0% found this document useful (0 votes)
55 views12 pages

It Era

This document provides an overview of different types of websites: 1. It describes 12 common types of websites including business, entertainment, portfolio, media, brochure, e-commerce, nonprofit, educational, infopreneur, personal, web portal, and wiki/community forum websites. 2. It also provides a brief history of the internet, noting the creation of ARPANET in 1969 and how it evolved into the public internet we know today. 3. Key details about the evolution of the web from static Web 1.0 to more interactive Web 2.0 and intelligent Web 3.0 are summarized.

Uploaded by

Regine Palconan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views12 pages

It Era

This document provides an overview of different types of websites: 1. It describes 12 common types of websites including business, entertainment, portfolio, media, brochure, e-commerce, nonprofit, educational, infopreneur, personal, web portal, and wiki/community forum websites. 2. It also provides a brief history of the internet, noting the creation of ARPANET in 1969 and how it evolved into the public internet we know today. 3. Key details about the evolution of the web from static Web 1.0 to more interactive Web 2.0 and intelligent Web 3.0 are summarized.

Uploaded by

Regine Palconan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

MODULE 3 7.

Maintenance Page
THE WEB AND THE INTERNET 8. Status Page
9. Landing Pages
Internet 10. Blog
- Is defined as an information
superhighway, to access information WEB 2.0 (Read-write interactive web)
over the web. - has the ability to contribute content
The Web (World Wide Web) and interact with other web users.
- consists of information organized - It has so much potential
into Web pages containing text and - simply requires that users can
graphic images. interact or contribute content.
- larger collection of interconnected - Examples:
documents or content. A. Social Networking - the use
- contains hypertext links, or of Internet-based social
highlighted keywords and images media sites to stay
that lead to related information. connected with friends,
Web Site family, colleagues,
- A collection of linked Web pages customers, or clients. (fb,
that has a common theme or focus twitter, google, etc)
Home page B. Blogs - a discussion or
- main page that all of the pages on a informational website
particular Website are organized published on the world wide
around and link back to web consisting of discrete,
often informal diary-style text
Sir Timothy John Berners- Lee entries (posts).
- also known as TimBL C. Wikis - a hypertext
- an English engineer and computer publication collaboratively
scientist best known as the inventor edited and managed by its
of the World Wide Web. own audience directly using
a web browser.
WEB 1.0 (Read Only Static Web) D. Video Sharing Sites - a
- A static web page, sometimes called website that lets people
a flat page or a stationary page, is a upload and share their video
web page that is delivered to a web clips with the public at large
browser exactly as stored in contrast or to invited guests.
to dynamic web pages which are
generated by a web application - Key Features of Web 2.0
- Examples: ❖ Folksonomy - allows users
1. Documentations to categorize and
2. Cache classify/arrange information
3. Website Presentation using freely chosen
4. Communication Cache keywords (e.g. tagging).
5. Form
6. Immutable Content
❖ Rich User Interface – to show potential clients and
content is dynamic and is the quality of the work they
responsive to user’s input. provide can use a portfolio
❖ User Participation – the website to collect some of
owner of a website is not the the best samples of past
only one who is able to put work they’ve done.
content. Others are able to 4. Media Website
place a content on their own - Collects news stories or
by means of comments, other reporting. There’s some
reviews, and evaluation. overlap here with
❖ Long Tail – services are entertainment websites, but
offered on demand rather media websites are more
than on a one-time purchase. likely to include reported
pieces in addition to or
WEB 3.0 (Read-write intelligent web) instead of content meant
- Web 3.0 is commonly referred to as purely for entertainment.
the "Semantic Web" because it 5. Brochure Website
aims to create a smarter Web by - simplified form of business
integrating meaning and context into websites
the structure of the Web - an informational website that
John Markoff of the New York Times is designed to look and feel
- Suggested the name for the third like a printed brochure. It
generation of web contains compelling text and
images that advertise a
12 TYPES OF WEBSITES company's products or
1. Business Website service.
- A website that’s devoted to 6. E-Commerce Website
representing a specific - (Electronic Commerce
business. Website)
- It should be branded like the - A website people can directly
business ( The same logo buy products from you’ve
and positioning) and probably used several
communicate the types of eCommerce websites before,
products and/or services the most big brands and plenty
business offers of smaller ones have one
2. Entertainment Website 7. Nonprofit Website
- Online platform dedicated to - It requires websites as an
providing various forms of online presence, as they
entertainment and engaging facilitate donations and
content to its visitors. provide a platform for
3. Portfolio Website potential donors to learn
- Sites devoted to showing about and support their
examples of your work. cause.
Service providers who want 8. Educational Website
- Are websites of educational network in the world that connects
institutions and online billions of computer users.
courses, primarily aimed at - The word internet comes from
providing educational combination between
materials or information “interconnection” and “network”.
about the institution to Network is a collection of computers
visitors. and devices connected via
9. Infopreneur Website communication channels and
- Distinct online businesses transmission media that allow us to
that specialize in creating share resources (hardware,
and selling information software, data, information).
products such as courses,
tutorials, videos, or eBooks. Brief History
10. Personal Website ARPANET
- Personal websites, such as - Advanced Research Project
blogs, vlogs, and photo Agency Network
diaries, are valuable for - January 2, 1969
individuals to share their - started an experimental
thoughts and experiences computer network.
with the world. - connected four universities’
11. Web Portal computers to each other. It
- are internal websites that grew and developed into
combine various information what we recognize as the
sources into a single internet today, which became
location, ensuring available for public access in
accessibility and 1991.
personalized views for users, 1982
catering to their specific - Year the word internet
needs. started.
12. Wiki or Community Forum 1986
Website - The year when the first “ free
- Wikis, popularly known as net” was created in Case
Wikipedia, are websites Western Reserve University
where users collaborate on
content, making their own Why was the internet created?
changes. They can be used - In the 1950s and 60s, the United
for fan communities, States was engaged in the Cold
business resources, and War with the Soviet Union. Each
information collection. country was working to increase its
science and technology
THE INTERNET capabilities in order to prevent
- The Internet or “net” (network of nuclear attacks from the other, and
network) is the largest computer also remain capable of attacking the
other should the situation devolve.
Researchers needed to be able to developed, known as TCP/IP.
use the computers to perform these These rules allowed for universal
tasks, but often had to travel long communication across all
distances to find a computer to do a networks, and made sure that
specific task. The proposed solution packets sent over a network would
was a way to connect the be delivered to the correct
computers so they could speak to destination.
each other, allowing researchers to
share data without needing to travel Major Components of the Internet
to the location of the computer. - The Internet can be seen as having
two major components: network
How was the internet created? What protocols and hardware. The
used to be the problem? protocols, such as the TCP/IP
- Having computers communicate with suite, present sets of rules that
each other was that the method of devices must follow in order to
transferring data from one computer complete tasks. Without this
to another, circuit switching, took a common collection of rules,
long time and could easily be machines would not be able to
interrupted. communicate.
- Then, Scientists developed a 1. Servers
different method called packet - a computer program that
switching to overcome this provides service to another
problem. With packet switching, the computer program and its
data could be broken up into smaller user.
segments, and each segment could Types of Servers
be sent individually. ● Application Server – a
- Once the data reached its program in computer that
destination, the packets were able to provides the business logic
be re-assembled into a complete for an application program.
packet. ● Web Server – a computer
- The evolution of the internet program that serves
continued from here. Packet requested HTML pages or
switching allowed computers to files.
connect to each other over a ● Proxy Server – is a software
network called ARPANET, the that acts as an intermediary
Advanced Research Projects between an endpoint device,
Agency Network. such as a computer and
- After ARPANET, other networks another server from which a
were developed, but the individual user is requesting.
networks could not communicate ● Mail Server – is an
with each other. In order to solve this application that receives
problem, a set of rules called the incoming e-mail from local
Transmission Control Protocol users and remote senders
and Internet Protocol were
and forward outgoing email
for delivery
● File Server – is a computer
responsible for central
storage and management of USES OF THE INTERNET
data files so that other ● Look for information
computers on the same ● School works, jobs, and home
network can access them. purposes
● Policy Server – is a security ● Send and receive electronic mail
component of a policy – ● Video teleconferencing (video call,
based network that provides video chat)
authorization services and ● Buy and sell product
facilities tracking and control ● Social networking
of files. ● Watch & post videos
2. IP Address (Internet Protocol) – is ● Games
a numerical label assigned to each ● Take college courses
device. This provides identity to a ● Monitor home while away
network device. ● Financial transactions
3. Browser – is an application program ● Download music and movies
that provides a way to look at
information on the web. INTERNET TERMS & DEFINITIONS
- Example of browsers: 1. INTERNET
Google chrome, safari, - A global network of
internet explorer, opera, thousands of computer
Mozilla networks linked by data lines
4. Domain Name System (DNS) – is and wireless systems.
the phonebook of the internet. We 2. WEB
access information online through - a collection of billions of web
domain names. pages that you can view with
5. Internet Service Provide (ISP) – is a web browser.
an organization that provides 3. Email
services for accessing, using or - the most common method of
participating in the internet. sending and receiving
● Two types of ISP: messages online
1. National ISP – provided 4. Social Media
internet access to a specific - websites and apps that allow
geographic area. people to share
2. Regional ISP – business comments,photos, and
that provides internet access videos
in cities and towns 5. Online gaming
nationwide. - games that allow people to
play with and against each
Example of ISP: Sky Broadband, PLDT, other over the Internet
Converge 6. Software updates
- operating system and signals arriving at your home
application updates can or business from your ISP.
typically be downloaded from - Modem- connects the
the Internet internet from ISP to your
7. HTML home.
- Hypertext Markup Language - Router- allows internet
is a coding language used to access to multiple devices.
tell a browser how to place 16. Encryption
pictures, text, multimedia and - is the mathematical
links to create a web page scrambling of data so that it
8. URL is hidden from
- Uniform Resource Locator is eavesdroppers. Encryption
a web address used to uses complex math formulas
connect to a remote resource to turn private data into
on the world wide web. meaningless gobbledygook
9. Bit that only trusted readers can
- is a single digit in the binary unscramble.
numbering system (base 2). 17. Web Bot
10. Byte - is an automated software
- generally consists of eight application that performs
bits. repetitive tasks over a
11. Upload network. It follows specific
- To upload is to transfer data instructions to imitate human
from your computer to behavior but is faster and
another computer. more accurate.
12. Download 18. Search Engine
- To download is to transfer - specialized software, such as
data from another computer Google and Yahoo, that lets
to your computer. www browser users search
13. HTTP for information on the web by
- Hypertext Transfer Protocol, using keywords,phrases.
the data communication
standard of web pages INTERNET OF THINGS (IoT)
14. HTTPS - is a complete IoT system that
- Hypertext Transfer Protocol integrates four distinct components:
Secure. This indicates that sensors/devices, connectivity, data
the web page has a special processing, and a user interface.
layer of encryption added to - is a network of interrelated devices
hide your personal that connect and exchange data with
information and passwords other IoT devices and the cloud.
from others. - We can control devices around us
15. Router or router-modem by the touch of a screen on our
- hardware device that acts as smartphones.
the traffic cop for network
- It's difficult for devices from different
manufacturers to communicate with
Impacts of IoT each other.
- It typically helps people to live and The Future of Internet of Things (IoT)
work smarter. In the next few years, we will finally
- As the internet rapidly grows and IoT have a glimpse at the future of the internet
being born its impact has gotten us of things. This will generate a lot of
to live in our daily lives— it can accessible technological matters that will
make our lives convenient. help us extend to a new class system or a
- without IoT we do things manually. more technologically-based generation.
- Before IoT, people would physically Here are some examples of things
get up to do things around the that will be more innovative in the future:
house, such as turn on the water ● Smart cities
heater or turn the lights on. ● Smart buildings and offices
● Smart hospitals
PROS AND CONS OF IoT ● Airborne sensors
● PROS ● Autonomous vehicles; and
- Ability to access information from ● Tracker of energy consumption
anywhere at any time on any device; But on the other hand, this will also
- Improved communication between serve as a way for technology to dominate
connected electronic devices; the people, like what Ray Bradbury
- Transferring data packets over a described in a short story from 1950 he said
connected network saving time and that the growth of Internet of things could
money; and also lead to new kinds of Cyber Warfare
- Automating tasks helping to
improve the quality of a business's "all the people might
services and reducing the need for disappear—but the smart homes,
human intervention. preparing meals and sweeping the
floors, will live on."
● CONS
- As the number of connected devices PHOTO IMAGING & POST PROCESSING
increases and more information is
shared between devices, the Photography
potential that a hacker could steal - It literally means 'drawing with light',
confidential information also which derives from the Greek photo,
increases. meaning light and graph, meaning to
- Enterprises may eventually have to draw. Photography is the process
deal with massive numbers -- of recording an image – a
maybe even millions -- of IoT photograph – on light sensitive film
devices. or, in the case of digital photography,
- If there's a bug in the system, it's via a digital electronic or magnetic
likely that every connected device memory.
will become corrupted.
3 BASIC TYPES OF PHOTOGRAPHY
1. Landscape photography ● Aperture comes from the Latin for
- is a photograph of the ‘opening’. f/stop values
environment.
2. Portrait Photography FACTS:
- A picture/painting of a person ● The aperture does more than just
mainly emphasizes the face, control the amount of light that hits
facial features, and the sensor; the size of the aperture
shoulders. affects the way an image looks well.
3. Documentary Photography ● The Av controls the amount of depth
- captures a real moment, of field in an image. The wider the
conveying a message about aperture, the shallower the depth of
the world. field, and vice versa

Exposure Depth of field — an expression describing


- amount of light that reaches your how much of a photo is in focus.
camera sensor or film.
Exposure is affected by four things: Shutter speed
1. Light in Photography - refers to how ● The function of the shutter
the light source, which can be mechanism is to admit light into the
natural or artificial, is positioned in camera, and onto the digital media
relation to your subject. or film for a specific length of time.
2. Shutter Speed - the speed at which B=Bulb
the camera's shutter closes. ● Measured in fractions of seconds.
3. Aperture - opening of a lens
diaphragm through which light
Shutter Speed and motion capture
passes.
4. ISO (International Organization for •Like with aperture, shutter speed affects
Standardization) - camera setting more than just the amount of light.
that will brighten or darken a photo. •It also affects motion in photo, which
makes sense, when you think about it.
Overexposed vs Underexposed •Your camera chip is measuring light as
A correct exposure is a simple long as the shutter is open. If the shutter is
combination of three important factors: open for a second and if scene changes in
aperture, shutter speed and ISO. the duration of that second, the light
reflecting off your subject will also move
across the frame
Aperture
● It is the size of the hole in the Film Speed / ISO
diaphragm that allows light into the •ISO is a measure of a film's sensitivity to
camera. The larger the hole, the light, a concept introduced in the
more light that enters the camera in mid-1970s. It represents the emulsion's
a given time. sensitivity to light, with ISO 400, 200, and
● Aperture (Av) are measured using 100 being the most common.
F-STOPS, shown as f/#
Stops
•A stop is a doubling or halving of the 5. Take some vertical pictures
amount of light let in when taking a photo. 6. Look the focus
Lighting 7. Move it from the middle
8. Know your flash range
- Light is the most fundamental aspect
9. Watch the light
of photography
10. Be a picture director
● Light in photography refers to how
the light source, which can be
natural or artificial, is positioned in
relation to the subject.
● Lighting is a key factor in creating a
successful image. Lighting
determines not only brightness and
darkness, but also tone.

Lighting – Direction

● Direction describes the angle at


which the light source or sources are
coming at the camera. Backlight,
toplight, frontal light, and profile light
are some common terms used to
describe the direction of light.
● The direction of light significantly
influences the creation of shape and
texture in images, specifically
controlling the width of shadows.

Lighting – Colour

● Color photography is the most


realistic representation of the world,
the closest to our hearts and brains.
● Color is often used to evoke emotion
from its viewers while improving the
composition of an image. The color
of light can vary dramatically
depending upon the light source.

10 Tips in Taking Great Pictures

1. Get down in their level


2. Use plain background
3. Use flash outdoors
4. Move in close
8. Respect other people’s privacy
9. Don’t abuse your power
MODULE 4 10. Be forgiving of other people’s
The Netiquette and The Computer Ethics mistake

The Netiquette CYBER


- Netiquette is a combination of the - It is the Characteristics of the culture
words network and etiquette and is of computers, information,
defined as a set of rules for technology and virtual reality.
acceptable online behavior.
Similarly, online ethics focuses on CYBERCRIME
the acceptable use of online - is defined as a crime in which a
resources in an online social computer is the object of the crime
environment. and is used as a tool to commit an
The Golden Rule offense.
- You may be interacting with a
computer screen, you are CYBERCRIMINALS
communicating with a real person - may use computer technology to
who will react to your message. access personal information,
Make a good impression - treat business trade secrets or use the
others with the same respect that internet for exploitative or malicious
you would like to receive and avoid purposes.
confrontational or offensive
language. Republic Act No. 10175 Cybercrime
1. Avoid Slangs, Acronyms, and Text Prevention Act of 2012
Talk - is a law in the Philippines approved
2. Avoid “Screaming” in Typed on September 12,2012 which aims
Message to address legal issues concerning
3. Proofread your message before online interactions and the internet.
sending them.
4. Exercise good judgement when Republic Act No. 10173 Data Privacy Act
sharing information with others of 2012
online. - It is an act protecting individual
5. Respect Diversity in Viewpoints personal information.

10 Commandments of Computer Ethics COMMON FORMS OF CYBERCRIME


1. Remember the Human ● Copyright
2. Be Ethical - Type of intellectual property
3. Know where you are that projects original works of
4. Respect other people’s time and authorship.
data limit ● Plagiarism
5. Make yourself look good online - An act or instance of using or
6. Share expert knowledge closely imitating the
7. Keep disagreement healthy language and thoughts of
another author without 6. Child Pornography
authorization. - Is a form of child sexual
● Computer addiction exploitation.
- Is a form of behavioral 7. Cyber Defamation
addiction that can be - Is an unprivileged false
described as the excessive statement of fact which tends
or compulsive use of the to harm the reputation of a
computer. person or a company.

CRIMINAL ACTIVITIES INTERNET THREATS


1. Hacking 1. Hacking
- Act of compromising digital - Is a term used to describe
devices and networks actions taken by someone to
through unauthorized access gain unauthorized access to
to an account or computer a computer.
system 2. Malware
2. Computer-related forgery, fraud - Intimidate you with
and/or identity theft scareware, which is usually a
- An attempt to obtain pop-up message that tells
sensitive information such as you your computer has a
usernames, passwords, and security problem or other
credit card details and false information.
(indirectly money), often for 3. Pharming
malicious reasons. - Convince you that the site is
3. Electronic Theft real and legitimate by
- The illegal transfer of funds spoofing or looking almost
from one account to another identical to the actual site
4. Cyberbullying down to the smallest details.
- The use of electronic You may enter your personal
communication to bully a information and unknowingly
person, typically by sending give it to someone with
a message of an intimidating malicious intent.
or threatening nature. 4. Phishing
5. Cybersex - is used most often by cyber
- Willful engagement, criminals because it's easy to
maintenance, control, or execute and can produce the
operation, directly or results they're looking for
indirectly of any lascivious with very little effort
exhibition of sexual organs or 5. Ransomware
sexual activity with the aid of - It will display a notification
a computer system for favor stating that your computer or
or consideration. data have been locked and
demanding a payment be
made for you to regain
access.
6. Spam
- is one of the more common
methods of both sending
information out and collecting
it from unsuspecting people.
7. Spyware
- Software that collects
personal information about
you without you knowing.
8. Trojan Horses
- It can delete your files and
use your computer to hack
other computers.
9. Viruses
- When a program is running,
the virus attached to it could
infiltrate your hard drive and
also spread to USB keys and
external hard drives. Any
attachment you create using
this program and send to
someone else could also
infect them with the virus.
10. Wifi eavesdropping
- is another method used by
cyber criminals to capture
personal information.

You might also like