You are on page 1of 44

Introduction to information and

communication technologies
Lesson 1
Information and Communication Technology
(ICT) deals with the use of different
communications technology to locate, save,
send and edit information.
If you happened to be “guilty as charged” in
those question.

You are a DIGITAL NATIVE

You are surrounded by technology


You are surrounded by ICT
Several international companies dub the
Philippines as the “ ICT Hub of Asia”
Call center BPO ( business process outsourcing)
centers
Time magazine’s is a People magazine
conducted the research on “ Selfiest Cities in
the world” and this was our country.
• Web 1.0 –Static websites without interactivity
• Web 2.0- websites that contain dynamic content.
(e.g. social networking sites, blogs, wikis, video
sharing sites, hosted services and web application.
• Web 3.0 – a concept of the World Wide Web that
designed to cater to the individual user.
• Tim Berners-Lee- created WWW.
• Hashtag – used to recognized post in website.
• Convergence – the synergy of technological
advancement to work on a similar goal or task
• Social media – websites, application, or online
channels that enable users to create, co-create,
discuss, modify, and exchange user- generated
content.
Features of Web 2.0
 Folksonomy - allows user to categorize and classify/arrange
information. e.g. tagging, twitter, instagram, facebook.
 Rich user experience – content is dynamic and responsive to
user’s input.
 User participation- the owner of the website is not the only one
who is able to put content. e.g. Amazon.com. Online stores.
 Long tail – services that offered on demand rather than on a one-
time purchase.
 Software as a service- user will subscribe to software only when
needed rather than purchasing them. e.g. Google Docs.
 Mass participation - diverse information sharing through
universal web access.
Web 3.0 the Semantic Web
• Semantic Web is a movement led by World wide web
consortium (W3C).
• Static – (flat page or stationary) refers to web pages
that are the same regardless of the user.
• Dynamic – refers to web pages that are affected by
user input or preference.
Web 3.0 problem encounters
• Compatibility
• Security
• Vastness
• Vagueness
• Logic
Trends in ICT
1. Technological convergence – is the synergy of
technological advancements to work on a similar
goal or task.
2. Social media – is a website, application, or online
channel the enables web users to create, co create,
discuss, modify, and exchange user generated
content.
Six types of Social Media
• Social Networks – these are the sites that allow you
to connect with other people with same interest or
background. Ex. FB, Google+
• Bookmarking sites – these are sites that allow you to
store and manage links to various websites and
resources. Ex. Stumble upon and Pinterest
• Social News – these are sites that allow users to post
their own news items or links. To others news
resources. Ex. Reddit, Digg
• Media sharing – these are sites that allow you to
upload and share media contents like images, music
and videos. Ex. Flicker, Youtube and Instagram
• Microblogging – these are sites that focus on short
updates from the user. Ex. Twitter and Plurck
• Blogs and forums – these websites allows user to
post their content. Ex. Blogger, Wordpress and
Tumblr
Cont. Trends in ICT

3. Mobile Technologies
The popularity of mobile phones and
tablets has taken a major rise over the year.
Several of these devices are capable of using
high-speed internet. The latest mobile devices
use 4G networking (LTE) long term evolution.
Different Mobile Operating System
• iOS – used in Apple devices such as the iPhone
and iPad.
• Android – an open source OS developed by
Google. Being open source means several
mobile phone companies use this OS for free.
• Blackberry OS – use in Blackberry device
• Windows Phone OS – a closed source and
proprietary OS developed by Microsoft
• Symbian – the original smartphones OS; used
by Nokia device.
• WebOS – originally used for smartphones;
now used for smart TVs
• Windows mobile – developed by Microsoft for
smartphones and pocket PCs
Cont. trends on ICT

4. Assistive media – a nonprofit service designed


to help people who have visual and reading
impairments.
Rules of Netiquette
Lesson 2
The internet is defined in this lesson as the
“Information Highway”.

This means that anyone can access to this


highway, can place information and grab that
information.
The internet is a public place and it is up to
you to protect your self.
Tips to stay safe online
• Be mindful of what you share online and what
site you share it to.
• Do not just accept terms and condition; read
it.
• Check out the privacy policy page of a website
to learn how website handles the information
you share.
• Know the security features of the social
networking site you use.
• Do not share your password with anyone.
• Avoid logging in to public networks/WI-FI.
Browsing in “incognito (or private) mode”.
• Do not talk to strangers whether online or
face to face.
• Never post anything about future vacation.
• Add friends you know in real life.
• Avoid visiting untrusted websites.
• Install and update an antivirus software on
your computer.
• If you have a Wi-Fi at home. Make it a private
network by adding password.
• Avoid downloading anything from untrusted
websites
• Buy software; do not use pirated one.
• Do not reply or click links from suspicious
emails.
Internet threats
1. Malware – stands for malicious software. A
malware is a set of instruction that run on
your computer and make your system do
something that an attacker wants it to do
Types of malware
a. Virus – a malicious program designed to
replicate it self and transfer from one
computer to another either through the
internet and local networks or data storage
like flash drives and CD’s.
b. Worm – a malicious program that transfer
from one computer to another by any type of
means. ex. The ILOVEYOU worm (Love Bug
worm created by a Filipino named “Onel De
Guzman” year 2000.
c. Trojan - is disguised as a useful program but
once downloaded or installed, leaves you PC
unprotected and allows hackers to get your
information.
 rogue security software – tricks the user
into posing that is a security software.
d. Spyware – a program that runs in the
background without you knowing it. It has
ability to monitor what are you doing and
typing through keylogging.
 Keyloggers – used to record the keystroke
done by the users it may steal your
password or any sensitive information. It
can record you email, messages, or any
information you type using keyboard.
e. Adware – a program designed to send you
advertisement.
Cont. internet threats

2. Spam – unwanted email mostly from bots or


advertisers. It can be used to send malware.
3. Phishing – its goal is to acquire sensitive
personal information like passwords and
credit card details
 Pharming - a more complicated way of phishing
where it exploits the DNS (Domain Name Service)
system.
Protecting Reputation Online
“Posting embarrassing over the internet
It might be last forever”
Think before you Click
• Before you post something on the web, ask these
questions to yourself
1. Would you want your parents to see it?
2. Would you want your future boss to see it? Once you
post on the web, you have no control of who sees your
posts.
3. Your friends depend on you to protect their reputation in
online.
4. Set your post to “private”
5. Avoid using names.
6. If you feel that post can affect you or other’s reputation,
ask the one who posted to pull it down.
COPYRIGHT
• A part of the law, wherein you have the rights
to your work, and anyone who uses it without
your consent in punishable by law.
• the exclusive legal right to reproduce, publish,
sell, or distribute the matter and form of
something (as a literary, musical, or artistic
work)
INFRINGEMENT
• an trespass on a right or privilege
COPYRIGHT PAGE
• “No part of this book may be copied,
reproduced…”
Tips to avoid copyright infringement
• Understand- copyright protects literary works,
photograph, painting, drawings, films, music and
lyrics, choreography, and sculptures.
• Be responsible – enough to know if something
has copyright.
• Be creative – it is important to add your own
creative genius in everything that will be credited
to you.
• Know the law – there are some limitations to
copyright laws, in the Philippines, copyrights only
last lifetime (of the author) plus 50 years.
Fair use
• An intellectual property maybe use without a
consent as long as it used in commentaries,
criticism, search engines, parodies, news
reports, research, library archiving, teaching
and education.
Quick Copyright Tips
• Limit use of copyrighted materials to your
classroom
• Give proper credit
• When in doubt, get permission
• Use web whacker software carefully
• Assume it’s copy written!
Tips in conducting Online research
1. Have a question in mind – focus on question you
want answered.
2. Narrow it down – use several filters to determine
the most appropriate results to you.
3. Advanced search – this allow you to filter out
information you do not need.
4. Look for the credible source –
5. Give credit – if you are going to use the information
from source for educational purposes.
• Cybercrime – a crime committed or assisted
through the use of the internet.
• Privacy policy – tells the user how the website
will handle its data.
1) What is a cyber crime?
A cybercrime is a crime committed with or through the use
of information and communication technologies such as
radio, television, cellular phone, computer and network,
and other communication device or application.

2) How is a cybercrime different from a real-world crime?


The main difference between a cybercrime and crime
committed in the physical world is that cybercrime is
committed with or through the use of information and
communication technology. Furthermore, cybercrimes are
punishable under special cybercrime laws and subject to
distinct law enforcement provisions.
3) What are the types of cybercrime?

There are various types and kinds of cybercrimes. The


2001Budapest Convention on Cybercrime
categorizes cybercrime offenses into four:
(1) offences against the confidentiality,
integrity and availability of computer data and
systems;
(2) computer-related offences;
(3) content-related offences; and
(4) offences related to infringements of copyright and
related rights.
3) What are the cybercrime-related laws in the Philippines?

The cybercrime-related laws in the country are:


a) RA 10175 – Cybercrime Prevention Act of 2012.
b) RA 9995 - Anti-Photo and Voyeurism Act of 2009;
c) RA 9725 - Anti-Child Pornography Act of 2009;
d) RA 9208 - Anti-Trafficking in Persons Act of 2003;
e) RA 8792 - E-Commerce Act of 2000; (6) RA 8484 -
Access Device Regulation Act of 1998; and
f) RA 4200 or Anti- Wiretapping Law.

You might also like