0% found this document useful (0 votes)
3 views

EMTECH-Notes-First-Summative

The document discusses Empowerment Technologies, emphasizing their role in communication, modernization, and the use of various digital tools. It outlines the evolution of the Internet from Web 1.0 to Web 3.0, highlights the importance of online safety, and provides tips for protecting personal information and maintaining good netiquette. Additionally, it covers the significance of assistive media for individuals with disabilities and the risks associated with sharing personal information online.

Uploaded by

hannah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

EMTECH-Notes-First-Summative

The document discusses Empowerment Technologies, emphasizing their role in communication, modernization, and the use of various digital tools. It outlines the evolution of the Internet from Web 1.0 to Web 3.0, highlights the importance of online safety, and provides tips for protecting personal information and maintaining good netiquette. Additionally, it covers the significance of assistive media for individuals with disabilities and the risks associated with sharing personal information online.

Uploaded by

hannah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

EMPOWERMENT TECHNOLOGIES Deals with the use of different communication tools

such as telephone, mobile phones, Internet, etc. to


locate, save, send, and edit information.
3 importance of Empowerment Technologies
 communication ICT in the Philippines
 make our lives easier
 help our country for its modernization plans ICT Hub of Asia
Rank 1- Makati City

Modernization Rank 9- Cebu City

We are now living in a world where everyone is


upgrading its system
World Wide Web
- Commonly referred to as WWW, W3, or web is an
Empowerment technologies can help in modernization interconnected system of public web pages accessible
because it can strengthen our plans to be competitive through the internet invented by Tim Berners-
with other countries by building up some new Lee in 1989.
technologies for the betterment of our nation. Web 1.0
- The first generation of the Internet when most
websites were read-only or static

ICT - Webpages are usually just single files in Hypertext


Markup Language (html or htm) format
Web 2.0
INFORMATION
- The second generation of the Internet is dynamic and
- Refers to the ideas or concepts obtained from reading, focuses on user participation
investigation, study or research which are transmitted
through media such as telephone, television and radio. - This allows for the creation of interactive application

- Information is necessary to make decisions and to


predict the future. Features of Web 2.0
Folksonomy- enables users to find information in an
organized way
COMMUNICATION Rich user experience- It has a dynamic and interactive
- Means of transmitting messages or sending and content
receiving information between individuals using User participation- helps with the flow of information
symbols, signs or verbal interactions between the user and the owner of a certain website

- The use of the Internet, e-mail or video conferencing. Mass participation- Allows universal web access from a
traditional internet user to a wider variety of users

Long Tail- Services that are offered on demand rather than


TECHNOLOGY on a one-time purchase
Software as a Service (SAAS)- Allows the user to
- The use of scientific knowledge, experience and subscribe to a software rather than purchasing them
resources to create processes and products that fulfill
human needs.
Web 3.0
Information and Communications Technology
- Third version of the internet which is an upgrade of
Web 2.0.
 Real-time - Refer to devices ranging from basic mobile phones to
 Everywhere tablet PCs, PDAs, MP3 players, memory sticks, e-
 Machine Learning readers, and smartphones

- The popularity of smartphones and tablets has taken a


Trends in ICT major rise over the years. This is largely because of the
devices’ capability to do tasks that were originally found
in personal computers.
Technological Convergence
- is an evolution of technological developments that
integrate different types of applications and media to Mobile devices use different OS:
form a new system. a) iOS
- is the combination of two or more different entities of b) Android - open source operating system
technologies to create a new single device developed by Google.
c) Windows Phone OS- closed source OS
developed by Microsoft
Social Media d) Symbian
e) WebOS - used for smart TVs
- it is a website, application, or online channel that
enables web users to create, co-create, modify, and f) Windows Mobile – developed by Microsoft for
exchange user-generated content smartphones and pocket PCs

Assistive Media
TYPES OF SOCIAL MEDIA
- A technology that includes assistive, adaptive, and
1) SOCIAL NETWORKS - Enables people to
rehabilitative devices for people with disabilities and
connect with other people with the same interests or
also includes the process used in selecting, locating, and
background
using them
2) BOOKMARKING SITES - Sites that allow
users to store and manage links to various websites and - It enables people to perform tasks by changing
resources, and to tag methods of interacting with the technology needed to
3) SOCIAL NEWS - Sites that allow users to post accomplish such tasks.
their own news articles or links to other news sources
and comment to the post or vote on the news articles of
the website VISUAL IMPAIRMENTS

4.) MEDIA SHARING - Sites that allow users to Screen readers, braille and braille embossers, desktop,
upload and share media content like music, images and video magnifier, screen magnification software, large-
video print and tactile keyboards

5) MICROBLOGGING - Sites that focus on short MOBILITY IMPAIRMENTS


updates from the user wherein subscribers of this user Wheelchairs, transfer devices, walkers, prosthesis
will be able to receive these updates
6) BLOGS and FORUMS - Websites that allow
users to post their content where users are able to HEARING IMPAIRMENTS
comment to the said topic Hearing aids, assistive listening devices, amplified
telephone equipment
Mobile Technologies

Online Safety and Security


Types of information and Risk 1. Be mindful of what you share online and what
site you share it to.
1. First Name There is still a risk in sharing your first 2. Do not just accept terms and conditions; read it.
name. Chances are that a hacker already knows 3. Know the security features of the social
plenty of stuff about you even if you only give out networking site you use. By keeping your profile
your first name. You cannot just walk in a room and private, search engines will not be able to scan
start introducing yourself to everyone. You do not your profile.
know whom you can come across with. 4. Do not share your password with anyone.
2. Last Name If sharing your first name is a small 5. Avoid logging in to public networks/Wi-Fi.
risk, having both your first and last is riskier. You Browsing in “incognito (or private) mode will
will be vulnerable to being searched for using NOT protect you from hackers.
search engines, which include image search. 6. Do not talk to strangers whether online or face-
Matching a name with a face can led to several to-face.
cybercrimes like identity theft. 7. Never post anything about a future vacation. It
3. Middle Name Sharing just your middle name is is like posting, “Rob my house at this date.”
probably not the riskiest of these shared 8. Add friends you know in real life.
information, but sharing your entire full name 9. Avoid visiting untrusted websites.
would be, 10. Install and update an antivirus software on your
4. Current and Previous School(s) Most people computer. Use only one anti-virus software to
who steal identities study their subject. They can avoid conflicts.
use this information for verification purposes. 11. If you have Wi-Fi at home, make it private
5. Your Cellphone Number Your cellphone network by adding a password.
number should never be posted over the Internet. 12. Avoid downloading anything from untrusted
The Internet is a public place. It is the same as websites.
posting your number on a billboard. 13. Buy the software, do not use pirated ones.
6. Who your Mother and Father are Risky, yet 14. Do not reply or click links from suspicious
not as risky as posting their full names, especially emails.
your mother’s maiden name. In fact, if you have 15. Make Online Purchases from Secure Sites
already encountered many websites that require
your mother’s maiden name as an answer to a
secret question whenever you lose your password.
7. Who your siblings are This is a huge risk,
especially if you have younger siblings. Strangers The Internet is defined as the information
may pretend or use their identity to dupe you. superhighway. This means that anyone has access to
8. Your address Hopefully you answered no to this this highway, can place information, and can grab that
one. Giving the Internet your number is one thing, information. This is why social networking sites like
giving them your address is a whole other level. It Facebook continue to improve their security features.
would be much easier for criminals to find you. The threat of cybercrime is very real. Whatever
9. Your home phone number This shared information we share today could affect our future.
information is riskier than sharing your personal
phone number. Scams usually use this information
to deceive you, one of which is when a stranger
pretends to know your parents or pretends to be
you.
10. Your birthday Letting people know your
birthday is probably a must if you want to get as
many gifts as possible. But having it your profile
makes you vulnerable to identity theft.

Tips to Stay Safe Online

Internet Threats
1. Malware – or malicious software, is any program 1. Before your post something on the web, ask these
or file that is harmful to a computer user. questions to yourself:
Types of Malwares:  Would you want your parents or grandparents
to see it?
a) Virus - a malicious program designed to replicate
 Would you want your future boss to see it?
itself and transfer from one computer to another
(internet, local networks, FDs, CDs, etc.)
b) Worm - a malicious program that transfers from 2. If you feel that a post can affect you or other’s
one computer to another by any type of means. reputation, ask the one who posted it to pull it down or
Ex. ILOVEYOU Worm - The malware originated report it as inappropriate.
in the Pandacan neighborhood of Manila in the
Philippines on May 5, 2000. Copyright Infringement
c) Trojan - a malicious program that disguises as a It is the use of works protected by copyright law
useful program but once downloaded or installed, without permission for a usage where such permission
leaves your PC unprotected and allows hackers to is required.
get your information.
d) Spyware - a program that runs in the background Here are some tips that could help you avoid copyright
without you knowing it (thus called “spy”). It has infringement:
the ability to monitor what you are currently doing 1. Always assume that the work is copyrighted.
and typing through keylogging. 2. Do not copy, share or alter without seeking
Ex. Keylogger – used to record keystrokes done permission.
by the user. This is done to steal their password 3. Review and retain licensing agreements.
or any other sensitive information. The key 4. Consider buying content.
logger software typically uses log file to store its 5. Give credit to the original author of the page or
recording. information
e) Adware - a program designed to send you
advertisements, mostly as pop-ups. Rules for Good Netiquette
f) Ransomware - or ransom software is a type of
1. Avoid posting inflammatory or offensive
malicious software from cryptovirology that
comments online (aka flaming).
threatens to publish the victim's data or
2. Respect others' privacy by not sharing personal
perpetually block access to it unless a ransom is
information, photos, or videos that another
paid.
person may not want published online.
3. Never spam others by sending large amounts of
unsolicited email.
2. Spam – an unwanted email mostly from bots or 4. Show good sportsmanship when playing online
advertisers. It can be used to send malware. games, whether you win or lose.
5. Don't troll people in web forums or website
comments by repeatedly nagging or annoying
3. Phishing – its goal is to acquire sensitive personal them.
information like passwords and credit card details. 6. Stick to the topic when posting in online forums
or when commenting on photos or videos, such
This is done by sending you an e-mail that will direct the
as YouTube or Facebook comments.
user to visit a fake website and be asked to update
7. Don't swear or use offensive language
his/her username, password, credit card or personal
8. Avoid replying to negative comments with more
information.
negative comments. Instead, break the cycle
with a positive post.
9. If someone asks a question and you know the
answer, offer to help.
10. Thank others who help you online.

Protecting Reputations Online

You might also like