0% found this document useful (0 votes)
40 views

Module 3&4 Notes

The document discusses different types of websites including ecommerce, business, entertainment, portfolio, media, educational, infopreneur, personal, web portal, wiki/community forum websites. It also discusses key features of Web 2.0 like folksonomy, rich user interface, user participation and long tail. Web 3.0 is described as more connected, open and intelligent with semantic technologies.

Uploaded by

Cherry Aguilar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views

Module 3&4 Notes

The document discusses different types of websites including ecommerce, business, entertainment, portfolio, media, educational, infopreneur, personal, web portal, wiki/community forum websites. It also discusses key features of Web 2.0 like folksonomy, rich user interface, user participation and long tail. Web 3.0 is described as more connected, open and intelligent with semantic technologies.

Uploaded by

Cherry Aguilar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Lesson 1: THE WEB the most recent post appears first, at the top of the web

page.
The WEB (World Wide Web) consists of information
organize into Web pages containing text and graphic EXAMPLES:
images. The web is a collection of interconnected
• Tumblr
documents. It contains hypertext links, or highlighted
keywords and images that lead to related information. • Wordpress
• Blogger
WEB 1.0 – READ-ONLY STATIC WEB
WIKIS: Is a hypertext publication collaboratively edited
• An old internet that only allows people to read and managed by unknown audience directly using a
from the internet browser.
• Web is used as “information portal”
A typical wiki contains multiple pages for the subjects or
EXAMPLES OF WEB: scope of the project and may be either open to the public
or limited to use within an organization for maintaining
• MP3.COM
its internal knowledge base.
• HOME PAGE
• DIRECTORIES EXAMPLE:
• PAGE VIEWS
• Wikipedia
• HTML/PORTALS
• Wikibooks
DISADVANTAGES: • Wikiversity

• READ ONLY WEB VIDEO SHARING SITES: A website that lets people upload
• LIMITED USER INTERFACE and share their video clips to the public or to invited
• LACK OF STANDARDS guests.

WEB 2.0 – READ-WRIITE INTERACTIVE WEB EXAMPLE:

• A term used to describe a new generation of • YouTube


Web services and applications with an increasing • Photobucket
emphasis on human collaboration. • MySpace
• A platform that gives users the possibility (or • Flickr
liberty) to control their data
KEY FEATURES OF WEB 2.0
• Allows the user to interact with the page known
as DYNAMIC PAGE; instead of just reading a • FOLKSONOMY – allows users to categorize and
page, the user may be able to comment or create classify/arrange information using freely chosen
a user account. keywords
• Is focused on the ability for people to collaborate • Rich User Interface – content is dynamic and is
and share information online via social media, responsive to user’s input. An example would be
blogging and Web-based communities. a website that shows local content.
• User Participation – the owner of the website is
SOCIAL NETWORKING: The use of Internet-based social
not the only one who is able to put content.
media to stay connected with friends, family, colleagues,
Others can place a content on their own by
customers, or clients. Social networking can have a social
means of comments, reviews, and evaluation.
purpose, a business purpose, or both, through sites.
• Long Tail – this is the same as subscribing to a
EXAMPLES: data plan that costs for internet time or speed.

• Facebook WEB 3.0 – READ-WRITE INTELLIGENT WEB


• Twitter
• Web 3.0 will be more connected, open, and
• Google+
intelligent, with semantic web technologies,
• Tumblr
distributed databases, natural language
• Pinterest processing, machine learning, machine
• Instagram reasoning, and autonomous agents.
BLOGS: The discussion or informational website • Changing the web into a language that can be
published on the world-wide web consisting of discrete, read and categorized by the system rather than
often informal diary-style text entries (posts). Posts are humans.
typically displayed in reverse chronological order, so that
• All the application on web or mobile will be 8. Educational Website
upgraded with more features. It applies same
These websites have the primary goal of either providing
principles as Web 2.0: two-way interaction.
educational materials to visitors or providing information
TYPES OF WEBSITES: on an educational institution to them.

1. eCommerce Website Example: Schoology, Teacher Dashboard

A website that people can directly buy products from. 9. Infopreneur Website
Any website that includes a shopping cart and a way for
Infopreneurs create and sell information products. That
you to provide credit card information to make a
could be in the form of courses, tutorials, videos, or
purchase fall into this category.
eBooks.
Example: Amazon
10. Personal Website
2. Business Website
Many people find value in creating personal websites to
Any website that’s devoted to representing a specific put their own thought out into the world. This category
business. It should be branded like the business and includes personal blogs, vlogs, and photo diaries people
communicate the types of products and/or services the share with the world.
business offers.
11. Web Portal
Example: Google Finance
Websites designed for internal purposes at a business,
3. Entertainment Website organization, or institution. They collect information in
different formats from different sources into one place
You can probably think of a few websites that you visit
to make all relevant information accessible.
purely for entertainment purposes.
Example: Banking and Insurance Portal, Intranet
Example: YouTube, Netflix
12. Wiki or Community Forum Website
4. Portfolio Website
A wiki is any website where various users can collaborate
Site devoted to showing examples of past work. This type
on content and all make their own tweaks and changes
of website is simpler to build than a business website and
as they see fit. These are wikis for fan communities, for
more focused on a particular task: collecting work
business resources, and for collecting valuable sources.
samples.
Example: Mumsnet, Barista Exchange
Example: Draftss

5. Media Website
LESSON 2: THE INTERNET
Collect news stories or other reporting. There’s some
overlap here with entertainment websites, but media The Internet or “net” is the largest computer network in
websites are more like to include reported pieces in the world that connects billions of computer user. The
addition to or instead of content meant purely for word internet comes from combination between
entertainment. “interconnection” and “network”.

Example: Facebook, LinkedIn Network is a collection of computer and devices


connected via communication channels and transmission
6. Brochure Website
media allow to share resources.
Simplified form of business websites. A simple brochure
MAJOR COMPONENTS OF INTERNET
site that includes just a few pages that lay out the basics
of what you do and provide contact information may be SERVERS: A computer program that provides service to
enough. another computer program and its user.

Example: Super Soco • APPLICATION SERVER – a program in computer


that provides the business logic for an
7. Nonprofit Website
application program
It is the easiest way for many potential donors to make • WEB SERVER – a computer program that serves
donations and will be the first place many people look to requested HTML pages or files
learn more about a nonprofit and determine if they want • PROXY SERVER – a software that acts as an
to support it. intermediary between an endpoint device, such

Example: Invisible Children, Canadian Blood Services


as computer and another server from which a • URL (Uniform Resource Locator): web address
user is requesting used to connect a remote resource on the world
• MAIL SERVER – an application that receives wide web
incoming e-mail from local users and remote • HTTP (Hypertext Transfer Protocol): the data
senders and forward ongoing e-mail for delivery communication standard of web pages. When a
• FILE SERVER – a computer responsible for central webpage has this prefix, the links, text, and
storage and management of data files so that pictures should work correctly in a web browser
another computer on the same network can • HTTPS (Hypertext Transfer Protocol Secure):
access them indicates that the webpage has a special layer of
• POLICY SERVER – a security component of a encryption added to hide your personal
policy-based network that provide authorization information and password to others
services and facilities tracking and control of files • ENCRYPTION: a mathematical scrambling of data
so that it is hidden from eavesdroppers.
IP ADDRESS/INTERNET PROTOCOL: A numerical label
Encryption uses complex math formulas to turn
assigned to each device. This provides identity to a
private data into meaningless that only trusted
network device.
readers can unscramble.
INTERNET SERVICE PROVIDER (ISP): An organization that
MODULE 4: Lesson 1
provides services for accessing, sing, or participating the
internet. THE NETIQUETTE AND THE COMPUTER ETHICS

• Two types of ISP: What is Netiquette?


o National ISP – provided internet access
• Simple stated, it’s network etiquette – that is
to a specific geographic area
the etiquette of cyberspace and “etiquette”
o Regional ISP – business that provides
means the forms of required by good
internet access in cities and towns
breeding or prescribed by authority to be
nationwide
required in social or official life. In other
o Example: Sky BroadBand, PLDT,
words, netiquette is a set of rules behaving
Converge
properly online.
DOMAIN NAME SYSTEM: The phonebook of internet. • When you use e-mail, messenger, video
We access information online through domain names. calls, or discussion boards to communicate
with others online, please be sure to follow
• DOMAIN NAMES:
the rules of professional online
o .com – commercial
communications known as netiquette. These
o .org – organization
rules will help you communicate with
o .net – network
instructors, classmates, and potential
o .edu – education
employers more effectively and will help
o .gov – national and state gov’t agencies
prevent misunderstandings.
USES OF INTERNET
GOLDEN RULE
1. Look for information
• You’re conversing with a real person behind a
2. School works
computer screen. Treat others with respect and
3. Social networking
avoid combative or insulting words to make a
4. Entertainment
positive impression.
5. News
• To help convey meaning when creating
6. Business
messages, it is sometimes acceptable to include
INTERNET TERMS & DEFINITIONS appropriate emoticon symbols, such as a smiley
face. However, for professional communications
• E-mail: the most common method of sending
these would be inappropriate.
and receiving messages online
• Social media: website and apps that allows AVOID SLANGS, ACRONYMS, AND TEXT TALKS
people to share comments, photos, and videos
- Communicating effectively in college and
• HTML (Hypertext Markup Language): a coding
business environments require the use of correct
language used to tell a browser how to place
terminology, spelling, and grammar that can
pictures, text, multimedia, and links to create a
easily be understood.
webpage
AVOID “SCREAMING” IN TYPED MESSAGES
- Typing an entire message using all capital letters today lead busy lives, and don’t have time to
is known “screaming”. It is distracting and read or respond to emails or discussion posts.
generally frowned upon in professional 5. Make yourself look good online. One of the best
environments. things about the virtual world is the lack of
judgement associated with your physical
RESPECT DIVERSITY IN VIEWPOINTS
appearance. You will, however, be judged by the
- Be constructive and respectful when sharing quality of your writing. So always check for
options, beliefs, and criticisms, or responding to spelling and grammar errors.
those of others in the conversation. Stive to 6. Share expert knowledge. The internet offers its
make you communication concise. users many benefits; one is the ease in which
information can be shared or accessed and in
PROOFREAD YOUR MESSAGES BEFORE SENDING fact, this “information sharing” capability is one
- Is a best practice for effective and efficient of the reasons the Internet was founded.
communication. Strive to make your 7. Help keep flame wars under control. “Flaming is
communications concise and free of any: what people do when they express a strongly
o Spelling and grammar errors held opinion without holding back any emotion.”
o Confusing terms or phrases that could be Don’t feed the flames; extinguish them by
misunderstood guiding the discussion back to a more productive
o Errors in accuracy of information direction.
8. Respect other people’s privacy. You may be
EXERCISE GOOD JUDGEMENT WHEN SHARING exposed to some private or personal information
INFORMATION that needs to be handled with care.
- E-mail and chat messages that you send or 9. Don’t abuse you power. Just like in face-to-face
receive are considered private and should not be situations, there are people in cyberspace who
forwarded or copied to others without gaining have more “power” than others. Just remember;
the consent of all involved participants. knowing more than others do or having more
- To protect your privacy and safety, do not share power than others may have does not give you
online any sensitive personal information such the right to take advantage of anyone.
as: 10. Be forgiving of other people’s mistakes. Not
o Home address or phone number everyone has the same amount of experience
o Personal conversations working in the virtual world. And not everyone
o Financial information knows the rules of netiquette. If you feel
compelled to respond to a mistake, do so in a
10 COMMANDMENTS OF COMPUTER ETHICS private email rather than a public forum.
1. Practice the Golden Rule: Do unto others as you MODULE 4: Lesson 2
would have others do unto you. Remember, your
written words are read by real people, all CYBERCRIMES
deserving of respectful communication. Before What is cyber?
you press “send” or “submit”, ask yourself.
“Would I be okay with this if someone else had - It is the characteristics of the culture of
written it?” computer, information, technology, and virtual
2. Adhere to the same standards of behavior online reality.
that you follow in real life. While it can be argued Cybercrime: is defined as a crime in which a computer is
that standards of behavior may be different in the object of the crime (hacking, phishing, spamming,
the virtual world, they certainly should not be and child pornography) is used as a tool to commit and
lower. You should do your best to act within the offense.
laws and ethical manners of society.
3. Depending on where you are in the virtual world, Cybercriminals: may use computer technology to access
the same written communication can be personal information, business trade secretes or use the
acceptable in one area, where it might be internet for exploitative or malicious purposes.
considered inappropriate in another. What you
REPUBLIC ACT NO. 10175 CYBERCIME PREVENTION ACT
text to a friend may not be appropriate in an
OF 2012: is a law in the Philippines approved on
email to be classmate or colleague.
September 12, 2012, which aims to address legal issues
4. Respect other people’s time and bandwidth.
concerning online interactions and internet
Electronic communication takes time: time to
read and time in which to respond. Most people
REPUBLIC ACT NO. 10173 DATA PRIVACY ACT OF 2012: sexual organs or sexual activity with the
is an act protecting individual personal information aid of a computer system for favor or
consideration
COMMON FORMS OF CYBERCRIMES
• CHILD PORNOGRAPHY
Copyright: the exclusive legal right, given to an originator o Is a form of child sexual exploitation
or an assignee to print, publish, perform, film, or record o Unlawful or prohibited acts defined and
literary, artistic, or music material, and to authorize punishable by Republic Act No. 9775 or
others to do the same. the Anti-Child Pornography Act of 2009,
committed through a computer system.
- Copyright infringement is the violation, piracy,
or theft of a copyright holder’s exclusive rights MODULE 4: Lesson
through the unauthorized use of a copyrighted
INTERNET THREATS
material or work.
HACKING: is a term used to describe actions taken by
Plagiarism: an act or instance of using or closely imitating
someone to gain unauthorized access to a computer. The
the language and thoughts of another author without
availability of information online on the tools,
authorization.
techniques, and malware makes it easier for even non-
Computer addiction: technical people to undertake malicious activities.

- Offline: generally used when speaking about • WHAT IT CAN DO:


excessive gaming behavior, which can be o Find weaknesses (or pre-existing bugs) in
practice both offline and online. your security settings and exploit them
- Online: also known as “internet addiction”, gets to access your information.
more attention in general from scientific o Install a Trojan horse, providing a back
research than offline computer addiction, mainly door for hackers to enter and search for
because most cases of computer addiction are your information.
related to the excessive use of the internet.
MALWARE: one of the more common ways to infiltrate
ONLINE CRIMINAL ACTIVITIES or damage your computer. Malicious software that
infects your computer, such as computer viruses, worms,
• HACKING Trojan horses, spyware, and adware.
o Unauthorized access of or interference
with computer systems, servers, or • WHAT IT CAN DO:
other information and communication o Intimidate you with a scareware, which
systems is usually a pop-up message that tells
o Illegal access you your computer has a security
o Misuse of devices problem or other false information.
• FORGERY/FRAUD o Reformat the hard drive of your
o An attempt to obtain sensitive computer causing you to lose all your
information such as usernames, information.
passwords, and credit card details and
PHARMING: a common type of online fraud. A means to
(indirectly money), often for malicious
point you a malicious and illegitimate website by
reasons.
redirecting the legitimate URL. Even if the URL is entered
• ELECTRONIC THEFT
correctly, it can still be redirected to a fake website.
o Illegal downloading
o Digital piracy • WHAT IT CAN DO:
o Practice of illegally copying and selling o Convince you that the site is real and
digital music, video, computer software legitimate by spoofing or looking almost
• CYBERBULLYING identical to the actual site down to the
o The use of electronic communication to smallest details. You may enter your
bully a person, typically by sending a personal information and unknowingly
message of an intimidating or give it to someone with malicious intent.
threatening nature
PHISHING: used most often by cyber criminals because
o The Anti-Bullying Act of 2013 (RA 10627)
it’s easy to execute and can produce the results they’re
• CYBERSEX
looking for with very little effort. Fake emails, text
o Willful engagement, maintenance,
messages, and website created to look like they’re from
control, or operation, directly or
authentic companies.
indirectly of any lascivious exhibition of
• WHAT IT CAN DO:
o Trick you into giving them information by
asking you to update, validate, or
confirm your account. It is often
presented in a manner than seems
official and intimidating to encourage
you to act.

RANSOMWARE: type of malware that restricts access to


your computer or your files and displays a message that
demands payment for the restriction to be removed.

• WHAT IT CAN DO:


o Ransomware will display a notification
stating that your computer or data have
been locked and demanding a payment
be made for you to regain access.

TROJAN HORSE: a malicious program that is disguised as,


or embedded within, legitimate software. It is an
executable file that will install itself and run
automatically once it’s downloaded.

• WHAT IT CAN DO:


o Delete your files.
o Log you keystrokes (such as credit card
number you entered in an online
purchase)
o Record usernames, passwords, and
other personal information

WORMS: a worm, unlike a virus, goes to work on its own


without attaching itself to files or programs. It lives in
your computer memory, doesn’t damage, or alter the
hard drive and propagates by sending itself to other
computers in a network.

• WHAT IT CAN DO:


o Cause a tremendous amount of damage
by shutting down part of the Internet,
wreaking havoc on an internal network
and costing companies’ enormous
amounts of lost revenue.

You might also like