Professional Documents
Culture Documents
[MULTIMEDIA]
Multimedia
- use of a computer to present and combine text, graphics, audio, and video with links and tools that let the
user navigate, interact, create, and communicate.
MULTIMEDIA CONTENT
1. VIDEOS
- Through video hosting sites, you can take a video and show it to the entire world.
2. SOUND, MUSIC, OR AUDIO
- If videos are too much for you, you can always record sounds. You can now share your entire bites to
the world.
3. ONLINE GAMES
- Games developers now create what is called “browser-based games.”
ONLINE TESTS
- Online survey forms and tests that automatically display the results when finished.
4. COURSEWARE
- Online courses that simulate the classroom online.
5. PODCASTS
- An episodic series of audio or text files streamed online.
6. VODCASTS
- An episodic series of video streamed online.
EDSA
Ferdinand Marcos - Radio Station (Radio Veritas)
1983-1986 - 24 Hour AM
February 22-25, 1986 - Roman Catholic Church (Cardinal Sin)
EDSA DOS
Joseph |Estrada - Mobile Phones (Text Brigates)
January 17-20, 2001
CHANGE.ORG
Create and sign a petition.
CHANGE.ORG
- A website that contains campaigns for social change.
- Is dubbed as the “WORLD’S PLATFORM FOR CHANGE”.
- Is an online petition platform that allows the online community to create or sign a petition.
Mission: Its mission is to help people from around the world create the change they want to see.
CONCEPT PAPER
a document used to convince a panel of potential funders to help a product, program, or service become
a reality.
S - Specific
M - Measurable
A - Attainable
R - Realistic
T - Time-bounded
4. The Peacocks
- popularity contest, high numbers of followers, fans, likes and retweets. (1 out of 10 Twitter users
want more followers than friends.)
5. The Lurkers
- hiding in the shadows of cyberspace. Watches what others are saying, but rarely (if ever) participate
themselves. (45% of Facebook users described themselves as "observers")
6. The Ranters
- mock and mid in face-to-face conversations. Highly opinionated online.
7. The Changelings
- adopt completely new personality online so no one knows their real identities.
8. The Ghosts
- create anonymous profiles, for fear of giving out personal information to strangers.
9. The Informers
- seek admiration by being the first to share the latest trends with audiences.
GOOGLE FORM
- Allow the audience to answer a set of questions you have set. These are also used to get user’s
feedback.
STEPS IN CREATING GOOGLE FORM
1. Open your browser and go to drive.google.com
2. Sign in or create an account.
3. On the left-hand side of your My Drive page, click New>More>Google Forms.
4. You will be taken to Google Forms interface.
CYBERCRIMES
- illegal acts done through the use of the internet.
- In 2012, Stephen Nale (complex.com) posted a list of ten most common Internet cybercrimes as
follows:
a. PHISHING/ SPOOFING - the act of sending multiple emails to multiple users in hopes of having a
number of them clicking on the links or malwares attached to the email.
b. BLACKMAIL/ EXTORTION - the act of using internet to threaten or damage someone’s reputation
to extort money or anything else of value.
c. ACCESSING STORED COMMUNICATIONS - or hacking; the of act of obtaining unauthorized access
to data from a computer network.
d. SPORTS BETTING - the act of wagering on any sports event over the Internet.
e. NON-DELIVERY OF MERCHANDISE - the act of devising a scheme wherein a culprit posts an item
or service for sale on the Internet and once the transactions have been done, does not really give
the item or service.
f. ELECTRONIC HARRASSMENT - the act of anonymously using the internet to harass, abuse,
threaten, or annoy other people. This is also an act of cyberbullying, however because the culprit
is anonymous, it is hard to detect who is bullying you.
g. CHILD PORNOGRAPHY - the act of using the internet to show child pornography. This is act is
highly punishable by law.
h. PROSTITUTION - the act of using the internet to engage in prostitution.
i. DRUG TRAFFICKING -
j. CRIMINAL COPYRIGHT INFRINGEMENT - the act of piracy mainly for financial gain.
COMBATTING CYBERCRIMES
a. NETWORK SECURITY
- The hacker has to get through several security measures like firewalls, secure connections,
passwords, antimalware, and data encryptions.
b. INVESTIGATION
- URL tracing and logging are used by websites to track your unique IP addresses.
c. PENALTIES
- More and more laws are being created and implemented today. Penalties include both fine and
imprisonment