Академический Документы
Профессиональный Документы
Культура Документы
Empowerment of ICT
Group1
Prepared by:
Eunice Nicole G. Santiago
Mark Anthony Domingo
Andre Muan
Nathaniel Masanque
Huebert Losorata
John Brix Pagco
John Infante
Prepared for:
Ms. Angel Libid
The Internet
The Internet can be divided into generations. Each generation
represents the combination of technologies, trends and ways of thinking
that drive the development of the Internet. For now, there a 3
recognizable generations; Web 1.0, Web 2.0 and Web 3.0.
Web 1.0- is the name given to the first generation of the Internet.
Static websites
Websites from the Web 1.0 generation are mostly read-only or static.
The main characteristic of a static web page is that they are delivered to
the users exactly as they are stored.
Web 2.0 -represents the second generation of the Internet. Unlike Web
1.0 where users are merely audiences or readers who absorb information
from websites, Web 2.0 focuses on user participation.
Dynamic Websites
In contrast with static websites, dynamic websites can change their
Social Media
One of the biggest elements of Web 2.0.
Web 3.0’s main characteristics include, but are not limited to:
1.Real-time
Events and information are made available to users as they happen.
2. Ubiquitous
Users are always connected to the Internet.
3. Machine learning
Computers and mobile devices can create data and make decisions
based on
Cloud Computing-
Cloud computing is the name given to Internet-based networks that are
used to store, manage, and share resources and information. To better
understand this concept, first we need to learn some new terms:
The cloud
First of all, “the cloud” is not an actual cloud. The cloud is a network of
servers that provide different services.
Benefits of Cloud Computing
Information Security
Full Name-Almost every app and website with a log-in feature require
your full name.
Username
A username is an alias that represents your online presence. It can be
your real name or combinations that totally depend on your creativity.
Password
The password is one of the most important bits of information in the
Internet.
Birth Date
Birth dates are mostly required to determine if you are old enough to
access certain contents and features in the Internet. Sometimes, it is also
used in security checks to determine if it is indeed the rightful owner who
is accessing the account since birth dates are not usually widely known.
Some online services ask for users’ home address. Some apps can
automatically determine your current location using your device’s GPS
(Global Positioning System) feature. They do this in order to give you
location-specific contents and options.
Phone Numbers
Phone numbers are usually required by many online services in order
to have a direct line to their clients.
Email Address
Almost every website that has a sign-up feature requires an email
address to confirm the user’s identity.
Financial information
This includes bank account names, account numbers, credit card
numbers and security details like pin codes and answers to security
questions.
1. Virus
2. Worm
3. Trojan
4. Spam
5. Ad ware
6. Phishing
Formal Netiquette
Netiquette can be formal or informal. Formal Netiquette involves a
strict set of rules that are imposed by online groups like message boards,
chat rooms and social media sites.
Plagiarism
Film
Movies and TV shows are pirated either physically, by making and
selling hard copies or virtually, by distributing unlicensed copies online.
Software
Copyright
Informal Netiquette