0% found this document useful (0 votes)
7 views

Lesson 1

This document provides an overview of current information and communication technologies (ICT). It discusses the evolution from static Web 1.0 pages to dynamic Web 2.0 pages that allow user interaction and participation. Key characteristics of Web 2.0 include folksonomies, rich user experience, user participation, and long tail services. Web 3.0 is described as focusing on semantic understanding of data to provide personalized results. Social media, assistive media, mobile technology, and convergence trends in ICT are also summarized. The document concludes with tips for staying safe online through secure password practices and protecting private information.

Uploaded by

Nova Gaming
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Lesson 1

This document provides an overview of current information and communication technologies (ICT). It discusses the evolution from static Web 1.0 pages to dynamic Web 2.0 pages that allow user interaction and participation. Key characteristics of Web 2.0 include folksonomies, rich user experience, user participation, and long tail services. Web 3.0 is described as focusing on semantic understanding of data to provide personalized results. Social media, assistive media, mobile technology, and convergence trends in ICT are also summarized. The document concludes with tips for staying safe online through secure password practices and protecting private information.

Uploaded by

Nova Gaming
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Lesson 1 -the page “as is” and cannot be

CURRENT STATE OF ICT


manipulated by the user

ICT- information communication WEB 2.0- It is a DYNAMIC WEB


technology. PAGES wherein allows the users
to interact with the page: instead
Information and communication of just reading a page, the user
Technology- It deals with the use may be able to comment or
of different communication create a user account.
technologies such as mobile
phones, internet and etc. to -Provide rich user experience,
locate, save, send and edit user participation, dynamic
information. content, metadata, web standards
and scalability.
-having unified way to
communicate is one of the goals -Other characteristics such as
of ICT. We spend less because of openness, freedom and collective
ICT intelligence by the way of user
participation can also viewed as
World wide web- commonly essential attribute.
referred to as WWW, W3 is an
interconnected system of public Features of web 2.0
web pages accessible through the 1. FOLKSONOMY- Allows
internet. user to categorize and
-It was invented Sir Tim Berners classify/arrange
Lee in 1989 information using freely
chosen keywords (e.g.,
-Web pages are what make up the Tagging). Popular social
world wide web and it can either networking sites such as
static or dynamic. Twitter, Instagram and
Web 1.0- It is a static web pages Facebook.
also known as flat page or
stationary page. 2. RICH USER EXPERIENCE-
Content is dynamic and is
responsive to user's input.
An example would be a 5. MASS PARTICIPATION -
website that shows local Diverse information
content. In the case of sharing through universal
social networking sites, web access since most
when logged on, your users can use the Internet,
account is used to modify Web 2.0's content is based
what you see in their on people from various
website. cultures
WEB 3.0- SEMANTIC WEB,
3. USER PARTICIPATION- The
third generation of internet
owner is not the only one
services for websites and
who is able to put content.
applications that will focus on
Others are able to place a
using a machine-based
content of their own by
understanding of data to
means of comments,
provide a data-driven and
reviews, and evaluation.
Semantic Web
4. LONG TAIL- Services that - The Internet is able to
are offered on demand predict the best possible
rather than on a onetime answers to your question by
purchase. In certain cases, "learning from your previous
time-based pricing is better choices."
than file size-based pricing
CHARACTERISTICS OF
or vice versa.
3.0
-Users will subscribe to a INTELLIGENCE -Applications of
software only when Web 3.0 is incorporated with
needed rather than different artificial intelligence
purchasing them. This is a tools and techniques which
cheaper option if you do means that it can directly do
not always need to use a intelligent analysis with
software possible finest output even
without much human SOCIAL MEDIA- enables web
intervention. users to create, co-create,
discuss, modify and exchange
PERSONALIZATION- Personal
user-generated
and individual preferences of
the user is considered during SIX TYPES OF SOCIAL MEDIA
information processing, search
 SOCIAL NETWORK
and information of
 SOCIALNEWS
personalized portal on the web
 MICROBLOGGING
INTEROPERABILITY-  BOOKMARKING SITES
Applications on Web 3.0 are  MEDIASHARING
easy to customize and can  BLOGS & FORUMS
independently work on
different kinds of devices ASSISTIVE MEDIA- a service
designed to help people who have
"ERABILITY Applications on visual and reading impairments.
Web 3.0 are easy to customize
and can independently work MOBILE TECHNOLOGY- these
on different kinds of devices. devices are capable of using high-
speed internet and has a
VISUALIZATION- It uses high capability to do tasks that were
end of three-dimensional originally found in personal
graphics to create a 3D computer
environment for 3D web
application. DIFFERENT OPERATING SYSTEMS
OF MOBILE DEVICE
TRENDS IN ICT
 IOS
CONVERGENCE- a synergy of  BLACKBERRY OS
technological advancement to  SYMBIAN
work on similar goal or task.  WINDOWS MOBILE
social media enables web  ANDROID
users to create, co-create,  WINDOWS Phone
discuss, modify and exchange  WEB OS
user-generated.
WEB BASED the electronic network. primarily
INFORMATION SYSTEMS the internet
& PLATFORMS EXTRANET- is a controlled private
network that allows customers.
WEB BASED INFORMATION
partners, vendors. suppliers and
SYSTEMS- is an information
other businesses gain
system that uses internet web
information. typically about a
technologies to deliver
specific company or educational
information and services to users
institution and do so without
or other information
granting access to the
systems/application.
organization's entire network.
TYPES OF W.I.S
Online Safety, Security,
INTRANET- a network based on Ethics & Etiquette
tcp/ip protocols belonging to an
organization. usually a TIPS TO STAY SAFE ONLINE
corporation. accessible only by the  Be mindful of what you
organization's members. share online and what site
employees or others with you share it to.
authorization and are used to  Do not just accept terms
share information and conditions;read it.
WEB PRESENCE- is an individual  Check out the privacy
or business having an established policy of a website to learn
existence in the www. through a how the website handles
website. email, advertising. blog or the information you share.
a collection of web files.  Know the security features
of the social networking
ELECTRONIC COMMERCE- a site you can use. By
systems that support consumer Keeping your profile
interactions that are usually private, search engines will
related to buying and selling of not be able to scan your
goods and services, or the profile.
transmitting of funds or data over
 Do not share your  * Buy the software: do not
password to anyone * use pirated ones. * Do not
Avoid logging in to public reply or click links from
networks / WiFi. Browsing suspicious emails.
"incognito" will not protect  Create a smart and strong
you from hackers. password and Never give
 Do not talk to strangers out your password.
whether online or face to  Use e-mail wisely. Be
face. careful on what
 Never post anything about information you put online
a future vacation. It is and never send any of
similar to posting "Rob my your private information
house at this date." via e-mail.
 Add friends you know in  Be smart when using
real life. instant messaging
 Avoid visiting untrusted application. Protect
websites. yourself by using your
 Install and update an nicknames as screen name
antivirus software on your and never accept strangers
computer. Use only one on your IM Group
anti-virus software to avoid  As much as possible never
conflicts post complete identity
 If you have Wi-Fi at home. information such as cell
make it a private network phone number, home
by adding a password. address, and any
 Avoid downloading information that may be
anything from untrusted used against your will.
websites. You are most  Shop safely. Make sure
vulnerable in peer-to-peer that the website uses a
downloads (torrents) as secure technology feature.
the download is most likelu Verify if it begins with an
not monitored bu the site https web address.
owner. *
 Think carefully before unauthorized access to a
posting a picture or a video computer system.
of yourself.
Malicious - Software
 When you see something
worrisome or when you Types of Malware
feel uncomfortable and
uncomfortable and unsafe, Virus- A malicious program to
leave the website replicate itself and transfer
immediately. from one to another by means
of internet, local networks or
NETIQUETTES data storage's. Some
computer viruses are
• Never use computers to
programmed to harm your
bash other users
computer by damaging
• Do not steal other
programs.
people's personal
information Worm- A program that
• Do not access a files transfers from one PC to
without the permission of another. Often it uses
the owner computer network to spread
• Always respect copyright itself. Sometimes a computer
law and policies worm's purpose is only to
• Respect the privacy of make copies of itself over and
others over
• Share expert knowledge
Trojan- A malicious program
• Safeguard your user ID and
that is disguised as a useful
Password
program but once
• Complain about any illegal
downloaded or installed. Your
Communication and
pc will left unprotected and
Activities
allows hacker to get your
Malware Software- that is information.
specifically designed to
Rogue Security Software-
disrupt, damage, or gain
Tricks the user into posting
that it is a security software. It
asks the user to pay to currently doing and typing
improve his/her security but in through key-logging.
reality they are not protected
Types of Spyware
at all.
Keyloggers -Used to record
SPAM- Unwanted emails
the keystroke done by the
mostly from bots or
users. This is done to steal
advertisers. It can be used to
their password or any other
send malware's as well.
sensitive information. It can
PHISHING- Its goal is to record email, messages, or
acquire sensitive personal any information you type
information like passwords using your keyboard.
and bank account details. This
Adware- A program designed
is done by sending you an
to send you advertisements,
email that will direct the user
mostly as pop-ups.
to visit a website and be asked
to update his/her username, Protecting Reputation Online-
password, credit card or Once you post something over
personal information. the internet, search engines
keep them in their archives for
PHARMING - A more
search results. This makes
complicated way of phishing
anything you post to last
where it exploits the DNS
forever even if you delete it in
(Domain Name Service)
your page. Some you and your
System. is a technique which
friends find funny today may
redirects a legitimate website's
be something that could harm
traffic to an illegitimate
someone's reputation later.
website to gain access to a
user's personal information. Think before you Click-
Before you post something on
SPYWARE- A program that
the web, ask these questions
runs in the background
to yourself: Would you want
without you knowing it (thus
your family members to see
called "spy") it has the ability
it? Would you want your
to monitor what you are
future boss to see it? Once you anyone who uses it
post something on the web, without your consent is
you have no control of who punishable by law.
sees your posts. Think before
Tips that could help you
you Click
avoid Copyright
• Your friends depend on
Infringement
you to protect their
reputation online. Talk to • Understand - Copyright
your friends about this protects literary works and
serious responsibility. almost all the medias in
• Set your post to "private." the internet. Give credits
In this way, search engines to the source.
will not be able to scan • Be Responsible - if
that post. something has a copyright.
• Avoid using names. Names • Be Creative - Ask our self
are easy for search engines whether what you are
to scan. making is something that
• If you feel that a post can came from you or made
affect you or the other's from somebody else's
reputation, ask the one creativity. Tips that could
who posted it to pull it help you avoid Copyright
down or report it as Infringement
inappropriate. Copyright • Know the Law - There are
Infringement some limitations to
• INTELLECTUAL PROPERTY - copyright.
an idea, an invention, a • Fair use - An intellectual
form of literary work, or property may be used
research, which you have without consent as long as
the rights as to how it it is used in commentaries,
should be used by other. In criticisms, parodies, news
other words, the copyright report, teaching and
law includes your rights education. Always seek for
over your work, and
permission upon using a
content.

You might also like