECHNOLOGIES
WHAT IS ICT? information system as part of its
documentation
Information and Communication
3. HARDWARE - is the physical parts or
Technology (ICT) deals with the use of
components of a computer. Hardware
different communication technologies
components are categorized as Input
such as mobile phones, telephones,
devices, Output devices and Storage
internet etc. to locate, save, send, and edit
devices.
information.
INPUT DEVICES – KEYBOARD, MOUSE,
Components of ICT
AND SCANNER
Software
OUTPUT DEVICES – MONITOR AND
Hardware
PRINTER
Data
STORAGE DEVICES – HARDDISK, CD-
Internet Access
ROM, FLASHDRIVE
Cloud Computing
4. SOFTWARE - is a collection of programs
1. INFORMATION TECHNOLOGY
designed to operate, control, and extend
is the use of any computer, storage,
the processing capabilities of the
networking, and other physical devices,
computer.
infrastructure, and processes to create,
EX. OPERATING SYSTEMS, COMPILERS,
store, secure, and exchange all forms of
INTERPRETERS AND ASSEMBLERS
electronic data
5. TELECOMMUNICATION - used to
2. INFORMATION SYSTEM
connect, or network, computer systems
is the collection of technical and human
and portable and wearable devices and to
resources that provide the storage,
transmit information.
computing, distribution, and
EX.WIRELESS CONNECTION AND
communication of the information required
WIRED CONNECTION
by enterprises
USES OF ICT
COMPONENTS OF INFORMATION
1. EDUCATION
SYSTEM
Learning Management Software uses
The main components of information
online classes and Moodle-style websites
systems are People, Procedures,
as ways of utilizing technology in
Hardware, Software, and
education.
Telecommunication
2. BUSINESS
1. PEOPLE - Qualified people are a vital
ICT is a key technology in interdisciplinary
component of any information system.
measures to reduce costs, improve
EX. BUSINESS ANALYSTS, DATABASE
processes boost innovation, and increase
ADMINISTRATOR, PROGRAMMERS
productivity.
AND COMPUTER TECHNICIANS
2. ROCEDURE - procedures are used for
using, operating, and maintaining an

Downloaded by justpassingby (minyoongles9375@gmail.com)


lOMoARcPSD|34111743

Centric Transport, Data Driven Driving,


Social Logistics and Airlines Reservation
3. GOVERNMENT
System.
E-Government can be defined as a set of
ICT IN THE PHILIPPINES
public-sector reforms that make use of
For every 100 Filipinos that you will meet
ICT. The four interaction links of the e-
there is a high chance that they use a
government consist of Government-to-
mobile phone and7 of them have 2.
Citizen (G2C), Government-to-Business
The ICT industry employs 19.3%of the
(G2B), Government-to-Government (G2G)
total employment population of the Filipino
and Government-to-Employee (G2E).
workforce.
4. MEDICINE
Is known as the “ICT Hub of Asia”due to
ICT is being used in the provision of
the huge growth of ICT Related Jobs in
medical care in the sense of Body
the country.
Scanners, Patient Monitoring, Organ
As of January 2020, the number of
Transplants and Patient Records.
5. BANKING AND FINANCE internet users in the Philippines grew to 73
million people, accounting for more than
ICT is used in concepts like Internet
half of the total population. The digital
Banking, Automated Teller Machine, Debit
population mostly belong to the age group
Card and Credit Card, and Transaction
of 16 years old and above. -Statista
Processing and Recording.
6. TRANSPORTATION In year 2016, RA 10844 or "An Act
ICT affects transportation directly and Creating the Department of Information
indirectly via the GPS Tracker, Citizen and Communication Technology" was signed

WEB 2.0, WEB 3.0, CONVERGENT TECHNOLOGIES, AND


SOCIAL, MOBILE, AND ASSISTIVE MEDIA
BRIEF HISTORY OF THE INTERNET In 1990 the first web browser and editor
called World Wide Web was created.
In 1960s Charles M. Herzfeld the director
of ARPA “Advance Research Project WWW is an information system on the
Agency” recognized the importance of internet which allows documents to be
computers and oversaw the decision for connected to other documents by
the creation of ARPANET “The Advanced hypertext links, enabling the user to
Research Projects Agency Networks”. search for information by moving from one
In 1966 ARPANET was created. document to another. (oxford)
In 1974 term “Internet” is born.
1. WORLD WIDE WEB In 1991 the first web page (info.cern.ch) is
released.
Tim Berners-Lee-An English Engineer and
Scientist that wrote a proposal about the Tim Berners-Lee also founded the
combination of hypertext and internet in W3C“World Wide Web Consortium”
invented in 1989. Massachusetts Institute of Technology.

Downloaded by justpassingby (minyoongles9375@gmail.com)


lOMoARcPSD|34111743

The important terms in Tim’s Proposal FEATURES OF WEB 2.0


1. Folksonomy
1. HTML allows the users to categorize and classify
information (Tagging). Popular social networking
2. URL sites use tags and freely chosen keywords to
activate the feature.
3. HTTP 2. Rich User Experience
web content is responsive to
WEBPAGE user’s input. In social networking sites, when
logged on, your account is used to modify what you
Web page is what is visible on see in the
the user’s web browser.
social media platform
3. User Participation
It is normally defined as a some websites allow readers to comment on an
hypertext documents that build article, participate in a poll,
up websites. or review a specific product. Users can place a
content of their own by means of comments,
THE EVOLUTION OF WORLD WIDE WEB reviews, and evaluation
1. WEB 1.0 (STATIC WEBPAGE) 4. Long Tail
are services that are offered on demand rather
Only allowed us to
than on a one time purchase.Examples are file
search for information
based pricing and time based pricing.
and read it.
5. Software as a Service
is a feature that allows you to rent a software
The interaction rather than installing it in your computer. An
between the user and example for this is Google Docs
the web is very limited. 6. Mass Participation
2. WEB 2.0 (DYANMIC WEB) diverse information sharing through
It allowed the users to universal web access
interact with the web page 3. WEB 3.0 (SEMANTIC WEB)
There is a dynamic content. Is a movement led by the World
Note: Web 2.0 allowed the Wide Web Consortium (W3C) W3C).
creation of web browsers due to
their user interface, application It is alike Web 2.0 but it is used to
software and file storage. cater individual user.

It allows data to be shared and


reused across application, enterprise,
and community boundaries.
Note: The aim of Web 3.0 is to have
servers understand the user’s
preference to be able to deliver web
content specifically targeting the
user.

Downloaded by justpassingby (minyoongles9375@gmail.com)


lOMoARcPSD|34111743

LIMITATION OF WEB 3.0 TYPES OF SOCIAL MEDIA


Compatibility- HTML files and current web 1. Social Networks
browsers could not support Web 3.0 are sites that allow you to connect with other people
with the same interests or background
Security -since the server saves the user’s
2. Bookmarking Sites
preference, the user’s security will be questioned.
are sites that allow you to store and manage
links to various websites and resources. Most
Vastness - the World Wide Web already contains
of these sites allow you to create a tag that
billions of web pages allows you and others to search or share them

Vagueness - The vagueness of words will be 3. Social News


questioned due to it being imprecise are sites that allow users to post their own
news items or links to other news sources.
Logic - since machines uses logic, there are Those who get the most amount of votes are
certain limitations for a computer to be able to shown most prominently
predict what the user is referring to at a given
4. Media Sharing
time
are sites that allow you to upload and share media
1. WEBSITE – a collection of static web pages.
content like images, music, and video
2. WEB APPS - is a collection of web pages
that caters individual 5. Microblogging
users and offer interactivity. are sites that focus on short updates from the
TECHNOLOGICAL CONVERGENCE user. Blogs and
Is the synergy of technological
6. Blogs and Forums
advancements to work on a similar goal or
are websites that allow users to post their
task. Simply put, it using several
content. Other users can comment on the said
technologies to accomplish a task
conveniently. topic.
Ex: TYPES OF MOBILE OPERATING SYSTEM
Creating word document using tablet or IOS Android
smartphone iPhone operating an open source operating
Syncing files from one device to another system used in Apple system developed by
File torrents devices such as iPhone Google Being open source
SOCIAL MEDIA and iPad means several mobile
phone companies use this
Is a website, application, or online channel
OS for free.
that enables web users to create, co
Windows Phone OS WebOS
create, discuss, modify, and exchange user
a closed source and the operating system
generated content.
proprietary operating used for Smart TVs.
Note: Internet users spend more time in system developed by
social media Microsoft WebOS
sites than in any other type of site. Due to
this, more and
more advertisers use social media to
promote their product.

Downloaded by justpassingby (minyoongles9375@gmail.com)


lOMoARcPSD|34111743

NETIQUETTE
DO’S 7. Thou shall not use other people’s computer
resources without authorization or proper
Be kind and respectful
compensation.
Think before you say or post something
Remember what you put online will be stay 8. Thou shall not appropriate other people’s
online forever intellectual output.
Obey the law
9. Thou shall think about the social consequences
DON’T
of the program you write and or the
Don’t type in ALL CAPS
system you design.
Don’t use inappropriate language
Don’t hurt other feelings 10. Thou shall use a computer in ways that show
Don’t Spam consideration and respect for your fellow humans.
TEN COMMANDMENTS OF COMPUTER ETHICS ISSUES IN COMPUTER ETHICS
1. Thou shall not use a computer to harm other Privacy –responsibility to protect data about
people. individuals

2. Thou shall not interfere with other people’s Accuracy –responsibility of data collectors to
computer work. authenticate information and ensure its accuracy

3. Thou shall not snoop around in other people’s Property –who owns information and software and
files. how can they be sold and exchanged.

4. Thou shall not use a computer to steal. Access –responsibility of data collectors to
control access and determine what information a
5. Thou shall not use a computer to bear false
person has the right to obtain about others and
witness
how the information can be used.
6. Thou shall not copy or use proprietary software
for which you have not paid.

INTERNET THREATS
CYBERCRIME TOP 5 POPULAR CYBERCRIME
Is a crime that involves a computer and a 1. Phishing scams
network. 2. Identity theft scams
Damage to computers, programs or files 3. Online harassment
(Virus, Worms etc.) 4. Cyberstalking
Theft/Stealing (Software Piracy, 5. Invasion of privacy
Identity Theft, etc.)
View/Manipulation (Harassment,
Cyberbullying etc.)

Downloaded by justpassingby (minyoongles9375@gmail.com)


lOMoARcPSD|34111743

CYBER ATTACK
1. Spam -is the use of electronic
messaging systems to send unwanted
bulk messages, especially advertising,
indiscriminately. A person who creates
electronic spam is called a Spammer.
2. Phishing –is done by sending you an
email that will direct the user to visit
a website and be asked to update
his/her username, password, credit
card, or personal information. Its goal TYPES OF MALWARE
is to acquire sensitive personal Malware “Malicious Software”
information is a software used or programmed by
3. Click Fraud -Occurs when user or attackers to disrupt computer operation,
individual or computer program gather sensitive information, or gain
prudently clicks on online ad without access to private computer systems.
any intention of learning more about It can appear in the form of code,
the advertiser scripts, active content, and other
4. Evil Twins -A wireless network that software.
pretends to offer trustworthy Wi-Fi VIRUS
connections to the internet A malicious program or file designed to
5. Identity Theft -Theft of personal replicate itself and transfer from one
information to impersonate someone. computer to another
6. Information Leaks -It is when * Almost all viruses are attached to an
information is revealed to the public executable file. (.exe)
or given to unauthorized user. WORMS
*May also refer to “Data Breach” Stand alone malware computer program
JOHN VON NEUMANN that replicates itself in order to spread
The first academic work on the theory of to other computers. Often, it uses a
computer viruses (although the term computer network to spread itself.
"computer virus" was not used at that TROJAN
time) was done in 1949 by John von A malicious program that is disguised as a
Neumann who gave lectures at the useful program but once downloaded or
University of Illinois about the "Theory installed leaves your PC unprotected and
and Organization of Complicated allows hacker to get your information
Automata“ Von Neumann's design for a SPYWARE
self-reproducing computer program is .Software that aids in gathering
considered the world's first computer information about a person or
virus, and he is considered to be the organization without their knowledge and
theoretical father of computer virology. that may send such information to
another entity without user’s consent
.

Downloaded by justpassingby (minyoongles9375@gmail.com)


lOMoARcPSD|34111743

KEYLOGGING COPYRIGHT
is the action of recording (or logging) the is the concept that original works belong
keys struck on akeyboard, typically in a to the people who create them, and you
covert manner so that the person using cannot use, copy, modified or publish that
the keyboard is unaware that their work without the owner's permission.
actions are being monitored.
Copyright protection includes:
ADWARE
Advertising supported software, is Motion pictures & Other audio - visual works
software that displays unwanted Architectural Works
advertisements on your computer. It uses
the browser to collect your web browsing Sound Recordings & Musical Works - Software/
history in order to 'target' Application
advertisements that seem tailored to
your interests. Pictorial, graphics & Sculptural Works - Literary
RANSOMWARE Works

Ransom software infects your computer


1. Copyright Infringement is the unlawful
and displays messages demanding a fee to
use of works protected by copyright law
be paid in order for your system to work
without permission for a usage where
again. This class of malware is a criminal
such authorization is required, thereby
moneymaking scheme that can be infringing certain exclusive rights
installed through deceptive links in an granted to the copyright holder, such as
email message, instant message or the right to reproduce, distribute, display
website. or perform the protected work, or to
1. HACKERS make derivative works.
Someone who accesses a computer 2. Intellectual Property Law deals with
system by circumventing and breaching laws to protect and enforce rights of the
its security system creators and owners of inventions,
2. HACKING writing, music, designs and other works,
known as the "intellectual property."
It is defined as showing computer
TIPS TO UNDERSTAND COPYRIGHT
expertise in achieving a goal.
INFRINGEMENT
TYPES OF HACKERS 1. Understand –Copyright protects literary
Professional Hackers works, photographs, paintings, drawings, films,
Script Kiddies music and sculptures. This means that you can
Underemployed Adult Hackers express something using your own words, but you
Ideological Hackers should give credit to the source.
Criminal Hackers 2. Be responsible –Be responsible enough to
know if something has a copyright
Corporate Spies
3. Be Creative –Ask yourself whether what
Disgruntled Employees
you are making is something that came from
you or something made from somebody else’s
creativity.
4. Know the Law –There are provisions for “Fair
Use” which mean that an intellectual property

Downloaded by justpassingby (minyoongles9375@gmail.com)


lOMoARcPSD|34111743

may be used without a consent as long as it is Check out the privacy policy page of a
used in commentaries, criticisms, search engines, website to learn how the website handles
parodies, news reports, research, library the information you have.
archiving, teaching, and education. Know the security features of the social
WHAT IS COMPUTER SECURITY
networking site you use.
Computer security refers to protecting
Do not share your password with anyone.
computer systems and information they
contain against unwanted access, Avoid logging in to Public Networks/ Wi-
modification, or destruction. Fi.
MEASURES TO PROTECT COMPUTER FILES Always browse the internet using
1. Change password frequently incognito mode.
2. Make back up copies file Do not talk to strangers online or face to
3. Use anti-virus software face.
4. Encrypt data Never post anything about a future
COMPUTER SECURITY INVOLVES vacation.
PROTECTING: Add friends you know in real life.
1. INFORMATION Avoid visiting untrusted websites.
2. HARDWARE Install and update an antivirus software
3. SOFTWARE in your computer.
4. UNAUTHORIZED USE AND
Make sure that your Wi-Fi at home has a
DAMAGE
password.
5. SABOTAGE AND NATURAL
Buy Official Software. Do not use
DISASTERS
pirated ones.
TIPS TO STAY SAFE ONLINE
Do not reply or click links from
suspicious emails
Be mindful of what you share online and
what site you share it to.
Do not just accept terms and conditions;
read it.

ICT RELATED LAWS

1. RA 4200 4. RA 8792
Anti wiretapping law Electronic commerce act
2. RA 8484
Access devices regulation act of 5. RA 9208
1998 Anti-trafficking in persons act of
3. RA 11449 2003
An act providing for additional 6. RA 9775
prohibitions to and increasing Anti-child pornography act of 2009
penalties for violations of republic
act no. 8484

Downloaded by justpassingby (minyoongles9375@gmail.com)


lOMoARcPSD|34111743

7. RA 9995
Ant-photo and voyeurism act of 10. RA 10175
2009 Cybercrime prevention act of 2012
8. RA 10173 11. RA 10844
Data privacy act of 2012 Department of information and
9. RA 10627 communications technology act of
Anti-bullying act of 2013 2015

BATCH FILES
BATCH FILE
A script file in Microsoft Windows
It consist a series of commands to be executed by CLI
Command Line Interface/ Command Line Interpreter or also known as Command Prompt
You can create a virus using batch file

Downloaded by justpassingby (minyoongles9375@gmail.com)


lOMoARcPSD|34111743

HTML
tags that tell a Web browser how to
structure it to display.

The purpose of a web browser is to read


HTML documents and display them. The
browser does
not display the HTML tags but uses them
to determine how to display the scripting
documents.
HTML STRUCTURE
An HTML document has two main parts:

The Head element contains the title and


metadata of a web document.
HTML HISTORY
1989-1990WWW was invented The Body element contains the
information that you want to display on a
1991Tim Berners-Lee invented HTML web page.

1993 HTML+ was drafted by Dave Ragget

1995HTML 2.0

1997 HTML 3.0

1999HTML 4.0

2005 We have the first version of HTML


5.0

As of 2021we are currently using HTML


5.2

WHAT IS HTML?
HTML stands for Hypertext Markup
Language, and it is the most widely used
language to write/ create Web Pages.
Hypertext refers to the way in which Web
pages (HTML documents) are linked
together. Thus, the link available on a
webpage is called Hypertext.
As its name suggests, HTML is a Markup
Language which means you use HTML to
simply "mark-up" a text document with

Downloaded by justpassingby (minyoongles9375@gmail.com)


lOMoARcPSD|34111743

The source file (src), alternative text


(alt), and size (width and height) are
provided as attributes
6. TITLE TAG
The <title> element is a required
HTML element used to assign a
title to an HTML document.

1. HTML TAG Page titles are not displayed in the


All HTML documents must start browser window, but they are used
with a type declaration: <!DOCTYPE as the page name by search engines
html>. The HTML document itself and displayed by browsers in the
begins with <html> and ends with title bar, on the page tab, and as
</html>. The visible part of the the page name of bookmarked
HTML document is between <body> webpages.
and </body> 7. PARAGRAPH TAG
2. HEAD TAG The <p> tag defines a paragraph.
The HTML <head> element is a Browsers automatically add a single blank
container for the following line before and after each <p> element.
elements: <title>, <style>, <meta>,
<link>, <script>, and <base>. 8. LINK TAG
3. BODY TAG HTML links are defined with the <a> tag:
The <body> tag defines the
document's body The <body> The link address is specified in the href
element contains all the contents attribute. Attributes are used to provide
of an HTML document, such as additional information about HTML
headings, paragraphs, images, elements.
hyperlinks, tables, lists, etc.
9. IMAGE TAG

HTML images are defined with the <img>


tag.
4. LINK TAG
The source file (src), alternative text
HTML links are defined with
(alt), and size (width and height) are
the <a> tag:
provided as attributes.
The link address is specified
in the hrefattribute.
Attributes are used to
provide additional
information about HTML
elements.
5. IMAGE TAG

ABC
HTML images are defined with
the <img> tag.

Downloaded by justpassingby (minyoongles9375@gmail.com)


lOMoARcPSD|34111743

Downloaded by justpassingby (minyoongles9375@gmail.com)

You might also like