E.T. W 12 Handouts
E.T. W 12 Handouts
E.T. W 12 Handouts
Matthew College
HIGH SCHOOL DEPARTMENT
SENIOR HIGH SCHOOL
SY 2021-2022
The term ICT, short for Information and Communication Technology, refers to the various technologies,
tools. And devices that are used to gather, create, edit, and store information that are communicated or
exchanged with others by means of electronics.
In essence, ICT generally deals with the interconnection between different technology-related platforms
such as the Internet, the software, and hardware used, the cloud, the data being exchanged, and the
transactions or the act of doing the exchange itself.
ICT includes technologies such as computers (not limited to desktop, laptop, netbook, or notebooks),
radio, television, video, DVDs, and telephones.
ICT is a result of economic and social or interpersonal transactions and interactions. It is a change
powered by the continuous revolution of the way people live, work, communicate, learn, and experience
things.
Types of Convergence
Digital convergence – It refers to the convergence of various types of data such as text, voice, video,
and graphics into digital form.
Messaging convergence – refers to the grouping of services that integrates SMS with voice.
Media Convergence – This is the concept in which old and new media intersect. It brings the 3C’s
together (computing, communication, and content). (multimedia = text, voice, animation, video)
Technology – This refers to smart phones, tablets, and the Internet made it a lot easier for users to get
access to media content.
Industry – This refers to the merging of industry leaders and players that opted to increase or diversify
their interests in the market. (Accenture = health, payments, automotive, and industrial equipment)
Social Awareness – The rise in popularity of social media sites also meant an opportunity for wider
coverage and market range through mainstream net-based communication such as social media sites
and blogging platforms.
Content convergence – It is simply defined as the portability of content which means that the content
can be mixed and matched to fit new context.
1. Identity – This block denotes the extent to which users reveal their identities in a social media setting.
This can include disclosing information such as name, age, gender, profession, location, and also
information that portrays users in certain ways.
2. Conversations - This block describes how users communicate with other users in social media setting.
3. Sharing – It is a block that defines the way users exchange, distribute, and receive content.
4. Presence – This block represents the range to which users can know if other users are accessible. Also
knowing where others are in the virtual world. (Online and Locations)
5. Relationships – The block that shows how the users can be related to others users.
6. Reputation – It characterizes the scope to which users can identify the standing of others, including
themselves, in a social media setting.
7. Groups – It is the block that shows the range on how users can form communities and sub-
communities. The more “social” a network becomes, the bigger the group of friends, followers, and
contacts.
1. Online Safety – It is also called cyber safety or digital safety which refers to practices and precautions
one should observe when using the Internet.
2. Internet Security – It encompasses the security of data entered through a web form, browser security,
and overall authentication and protection of data sent via Internet protocols.
3. Ethics – Refers to a set of moral principles that govern an individual or a group on what is considered
as acceptable or not while using the computer.
4. Netiquette – Means acceptable rules for online behaviors.
5. Mobile Learning – Learning by means of a hand-held device, such as mobile phone or a tablet.
6. Virtual Classroom – Refers to digital classroom where learning takes place.
7. Forum – A place on Internet where users with the common interests interacts.
8. Keyword – Group of words that a person may use to search for.
9. Search Engines – Search engines are software systems that people go to search.
10. Webinar – Refers to “web seminar”.
11. Wiki – A site written, controlled, and edited by the users themselves.
12. Webpage – It is a page seen by the users when browsing the Internet and can be compared to a page
in a magazine.
13. Uniform Resource Locators (URLs) – These are specific addresses of the Internet pages and files.
14. E-commerce – it is a short for electronic commerce. The act of doing business transactions online.
15. Downloading – it generally applies to the transfer of data from the Internet to the computer or mobile
devices.
16. Firewall – is a broad term used to describe a protective barrier against computer bugs or viruses.
Internet Threats
Browser hijacking – happens when malware or spyware replaces a web user’s browser homepage
that redirects the user to unwanted websites while capturing sensitive private data for personal or
business gain.
Identity theft – happens when a criminal impersonates a user by stealing his or her personal
information.
Malware – a malicious software that is intended to damage or disable computer systems which has
codes to collect information without one’s knowledge.
Pharming – is a technique which redirects a legitimate website’s traffic to an illegitimate website to
gain access to a user’s personal information
Phishing – is an e-mail or instant message scam which look like an official message from legitimate
organization like bank, company, etc.
Spam – is an irrelevant, inappropriate, unwanted, or junk e-mail or messages.
Spyware – a software that enables a user to obtain information about another’s computer activities
by transmitting data covertly to one’s hard drive. Spyware are usually bundled with other software.
Trojan horse – is a destructive program that pretends as a desirable application that tricks the user
to allow access to their computers through downloads or e-mail attachments.
Netiquettes
1. Never use computers to bash other users.
2. Do not use computers and the Internet to steal other people’s personal information.
3. Do not access files without the permission of the owner.
4. Always respect copyright laws and policies.
5. Respect the privacy of others.
6. Share expert knowledge.
7. Safeguard your user ID and password.
8. Complain about any illegal communication and activities to Internet providers or local law enforcement.
A search engine is a software system designed to search the Internet for documents related to the
keyword or search word used or entered into the system. Users are able to maximize the potential of search
engines by learning the proper searching protocols.
1. Use of keywords – Determine which keyword works best, the recommended maximum is six to eight
carefully chosen words, preferably nouns and objects.
2. Use of phrases – The most powerful keyword is a phrase, a combination of two or more words that
must be found in the documents being searched.
3. Capitalization – When searching for proper names, use capital or uppercase to narrow the search.
4. Boolean logic – is a powerful search to a reasonable number of results and increase the chance of
useful outcome. (AND, OR, and NOT).
5. Wildcards and truncation – This involves substituting symbols for certain letters of a word so that the
search engine will retrieve items with any letter in that spot in the word.
Bibliography
Revano, T. F., Empowerment Technologies. (2016). Mindshapes Co., Inc., Rm. 108, Intramuros
Corporate Plaza Bldg., Recoletos St., Manila.