Ict - Notes
Ict - Notes
0
Introduction To Information And - It is the evolution of Web 1.0 by adding
Communication Technology dynamic web pages - the user is able to see
The Current State of ICT Technologies a website differently than others.
- Examples of Web 2.0 include social
● ICT (Information and Communication
networking sites, blogs, wikis, video sharing
Technology)
sites, hosted services, and web
- According to Blurton 1999, Information and
applications.
Communication Technology (ICT) is defined
- Web 2.0 allows users to interact with the
as “diverse set of technological tools and
page: instead of just reading a page, the
resources used to communicate, create,
user may be able to comment or create a
disseminate, store, and manage.
user account.
- ICT is the study of computers as tools for
- Web 2.0 also allows users to use web
data processing.
browsers instead of just using their
- It teaches students the fundamentals of
operating system.
operating computer systems in an internet-
- Browsers can now be used for their user
based environment.
interface, application software (or web
applications), and even for file storage.
● Information and Communication
Technology in the Philippines
■ Features of Web 2.0
- The Philippines has been dubbed the “ICT
→ Folksonomy
Hub of Asia” due to the rapid growth of ICT-
- It allows users to categorize and
related jobs, one of which is Business
classify/arrange information using freely
Process Outsourcing (BPO) or call centers.
chosen keywords (tagging).
- The Department of Information and
- Popular social networking sites such as
Communication Technology (DICT) is in
Twitter, Instagram, Facebook, etc. use tags
charge of developing, planning, and
that start with the pound sign (#). This is
promoting the country’s information and
also referred to as a hashtag.
communications technology (ICT) agenda in
→ Rich User Experience
support of national development.
- Content is dynamic and is responsive to
user’s input.
● World Wide Web
- An example would be a website that shows
- An information system on the internet that
local content.
allows documents to be connected to other
- In the case of social networking sites, when
documents by hypertext links, enabling the
logged on, your account is used to modify
user to search for information by moving
what you see on their website.
from one document to another.
→ User Participation
- W3 is an information space where
- The owner of the website is not the only one
documents and other web resources are
who is able to put content.
identified by URLs, interlinked by hypertext
- Others can place a content of their own by
links, and can be accessed via the Internet
means of comments, reviews, and
and invented by Tim-Berners Lee.
evaluation.
- Examples are Lazada, Shopee, and
● Web 1.0
Amazon.
- It refers to the first stage in the World Wide
→ Long Tail
Web, which was entirely made up of the
- Services that are offered on demand rather
Web pages connected by hyperlinks.
than on a one-time purchase.
- Static Web Page is known as flat plage or
- This is synonymous to subscribing to a data
stationary age in the sense that the page is
plan that charges you for the amount of time
“as is” and cannot be manipulated by the
you spend on the internet.
user.
→ Software As a Services
- The content is also the same for all users
- Users will subscribe to a software only
that is referred to as Web 1.0
when needed rather than purchasing them.
- Example: Google docs used to create and
edit word processing and spreadsheet.
➢ Mass Participation ■ Examples:
- Diverse information sharing through → Mobility aids : Such as wheelchairs,
universal web access. scooters, walkers, canes, crutches,
- Web 2.0’s content is based on people from prosthetic devices, and orthodontic devices.
various cultures. → Hearing aids : To help people hear or hear
more clearly
● Web 3.0 → Cognitive aids: Including computer or
- According to the W3C, “The Semantic Web electrical assistive devices, to help people
provides a common framework that allows with memory, attention, or other challenges
data to be shared and reused across in their thinking skills.
application, enterprise, and community → Computer software and hardware: Such
boundaries.” as voice recognition programs, screen
- The aim of Web 3.0 is to have machines (or readers, and screen enlargement
servers) understand the user’s preferences applications, to help people with mobility
to be able to deliver web content specifically and sensory impairments use computers
targeting the user. and mobile devices.
→ Tools: Such as automatic page turners,
■ Several Problems of Web 3.0 book holders, and adapted pencil grips to
→ Compatibility help learners with disabilities participate in
- HTML files and current web browsers could educational activities.
not support Web 3.0. → Closed captioning: To allow people with
→ Security hearing problems to watch movies,
- The user’s security is also in question since television programs, and other digital
the machine is saving their preferences. media.
→ Vastness → Physical modifications in the built
- The World Wide Web already contains environment: Including ramps, grab bars,
billions of web pages. and wider doorways to enable access to
→ Vagueness buildings, businesses, and workplaces.
- Certain words are imprecise. → Lightweight, high-performance mobility
- The words “old” and “small” would depend devices: Enables persons with disabilities
on the user. to play sports and be physically active.
→ Logic → Adaptive switches and utensils: To allow
- Since machines use logic, there are certain those with limited motor skills to eat, play
limitations for a computer to be able to games, and accomplish other activities.
predict what the user is referring to at a → Devices and features of devices: To help
given time. perform tasks such as cooking, dressing,
Online Systems, Functions, and Platforms and grooming; specialized handles and
● Technology Trends Awareness grips, devices that extend reach, and lights
- Refers to being aware of technology that on telephones and doorbells are a few
has lately become popular and is widely examples
recognized in the market or industry.
- Technology trends can influence how ● Collaborative Platforms.
customers reach your ecommerce site or - The goal of a collaborative platform is to
the company’s strategic efforts. facilitate communication and interpersonal
- Technology advancements can signal contact in corporate project work.
market openings or open up new products, - It is a virtual workspace where resources
but they can also present new ways that and tools are centralized
can give you a competitive advantage over
your online competition. ■ Examples:
● Assistive Technology → Video Conferences: Zoom, Skype,
- Piece of equipment, software program, or Discord, Google Meet, Microsoft Teams.
product system, these are equipment that → Office Suites: Google Work Space,
helps people especially those with disability Microsoft Office 365, Adobe Creative Cloud.
to increase, to improve, and to maintain → Online Games: Mobile Legends Bang
their functional capabilities. Bang, League of Legends, DOTA, Genshin
Impact
→ Educations: Canvas, Edmodo, Google → Web OS - Originally used in smartphones,
Classroom. now in smart TVs.
→ Windows Phone OS - A closed source and
● Convergent Technology proprietary operating system developed by
- An extension of the term convergence, Microsoft.
which means “coming together” of two or
more separate technologies / Synergy of ● Social Media
technological advancements to work on a - Are computer-mediated tools that allow
similar goal or task. people or companies to create, share or
- A convergence is when two or more distinct exchange information, career interest, ideas
things come together. and even pictures and videos in virtual
communities and networks.
■ Examples:
→ Smartphones ■ Types of Social Media
- Which combines the functionality of a → Social Networks
telephone, a camera, a music player, and a - These are sites that allows you to connect
digital personal assistant (among other with other people with the same interests or
things) into one divide. background.
- A tablet computer is another example of - Once the user creates their account, they
technology convergence. can set up a profile, add people, share
→ Artificial Intelligence content, etc.
- AI is when machines seem to be “intelligent” - Examples: Facebook, Twitter, Instagram,
- What humans really mean by intelligence, and etc.
however, is the ability to perceive your → Bookmarking Sites
environment and take actions that increase - Sites that allow you to store and manage
your chance of success in that environment. links to various websites and resources.
→ The Internet of Things - Most of the sites allow you to create a tag
- IoT is when physical devices, also called for others.
connected devices or smart devices, have - Examples: Pinterest, Google, Reddit etc.
electronics implanted in them that gives → Social News
them the ability to link to the Internet. - Sites that allow users to post their own
- By connecting to the Internet, they can news items or links to other new sources.
collect data, exchange data, make - The user can also comment on the post and
decisions, and control the device. comments may also be ranked.
- Examples: CNN, BBC, Apple News, Google
● Mobile Technology News, and etc.
- The popularity of smartphones and tablets → Media Sharing
has taken a major rise over the years. This - Sites that allow you to upload and share
is largely because of the devices capability media content like images, music, and
to do tasks that were originally found in video.
personal computers - Examples: Tiktok, YouTube, Spotify etc.
→ Blogs and Forums
■ Examples: - Allows users to post their content.
→ Android - Developed by Google. Being an - Other users are able to comment on the
open source means mobile phone said topic.
companies use this OS for free. - Example: Tumblr, WordPress, Evernote,
→ Blackberry OS - Developed by Blackberry and etc.
use in blackberry devices.
→ Firefox OS - Collaborative project by
Firefox for smartphones.
→ KaiOS - For feature phones.
→ iOS - Developed by Apple, used in Apple
devices such as iPhone and iPad.
→ Symbian - The original smartphone OS.
Used by Nokia devices.
Online Safety, Security, and Rules of - Get a sense of what the discussion group is
Netiquette about before you join it.
Online Safety, Security, Ethics, and Etiquette ■ Rule No. 4 : Respect Other People’s
Time and Bandwidth
● Internet Safety
- Remember people have other things to do
- The goal of internet safety, also known as
besides reading your email.
online safety, cyber safety, and E-safety, is
- We are not the center of their world.
to minimize a user’s ignorance of the
- Keep your post and emails to a minimum by
security hazards to their personal safety
saying what you want to say.
and property associated with using the
- Remember everyone won’t answer your
internet as well as to protect themselves
questions.
from computer crime.
■ Rule No. 5 : Make Yourself Look Good
Online
● Netiquette
- Be polite and pleasant to everyone.
- It is a made-up word, netiquette is
- Always check your spelling and grammar
constructed from the words net and
before posting.
etiquette.
- Know what we are talking about and make
- Netiquette refers to the standards of
sense of it.
behavior for polite and appropriate online
■ Rule no. 6 : Share Expert Knowledge
conversation.
- Ask questions online.
- Etiquette for the internet is another name for
- Share what you know online.
netiquette.
- Post the answers to your questions online
- These are suggested politeness guidelines
because someone else may have the same
rather than laws.
question we have.
■ Rule no. 7 : Help Keep Flame Wars
● Information We Must Limit to Share
Under Control
Online
- Netiquette does not forgive flaming.
- Personal Information
- Netiquette does however forbid people who
- Contact Information
are flaming to hurt discussion groups by
- Educational Background
putting the group down.
- Financial Account
■ Rule no. 8 : Respect Other People’s
- Location
Privacy
- Do not read other people’s mail without their
● The 10 Commandments of Netiquette
permission.
- The Core Rules of Netiquette are excerpted
- Going through other people’s things could
from the book “Netiquette” by Virginia Shea.
cost you, your job, or you could even go to
jail.
■ Rule No.1: Remember the Human
- Not respecting other people’s privacy is a
- We need to remember that we are talking to
bad netiquette.
a real person when we are online.
■ Rule No. 9 : Don’t Abuse your Power
- The internet brings people together who
- Do not take advantage of other people just
would otherwise never meet.
because you have more knowledge or
■ Rule No. 2: Adhere to the Same
power than them.
Standards Online that you Follow in Real
- Treat others as you would want them to
Life
treat you if the roles were reversed.
- We need to behave the same way online
■ Rule No. 10 : Be Forgiving of Other
that we do in real life.
People’s Mistake
- We need to remember that we can get
- Do not point out mistakes to people online.
caught doing things we should not be doing
- Remember that you were once the new kid
online just like we can in real life.
on the block.
- We are still talking to a real person with
- You still need to have good manners even
feelings even though we can’t see them.
though you are online and cannot see the
■ Rule No. 3: Know Where We are in
person face to face.
Cyberspace
- Always take a look around when you enter
a new domain when surfing the web.
Internet Threats - Since 2008, malicious security software has
● Internet Threats posed a significant security risk to desktop
- Web-based threats, or online threats, are a computers.
category of cybersecurity risks that may - SpySheriff and its clones were a primitive
cause an undesirable event or action via the example that became infamous.
internet. → Worm
- Web threats are made possible by end-user - After infiltrating a system, a computer worm
vulnerabilities, web service is a subset of Trojan Horse Malware that
developers/operators, or web services may spread or self-replicate from one
themselves. computer to another without human
activation.
● Malware Vs. Virus - Your Internet or LAN (Local Area Network)
- Malware is a catch-all term for any type of connection is often how worms spread
malicious software, regardless of how it throughout a network.
works, its intent, or how it’s distributed. → Spyware
- A virus is a specific type of malware that - Malicious software, often known as
self-replicates by inserting its code into malware, such as spyware, is placed on a
other programs. computer without the end user’s knowledge.
- Malware, or malicious software, is an - It intrudes, takes private information and
overarching term used to describe any internet usage data, and then passes it to
program or code that is created with the third parties like advertising, data
intent to do harm to a computer, network, or companies, or other users.
server. - This type of malware is hard to detect.
- A virus is a type of malware. → Keylogger
- The act of secretly recording the keys
● Malware pressed on a keyboard such that the person
- Malware is any software that is consciously using it is unaware that their actions are
created to disrupt a computer, server, client, being watched is known as keystroke
or computer network, leak sensitive data, logging, also known as keylogging or
obtain unauthorized access to data or keyboard capture.
systems, deny users access to information, - The person running the logging program
or unintentionally compromise a user’s can then get the data.
computer security and privacy. → Adware
- It is commonly referred to as advertising-
■ Types of Malware supported software, making money for its
→ Trojan creators by displaying banner ads on your
- A Trojan Horse Virus is a form of malware screen, typically inside of a web browser.
that installs into a computer pretending to - Although it is frequently made for desktops,
be a reliable application. adware can also be discovered on mobile
- In order to try and access consumers’ devices.
systems, an attacker will frequently utilize - Some types of adware are extremely
social engineering to conceal malicious manipulative and provide a backdoor for
malware in genuine applications. dangerous software.
→ Rogue Security Software → Spam
- Rogue Security Software is a type of - Malspam is an abbreviation for “malware
malicious software and online fraud that spam” or “malicious spam”, which refers to
tricks consumers into thinking their spam messages that include malware.
computer has a virus and tries to persuade - When readers open an email attachment or
them to pay for a phony malware removal click on a link, they often download malware
program that in fact installs malware on such as keyloggers, ransomware, Trojan
their computer. horses, bots, info-stealers, cryptominers,
- It is a type of ransomware as well as spyware, and Trojans.
scareware, which uses fear to control users.
Ctrl + V Paste.
● Microsoft Versions