This document provides an overview of current information and communication technologies (ICT). It discusses the evolution from static Web 1.0 pages to dynamic Web 2.0 pages that allow user interaction and participation. Key characteristics of Web 2.0 include folksonomies, rich user experience, user participation, and long tail services. Web 3.0 is described as focusing on semantic understanding of data to provide personalized results. Social media, assistive media, mobile technology, and convergence trends in ICT are also summarized. The document concludes with tips for staying safe online through secure password practices and protecting private information.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
7 views
Lesson 1
This document provides an overview of current information and communication technologies (ICT). It discusses the evolution from static Web 1.0 pages to dynamic Web 2.0 pages that allow user interaction and participation. Key characteristics of Web 2.0 include folksonomies, rich user experience, user participation, and long tail services. Web 3.0 is described as focusing on semantic understanding of data to provide personalized results. Social media, assistive media, mobile technology, and convergence trends in ICT are also summarized. The document concludes with tips for staying safe online through secure password practices and protecting private information.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9
Lesson 1 -the page “as is” and cannot be
CURRENT STATE OF ICT
manipulated by the user
ICT- information communication WEB 2.0- It is a DYNAMIC WEB
technology. PAGES wherein allows the users to interact with the page: instead Information and communication of just reading a page, the user Technology- It deals with the use may be able to comment or of different communication create a user account. technologies such as mobile phones, internet and etc. to -Provide rich user experience, locate, save, send and edit user participation, dynamic information. content, metadata, web standards and scalability. -having unified way to communicate is one of the goals -Other characteristics such as of ICT. We spend less because of openness, freedom and collective ICT intelligence by the way of user participation can also viewed as World wide web- commonly essential attribute. referred to as WWW, W3 is an interconnected system of public Features of web 2.0 web pages accessible through the 1. FOLKSONOMY- Allows internet. user to categorize and -It was invented Sir Tim Berners classify/arrange Lee in 1989 information using freely chosen keywords (e.g., -Web pages are what make up the Tagging). Popular social world wide web and it can either networking sites such as static or dynamic. Twitter, Instagram and Web 1.0- It is a static web pages Facebook. also known as flat page or stationary page. 2. RICH USER EXPERIENCE- Content is dynamic and is responsive to user's input. An example would be a 5. MASS PARTICIPATION - website that shows local Diverse information content. In the case of sharing through universal social networking sites, web access since most when logged on, your users can use the Internet, account is used to modify Web 2.0's content is based what you see in their on people from various website. cultures WEB 3.0- SEMANTIC WEB, 3. USER PARTICIPATION- The third generation of internet owner is not the only one services for websites and who is able to put content. applications that will focus on Others are able to place a using a machine-based content of their own by understanding of data to means of comments, provide a data-driven and reviews, and evaluation. Semantic Web 4. LONG TAIL- Services that - The Internet is able to are offered on demand predict the best possible rather than on a onetime answers to your question by purchase. In certain cases, "learning from your previous time-based pricing is better choices." than file size-based pricing CHARACTERISTICS OF or vice versa. 3.0 -Users will subscribe to a INTELLIGENCE -Applications of software only when Web 3.0 is incorporated with needed rather than different artificial intelligence purchasing them. This is a tools and techniques which cheaper option if you do means that it can directly do not always need to use a intelligent analysis with software possible finest output even without much human SOCIAL MEDIA- enables web intervention. users to create, co-create, discuss, modify and exchange PERSONALIZATION- Personal user-generated and individual preferences of the user is considered during SIX TYPES OF SOCIAL MEDIA information processing, search SOCIAL NETWORK and information of SOCIALNEWS personalized portal on the web MICROBLOGGING INTEROPERABILITY- BOOKMARKING SITES Applications on Web 3.0 are MEDIASHARING easy to customize and can BLOGS & FORUMS independently work on different kinds of devices ASSISTIVE MEDIA- a service designed to help people who have "ERABILITY Applications on visual and reading impairments. Web 3.0 are easy to customize and can independently work MOBILE TECHNOLOGY- these on different kinds of devices. devices are capable of using high- speed internet and has a VISUALIZATION- It uses high capability to do tasks that were end of three-dimensional originally found in personal graphics to create a 3D computer environment for 3D web application. DIFFERENT OPERATING SYSTEMS OF MOBILE DEVICE TRENDS IN ICT IOS CONVERGENCE- a synergy of BLACKBERRY OS technological advancement to SYMBIAN work on similar goal or task. WINDOWS MOBILE social media enables web ANDROID users to create, co-create, WINDOWS Phone discuss, modify and exchange WEB OS user-generated. WEB BASED the electronic network. primarily INFORMATION SYSTEMS the internet & PLATFORMS EXTRANET- is a controlled private network that allows customers. WEB BASED INFORMATION partners, vendors. suppliers and SYSTEMS- is an information other businesses gain system that uses internet web information. typically about a technologies to deliver specific company or educational information and services to users institution and do so without or other information granting access to the systems/application. organization's entire network. TYPES OF W.I.S Online Safety, Security, INTRANET- a network based on Ethics & Etiquette tcp/ip protocols belonging to an organization. usually a TIPS TO STAY SAFE ONLINE corporation. accessible only by the Be mindful of what you organization's members. share online and what site employees or others with you share it to. authorization and are used to Do not just accept terms share information and conditions;read it. WEB PRESENCE- is an individual Check out the privacy or business having an established policy of a website to learn existence in the www. through a how the website handles website. email, advertising. blog or the information you share. a collection of web files. Know the security features of the social networking ELECTRONIC COMMERCE- a site you can use. By systems that support consumer Keeping your profile interactions that are usually private, search engines will related to buying and selling of not be able to scan your goods and services, or the profile. transmitting of funds or data over Do not share your * Buy the software: do not password to anyone * use pirated ones. * Do not Avoid logging in to public reply or click links from networks / WiFi. Browsing suspicious emails. "incognito" will not protect Create a smart and strong you from hackers. password and Never give Do not talk to strangers out your password. whether online or face to Use e-mail wisely. Be face. careful on what Never post anything about information you put online a future vacation. It is and never send any of similar to posting "Rob my your private information house at this date." via e-mail. Add friends you know in Be smart when using real life. instant messaging Avoid visiting untrusted application. Protect websites. yourself by using your Install and update an nicknames as screen name antivirus software on your and never accept strangers computer. Use only one on your IM Group anti-virus software to avoid As much as possible never conflicts post complete identity If you have Wi-Fi at home. information such as cell make it a private network phone number, home by adding a password. address, and any Avoid downloading information that may be anything from untrusted used against your will. websites. You are most Shop safely. Make sure vulnerable in peer-to-peer that the website uses a downloads (torrents) as secure technology feature. the download is most likelu Verify if it begins with an not monitored bu the site https web address. owner. * Think carefully before unauthorized access to a posting a picture or a video computer system. of yourself. Malicious - Software When you see something worrisome or when you Types of Malware feel uncomfortable and uncomfortable and unsafe, Virus- A malicious program to leave the website replicate itself and transfer immediately. from one to another by means of internet, local networks or NETIQUETTES data storage's. Some computer viruses are • Never use computers to programmed to harm your bash other users computer by damaging • Do not steal other programs. people's personal information Worm- A program that • Do not access a files transfers from one PC to without the permission of another. Often it uses the owner computer network to spread • Always respect copyright itself. Sometimes a computer law and policies worm's purpose is only to • Respect the privacy of make copies of itself over and others over • Share expert knowledge Trojan- A malicious program • Safeguard your user ID and that is disguised as a useful Password program but once • Complain about any illegal downloaded or installed. Your Communication and pc will left unprotected and Activities allows hacker to get your Malware Software- that is information. specifically designed to Rogue Security Software- disrupt, damage, or gain Tricks the user into posting that it is a security software. It asks the user to pay to currently doing and typing improve his/her security but in through key-logging. reality they are not protected Types of Spyware at all. Keyloggers -Used to record SPAM- Unwanted emails the keystroke done by the mostly from bots or users. This is done to steal advertisers. It can be used to their password or any other send malware's as well. sensitive information. It can PHISHING- Its goal is to record email, messages, or acquire sensitive personal any information you type information like passwords using your keyboard. and bank account details. This Adware- A program designed is done by sending you an to send you advertisements, email that will direct the user mostly as pop-ups. to visit a website and be asked to update his/her username, Protecting Reputation Online- password, credit card or Once you post something over personal information. the internet, search engines keep them in their archives for PHARMING - A more search results. This makes complicated way of phishing anything you post to last where it exploits the DNS forever even if you delete it in (Domain Name Service) your page. Some you and your System. is a technique which friends find funny today may redirects a legitimate website's be something that could harm traffic to an illegitimate someone's reputation later. website to gain access to a user's personal information. Think before you Click- Before you post something on SPYWARE- A program that the web, ask these questions runs in the background to yourself: Would you want without you knowing it (thus your family members to see called "spy") it has the ability it? Would you want your to monitor what you are future boss to see it? Once you anyone who uses it post something on the web, without your consent is you have no control of who punishable by law. sees your posts. Think before Tips that could help you you Click avoid Copyright • Your friends depend on Infringement you to protect their reputation online. Talk to • Understand - Copyright your friends about this protects literary works and serious responsibility. almost all the medias in • Set your post to "private." the internet. Give credits In this way, search engines to the source. will not be able to scan • Be Responsible - if that post. something has a copyright. • Avoid using names. Names • Be Creative - Ask our self are easy for search engines whether what you are to scan. making is something that • If you feel that a post can came from you or made affect you or the other's from somebody else's reputation, ask the one creativity. Tips that could who posted it to pull it help you avoid Copyright down or report it as Infringement inappropriate. Copyright • Know the Law - There are Infringement some limitations to • INTELLECTUAL PROPERTY - copyright. an idea, an invention, a • Fair use - An intellectual form of literary work, or property may be used research, which you have without consent as long as the rights as to how it it is used in commentaries, should be used by other. In criticisms, parodies, news other words, the copyright report, teaching and law includes your rights education. Always seek for over your work, and permission upon using a content.