Вы находитесь на странице: 1из 10

Written Report in ICT

Empowerment of ICT

Group1

Prepared by:
Eunice Nicole G. Santiago
Mark Anthony Domingo
Andre Muan
Nathaniel Masanque
Huebert Losorata
John Brix Pagco
John Infante
Prepared for:
Ms. Angel Libid

The Current State of ICT

The Internet
The Internet can be divided into generations. Each generation
represents the combination of technologies, trends and ways of thinking
that drive the development of the Internet. For now, there a 3
recognizable generations; Web 1.0, Web 2.0 and Web 3.0.

Web 1.0- is the name given to the first generation of the Internet.

Static websites
Websites from the Web 1.0 generation are mostly read-only or static.
The main characteristic of a static web page is that they are delivered to
the users exactly as they are stored.

Web 2.0 -represents the second generation of the Internet. Unlike Web
1.0 where users are merely audiences or readers who absorb information
from websites, Web 2.0 focuses on user participation.
Dynamic Websites
In contrast with static websites, dynamic websites can change their

appearance and behavior based on the users’ actions.

Social Media
One of the biggest elements of Web 2.0.

Web 3.0-Some people are already referring to the current generation of


the Internet as Web 3.0.

Web 3.0’s main characteristics include, but are not limited to:

1.Real-time
Events and information are made available to users as they happen.
2. Ubiquitous
Users are always connected to the Internet.
3. Machine learning
Computers and mobile devices can create data and make decisions
based on

the user’s previous actions.


Web Applications -Web applications are internet-based programs that
are accessed through web browsers.

Web Apps vs Native Apps


Native applications are programs that are directly installed in a
computer or mobile device. Unlike web apps that are accessed through
web browsers, native apps can be run independently in the computer or
device that they are installed in.

Cloud Computing-
Cloud computing is the name given to Internet-based networks that are
used to store, manage, and share resources and information. To better
understand this concept, first we need to learn some new terms:

Server, client, and service


A server is a computer that does tasks for other computers. A task that
is done by a server is called a service. The computer that accesses the
services that are provided by a server is called a client.

The cloud

First of all, “the cloud” is not an actual cloud. The cloud is a network of
servers that provide different services.
Benefits of Cloud Computing

1. Reduced Cost-Subscribing to cloud-based services is a lot cheaper than


traditional options such as building your own programs, buying your own
hardware, and hiring more people.
2. Flexibility-Cloud-based services can be upgraded or downgraded to
suit the clients’ need.
3. Mobility- Because cloud-based services rely on the Internet, clients
can access them using computers and mobile devices in different
locations.
4. Better Collaboration-The cloud enables people in different location to
work on the same project.
5. Updated Software-Providers of cloud-based services compete with
each other in delivering the best services to clients. Because of this,
cloud-based apps are constantly improved and these improvements are
immediately made available to the clients.

Online Safety and Security

Information Security
Full Name-Almost every app and website with a log-in feature require
your full name.

Username
A username is an alias that represents your online presence. It can be
your real name or combinations that totally depend on your creativity.
Password
The password is one of the most important bits of information in the
Internet.

Birth Date
Birth dates are mostly required to determine if you are old enough to
access certain contents and features in the Internet. Sometimes, it is also
used in security checks to determine if it is indeed the rightful owner who
is accessing the account since birth dates are not usually widely known.

Home Address and Locations

Some online services ask for users’ home address. Some apps can
automatically determine your current location using your device’s GPS
(Global Positioning System) feature. They do this in order to give you
location-specific contents and options.

Phone Numbers
Phone numbers are usually required by many online services in order
to have a direct line to their clients.

Email Address
Almost every website that has a sign-up feature requires an email
address to confirm the user’s identity.

Financial information
This includes bank account names, account numbers, credit card
numbers and security details like pin codes and answers to security
questions.

Malware: Online Threats

1. Virus
2. Worm
3. Trojan
4. Spam
5. Ad ware
6. Phishing

How to Avoid Malware


1. Install an anti-virus program.
2. Do not submit your email address to suspicious looking websites.

3. Don’t fall for obvious tricks.

4. Don’t open spam emails.


5. Do not click suspicious looking links.
6. Read before you install.
7. Do not download pirated contents.
8. Install an ad-blocker.
Netiquette

Formal Netiquette
Netiquette can be formal or informal. Formal Netiquette involves a
strict set of rules that are imposed by online groups like message boards,
chat rooms and social media sites.

The following are examples of such actions:


1. Foul language
2. Spamming
3. Bullying
4. Trolling
5. Sock puppets
6. Flame Wars

Plagiarism

Plagiarism is the practice of using someone else’s work as if it is yours.


Piracy
Piracy is the act of reproducing and distributing materials without the
owner’s consent.
Books
Musics
Bootlegging
Counterfeiting

Film
Movies and TV shows are pirated either physically, by making and
selling hard copies or virtually, by distributing unlicensed copies online.
Software
Copyright

Informal Netiquette

1. The Golden Rule

“Do unto others as you would have them do unto you.”


2. Act as you would in real life.
3. Know where you are and act accordingly.

4. Respect people’s privacy.

5. Respect other people’s properties

Mobile Device Etiquette

1. Talking too loudly on your phone.


2. Making long phone calls.
3. Putting the other party on loud speaker.
4. Using loud or annoying ring tones/notification sounds.
5. Playing music, videos, and games too loudly.
6. Taking pictures or videos of live performances.
7. Using your phone in cinemas.
8. Taking pictures and videos without asking permission.
9. Using your mobile device while waiting in line.
10. Using your mobile device while driving.
11. Using your mobile device while walking.
12. Wearing earphones/headphones while walking.
13. Using your mobile device in social gatherings and important events

Вам также может понравиться