0% found this document useful (0 votes)
23 views4 pages

EMPOWERWENT TECHNOLOGIES Week 1 and 2

The document discusses key concepts related to information and communication technology (ICT). It defines ICT as using technologies like mobile phones, internet, and telephone to locate, save, and edit information. Famous pioneers who advanced ICT are discussed, including Bill Gates, Steve Jobs, and Tim Berners-Lee who invented the World Wide Web. Trends in the Philippines related to increasing ICT usage are more jobs in the sector, higher smartphone ownership, and easier access to information online. Core concepts about the internet, websites, browsers and the evolution from Web 1.0 to 2.0 are explained. Web 3.0 and the semantic web are noted to not be fully realized. The document concludes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views4 pages

EMPOWERWENT TECHNOLOGIES Week 1 and 2

The document discusses key concepts related to information and communication technology (ICT). It defines ICT as using technologies like mobile phones, internet, and telephone to locate, save, and edit information. Famous pioneers who advanced ICT are discussed, including Bill Gates, Steve Jobs, and Tim Berners-Lee who invented the World Wide Web. Trends in the Philippines related to increasing ICT usage are more jobs in the sector, higher smartphone ownership, and easier access to information online. Core concepts about the internet, websites, browsers and the evolution from Web 1.0 to 2.0 are explained. Web 3.0 and the semantic web are noted to not be fully realized. The document concludes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

EMPOWERWENT TECHNOLOGIES

WEEK 1 and 2

WHAT THEN IS ICT?


It deals with the use of different communication technologies such as mobile phones, telephone, Internet, etc. to locate,
save, and edit information. When we make a video call, we use the Internet. When we send a text or make a call, we
use cellular networks.

FAMOUS PERSONALITIES BEHIND THE ICT


a. BILL GATES – He introduced Microsoft
b. STEVE JOBS – He introduced Apple
c. MARK ZUCKERBERG – He pioneered Facebook and later bought Instagram
d. MARTHA LANE FOX – developed last-minute.com., an online booking site for airlines, hotels, restaurant and
everything under the sun. Her website relied heavily on online systems which other websites soon followed suit.
e. TIM BERNERS-LEE – invented the World Wide Web, an Internet-based hypermedia initiative for global information
sharing.

ICT IN THE PHILIPPINES


• More ICT-related jobs and companies are established.
• Owning multiple phones/gadgets at the same time.
• Increase in text messages, chat messages and emails sent each day.
• Different services, news and new information are easily access through the internet.
• A lot of selfies are taken and posted in social media each day.

WHAT IS INTERNET?
• Is the global system of interconnected computer networks that use the Internet protocol suite to link billions of devices
worldwide;
• Means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers.
WHAT IS WORLD WIDE WEB (WWW)?
• Is an information space where documents and other web resources are identified by URLs, interlinked by hypertext
links, and can be accessed via the Internet.
• Invented by Tim-Berners Lee.

Examples of WWW
1. www.google.com
2. www.facebook.com
3. www.youtube.com

WHAT IS WEB PAGE?


• Web page is a hypertext document connected to the World Wide Web.
• It is a document that is suitable for the World Wide Web.

WHAT IS WEBSITE?
• A location connected to the Internet that maintains one or more pages on the World Wide Web.
• It is a related collection of World Wide Web (WWW) files that includes a beginning file located a home page.

WHAT IS WEB BROWSER?


• It displays a web page on a monitor or mobile device.
• It is a software application for retrieving, presenting, and traversing information resources on the World Wide Web.

WHAT IS WEB 1.0 STATIC?


When the World Wide Web was invented, most web pages were static.
➢ It is also known as flat page or stationary page because the page is “as is” and cannot be manipulated by the user.
➢ The content is also the same for all users.
WHAT IS WEB 2.0?
➢ It allows users to use web browsers instead of just using their operating system.
➢ Browsers can now be used for their user interface, application software (or web applications), and even for file
storage.
➢ Examples of Web 2.0 include social networking sites, blogs, wikis, video sharing sites, hosted services, and web
applications.
WHAT ARE THE FEATURES OF WEB 2.0?
1. Folksonomy – allows users to categorize and classify/arrange information using freely chosen keywords (e.g.,
tagging). Popular social networking sites such as Twitter, Instagram, Facebook, etc. use tags that start with the pound
sign (#). This is also referred to as hashtag
2. Rich User Experience – content is dynamic and is responsive to user’s input. An example would be a website that
shows local content. In the case of social networking sites, when logged on, your account is used to modify what you
see in their website.
3. User Participation – the owner of the website is not the only one who is able to put content. Others are able to place
a content of their own by means of comments, reviews, and evaluation. Some websites allow readers to comment on
an article, participate in a poll, or review a specific product. (e.g., Amazon.com, online stores.)
4. Long Tail – services that are offered on demand rather than on a one-time purchase. In certain cases, time-based
pricing is better than file-sized pricing or vice-versa. This is synonyms to subscribing to a data plan that charges you for
the amount of time you spent in the Internet, or a data plan that charges you for the amount of bandwidth you used.
5. Software as a Service – users will subscribe to a software only when needed rather than purchasing them. This is a
cheaper option if you do not always need to use a software. Software as a service allows you to “rent” a software for a
minimal fee.

WHAT IS WEB 3.0 AND THE SEMANTIC WEB?


• SEMANTIC WEB is a movement led by the World Wide Web Consortium (W3C).
• The W3C standard encourages web developers to include semantic content in their web pages.
• Tim Berners Lee – inventor of World Wide Web, noted that the Semantic Web is a component of Web 3.0.

Web 3.0 is yet to be fully realized because of several problems:


1. Compatibility. HTML files and current web browsers could not support Web. 3.0.
2. Security. The user’s security is also in question since the machine is saving his or her preferences.
3. Vastness. The World Wide Web already contains billions of web
4. Vagueness. Certain words are imprecise. The words “old” and “small” would depend on the user.
5. Logic. Since machines use logic, there are certain limitations for a computer to be able to predict what the user is
referring to at a given time.

TRENDS IN ICT
1) CONVERGENCE a) Technological convergence is the synergy of technological advancements to work on a similar
goal or task.
b) Convergence is using several technologies to accomplish a task conveniently.

2) SOCIAL MEDIA a) is a website, application, or online channel that enables web users to create, co-create, discuss,
modify, and exchange user-generated content.

There are six types of Social Media


i) Social Networks. These are sites that allow you to connect with other people with the same interests or background.
ii) Bookmarking Sites. These are sites that allow you to store and manage links to various websites and resources. Most
of these sites allow you to create a tag that allows you and others to easily search or share them. Examples: Twitter
and Pinterest
iii) Social News. These are sites that allow users to post their own news items or links to other news sources. The users
can also comment on the post and comments may also be ranked. They are also capable of voting on these news
articles of the website. Examples: Reddit and Digg
iv) Media Sharing. These are sites that allow you to upload and share media content like images, music, and video.
Most of these sites have additional social features like liking, commenting, and having user profiles. Examples: Flicker,
Youtube, and Instagram.
v) Microblogging. These are sites that focus on short updates from the user. Those subscribe to the user will be able to
receive these updated. Examples: Twitter and Plurk
vi) Blogs and Forums. These websites allow users to post their content. Other users are able to comment on the said
topic. There are several free blogging platforms like Blogger, WordPress, and Tumblr. On the other hand, forums are
typically part of a certain website or web service.

3) MOBILE TECHNOLOGIES
a) The popularity of smartphones and tablets has taken a major rise over the years. Several of these devices are capable
of using high-speed Internet. Today, the latest mobile devices use 4G Networking (LTE), which is currently the fastest
mobile network
b) iOS – used in Apple devices such as the iPhone and iPad. Android – an open source operating system developed
by Google. Being open source means several mobile phone companies use this OS for free.
c) Blackberry OS – used in Blackberry devices.
d) Windows Phone OS – a closed source and proprietary operating system developed by Microsoft®.
e) Symbian – the original smartphone OS; used by Nokia devices.
f) WebOS – originally used for smartphones; now used for smart TVs. e. Windows Mobile– developed by Microsoft for
smartphones and pocket PCs.
4) ASSISTIVE MEDIA a) is a nonprofit service designed to help people who have visual and reading impairments. A
database audio recordings is used to read to the user

RULES OF NETIQUETTE
• Online security, safety and ethics
• Internet threats
• Protecting reputations online
• Copyright
• Contextualized online search and research skills
10 Best Rules of Netiquette
➢ The Golden Rule o (treat others as you would like to be treated)
➢ No Flaming o (Flame is a personal insult communicated through the internet
➢ Don’t type in ALL CAPS o (people may misinterpret)
➢ Don’t SPAM o (it is any unsolicited e-mail from unknown sources
➢ Don’t talk with people you do not know. o (do not arrange to meet anyone you meet online)
➢ Obey Copyright Laws o (Don’t steal someone else’s idea, property and rights)
➢ Use proper Grammar and Spelling o (errors diminishes the credibility of the message)
➢ Be honest/Be yourself o (tell the truth, do not pretend to be someone else)
➢ Follow the TOS (TOS-Term of Service) o (Rules and policy of the sites)
➢ Shop Secure Sites o (these are sites with transport layer security TLS or SLS Socket Layer Security

What is internet Safety?


It refers to the online security or safety of people and their information when using the internet.
As teenagers, you are all exposed to many things powered by the Internet. Whether it is socializing, playing games,
reading sports news, shopping, etc., the Internet years, did not have.
The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with
the old ones. It is also a source of entertainment. But like most things in this world, there is always “another side of the
coin.” The Internet is one of the most dangerous places, especially if you do not know what you are doing.
Are you Safe and Secured online? How Safe and Secured are you online?

Types of Information with Risk:

Some Tips to Stay Safe Online:


• Be mindful on what you share online.
• Do not just accept terms and conditions,
read it.
• Do not share your password with anyone.
• Do not talk to strangers whether online or
face-to-face.
• Never post anything about a future
vacation.
• Avoid visiting untrusted websites.
• If you have WiFi at home, make it private
by adding a password.
• Install and update an antivirus software on
your computer.
• Add friends you know in real life.
• Avoid downloading anything from
untrusted websites.
• Buy the software, do not use pirated ones.
• Do not reply or click links from suspicious
emails.

Antivirus:
➢ Windows Defender
➢ BitDefender
➢ ESET NOD32
➢ F-Secure
➢ Kaspersky
➢ Norton
➢ AVAST
➢ SMADAV

INTERNET THREATS
A. Malware – stands for malicious software; It is a set of instructions that run on your computer and make your system
do something that an attacker wants it to do.
Virus - a malicious program designed to replicate itself and transfer from one computer to another (internet, local
networks, FDs, CDs, etc.)
Spyware - a program that runs in the background without you knowing it (thus called “spy”). It has the ability to monitor
what you are currently doing and typing through keylogging.
Adware - A program designed to send your advertisement, mostly as pop-ups; SPAM- Refers to the transmission of
unsolicited messages from various origins using electric messaging systems

A. Spam – unwanted email mostly from bots or advertisers. It can be used to send malware.
B. Phishing – Its goal is to acquire sensitive personal information like passwords and credit card details.
Dangers on the Internet
Email Spam- Also known as junk email, it is usually unsolicited commercial email sent from one source with identical
message sent to multiple recipients. Although some of them are not harmful, deleting them one by one will eat up your
time and can clog your email. Dangerous spams carry virus like Trojan horse and other malicious software (malware).
Spamming is projected to continue because it is a cheap means of advertising. In addition, many countries do not have
laws to punish spammers.
Phishing- This is a deceitful practice of trying to get confidential information such as passwords and usernames and
credit card details by making it appear as if it comes from a trustworthy source. Phishing is usually done by email or
other similar means using a popular entity such as Microsoft, Yahoo, Google, Amazon and financial institutions to lure
you to their website. Internet users would think that they are accessing genuine website and through this way, a phisher
would be able to gather sensitive information from internet account user.
Pharming - This is a dangerous hacker attack on a website which directs all traffic to that website to another fictitious
website. The main object of pharming is to obtain username and passwords as well as credit card and financial
information and use these to steal their money electronically or use the credit card of the victims. Pharming is a major
concern of many online banking and electronic commerce transactions, which would comprise many of their client
accounts as well as the business. Antivirus and anti-spyware software cannot prevent and protect one from pharming.
Spyware - It is known that spyware programs also affect the performance and settings of the computer. Major antivirus
companies have incorporated in their products anti-spyware programs and many internet-based companies have
offered anti-spyware programs for a fee and some are free. But you must be careful which one to use to ensure your
protection.
Computer worm - This is a dangerous computer program that replicates itself through a network. Some worms delete
files, others disrupt the network function and still, others send junk mail from infected computer.
Trojan Horse - it can erase data, can allow access of the victim’s computer, can corrupt files, and can be used in Phishing
for bank accounts.
Hacker - This is a person who is able to enter and control other people’s computer without authorization. A hacker is
able to enter another’s computer, usually vandalizes the victim’s website, steals personal information, obtains intellectual
property, and performs credit card fraud. Firewalls are able to prevent entry by hackers.

IN ORDER TO BE SAFE ALL THE TIME, TAKE THE NETIQUETTE “GOLDEN RULE”:

You might also like