0% found this document useful (0 votes)
30 views3 pages

Empowerment Technology

The document discusses various topics related to empowerment technology including the world wide web, digital literacy, productivity tools, effective communication, ethics and responsibility, problem solving skills, importance of empowerment technology, information and communication technology concepts, types of computers and the internet, emerging technologies, online platforms, online safety, security and threats, cyberbullying, identity theft, plagiarism, and intellectual property rights.

Uploaded by

Althea Raquel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views3 pages

Empowerment Technology

The document discusses various topics related to empowerment technology including the world wide web, digital literacy, productivity tools, effective communication, ethics and responsibility, problem solving skills, importance of empowerment technology, information and communication technology concepts, types of computers and the internet, emerging technologies, online platforms, online safety, security and threats, cyberbullying, identity theft, plagiarism, and intellectual property rights.

Uploaded by

Althea Raquel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

EMPOWERMENT TECHNOLOGY WWW - invented by Tim-Berners Lee;

subject that focuses on harnessing the power of information system that allows documents to
technology. be connected.

DIGITAL LITERACY WEB PAGES


how to navigate the internet safely hypertext document connect to WWW

PRODUCTIVITY TOOLS DIFF ONLINE PLATFORMS OF WWW


discover various software and tools WEB 1.0: STATIC PAGES
first stage in the WWW
EFFECTIVE COMMUNICATION WEB 2.0: DYNAMIC WEB PAGES
learn how to communicate effectively evolution of Web 1.0
Six Characteristics of web 2.0
ETHICS AND RESPONSIBILITY Folksonomy
understand the ethical implications of allows users to categorize and classify info.
technology Rich User Interface
content is dynamic and is responsive.
PROBLEM-SOLVING User Participation
develop your problem-solving skills the owner of website is not the only one who is
able to put content.
WHY EMTECH MATTERS Long Tail
its essential, provides tools you need to suceed. services are offered on demand
Software as a service
IMPORTANCE OF EMTECH users will subscribe to a software only when
know the right ways of using ICT needed
Mass Participation
INFORMATION AND COMMUNICATION sharing through universal web access
TECHNOLOGY (ICT) WEB 3.0: THE SEMANTIC WEB
Deals with the use of diff. communication a common framework.
technologies.
TRENDS IN ICT
3 IMPORTANT CONCEPT OF ICT CONVERGENCE
INFORMATION synergy of technological advancements to work
valuable context that gives meaning and SOCIAL MEDIA
relevance to many people. (name, palce, birth, website, application, or online channel
color) Six Types of SocMed
COMMUNICATION Social Networks - sites that allow you to connect
conveying of information between two or more with other people
people in diff. places. Bookmarking Sites - sites that allow you to store
Basic Types of Communications and manage links
Verbal Communications - oral and writeen; Social News - sites that allow users to post their
about language. own news items
Non-verbal communication - signs and symbols, Media Sharing - allow you to upload and share
etc. media content.
TECHNOLOGY Microblogging - focus on short updates from
used to accomplish various task in our daily the user.
lives, in brief technology are products and Blogs and Forums - allow user to post their
processes to simplify our daily lives. content.
MOBILE TECHNOLOGIES
Philippines dub as the ICT Hub of Asia. popularity of smartphones and tablets
ASSISTIVE MEDIA
COMPUTER non-profit service designed to help people who
Electronic device for storing and processing data have visual and reading impairments.
Three Components
INTERNET Global system of interconnected Client Computers - interact with cloud
computers networks Distributed Servers - servers are in
WORLD WIDE WEB geographically different places
Datacenters - where application is placed and is incorporated set of interactive online services.
accessed via internet ONLINE VIDEO PLATFORMS
service providing end-to-end tools
TYPES OF CLOUDS
PUBLIC CLOUD ONLINE SAFETY, SECURITY, ETHICS, AND RULES
Allows systems and services to be easily OF NETIQUETTE
accessible to the general public INTERNET
PRIVATE CLOUD information superhighway
allows systems and services to be accessible INTERNET SAFETY
within an org refers to the online security
COMMUNITY CLOUD ONLINE SAFETY
allows systems and services to be accessible by refers to the practices and precautions
group of org ONLINE SAFETY AND SECURITY
HYBRID CLOUD defines how you are going to keep yourself safe
mixture off public and private cloud while surfing the web

ONLINE TYPE OF INFO W RISK


state of being connected to the cyberspace First Name
ONLINE SYSTEMS Last Name
vary in nature Middle Name
Wireless Fidelity (Wi-Fi) Current and Prev. schools
wireless local area net Cellphone number
Bluetooth
packet-based transmission INTERNET THREATS
Third Generation, Fourth Generation, Global MALWARE
System for Mobile communications, General malicious software. designed to disrupt.
Packet Radio Service, Data Services. 5 Types of Malware
data netwoking services Virus - designed to transfer from one comp.
Dial-up Services Worm - designed to replicate itself and transfer
data net services using modems Trojan - disguises as a useful program
Virtual Private Networks Spyware - runs in the background
secure access to a priv. net Adware - designed to send you ads
SPAM
EMERGING TECHNOLOGIES Stupid Pointeless Annoying Malware. unwanted
ARTICIAL INTELLIGENCE email
AI; branch of computer science...act like PHISHING
humans unwanted acquisition of sensitive personal
ROBOTICS information
field of comp. sci. creating devices that can Types of Phishing
move Spear Phishing Attacks - directed at specific
BIOMETRICS individuals
used to measure and analyze human body Whaling Attacks - specifically target senior
characteristics executives.
QUANTUM CRYPTOGRAPHY Pharming - uses domain name system cache
science of encoding and decoding info. Clone Phising Attacks - prev. delivered but
COMPUTER-ASSISTED TRANSLATIONS legitimate emails
use of comp to assist in the translation of one or Evil Twin Attacks - occur when hackers try to
more languages. trick users into connecting to a fake Wi-Fi net
Voice Phishing - voice-based media
PLATFORMS SMS Phishing - movile device-oriented phishing
defined as a group of technologies. attack
Common Online Platforms Calendar Phishing - sending false calendar
SOCIAL MEDIA PLATFORM invites
web-based tech Page Hijack Attacks - compromised website
E-COMMERCE PLATFORM Phishing Techniques
collection fo software tech Url Spoofing
ONLINE LEARNING PLATFORM Link Manipulation
Link Shortening KEYLOGGERS
Homograph Spoofing used to record the keystrokes done by user.
Graphical Rendering ROGUE SECURITY SOFTWARE
Covert Redirect form of malicious software and internet fraud
Chatbots
Ai Voice Generators ICT ACRONYMS AND ABBREVIATIONS
CYBERBULLYING AGP - Accelerated Graphic Port
bullying that takes place over digital devices HTTP – Hypertext Transfer Protocol
SEXTING ATX - Advanced Technology Extended
sending and receiving naked pictures/videos WAN - Wide Area Network
IDENTITY THEFT BASIC - Beginner All Purpose Symbolic
act of obtaining info. Instruction Code
PLAGIARISM MMS - Multimedia Messaging Service
act of using the language of another author BIOS - Basic Input and Output System
INTELLECTUAL PROPERTY (IP) RIGHTS SPAM – Stupid Pointless Annoying Malware
refers to creations of the mind, such as CAN - Campus Area Network
inventions GPRS - General Packet Radio Service
FLAME WAR DBMS - Database Management System
series of flame posts or messages in a thread GSM - Global System for Mobile
communications
PROTECTING REPUTATIONS ONLINE CMD – Command
INTELLECTUAL PROPERTY Wi-Fi – Wireless Fidelity
category of property that includes intagible ISP – Internet Service Provider
creations of the human intellect. HTML – Hyper Text Markup Language
COPYRIGHT LAW GUI - Graphic User Interface
legal protection extended to the owner of the MAC - Media Access Control
rights LAN - Local Area Network
COPYRIGHT PAGE PAN - Metropolitan Area Network
where the publisher places all the legal notices SMS - Short Message/Messaging Service
TCIP - Transmission Control Internet Protocol
ONLINE ETHICS URL - Universal Resource Locator
focuses on the acceptable use of online VPN - Virtual Private Network
resources
NETIQUETTE
combination of the words “net”’ and
etiwquette; set of rules regarding the proper
and polite way of interacting.
Ten Rules of Netiquette
1 Remember the Human
2 Adhere to the same standards online that
you follow in real life
3 Know where you are in cyberspace
4 Respect other people’s time and bandwidth
5 Make youself look good online
6 Share expert knowledge
7 Help keep flame wars under control
8 Respect each other people’s privacy
9 Don’t abuse your power
10 Be forgiving of other people’s mistake

CYBERCRIME
a crime commited through the use of the
internet
PRIVACY POLICY
how the website handle its data
FAIR USE
Ip may be use w/o consent

You might also like