Академический Документы
Профессиональный Документы
Культура Документы
Trends in ICT
Technology Convergence- it is an evolution of technological developments that merge into a
new system bringing together different types of applications and media.
Social Media- is a website, application, or online channel that enables web users to create, co-
create, discuss, modify, and exchange user generated content. It is a collection of internet-based
communication tools and computer assisted channels dedicated to allow users to interact,
communicate, and share information in a virtual community and network.
Types of Social Media
a. Social Networks – these are sites that allows you to connect with other people with the same
interests or background.
Ex. Facebook and Google+
b. Bookmarking sites- these are sites that allow you to store and manage links to various website
and resources. Most of these sites allow you to create a tag and share them easily
c. Social News- sites that allow you users to post their own new items or links to other news
sources. The users can also comment on the post and comments may also be ranked.
d. Media Sharing- sites that allow you to upload and share media content like images, music and
videos.
e. Microblogging- sites that focus on short updates from the user. Those that subscribed to the
user will be able to receive these updates.
f. Blogs and Forums- websites allow user to post their content. Other users are able to comment
on the said topic.
Mobile technologies- several of these devices are capable of using high-speed internet. Today the
latest model devices use 4G Networking (LTE), which is currently the fastest mobile network
Mobile OS
a. iOS- use in apple devices such as iPhone and iPad.
b. Android- an open source OS developed by Google. Being open source means mobile phone
companies use this OS for free.
c. Blackberry OS- use in Blackberry devices.
d. Windows Phone OS- a closed source and proprietary operating system developed by
Microsoft
e. Symbian- the original smartphones OS, used by Nokia devices.
f. WebOS- originally used in smartphones, now used in smart TVs.
g. Windows Mobile- developed by Microsoft for smartphones and pocket PCs.
Assistive Media- is a non-profit service designed to help people who have visual and reading
impairments. A database of auio recordings is used to read to the user
Cable
SKY
Platforms
Payment System
-It is any system used to settle financial transactions through transfer of monatery value, and includes the
institutions, instruments, people, rules, procedures, standard, and technologies.
ExampleL:
PayPal
Cebuana Lhuiller
MasterCard
American Express
VISA
Land Bank
Metro Bank
Bank Of The Philippines Islands
Banco De Oro
PNB
Union Bank
PBCOM
UCPB
RCBC Savings Bank
BC China Bank
Platforms
Advertising Platforms
-It allows users to create and manage advertising campaigns, and organizations that are associated with an
account.
Example:
LAZADA
Amazon
EBAY.ph
Ali express
G.market
ZALORA
Platforms
Online Platforms
4. Video Editing Tools- Sony Vegas Pro, Windows Movie Maker, Adobe Premier Pro
12.ICT Projects and Content Publishing and Uploading Platforms- WordPress, MS Office Project Server,
File Manager
Online safety/Internet safety-one of the biggest concerns every parent has for their children.
Common Concerns:
- is defined as a process to create rules and actions to take to protect against attacks over the internet.
Example: online system that prevents credit card numbers from being stolen on a shopping website.
4. Follow the conventions of writing when sending formal emails or posting online. For informal such as text
message to a friend, use correct spelling . Writing in ALL CAPS considered shouting
ONLINE ETHICS
It is defined as a set of rules of acceptable online behaviour. It focuses on the social environment.
Being a good netizen in the online world means:
1.Internet is not a new world but not extension of our existing society.
Email Spam
AKA Junk Mail
Usually unsolicited commercial email sent from an unknown source with identical message sent
to multiple recipients.
Usually not dangerous but can be time and space consuming.
Dangerous ones can carry viruses and other malicious software (Malware)
Email Spoofing
It is a deceitful email practice in which the sender address is changed, so that it would appear to
have come from a different source which is usually someone you know.
Email spoofing is usually used by spammers to hide the origin of the spam.
Phishing
Pharming
This is a dangerous hacker attack on a website which directs all traffic to that website to another
fictitious website.
The main objective is to obtain username and passwords, as well as credit cards ad financial
information, and use these to steal their money electronically or use the credit cards of the
victims.
It is a major concern of many online banking and electronic commerce transactions.
Spyware
Trojan Horse
A malware fronting to perform a good task, but covertly performs undersirable function with the
intention of entering the computer without the user’s name.
It can disable the computer’s defences, opening it to unauthorized entry. I t can erase data, can
corrupt files, allow access to computer, and
Computer Virus
It is a program that duplicates itself and then infects the computer. It spreads like a biological
virus.
It can be transferred by the use of removable storage media devices.
Damages may be mild to serve.
Hacker
This is a person who is able to enter and control other people’s computer without authorization.
Usually vandalizes the victim’s website, steals personal information, obtains intellectual property,
and performs credit card fraud.
Firewalls are able to prevent entry by hacker.
WINDOWS SECURITY
Possible user’s of your account are your parents, siblings, children, friends, lover, etc.
The disadvantage of having a single account is that everyone who uses the computer will share the same
application setting, files , and system permissions.
KINDS OF ACCOUNTS
1. Computer Administrator – controls all the contents and users of the computer, installs, programs, and
adds and deletes users.
2. Limited Account- has limited control and only have access to his/ her particular account .
3. Guest- accounts created for transient users and do not have access to other computer accounts and their
content.
Creating a Password
It must be:
1. Case sensitive
3. Hard to guest.
6. Thou shalt not use or copy software which you have not paid (ouch…)
7. Thou shalt not use other peoples computer resources without authorization.
9. Thou shalt think about social consequences of the program you write.
10. Thou shalt use a computer in many ways that show considerati.
CONTEXTUALIZED ONLINE SEARCH AND RESEARCH SKILL
Online Search
Online Search is the progress of interactively searching for and retrieving requested information via a
computer from databases that are online.
Advantages:
Disadvantages:
Research Skills: