Lesson 1 Ict
Lesson 1 Ict
Philippines is dub as the "ICT Hub of Asia" because of huge growth of ICT-related jobs, one of
which is BPO, Business Process Outsourcing, or call centers. ICT Department in the Philippines is
responsible for the planning, development and promotion of the country's information and
communications technology (ICT) agenda in support of national development.
Hybrid Work: Organizations are shifting to hybrid work to models a more consistent experience
regardless of an employee’s location and putting more importance on outcomes rather than hours put
in. (Ex.: Reporting news while at home)
Digital Banking: More and more Filipinos embrace digital banking services and are more open to
innovations that make payments and banking more convenient, accessible, and seamless. (Ex.: G-Cash)
Hyperlocal Market: Consumers have learned to patronize goods and services and interact with small
businesses within their local communities. (Ex.: Shopee)
Gamification: Nongame environments, like websites, online communities, and learning management
systems incorporate gamification to increase participation and engagement among consumers,
employees, and partners.
Goals - Complete the task and get a reward, such as a badge or points.
Status - Users increase their level or rank through completing activities. Leaderboards show who
is 'winning' and inspire users to work harder to compete.
Community - Users are paired or put in groups to solve problems, complete activities, or
otherwise achieve an objective.
Education - Tips, tricks and quizzes are given to the user throughout the process.
Rewards - As mentioned above, points and badges are common, and useful, rewards. Other
rewards could be discounts, coupons, or gift cards. This fuels the user's motivation and keeps
engagement high.
COMPUTER:
Is an electronic device for storing and processing data, typically in binary form, according to
instructions given to it in a variable program.
INTERNET:
Is the global system of interconnected computer networks that use the internet protocol suite
(TCP/IP) to link billions of devices worldwide.
Means of connecting a computer to any other computer anywhere in the world via dedicated
routers and servers.
Sometimes called simply "The Net", is a worldwide system of computer networks – a network of
networks in which the users at any one computer can get information from any other computer.
The Internet is the largest computer network in the world. Actually, it is a "Network of
Networks" that connect many government, private, corporate, insurance, health center
computer network all around the world.
Word "Internet" is the combination of two words "Inter" & "Net", Inter comes from
Interconnected and Net comes from Network.
Most of the user have misconception about Web and Internet, that both are same. but it is not
true. Because Internet is a network which provide more than hundred of service to the user (eg.
email, www, download, upload, ftp, etc), and web (www) is one of them.
Web Page:
Is a hypertext document connected to the World Wide Web. It is a document that is suitable for
the World Wide Web.
Web 1.0
o refers to the first stage in the World Wide Web (WWW). At the beginning of the WWW,
there were very few web content creators and many of them were so called "read only
web" since there were no user interaction. The feedback mechanism was thru private
email and direct comment was not available. (Founded in 1991 to 2004).
o is a content-delivery network which enables to showcase information on websites. It
could also be used as a personal website.
Web 2.0
o is the evolution of Web 1.0 by adding dynamic pages. In web 2.0, web pages are now
written using web programs such as PHP, Python, Ruby or Pearl-all dynamic
programming languages. Web 2.0 is the advent of the "read-write" web. The user is able
to see a website differently than others. It allows users to interact with the page;
instead of just reading the page, the user may be able to comment or create user
account. (from 2004 to present)
o is a participative-social web which allows user to interact and collaborate in a social
media dialogue as creator's user generate content in a virtual community.
Web 3.0
o this platform is all about semantic web. It aims to have machines (or servers)
understand the user's preferences to be able to deliver web content. (currently a work
in progress.)
o uses block-chain, smart-contracts, AI, and other internet technology to enable
decentralized, open and intelligent web that can create greater utility and value to
users. It allows user to control the data and identity that relies on a centralized
platforms.
Static Web Page: Is known as a flat page or stationary age in the sense that the page is "as is" and
cannot be manipulated by the user. The content is also the same for all users that is referred to as Web
1.0.
Dynamic Web Pages: It is mainly known as Web 2.0 which is the evolution of Web 1.0 by adding
dynamic web pages. The user is able to see website differently than others e.g. social networking sites,
wikis, video sharing sites.
FEATURES OF WEB 2.0
Software as a services – users will be subscribed to a software only when needed rather than
purchasing them. E.g: Google docs used to create and edit word processing and spread sheet, Microsoft
365.
Mass Participation – diverse information sharing through universal web access. Web 2.0's content is
based on people from various cultures. Since most users can use the Internet, Web 2.0’s content is
based on people from various cultures.
Convergence:
- Is the synergy of technological advancements to work on a similar goal or task. For example, besides
using your personal computer to create word documents, you can now use your smartphone.
- In short, convergence means unified which brings all related technologies together. Smartphones
might be the best possible example of such a convergence. Prior to the widespread adoption of
smartphones, consumers generally relied on a collection of single-purpose devices. Some of these
devices included telephones, wrist watches, digital cameras and global positioning system (GPS)
navigators.
Social Media:
- Is a website, application, or online channel that enables web users to create, co-create, discuss modify,
and exchange user generated content.
a. Social Networks – these are sites that allows you to connect with other people with the
same interests or background. Once the user creates his/her account, he/she can set up a
profile, add people, share content, etc. (FB, Google)
b. Bookmarking Sites – Sites that allow you to store and manage links to various website and
resources. Most of the sites allow you to create a tag to others. (Pinterest)
c. Social News – Sites that allow users to post their own news items or links to other news
sources. The users can also comment on the post and comments may also be rank. (Reddit)
d. Media Sharing – Sites that allow users to upload and share media content like images,
music, and video. (YT, Insta)
e. Microblogging – focus on short updates from the user. Those that subscribed to the user
will be able to receive these updates. (Twitter/X, Thread)
f. Blogs and Forums – allow user to post their content. Other users are able to comment on
the said topic. (WordPress, tumblr.)
Mobile Technologies:
- The popularity of smartphones and tablets has taken a major rise over the years. This is largely because
of the devices capability to do the tasks that were originally found in PCs. Several of these devices are
capable of using a high-speed internet. Today the latest model devices uses 4G Networking (LTE), which
is currently the fastest.
Assistive Media:
- is a non-profit service designed to help provide who have visual and reading impairments. A database
of audio recordings is used to read to the user. Example: Phone Magnifier – allows user to zoom in on
screen. Text-to-Speech – allows user to control the language setting and voice used to read text aloud
Cloud-Computing:
- Distributed computing on internet or delivery of computing service over the internet. Instead of
running an e-mail program on your computer, you log in to a Web. E-mail account remotely. The
software and storage for your account doesn't exist on your computer – it's on the service's computer
cloud.
1. Client computers – are the device that the end user interact with cloud.
2. Distributed Servers – often servers are in geographically different places, but server acts as if
they are working next to each other.
3. Datacenters – it is a collection of servers where application is placed and is accessed via
Internet.
Type of Clouds:
1. Public Cloud – allows systems and services to be easily accessible to the general public. Public
Cloud may be less secured because of its openness (e.g e-mail).
2. Private Cloud – allows systems and services to be accessible within an organization. It offers
increased security because of its private nature
3. Community Cloud – allows systems and services to be accessible by group of organizations
4. Hybrid Cloud - is a mixture of public and private cloud. However, the critical activities are
performed using private cloud while the non-critical activities are performed using public cloud.
1. E-mail Spam – also known as junk email, it is usually unsolicited commercial email sent from one
source with identical message sent to multiple recipients. Dangerous spams carry virus like
Trojan horse and other malicious software (malware). Spammer is the term used to refer to a
person who creates electronic spam.
2. E-mail Spoofing – refers to deceit email practice in which the sender address changes, so that it
would appear to have come from a different source usually someone you know. Email spoofing
is usually used by spammers to hide the origin of the spam.
3. Phishing – is a deceitful practice of trying to get confidential information such as passwords and
usernames, and credit card details by making it appear as if it comes from a trustworthy source.
4. Pharming – is a dangerous hacker on a website which directs all traffic to that website to
another fictitious website. The main object of pharming is to obtain username and password, as
well as credit card of the victims. Antivirus and anti-spyware software cannot prevent and
protect one from pharming.
5. Spyware – is a computer program that is installed covertly on a personal computer to collect
information or even take control over the computer without the nowledge of the user. A
spyware program would be able to monitor and collect information about the user and his
internet habits and practices. It is also known that spyware programs also affect the
performance and settings of the computer.
6. Computer Worm – is a dangerous computer program that replicates itself through a network.
Some worms delete files, others disrupt the network function and still, others send junk mail
from infected computer. Computer worm usually spreads by exploiting weaknesses in operating
system, and manufacturers of this software regularly send free updates to clients to prevent the
spread of the worms.
7. Trojan Horse – is a form of malicious software (malware) fronting to perform a good task, but
covertly performs undesirable function with the intention of entering the computer without the
user's consent. Once the malware is installed in the computer the Trojan horse can disable the
computer's defenses opening it to unauthorized entry. It can erase data, can allow access of the
victim's computer, can corrupt files, and can use Phishing for bank accounts.
8. Computer Virus – is a program that duplicates itself and then infects the computer. It spreads
like a real biological virus, wherein it attaches itself to a host program and infect other
computers as if it is received by computer through the internet. The virus can also be
transferred by the use of removable storage media.
9. Hacker – is a person who is able to enter and control other people's computer without
authorization. Usually, a hacker vandalizes the victim's website, steals personal information,
obtains intellectual property, and perform credit card fraud. Firewalls are able to prevent entry
by hackers.
Windows Security:
-Is sometimes necessary to protect important work and personal information stored in the computer.
There are also situations that you want to prevent other people from using your computer. Microsoft
Windows has security features that determine who can use and have access to your computer.
- Windows operating system provides user account in your operating system to determine and manage
the different kinds of users in one computer. This is to ensure the security and privacy of each user who
will use the computer.
- Most operating systems has a feature that allows you to lock the computer even when the computer is
in a screen saver mode. This means that, even if your computer is open, no one will be able to access
your computer account from a screen saver mode.
Security Center:
- The security Center of Windows is the place where you can set additional protection from threat to
your computer, especially when using the Internet. There are three important security settings
available:
1. Firewall - helps in protecting your computer from unauthorized entries, viruses, or worms
from the internet or network. It is recommended that you have this setting on.
2. Automatic Updates - is another feature on Windows which when turned on will automatically
download updates from Microsoft Windows Website. Many of the updates coming from the Microsoft
are usually meant to update some windows feature, secure areas of vulnerability, fix any bugs in the
operating system, and others.
3. Virus Protection - is usually about the current antivirus software installed in your computer.
Antivirus software is meant to locate, find and remove virus threats that are already in our computer. It
also prevents other malware (malicious software) from gaining entry into your computer.