Et Week 1
Et Week 1
Et Week 1
EMPOWERMENT TECHNOLOGIES B I U
Information and
Communication
Technology
INFORMATION AND
COMMUNICATION TECHNOLOGY
Information and
Communications Technology
(ICT) deals with the use of
different communication
technologies such as mobile
phones, telephone,
internet, etc. to locate,
save, send, and edit
information.
INFORMATION AND
COMMUNICATION TECHNOLOGIES
TIM BERNERS-LEE
INFORMATION AND
COMMUNICATION TECHNOLOGIES
1. WEB 1.0
3. WEB 3.0
INFORMATION AND
COMMUNICATION TECHNOLOGIES
TRENDS IN ICT
1.Convergent technologies
The synergy of technological
- An extension of the
advancements to work on a
term convergence, which means
similar goal or task. For
a “coming together of two or
example, besides using your
more disparate disciplines or
personal computer to create
technologies. For example,
word documents, we can use
the so-called fax revolution
our smartphones. Using
was produced by a convergence
several technologies to
of telecommunications
accomplish a task
technology, optical scanning
conveniently.
technology, and printing
technology.”
INFORMATION AND
COMMUNICATION TECHNOLOGY
TRENDS IN ICT
Type of Social Media
2. Social Media – an
application and website A. Social Network – A
where user can website where people with
communicate, create and the same interests come
share content, and together to share
participate in online information. Examples:
communities. Twitter, Instagram,
Facebook
INFORMATION AND
COMMUNICATION TECHNOLOGY
TRENDS IN ICT
B. Social News – A C. Bookmarking Sites – A
website where user can website that allows you
post stories/news content to share and store
and are ranked based on internet bookmarks,
the popularity through articles, posts, blogs,
voting. Examples: Digg, images and others.
Reddit, Propeller, Examples: Pinterest,
Slashdot, Fark StumbleUpon, Dribble
INFORMATION AND
COMMUNICATION TECHNOLOGY
TRENDS IN ICT
TRENDS IN ICT
3.Mobile technologies
F. Blogs and Forums – a
- This refers to
discussion website that
“media devices such as
allows user to ask
mobile phones and PDA’s
questions and comments on
(Personal Digital
a journal posted by an
Assistance) were the
individual or group.
primary source of portable
Examples: Wordpress,
media from which we could
Blogger obtain information and
communicate with one
another.
INFORMATION AND
COMMUNICATION TECHNOLOGIES
CYBERBULLYING
CYBER STALKING
RISK SEXTING
Tips on how to stay safe online, here are some tips to ponder.
1.Be mindful of what you share online and what site you share it
to.
2.Do not just accept terms and conditions; read it.
3.Check out the privacy policy page of a website to learn how the
website handles the information you share.
4.Know the security features of the social networking site you
use. By keeping your profile private, search engines will not be
able to scan your profile.
5.Do not share your password with anyone.
6.Avoid logging in to public networks/WiFi. Browsing in
“incognito (or private) mode” a feature of the browser, will not
protect you from hackers.
INFORMATION AND
COMMUNICATION TECHNOLOGIES
MALWARE
- stands for malicious software
- Is a software used or created to
disrupt computer operation, gather
sensitive information, or gain access to
private computer systems.
- It can appear in the form of code,
scripts, active content, and other
software.
- Malware' is a general term used to
refer to a variety of forms of hostile,
intrusive, or annoying software.
INFORMATION AND
COMMUNICATION TECHNOLOGIES
Netiquette
It is a word that came from the two words “net”
and “etiquette”. It is an etiquette applied
online that shows proper manner and behavior. If
you are a member of an online society through
social media, you are called netizen. Interacting
with other netizens online, we need to maintain
good behavior which is acceptable to others in
the online community.
Contextualized
online search and
research skills
INFORMATION AND
COMMUNICATION TECHNOLOGIES
Internet research
It is a research method in
collecting and gathering
information via Internet by
using search engine such as
google.
ONLINE RESEARCH
The information we need is more likely already on the Internet. It is
just a matter of how to look for it and how to use information from
the most credible source. Here are some tips in conducting online
search.
1.Have a question in mind – Focus on a question you want answered. If
it is series of questions, start with one. Never search everything on
one go.
2.Narrow it down – Search engines like Google, Bing, or Yahoo use
several filters to determine the most appropriate result for you.
These search engines use your previous search history and your
geographical location, and send you the result which is the most
related to you.
3.Advance search – The best way to filter information you get from
search engines is by using the advanced search. This will allow you
to filter out information you do not need.
INFORMATION AND
COMMUNICATION TECHNOLOGIES
Example:
Limer, E. (2013, October 1). Heck yes! The first free wireless
plan is finally here. Retrieved from http://gizmodo.com/heck-
yes-the-first-free-wireless-plan-is-finally-here
EMPOWERMENT TECHNOLOGIES B I U
INFORMATION AND
COMMUNICATION TECHNOLOGY
COPYRIGHT
INFRINGEMENT
Copyright infringement is the use
or production of copyright-
protected material without the
permission of the copyright holder.
Copyright infringement means that
the rights afforded to the
copyright holder, such as the
exclusive use of a work for a set
period, are being breached by a
third party.
INFORMATION AND
COMMUNICATION TECHNOLOGIES
FAIR USE
Fair use is the use of
copyrighted material for
comment, teaching,
criticism, news
reporting, research,
scholarship, and another
similar purpose is not
an infringement of
copyright.
File Edit Format View
EMPOWERMENT TECHNOLOGIES B I U
ACTIVITIES
LET US TEST YOUR LEARNING!
INFORMATION AND
COMMUNICATION TECHNOLOGIES
Thank You!
Do you have any questions?