EmTech Reviewer
EmTech Reviewer
C: Isaiah Salgado
Information and Technology Communication (ICT)
– Deals with the use of different communication technologies such mobile phones,
telephones, internet, etc. to locate, save, send and edit information.
Communication Technology
– also known as information technology, refers to all equipment and programs that are
used to process and communicate information.
3. Data Networking Services – a system that transfers data between network access
points through data switching, system control, and interconnection transmission
lines.
4. Network Generation
• Defined as a set of telephone or mobile network standards, which detail
the technological implementation of a particular mobile phone system.
• The speed increases and the technology used to achieve that speed also
changes.
5. Dial-up Services – data networking services using modems and telephone lines.
When the World Wide Web was invented, most pages were static (also known as flat or
stationary page)
Types of Web Pages:
1. Web 1.0 – refers to the state of the World Wide Web, when a set of static Websites
were used, providing no interactive content.
2. Web 2.0 – the addition of dynamic web pages, the user is able to see a website
differently than others; allows users to interact with the page.
Key features of Web 2.0:
3. Web 3.0 / Semantic Web – a movement led by the World Wide Web Consortium
(W3C). The W3C standard encourages web developers to include semantic
content in their web pages. The term is coined by the inventor of the World Wide
Web, Tim Berners-Lee.
3. File Management Platform – used for the storing, naming, sorting, and handling of
computer files.
4. Mapping Platform – a transformation taking the points of one space into the points
of the same or another space.
5. Social Media Platform – computer-mediated tools that allow large group of people
to create, share or exchange information, interest and the information can be in
the form of ideas, pictures, videos or anything that you want to create and share to
virtual communities.
b. Bookmarking Sites – sites that allow you to store and manage links to various
websites and resources.
c. Social News – sites that allow users to post their own news items or links to other
news sources.
d. Media Sharing – sites that allow you to upload and share media content like
images, music and video.
f. Blogs and Forums – sites that allow users to post their content.
MOBILE TECHNOLOGIES:
a. IOS (iPhone operating system) – used in Apple devices such as the iPhone and iPad
f. WebOS – originally used for smartphones, now used for Smart TVs.
TRENDS IN ICT:
1. Mobile Technologies – the popularity of smartphones and tablets has taken a
major rise over the years.
2. Social Media – a website application, or online channel that enables web users to
create, co-create, discuss, modify, and exchange user-generated content.
3. Assistive Media – a non-profit service designed to help people who have visual and
reading impairments.
2. Do not give any banking or sensitive information unless you are sure that it is a
reputable business having a secure service.
5. When using a public computer, delete your browsing data before leaving.
Netiquette – a made-up word from the words “net” and “etiquette”; Describes the rules of
conduct for respectful and appropriate communication on the internet.
10 Rules of Netiquette:
Rule 1: Remember The Human
Rule 2: Adhere to the Same Standards of Behavior Online That You Follow in Real Life
Rule 3: Know Where You Are in The Cyber Space
Rule 4: Respect Other Peoples’ Time and Bandwidth
Rule 5: Make Yourself Look Good Online
Rule 6: Share Expert Knowledge
Rule 7: Help Keep the Flame Wars Under Control
Rule 8: Respect Other Peoples’ Privacy
Rule 9: Don’t Abuse Your Power
Rule 10: Be Forgiving of Other People’s Mistake
Online Threats – any malicious act that attempts to gain access to a computer network
without authorization or permission from the owners.
4. Internet Robots - Other bots are "bad" and are programmed to break into user
accounts, scan the web for contact information for sending spam, or perform other
malicious activities.
b. Worm - a malicious program that transfers from one computer to another by any
type of means.
d. Rogue security software - tricks users into posing that is a security software.
e. Spyware – a program that runs in the background without you knowing it (thus
called “spy”).
6. Spams - Unwanted email mostly from bots or advertisers. It can be used to send malware.
7. Cyberstalking - refers to the use of the internet or other electronic device to harass
or stalk individuals or organizations.
Copyright Infringement
Intellectual Property – if you can create something, an idea, an invention, a form of literary
work, or a research, you have the right as to how it should be to others.