Вы находитесь на странице: 1из 9

EMPOWERMENT TECHNOLOGIES

INFORMATION AND COMMUNICATIONS TECHNOLOGY (Information Technology)


-deals with the use of different communication technologies such as mobile phones, telephone, Internet to
locate, save, send and edit information.

ICT in the Philippines


-Philippines as the “ICT Hub of Asia”. It is because of the huge growth of ICT related jobs around the
country, one of which is the call center or BPO( Business Process Outsourcing) centers.
-Time magazines declared Makati City, Philippines-Rank 1 as the “Selfiest Cities around the world, And
Rank 9 is Cebu City.

WWW (World Wide Web) (Web 1.0)


-most webpages were static. Static (also known as flat page or stationary page) and cannot be manipulated
by the user.
-read only web
Web 2.0
-allows the user to interact with the page known as dynamic page. The user may be able to comment or
create a user account
Web 3.0 (Semantic Web
-it is described by Time Berners-Lee (Father of WWW) as the Read-write-execute web.

Trends in ICT
 Technology Convergence- it is an evolution of technological developments that merge into a
new system bringing together different types of applications and media.
 Social Media- is a website, application, or online channel that enables web users to create, co-
create, discuss, modify, and exchange user generated content. It is a collection of internet-based
communication tools and computer assisted channels dedicated to allow users to interact,
communicate, and share information in a virtual community and network.
Types of Social Media
a. Social Networks – these are sites that allows you to connect with other people with the same
interests or background.
Ex. Facebook and Google+
b. Bookmarking sites- these are sites that allow you to store and manage links to various website
and resources. Most of these sites allow you to create a tag and share them easily
c. Social News- sites that allow you users to post their own new items or links to other news
sources. The users can also comment on the post and comments may also be ranked.
d. Media Sharing- sites that allow you to upload and share media content like images, music and
videos.
e. Microblogging- sites that focus on short updates from the user. Those that subscribed to the
user will be able to receive these updates.
f. Blogs and Forums- websites allow user to post their content. Other users are able to comment
on the said topic.

 Mobile technologies- several of these devices are capable of using high-speed internet. Today the
latest model devices use 4G Networking (LTE), which is currently the fastest mobile network
Mobile OS
a. iOS- use in apple devices such as iPhone and iPad.
b. Android- an open source OS developed by Google. Being open source means mobile phone
companies use this OS for free.
c. Blackberry OS- use in Blackberry devices.
d. Windows Phone OS- a closed source and proprietary operating system developed by
Microsoft
e. Symbian- the original smartphones OS, used by Nokia devices.
f. WebOS- originally used in smartphones, now used in smart TVs.
g. Windows Mobile- developed by Microsoft for smartphones and pocket PCs.

 Assistive Media- is a non-profit service designed to help people who have visual and reading
impairments. A database of auio recordings is used to read to the user

Hashtag (#) – used to “categorize” posts in a website.

Online Platforms In ICT


-It makes it easier for users to interact, to collect, and use the data from the user’s interactions for their
own particular needs.
Online Platform Categories
 Social Media
 Ssearch Engines
 Communication Service
 Payment Systems
 Advertising Platforms
 Creative Content Outlet
Platforms
Web Search Engines
-It is a software system that is designed to search for information on the World Wide Web (WWW).The
search result are generally presented in a line of result referred to as Search Engine Results Page (SERPs).
The information may be mix of webpages, images, and other types of files.

Top 10 Search Engines (2016)


1. Google
2.Bing (Microsoft)
3.Yahoo (No.1 email provider)
4.Ask.com (Ask Jeeves)
5.AOL.com (America Online)
6.Baidu (China)
7.Wolframalpha (Computational Knowledge Engine)
8.DuckDuckGo (simple)
9.Internet Archive (histories of a domain)
10.ChaCha.com (similar to Ask.com)
Platforms
Communication Services
-These are outsourced enterprise communications solution that can be leased from a single vendor or
provider.
-A Communications Service Provider (CSP) is a provider that transports information electronically and
can encompass public and private companies in telecom, internet, cable, satellite, and managed services
business.
Example:
Telecom and Internet
 Smart
 PLDT
 Globe
 Sun

Cable

 SKY

Platforms

Payment System

-It is any system used to settle financial transactions through transfer of monatery value, and includes the
institutions, instruments, people, rules, procedures, standard, and technologies.

ExampleL:

 PayPal
 Cebuana Lhuiller
 MasterCard
 American Express
 VISA
 Land Bank
 Metro Bank
 Bank Of The Philippines Islands
 Banco De Oro
 PNB
 Union Bank
 PBCOM
 UCPB
 RCBC Savings Bank
 BC China Bank

Platforms

Advertising Platforms
-It allows users to create and manage advertising campaigns, and organizations that are associated with an
account.

Example:

 LAZADA
 Amazon
 EBAY.ph
 Ali express
 G.market
 ZALORA

Platforms

Creative Content Outlets

-It is content that needs to be translated creatively.

Topic\ concept *Creative presentation it.

Online Platforms

1. Presentation Tools- Prezi,Zoho Shows, MS PowerPoint.

2. Newsletter, ICT Content Platforms- Dropbox, Tumblr, Wix

3. Photo Editing Tools – Picasa,Adobe Photoshop, GIMP

4. Video Editing Tools- Sony Vegas Pro, Windows Movie Maker, Adobe Premier Pro

5. Photo uploading and hosting tools- Dropbox , Flickr

6. Online Collaborative Tools- Google Drive, Viber, Facebook

7. Cloud Computing –Dropbox ,Google Drive, Microsoft One Drive

8. Blog Tools- Blogger , WordPress, LiveJournal

9. Mapping Tools –Google Maps , Waze,Wikimapia

10. Music Production- Sony Vegas Pro, Audacity, Virtual DJ

11.Survey and Forms- Google Forms

12.ICT Projects and Content Publishing and Uploading Platforms- WordPress, MS Office Project Server,
File Manager

13.Web Design Platforms- Wix, Weebly, Adobe Dreamweaver

14.Web Management Platforms- Drupal, WordPress, Joomla


ONLINE SAFETY, SECURITY, ETHICS AND ETIQUETTE

Online safety/Internet safety-one of the biggest concerns every parent has for their children.

Common Concerns:

1. Malicious Users –Spam, phishing, cyberbullying, cyberstalking etc.

2.Websites and Software –malware, computer,viruses, etc.

3.Various types of obsence or offensive content.

ONLINE SECURITY or INTERNET SECURITY

- It is a tree branch of computer security specifically related to the internet..

- is defined as a process to create rules and actions to take to protect against attacks over the internet.

Example: online system that prevents credit card numbers from being stolen on a shopping website.

ONLINE ETIQUETTE OR INTERNET ETIQUETTE

 Is the correct or acceptable way of communicating or behaving on the internet.

Basic Rules That Should Follow

1.Think before you send

2. Respect the time and bandwith of others

3.Don’t send messages that could be misinterpreted as theartening or hurtful

4. Follow the conventions of writing when sending formal emails or posting online. For informal such as text
message to a friend, use correct spelling . Writing in ALL CAPS considered shouting

5. Respect other’s right to privacy

ONLINE ETHICS

 It is defined as a set of rules of acceptable online behaviour. It focuses on the social environment.
 Being a good netizen in the online world means:

1.Internet is not a new world but not extension of our existing society.

2.Understanding and accepting the laws online.

3.Acknowledgement of cultural differences.

4. Respecting the rights to privacy

Tips for Privacy and Security

 Websites covered in flashy ads


 Check for website safety
 Lock your Screen or Device
 Choose strong and varied password and secure it
 Avoiding spyware
 Minimizing info. And maximize privacy setting
 Singing in and out
 Use secure Network

DANGERS ON THE INTERNET

Email Spam
 AKA Junk Mail
 Usually unsolicited commercial email sent from an unknown source with identical message sent
to multiple recipients.
 Usually not dangerous but can be time and space consuming.
 Dangerous ones can carry viruses and other malicious software (Malware)

Email Spoofing

 It is a deceitful email practice in which the sender address is changed, so that it would appear to
have come from a different source which is usually someone you know.
 Email spoofing is usually used by spammers to hide the origin of the spam.

Phishing

 It is a deceitful practice of trying to get confidential information such as passwords and


usernames , and credit cards details by making it appear as if it comes from a trustworthy source.
 It is usually done through emails or using popular entity such as Microsoft, Yahoo, Google,
Amazon, and financial institutios.

Pharming

 This is a dangerous hacker attack on a website which directs all traffic to that website to another
fictitious website.
 The main objective is to obtain username and passwords, as well as credit cards ad financial
information, and use these to steal their money electronically or use the credit cards of the
victims.
 It is a major concern of many online banking and electronic commerce transactions.

Spyware

 A computer program that is installed covertly on personal computer to collect information or


even take control over the computer without the knowledge of the user.
 It can monitor and collect information about the user’s internet habits and pratices.
 It can also affect the performance and setting of the computer.
Computer Worm

 It is a dangerous computer program that replicates itself through a network


 Some worms delete files, others disrupt the network function.
 It is usually spread through email and running of attachments from suspicious sources.
 It spreads by exploiting weaknesses in operating systems (but BLESS OS updates!)

Trojan Horse

 A malware fronting to perform a good task, but covertly performs undersirable function with the
intention of entering the computer without the user’s name.
 It can disable the computer’s defences, opening it to unauthorized entry. I t can erase data, can
corrupt files, allow access to computer, and

Computer Virus

 It is a program that duplicates itself and then infects the computer. It spreads like a biological
virus.
 It can be transferred by the use of removable storage media devices.
 Damages may be mild to serve.

Hacker

 This is a person who is able to enter and control other people’s computer without authorization.
 Usually vandalizes the victim’s website, steals personal information, obtains intellectual property,
and performs credit card fraud.
 Firewalls are able to prevent entry by hacker.

WINDOWS SECURITY

1. Changing and adding User accounts

2.Creating a new password

3.Setting up/ changing the screen saver security setting, and

4. Fortifying the security center

Changing and Adding User Accounts

Possible user’s of your account are your parents, siblings, children, friends, lover, etc.

The disadvantage of having a single account is that everyone who uses the computer will share the same
application setting, files , and system permissions.

KINDS OF ACCOUNTS

1. Computer Administrator – controls all the contents and users of the computer, installs, programs, and
adds and deletes users.
2. Limited Account- has limited control and only have access to his/ her particular account .

3. Guest- accounts created for transient users and do not have access to other computer accounts and their
content.

Creating a Password

This is one of the first line of defense for information security.

It must be:

1. Case sensitive

2.At least 8 characters using letters, symbols, and/or numbers.

3. Hard to guest.

4. Something you could always remember.

10 COMMANDMENTS OF COMPUTER ETHICS

1. Thou shalt not use a computer to harm other people.

2. Thou shalt not interfere with other people’s computer work.

3. Thou shalt not snoop around in other people’s files.

4. Thou shalt not use a computer to steal.

5.Thou shalt not use a computer to bear false witness.

6. Thou shalt not use or copy software which you have not paid (ouch…)

7. Thou shalt not use other peoples computer resources without authorization.

8. Thou shalt not appropriate other peoples intellectual output.

9. Thou shalt think about social consequences of the program you write.

10. Thou shalt use a computer in many ways that show considerati.
CONTEXTUALIZED ONLINE SEARCH AND RESEARCH SKILL

Online Search

Online Search is the progress of interactively searching for and retrieving requested information via a
computer from databases that are online.

Advantages and Disadvantages

Advantages:

 Speed and accuracy


 Outstanding level of information
 Broad information
 Quite comfortable
 Flexibility
 Easy and saves time

Disadvantages:

 Unavailability in certain areas


 Lack of security
 No quality of information
 Arrangement
 Distracting and misleading

Research Skills:

 Identity your keywords


 Develop your research strategy
 Search for books- includes your evaluating search results
 Search for journals- online and print media
 Cite your sources
 Manage your bibliography

Вам также может понравиться