Professional Documents
Culture Documents
ICT
Prepared By: Geraldo A. Capoy Jr.
CURRENT STATE OF
ICT
Web 1.0
Web 2.0
Web 3.0
In this stage of internet technology there were very few
web content creators and many of them were so called ‘
read only web’’.
o There were no user interaction.
o Web pages were STATIC
o The feedback mechanism was thru private email
o No direct comment available
The term Web 2.0 was used around 2004
o Internet Technology became more and more interactive.
o The internet became more available to everyone.
o The users on now interact, contribute, and create their own internet
space
and content.
WEBMASTER
User’s Contribution
BLOGS,WIKIS,RR,SS
o It is referred to as the semantic web or
data driven web content and response.
It is an evolution of technological
development that merge into two system
bringing together different types of applications
and media.
Smartphone
-as it provides functionality of various individual separate
and different devices now available in one year. It can
function as a telephone, camera ,radio, TV and gaming
console.
It is a collection of internet- based communication tools
and computer- assisted channels dedicated to allow
users to interact.
FACEBOOK
is a popular free social networking sites with more than
a billion users around the globe that allows its users to
create profiles.
With more than 300 million users in 2016
Allows users to micro logy or broadcast short
messages called ‘’tweets’’
Instragram
A social networking application that
enables the user to share mobile photo and
video either publically or privately.
Snap chat
Designed for the mobile networking application.
Also designed for photo sharing , chat,
and messaging services
Images and videos shared in this app last
only for a short time and they are gone.
Assistive Media
It is was the first internet-based reading
service
for persons with casual and reading
impairments.
Known as junk email, usually unsolicited
commercial email sent from one source with
identical
message to send to multiple recipients.
Email Spoofing
A deceitful email practice in which the sender
address is changed, so that it would appear
to have come from a different sources
usually someone you know.
Phishing
A deceitful practice of trying to get confidential
information such as passwords and usernames,
and credit card details by making it appear as
if it comes from a trust worthy source.
Pharming
A dangerous hacker attack on a
website which directs all traffic to that
web site to another fictitious website.
It is a computer program that is installed covertly
on a personal computer to collect information or
even take control over the computer without
the knowledge of the users.
Computer Worm
Some worms delete files, others disrupt
the network function and still, other
disrupt the network function and still,
other send junk mail from infected
computer.
Trojan Horse
It can erase data, can allow access of the victim’s
computer, can corrupt files ,and can be use
in Phishing.
Computer Virus
It spread like a real biological virus,
wherein it attaches it self to a host program
and
infect other computer if it is received by a
computer if it is received by a computer
through the internet.
Hacker
A person who is able to
enter the control other
people’s computer without
authorization.
Is an attempt to be more precise in
providing the list document according
to the words used by the user to
search the internet.
A good contextual search engine
would request for more information to
narrow down the result of the search.
experiment
explore
survey
wikipedia
google
Critical skill
- it is the ability to digest reflect and conclude
from the information search.
Analytical thinking
- the ability to look verbalize conceptualize
and gather data attuned to the context of
the subject.
-the ability to apply synthesis, focus and critical
thinking to extract the useful information.
Problem Solving Capability
- the ability to present solutions or solve
problems by presenting a decision based on
the given information.
-people with this ability are able to define
and identify the latitude of the problem and
present all possible solutions.
B. Pixels
-Is the smallest information of an image. Image using pixels are usually
represented on dots or squares that are arranged and added together to form the
picture.
- The word PIXEL comes from the word picture (pix) and element
(el).
Raster Image Files
- is a common formats you will encounter in the internet and with
many digital image files, such as those coming from digital cameras. The
raster image are stored as bit maps.
Examples:
J
PEG
GIF
P
NG
files
Filename Extension Description
.bmp Bitmap image file- is an image file format
developed and used on Microsoft windows
environment and is stored in a graphics File
format called device- independent bitmap and
has a file extension of .bmp or .dip. Not a
common format on the world wide web because
of its large file size.
Vector format or graphic is preferred for those who desire quality prints
and display of images.