Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Lesson 1

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 31

Lesson 1: Computers are Everywhere A Website is a combination of different web pages linked together

Website is a combination of different web pages linked together in a certain fashion according to

the designer’s will and organizational need served through the same domain name server. The

developed website is prepared and maintained by a person, group or an organization.

A webpage ICT or Information and Communications Technology is the umbrella that includes

any communication device or application, encompassing: radio, television, cellular phones, computers,

etc.

It is a term that can be easily understood by subdividing the meaning further into the words that

comprise it: information, communication and technology.

Information is technically referred to as data (once processed in a computer) which is accurate and

timely committed and organized for a purpose. Communication, on the other hand, is the conveying of

information between two or more people through a specific medium. While Technology is the

acquisition, analysis, manipulation, storage and distribution of information; and the design and

provision of equipment and software for these purposes.

The way we communicate has been greatly influenced by ICT in so many ways. In terms of

convenience, time, and money, ICT paved the way to these evolutions.

INFORMATION AND COMMUNICATIONS TECHNOLOGY: AN OVERVIEW

TECHNOLOGY-presently includes advancements in communication and how information is

handled, thus enabling governments, organizations, industries and ordinary individuals to improve on

their decision making, business processes and everyday living.

ICT- deals with the use of different communication technologies such as mobile phones, telephone,

Internet to locate, save, send and edit information. It is a study of computers as data processing tools.

It introduces students to the fundamental of using computer systems in an internet environment.

ICT in the Philippines

Philippines is dub as the ‘’ICT Hub of Asia” because of huge growth of ICT-related jobs, one of which

is BPO, Business Process Outsourcing, or call centers. ICT Department in the Philippines is

responsible for the planning, development and promotion of the country’s information and

communications technology (ICT) agenda in support of national development.

DIFFERENT ONLINE PLATFORMS OF THE WORLD WIDE WEB


1. Web 1.0

The first stage of World Wide Web when most webs were entirely made up of web pages connected

by hyperlinks more commonly described as static. Static (also known as flat page or stationary page)

in the sense that the page is “as is” and cannot be manipulated by the user. The content is also the

same for all users.

2. Web 2.0

The evolution of Web 1.0 by adding dynamic web pages—the user is able to see a website differently

than others—and it provides a deep and rich experience. This pertains to the current state of online

technology as it compared to the early days of the Web, characterized by greater user interactivity

and collaboration, more pervasive network connectivity and enhanced communication channels.

Features of Web 2.0

1. Folksonomy.

It allows users to categorize and classify/arrange information using freely chosen keywords

(e.g., tagging). Popular social networking sites such as Twitter, Instagram, Facebook, etc. use tags

that start with the pound sign (#). This is also referred to as hashtag.

2. Rich User Experience.

Content is dynamic and is responsive to user’s input. An example would be a website that

shows local content. In the case of social networking sites, when logged on, your account is used to

modify what you see in their website.

3. Long Tail.

Services are offered on demand rather than on a onetime purchase. In certain cases, timebased pricing
is better than file-size-based pricing or vice versa. This is synonymous to subscribing

to a data plan that charges you for the amount of time you spent in the Internet, or a data plan that

charges you for the amount of bandwidth you used.

4. User Participation.

The owner of the website is not the only one who is able to put content. Others are able to

place a content of their own by means of comment, reviews, and evaluation. Some websites allow

readers to comment on an article, participate in a poll, or review a specific product (e.g.,

Amazon.com, Shopee, Lazada, Zalora, other online stores).


5. Software as a Service.

Users will subscribe to a software only when needed rather than purchasing them. This is a

cheaper option if you do not always need to use a software. For instance, Google Docs is a free

web-based application that allows the user to create and edit word processing and spreadsheet

documents online. When you need a software, like a Word Processor, you can purchase it for a onetime
huge amount and install it in your computer and it is yours forever. Software as a service allows

you to “rent” a software for a minimal fee.

6. Mass Participation.

It is a diverse information sharing through universal web access. Since most users can use

the Internet, Web 2.0’s content is based on people from various cultures.

3. Web 3.0

This platform is all about semantic web. Semantic Web is a movement led by the World

Wide Web Consortium (W3C).

According to the W3C, “The Semantic Web provides a common framework that allows data

to be shared and reused across application, enterprise, and community boundaries.”

The aim of Web 3.0 is to have servers (machines) understand the user’s preferences to be

able to deliver web content specifically targeting the user. For example, while using social media,

have you experienced being shown advertisements, pages or groups similar to what king of ads,

groups and pages you usually interacted with or liked. It’s labeled as based on groups or pages you

liked.

TRENDS IN ICT

1. CONVERGENCE

Technological convergence is the synergy of technological advancements to work on a similar goal

or task.

2. SOCIAL MEDIA

Social media is a website, application, or online channels that enable web users to create, cocreate,

discuss, modify, and exchange user-generated content.

6 TYPES OF SOCIAL MEDIA

1. Social Networks. that allow you to connect with other people of the same interest or background.
Example: Facebook, Google+

2. Bookmarking Sites. These are sites that allow you to store and manage links to various websites

and resources. Example: Pinterest

3. Social News. These are sites that allow users to post their own news items or links to other news

sources. Example: Reddit, Digg

4. Media Sharing. These are sites that allow you to upload and share media content like images,

music, and video. Example: YouTube, Instagram

5. Microblogging. These are sites that focus on short updates from the user. Example: Twitter

6. Blogs and Forums. These websites allow users to post their content. Example: Blogger,

WordPress, Tumblr

3. MOBILE TECHNOLOGIES

The popularity of smartphones and tablets has taken a major rise over the years. This is largely

because of the devices’ capability to do tasks that were originally found in personal computers.

a. iOS – used in Apple devices such as iPhone and iPad

b. Android – an open source OS developed by Google. Open source means mobile companies use

this for free.

c. Blackberry OS – used in Blackberry devices.

d. Windows Phone OS – a closed source and proprietary operating system developed by Microsoft.

e. Symbian – the original smartphone OS used by Nokia devices.

f. WebOS – originally used in smartphones, now used in smart TVs.

g. Windows Mobile – developed by Microsoft for smartphones and pocket PCs.

4. ASSISTIVE MEDIA

Assistive media is a nonprofit service designed to help people who have visual and reading

impairments. A database of audio recordings is used to read to the user.

5. CLOUD

Distributed computing on the internet or delivery of computing service over the internet. Example:

Gmail, Yahoo!

VI. Agreement

For Learning Activity please write your answer on the Worksheet/Activity sheet provided or
on a one whole sheet of paper. You will pass the activity on Friday. You may also take a photo of

your activity with answer and upload it on our LMS.

You should also check your LMS account for some announcement and or/ online quizzes.

VII. Assessment

The teacher will announce an online assessment/quiz/ quarterly assessment. Please be

online at the time of our online learning which is listed on the assignment section.

VIII. Reference

Rex publishing. (2016). Empowerment Technologies (1st ed., pp. 2-15). Manila.

DepEd. (2020). K-12 Most Essential Learning Competencies with Corresponding Codes [Ebook]

(1st ed., pp. 548-551). Manila. Retrieved from https://lrmds.deped.gov.ph/

Prepared by:

Ms. ELLAINE M. LACATAN

Subject Teacher

Checked by:

Ms. VERNADETH B. TORALBA

Academic Coordinator, Pinamalayan Campus

Recommended by:

Mr. WYNDELL S. GASPAN III

OIC-Principal, Basic Education

Approved by:

Br. HUBERTUS GURU, SVD

Vice President of Academic Affairs

Director, Basic Education

Lesson 1 Contextualized Online Search and Research Skills

Being a vast sea of information is one of the key features of the Internet. it is such a big repository of
data that

is believed that one could find out something about anything on the internet. Developing the necessary
knowledge

and skills in online searching, however, is the key to maximizing its use.
SEARCH ENGINE

A search engine is a software system designed to search the Internet for documents related to the
keyword

or search word used or entered into the system. Users are able to maximize the potential of search
engines by

learning the proper searching protocols.

TYPES OF SEARCH ENGINES

• Crawler-based search engine - It uses a spider or a crawler to search the Internet. The crawler digs

through individual web pages, pulls out keywords, and then adds the pages to the search engine's

database. Google and Yahoo are its examples.

• Directories - depend on human editors to create their listings or database. There are two types of

directories: (1) academic and professional directories which are often created and maintained by subject

experts to support the needs of researchers; and (2) commercial and portal directories that cater to the

general public and are competing for Internet traffic.

• Hybrid search engine uses both crawler based searches and directory searches to obtain their results.

• Meta search engines - transmit user supplied keywords simultaneously to several individual search

engines to carry out the search. In this type of search engine, duplicates can be eliminated and
clustering

by subjects within search is implemented.

ONLINE RESEARCH

In the Philippines, copyrights only last a lifetime (of the author) plus 50 years. There are also provisions
for

“fair use”.

• Have a question in mind- Focus on a question you want answered.

• Narrow it down- Search engines like Google, Bing, or Yahoo use several filters to determine the most

appropriate result for you.

• Advanced Search- The best way to filter information you get from search engines is by using the
advanced

search.

• Look for a credible source- Some wikis, filled with updated information, are not a credible source.
When using
wikis, check out the link of the cited texts.

• Give credit- Give credit to the original author of the page or information. To properly site a reference,
you may

use the format below

Advanced Tools and Techniques and Software Application

1. AutoCorrect – corrects common spelling errors as well as capitalization mistakes

2. AutoFormat – applies formatting to text, e.g. number listing, bullet, hyperlinks

3. Grammar Checker – proofreads documents for grammar, writing style, sentence

structure errors and reading statistics.

4. Template – a document that contains the formatting necessary for a specific

document type.

5. Thesaurus – provides synonyms for a word in a document

6. Tables – organize information into rows and columns

7. Mail Merge – a feature that allows you to create a document and merge them with

another document or data file.

8. Text Wrap – adjusts how the image behaves around other objects or text

ALPHABET of KEYBOARD SHORTCUTS IN WORD PROCESSING SOFTWARE

• Ctrl + A – Select All

• Ctrl + B – Bold Text

• Ctrl + C – Copy Text

• Ctrl + D – Show Font Dialog Box

• Ctrl + E – Align Text to Center

• Ctrl + F – Display Find Dialog Box

• Ctrl + G – Display Go To Dialog Box

• Ctrl + H – Display Replace Dialog Box

• Ctrl + I – Italicize Text

• Ctrl + J – Justify Text

• Ctrl + K – Create a hyperlink

• Ctrl + L – Align Text to Left


• Ctrl + M – Tab

• Ctrl + N – Create a new document

• Ctrl + O – Open a document

• Ctrl + P – Display Print dialog box

• Ctrl + R – Align Text to Right

• Ctrl + S – Save a document

• Ctrl + U – Underline Text

• Ctrl + V – Paste a copied text

• Ctrl + X – Cut a selected Text

• Ctrl + Y – Redo the last undoneaction

• Ctrl + Z – Undo the last action

Mail Merging in Microsoft Word

Microsoft Excel is a spreadsheet developed by Microsoft for Windows, macOS, Android and iOS. It
features

calculation, graphing tools, pivot tables, and a macro programming language called Visual Basic for
Applications.

KEY TERMS IN MS Excel:

• Row - horizontal line of entries in a table.

• Column – vertical line of entries in a table.

• Cell - the place where info. is held in a spreadsheet

• Active Cell – the selected cell

• Column Heading – the box at the top of each column containing a letter

• Row Heading – the row number

• Cell Reference – the cell address of the cell usually combine letter and number (ex. A1, B4, C2)

• Merge – combining or joining two or more cells

• Functions – are predefined formulas and are already available in Excel

• Formula Bar – the bar that displays the contents of a cell

BASIC MATH OPERATIONS:

• =SUM(x,y) or =SUM(range) – returns the sum of x and y or (all the numbers within the range)
• =PRODUCT(x,y) – returns the product of x and y

• =QUOTIENT(x,y) – returns the quotient of x divided by y

OTHER FUNCTIONS

• =ABS(x) – returns the absolute value of x

• =AVERAGE(x,y) – returns the average of x and y

• =CONCATENATE(x,y) – joins x and y

• =IF(Condition, x, y) – returns x if the condition is true, else it returns y

• =COUNT(range) – counts the number of cell containing a number within a range

• =COUNTIF(range, criteria) - count the number of cell that fits with the criteria within the range

• =LEFT(x,y) – returns the characters of x specified by y (from the left)

• =RIGHT(x,y) – returns the characters of x specified by y (from the right)

• =MIN(x,y) – returns the smallest number between x and y

• =MAX(x,y) – returns the largest number between x and y

• =MIN(range) – returns the smallest number within the range

• =MAX(range) – returns the largest number within the range

• =POWER(x,y) – returns the value of x raised to the power of y

• =ROUND(x,y) – rounds x to a specified number of digits (y)

• =COLUMN(x) – returns the column number of x

• =ROW(x) – returns the row number of x

• =SQRT(x) – returns the square root of x

• =TRIM(x) – removes extra spaces in x

• =UPPER(x) – returns x in all capital form

• =LOWER(x) – returns x in non- capital form

• =TODAY() – returns the current date

• =NOW() – returns the current date and time

Presentation Software – is an application software that allows users to create visual aids for
presentations

to communicate ideas, messages, and other info.

EXAMPLES OF PRESENTATION SOFTWARE


• MagicPoint

• OpenOffice.org Impress

• LibreOffice Impress

• Powerdot

• Microsoft PowerPoint

KEY TERMS IN MS PowerPoint:

• Slide – is a single page of a presentation. Collectively, a group of slides may be known

as a slide deck.

• Design Template – pre-designed graphic styles that you can apply to your slides.

• Slide Show – a collection of pages arranged in sequence that contain text and images for presenting to
an

audience.

• Press “F5” – to display slide show

• Animation – is a set of effects which can be applied to text or graphics within a slide.

• Transition – are motion effects that when in Slide Show view add movement to your slides as you
advance

from one slide to another.

• Hyperlink – allows you to jump to another location.

• Normal View - simplified layout of the page so you can quickly key, edit, and format the test.

• Notes Page View - displays your slides on the top portion of the page, with the speaker notes for each
slide

in the notes pane on the bottom of the pane.

• Outline View - displays all of the text in a PowerPoint slide show in outline form regardless of the
design,

objects and animations.

• File Insertion: Image, Illustrations, Links, Text & Media.

Presentation Software – is an application software that allows users to create visual aids for
presentations

to communicate ideas, messages and other info.

To animate objects to create the illusion of movement


1. On the first slide of your presentation, change the layout into a blank layout. To do this, follow the
steps

below:

▻ Click the Home tab.

▻ On the Slides group, click Layout.

▻ Click Blank.

2. Draw two objects in the form of a man using PowerPoint’s shapes. To do this, follow the

steps below:

▻ Click the Insert tab.

▻ Click Shapes and select the appropriate shapes as shown on the figure using a black fill color for the
two

men, dark red for the ball and green for the rectangular ground.

3. Right-click the slide thumbnail on the Slides pane and click Duplicate Slide.

4. Move the right hand of the first man a little backward as shown :

5. Right-click the first slide thumbnail on the Slides pane and click Copy.

6. Paste the slide after the second slide on the Slides pane.

7. On the third slide, click the ball.

8. Click the Animations tab.

9. Click Add Animation and then select More Motion Paths. Add Motion Path dialog box will appear.

10. Click Arc Up and then click OK. The motion path will look similar to the one below. Adjust the motion
path

such that the arrow is extended up to the hands of the second man.

11. Make sure the motion path is still selected. Click Animation Pane on the Advanced Animation group.

12. On the Animation pane, click the drop-down arrow on the Oval animation and then select Effect
Options.

To integrate timing, do the following:

1. Click the Timing tab.

2. On the Start drop-down arrow, click With Previous.

3. Click OK.

4. Click the first slide thumbnail.


5. Click the Transitions tab. On the Timing group under Advance Slide, click After and select 00:01:00 (1

second). Make sure that the same timing is selected to the other two slides.

6. Check your output > Go to the first slide and click Slide Show view button.

Empowerment

I. Content Standard

The learners demonstrate and understanding of:

a. Ethical issues in society and various ways to protect the moral of personal information Various

types of websites.

b. Risks and safeguards associated with Internet and network attacks, unauthorized access and use,

software theft, information theft, and hardware theft, vandalism, and failure.

c. Cybercrime and cybercriminals.

II. Performance Standard

The learners should be able to:

a. Independently compose an insightful reflection paper on the nature of ICT in the context of their lives,

society, and professional tracks.

b. Problem Solving exercises by seeking solutions to practical problems with technology that students

may encounter at home and school.

III. Learning Competencies

a. Apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it

would relate to their specific professional tracks.

IV. Learning Materials

a. PowerPoint Presentation

b. Links

c. Worksheets

d. DWCC LMS (Moodle)

V. Routinary Activities

a. Prayer

May the darkness of sin and the night of unbelief vanish before the light of the Word and the Spirit

of grace and may the Heart of Jesus live in the hearts of all. Amen.
b. Attendance

The subject teacher checks the attendance on their meeting day through the classroom attendance

sheet or DWCC Learning Management System (Moodle or G-suit).

c. Review of the Past Lesson

The subject teacher will recap the past lesson that has been discussed last meeting about the

Internet: Accessing, Searching and Communicating

d. Motivation

Name: _______________________________ Date: ________________________

Grade and Section: ____________________ Score: _______________________

Direction: Answer the following statement below.

What should we do in order to be safe from the negative impact of using Internet?

_______________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

VI. Lesson Proper

Specific Learning Objectives:

1. Identify ways to keep safe through technology.

2. Understand the essence of privacy.

3. Identify what is ethical and unethical in terms of technology.

Lesson 1: Digital Security, Ethics and Privacy

DIGITAL SECURITY RISKS

✓ A digital security risk is any event or action that could cause a loss of or damage to a computer

or mobile device hardware, software, data, information, or processing capability

✓ Any illegal act involving the use of a computer or related devices generally is referred to as a

computer crime.

✓ A cybercrime is an online or Internet-based illegal act

INTERNET AND NETWORK ATTACKS


Information transmitted over networks has

a higher degree of security risk than

information kept on an organization’s premises

✓ Malware, short for malicious software, consists

of programs that act without a user’s knowledge

and deliberately alter the operations of

computers and mobile devices

✓ A botnet is a group of compromised computers

or mobile devices connected to a network

✓ A compromised computer or device is known

as a zombie

✓ A denial-of-service attack (DoS attack)

disrupts computer access to an Internet service

- Distributed DoS attack (DDoS attack)

Hacker Refers to someone who accesses a computer or network illegally.

Cracker Someone who accesses a computer or network illegally but has the intent of

destroying data, stealing information, or other malicious action.

s Has the same intent as a cracker but does not have the technical skills and

knowledge?

Corporate Spies Unlawful theft/acquisition of intellectual property, such as key trade secret

and patent information as well as industrial manufacturing techniques and

processes, ideas and formulas.

Unethical Employees an action that falls outside of what is considered morally right or proper for a

person, a profession or an industry. Individuals can behave unethically, as

can businesses, professionals and politicians.

Cyber extortionist Someone who demands payment to stop an attack on an organization’s

technology infrastructure.

Cyber Terrorist Someone who uses the Internet or network to destroy or damage computers
for political reasons.

✓ A back door is a program or set of instructions in a program that allow users to bypass security
controls.

✓ Spoofing is a technique intruder use to make their network or Internet transmission appear legitimate

✓ A firewall is hardware and/or software that protects a network’s resources from intrusion

✓ Unauthorized access is the use of a computer or network without permission

✓ Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities

➢ Access controls define who can access a computer, device, or network; when they can access

it; and what actions they can take while accessing it

➢ The computer, device, or network should maintain an audit trail that records in a file both

successful and unsuccessful access attempts

-User name

-Password

✓ A passphrase is a private combination of words, often containing mixed capitalization and


punctuation,

associated with a user name that allows access to certain computer resources

✓ A PIN (personal identification number), sometimes called a passcode, is a numeric password, either

assigned by a company or selected by a user

✓ A possessed object is any item that you must possess, or carry with you, in order to gain access to a

computer or computer facility

✓ A biometric device authenticates a person’s identity by translating a personal characteristic into a


digital

code that is compared with a digital code in a computer or mobile device verifying a physical or
behavioral

characteristic.

➢ Finger print reader

➢ Face Recognition system

➢ Hand geometry

➢ Voice Verification System


➢ Signature Verification System

➢ Iris Recognition System

✓ Digital forensics is the discovery, collection, and analysis of evidence found on computers and
networks.

Many areas use digital forensics

✓ Law Enforcement

✓ Criminal prosecutors

✓ Military Intelligence

✓ Insurance Agencies

✓ Information security departments

SOFTWARE THEFT

Software theft occurs when someone:

✓ Steal’s software media

✓ Intentionally erases programs

✓ Illegally registers and/or activates a program

✓ Illegally copies program

Many manufacturers incorporate an activation process into their programs to ensure the

software is not installed on more computers than legally licensed

During the product activation, which is conducted either online or by phone, users provide

the software product’s identification number to associate the software with the computer or mobile

device on which the software is installed

INFORMATION THEFT

✓ Information theft occurs when someone steals personal or confidential information

✓ Encryption is a process of converting data that is readable by humans into encoded characters

to prevent unauthorized access.

✓ A digital signature is an encrypted code that a person, website, or organization attaches to an

electronic message to verify the identity of the message sender.

✓ Often used to ensure that an impostor is not participating in an Internet transaction


✓ A digital certificate is a notice that guarantees a user or a website is legitimate

✓ A website that uses encryption techniques to secure its data is known as a secure site.

LESSON 2: Why Be Concerned About Computer Security?

• There are a number of security concerns related to computers that users should be aware of,

including:

✓ Having a PC stolen

✓ Losing important data

✓ Losing contact lists

✓ Pirated or counterfeited products

• Hardware loss: Can occur when a portable PC, USB flash drive, mobile device, or other piece of

hardware is stolen or lost by the owner.

• Hardware theft: One of the most obvious types of hardware loss.

✓ Occurs when hardware is stolen from an individual or an organization.

✓ Hardware can be stolen from homes, businesses, cars, airports, hotels, etc.

✓ Often for the value of the hardware, but increasingly for the information that might be contained

on the hardware.

➢ C level attacks are growing.

• Hardware damage: Can be accidental or intentional.

• System failure: The complete malfunction of a computer system

➢ Can be due to a hardware problem, software problem, or computer virus.

➢ Can be due to a natural disaster or planned attack.

Protecting Against Hardware

Loss, Damage, and System

Failure

✓ Use door and computer

equipment locks

✓ Cable locks

✓ Security slots
✓ Use encryption to protect data

o Increasingly used with USB flash drives, notebook PCs, hard drives, etc.

o Full disk encryption (FDE): Everything on storage medium is encrypted.

o Self-encrypting hard drive: A hard drive using FDE.

• Computer tracking software: Used to find a PC after it is lost or stolen.

✓ Sends out identifying data via the Internet.

✓ Law enforcement can use this data to recover the PC.

✓ Most often used with PCs but also available for other devices.

✓ Kill switch: Software used to destroy sensitive data on a stolen or lost PC.

• Other precautions:

✓ Alarm software, tamper evident labels, etc.

✓ Common sense

• Proper hardware care: Needed to prevent damage.

✓ Ruggedized PCs: Designed for more abuse than conventional

hardware.

⚫ Surge suppressor: Protects hardware from damage due to electrical fluctuations.

⚫ Uninterruptible power supply (UPS): Provides continuous power to a computer system for a period of

time after the power goes off.

• Watch dust, moisture, static, heat, etc.

• Avoid head crash

• Stop USB devices before removing

• Use screen protectors, jewel cases, etc.

• Backup and disaster recovery plans:

✓ Both businesses and individuals should use appropriate backup procedures.

✓ Continuous data protection (CDP): Enables data backups to be made on a continual basis.

✓ Backup media needs to be secured.

o Data storage companies store backup media at secure remote locations.

o Online backup is another possibility.


✓ Disaster-recovery plan: Spells out what an organization will do to prepare for and recover from

a disruptive event.

o Hot sites

• Software piracy: Unauthorized copying of a computer program.

✓ Widespread, global problem

✓ Occurs when:

o Individuals make illegal copies of software to give to friends.

o Businesses or individuals install software on more than the number of computers

allowed according to the end-user license agreement (EULA).

o Sellers install unlicensed copies on PCs sold to consumers.

o Large-scale operations in which programs and packaging are illegally duplicated and

sold as supposedly legitimate products.

• Digital counterfeiting: The use of computers to make illegal copies of currency, checks, collectibles,

and other items

Often scanned and printed or color-copied

Protection against software piracy:

✓ Educating businesses and consumers

✓ Strengthening antipiracy laws

✓ Holograms: Printed text or images attached to a product that change their appearance when the

product is tilted.

✓ Mandatory product registration/activation

✓ Watching online auction sites/lawsuit

Protecting against digital counterfeiting

✓ New currency designs

• Microprinting, watermarks, security thread, etc.

• Special paper is used with U.S. currency

✓ Identifying technology included in digital imaging hardware.

✓ Digital watermarks: Subtle alteration to a digital item that is not noticeable but that can be
retrieved to identify the owner of the item.

✓ Also, can use:

• Holograms, RFID tags, and other hard-to-reproduce content

Privacy: State of being concealed or free from unauthorized intrusion.

Information privacy: Rights of individuals and companies to control how information about them is

collected and used.

Computers add additional privacy challenges

Many data breaches recently due to lost or stolen hardware, carelessness with documents

containing sensitive data, database breaches, etc.

Businesses need to be concerned with the expense, damage to reputation, and possible

lawsuits.

Marketing database: Collection of data about people, used for marketing purposes Data obtained

through online and offline purchases, public information, etc.

Beginning to be used in conjunction with Web activities.

Government database: Collection of data about people, collected and maintained by the government

Tax information, Social Security earnings, personal health records, marriage and divorce information

Some information is confidential, other is public

Electronic profiling

Using electronic means to collect a variety of in-depth information about an individual.

• Spam: Unsolicited, bulk e-mail sent over the Internet.

✓ Often involves health-related products, fraudulent business opportunities, pornography, etc.

✓ Ads from companies a person has done business with are also considered to be spam by many.

✓ Appearing via instant messaging (spim).

✓ Also delivered via mobile phones and fax machines.

✓ Spam legislation enacted some regulations regarding spam.

• Other annoyances

✓ Pop-up ads

✓ Pop-under ads
✓ Telemarketing

Protecting the Privacy of Personal Information

• Safeguard your e-mail address

✓ Use a throw-away e-mail address (an extra e-mail address that you can use for activities that might

result in spam).

➢ Get a second e-mail address from your ISP or from Hotmail, Yahoo! Mail, or Gmail.

➢ Can stop using it and get a new one when needed.

• Be cautious of revealing personal information.

✓ Read a Web site’s privacy policy.

✓ Can use privacy software, such as the free Privacy Bird program.

✓ Do not supply personal information to people in chat rooms.

✓ Avoid putting too many personal details on your Web site.

✓ Be wary of sites offering prizes in exchange for personal information.

✓ Can use an anonymous Web browsing service, such as Anonymizer.

✓ Supply only the required information in registration forms.

✓ Delete your browsing history and e-mail settings when using a public computer.

Use an e-mail filter to automatically route possible spam into a special folder to deal with later.

Can opt out from marketing activities

✓ Some privacy groups want individuals to have to opt in to activities instead.

✓ Do Not Call Registry: Can reduce calls from telemarketers.

✓ Do Not E-Mail Registry: May be a possibility for the future, but more difficult to implement.

Web servers holding sensitive data should be secured.

✓ Only enter personal information on Web sites using secure servers.

✓ Automatic encryption systems for e-mail can help sensitive data from accidentally being

revealed.

Properly dispose of hardware and outdated data

✓ Wipe (not just delete) data on hard drives before disposing of a computer or hard drive.

✓ Storage media containing sensitive data should be shredded.


✓ Businesses should have a media sanitation/data destruction policy.

Computer monitoring software: Used to record an individual’s computer usage either by

capturing images of the screen or by recording the actual keystrokes used.

✓ Can be used in homes by adults to monitor computer usage of children or spouse.

✓ Can be used in businesses to monitor employee computer usage.

✓ Keystroke-logging programs: Used to capture keystrokes.

✓ Can be used by hacker to capture usernames, passwords, and other sensitive information

entered into a PC.

✓ Used by the government in criminal investigations.

Video surveillance: The use of video cameras to monitor activities of individuals.

✓ Used to monitor employees

✓ Used in public locations for crime-prevention purposes

✓ Stores and other businesses

✓ Public streets

✓ Subways, airports, etc.

✓ Can be used with face recognition software

✓ Privacy issues also involved with the use of camera phones

✓ Privacy issues also involved with the use of camera phones

Employee monitoring: Observing or reviewing employees’ actions while they are on the job.

✓ Can monitor computer usage

✓ Can monitor physical location

✓ Video cameras

✓ GPS capabilities built into cars or mobile phones

✓ Proximity cards

✓ Can also be used to access facility, computer, etc.

✓ Businesses should notify employees

Presence technology: Enables one computing device to locate and identify the current status of another
device on the same network.

✓ Instant messaging, mobile phones, etc.

✓ Can be used to locate coworkers or by customers.

✓ May also be used for marketing activities in the future.

✓ Can use antispyware software to detect if someone is monitoring your computer usage.

✓ Employers have a responsibility to keep employee and customer information private and

secured.

✓ Employees should be familiar with their company’s employee policy and avoid personal activities

at work.

Lesson 3: ETHICS AND SOCIETY

Technology ethics are the guidelines that govern the use of computers, mobile devices,

information systems, and related technologies.

Information accuracy is a concern Not all information on the Internet is correct.

✓ Intellectual property refers to unique and original works such as ideas, inventions, art, writings,

processes, company and product names, and logos.

✓ Intellectual property rights are the rights to which creators are entitled to their work.

✓ A copyright protects any tangible form of expression.

✓ Digital rights management (DRM) is a strategy designed to prevent illegal distribution of movies,

music, and other digital content.

✓ A code of conduct is a written guideline that helps determine whether a specification is

ethical/unethical or allowed/not allowed.

INFORMATION PRIVACY

✓ Information privacy refers to the right of individuals and companies to deny or restrict the collection,

use, and dissemination of information about them.

✓ Huge databases store data online.

✓ Websites often collect data about you, so that they can customize advertisements and send you

personalized email messages.

✓ Some employers monitor your computer usage and email messages.


Empowerment

Technology Module 4

The Principles and Techniques of

Design using Online Creation Tools,

Platforms, and Applications to

Develop ICT Content

Ellaine M. Lacatan

Subject Teacher

____________________

Name of Student

I. Lesson Proper

Specific Learning Objectives:

1. Evaluate existing online platforms and applications in developing ICT content in your own specific

professional track. Understand the essence of privacy.

Lesson 1 Nature and Purposes of Online

Platforms and Applications

Presentation or Visualization – this is an online platform that allows you to present and share
presentations,

infographics and videos with other people.

• Cloud Computing – dictionary.com defines Cloud Computing as “Internet-based computing in which


large

groups of remote servers are networked so as to allow sharing of data-processing tasks, centralized data
storage,

and online access to computer services or resources”.

Cloud Computing is a platform often referred to simply as “the cloud”. In other words, instead of using
your

computer’s hard drive, you store and access your data and programs over the Internet.

• Social Media – dictionary.com also defines Social Media as “websites and other online means of
communication

that are used by large groups of people to share information and to develop social and professional
contacts”.
Social Media –The information shared can be in the form of ideas, pictures, videos or anything that you
want to create and share to the virtual communities. The information you share will be the basis of the
people to interact, share content and collaborate with you and the large group of people.

• Web Page Creation – this is an online platform that lets you build a web page that includes colors, text,
images,

and often contain links to media such as video and audio. The platform does not require any web
programming

skill as they provide a drag and drop interface and free hosting as well.

• File Management – this is an online platform that allows you to convert and manage files like images,
video,

documents, audio and more to other formats without downloading software tool.

Lesson 2 Basic Web Design Principles and Elements

Basic Web Design Principles

The most important factor in web design is the end user. So, in designing your own web pages,
remember the

following principles:

Principle #1: Visual Language

• Use a consistent template on each page with a uniform color scheme.

• Use contrasting colors between text and background (dark over light or vice versa). Create the most
contrast in

the area where you want more attention to.

• Avoid too large or too small font size. Avoid too many typefaces too.

• Use common font style to similar items across the web pages.

• Make important links or menus more prominent in terms of color.

• Use high-quality pictures

• Images used should follow the rule of thirds as a rough guideline. “The rule of thirds states than an
image is most

pleasing when its subjects or regions are composed along imaginary lines which divide the image into
thirds —

both vertically and horizontally.”

Principle #2: Balance

• There should be a balance distribution of heavy and light elements on the page.
• Proper alignment of text and images in a web page helps maintain consistency in design.

• Important information is placed near the top.

• The size of a button should be proportional to its expected frequency of use.

• Group similar things together in terms of shape, color or shading.

• Create a pattern which will make your page easier to use, remember and understand

Principle #3: Paradox of Choice

• “Paradox of choice means the more choices you provide, the easier for others to choose nothing.”
Hence, you

should eliminate unimportant or distracting menus or options.

• Focus on user needs

• Design around context of the multiuser in a multi-screen and in a multidevice.

Principle #4: Focus on Content

• Know the purpose of your web page so you could match the content with the purpose.

• Content should be spellchecked.

• Content should be organized.

• There should be a clear delivery of content.

• Include images on your content not just pure text.

• Content should be updated. Always add something new to your content. If you have nothing to add,
you can pick

some free articles or free e-books at:

http://www.web-source.net/free_articles.htm or

http://www.web-source.net/free_ebooks.htm

• Just make sure to acknowledge the author or include the author’s resource box.

Principle #5: Simplify

• Minimal design does not always mean an effective design. However, when choosing between simple
and the

opposite, the former is always a better choice than the latter. Hence, strive to have a simple design.

• Keep content simple.

• Use minimal animated graphics.

• Maintain a look and feel across all the web pages.


Basic Web Design Elements

Web design elements are building blocks of a webpage. Here are the basic elements that were
handpicked and

organized for you to consider in your web design:

Element #1: Illustrations and Styles

• Illustrations include lines, shapes, texture and color which are fundamental

elements that should not be overlooked.

• Lines are used to organize, connect, and separate information and design

elements. Combined with shapes, color, and texture they give us a visual

grammar which you can use to communicate.

Element #2: Links

• Links are the most basic interface on web pages. Links should be distinctive in color from other types
of text in a

webpage. Keep links and regular text styled consistently to avoid users from thinking whether or not the
text is a

link.

• Make sure your links are working.

Element #3: Buttons and Menus

• Just like links, buttons and menus are also essential to web pages and they too need consistent styles.

• Buttons and menus should be well-organized.

• Button labels and menus should be clear and easy to understand.

Element #4: Images

• Images also aids in communicating your message to the viewers. Aside from being used as fillers,
images also

helps in leaving a lasting first impression.

• Use specific images that are related to your content so that it will draw attention not only to the
content but to

your web page as a whole.

Lesson 3 Web Templates and WYSIWYG Platforms

Web Templates and WYSIWYG Platforms


• WYSIWYG = “what you see is what you get”

• In this kind of platform, no coding skills are required. Instead, you manipulate with design components
using an

editor window and get the chance to choose what elements are placed on your page.

• Web templates are unique full page layout that contains generic information which can be replaced by
the users

with their own personal information.

• Slideshare – you can use this to upload and share your professional videos and slide presentations.

• Google Drive – you can use this to backup your files in the cloud and access them anywhere. You can
also use

other applications of Google along with Google Drive.

• Tumblr – you can use this to share text, photos, quotes, links, music, and videos from your browser,
phone,

desktop, email or wherever you happen to be. This is a microblogging service that has recently become a
popular

social media site.

• Wix – you can use this to create your web site or mobile site.

GETTING STARTED WITH SLIDESHARE

a. Go to Slideshare by typing www.slideshare.net in the address bar of your browser. Slideshare


homepage will

appear as shown below.

b. Create your account by clicking Signup.

c. Enter the required data in the page.

d. Click Signup.

e. When the signup is successful, the page below will be displayed and you’re on your way to become
one of the

Sliders.

f. For the meantime, log out to your SlideShare account by hovering to the face and then click Logout.

GETTING STARTED WITH GOOGLE DRIVE

If you already have a Gmail account, then you don’t need to create another account since Google
implements a

“one Google Account for everything Google”.


But if you still don’t have an account, then follow these steps before you can finally use Google Drive.

a. Go to Google and type www.google.com in the address bar of your browser. The homepage of Google
will

appear as shown:

b. Click Sign in.

c. Click Sign in. Login Page will appear as shown below.

d. Click Create account.

e. Fill out your profile information. At the end of the form, do not forget to click the “I Agree…” check
box.

f. Click Next Step.

Welcome Page will appear. This means that you are now ready to use Google Drive. In Google Drive, you
can

create a folder, upload a file, create Google Docs, Sheets and Slides, and even Google Forms, Drawings
and

Maps. Before you can do that, click Google Apps and select Drive Click New and everything follows.
Google offers

other useful applications which can be accessed by clicking Google Apps .

• Play - is the official app store of Google for Android smartphones and tablets.

• News - is a computer-generated news site of Google whose news is aggregated from sources all over
the world.

• Gmail - is a free, advertising-supported email service provided by Google.

• Calendar - is a time-management web application and mobile app by Google.

• Google+ - is an interest-based social network by Google.

• Translate - is a multilingual service provided by Google to translate text, speech, images, or real-time
video from

one language into another.

• Photos - is the newest app of Google which provides a photograph and video sharing and storage
service for

Google users.

GETTING STARTED WITH TUMBLR

a. Go to Tumblr by typing www.tumblr.com in the address bar of your browser. The Tumblr homepage
will appear
as shown:

b. Click Next.

c. Click I’m not a robot box and then answer what is asked.

d. Welcome page will be displayed. You will be asked to select and follow five blogs to get started.
However, to

speed up the process of completing your account, click Skip.

e. You will be asked to verify your email address as shown below. So create a new tab and go to your
gmail

account by typing gmail.com in the address bar.

f. Click Sign In.

g. Enter your email and then click Next.

h. Enter your password and then click Sign In.

i. Click Done. Your gmail account will be loaded and a welcome message will appear. Close the welcome
message.

j. In your Inbox, click the message of Tumblr asking for your confirmation.

k. Within the message, click Verify email address.

l. The page below will appear when the verification is successful. Click skip to your web dashboard.

m. Close the tab and go back to your gmail account. Sign out to your gmail account, close the tab and
then go

back to Tumblr.

n. To log out your Tumblr account, click the face account and then click Log out.

GETTING STARTED WITH WIX

a. Go to Wix by typing www.wix.com in the address bar of your browser. Wix homepage will appear as
shown

below:

b. Click Start Now. Sign In Page will appear as shown.

c. If you want to sign in using your social media account on Facebook or Google, click the corresponding
button.

However, you can also sign in using your available email. Enter your email and password and then click
Go.

d. Enter your email and password again for verification.


e. Click Go. When successful, a welcome page will appear.

f. Select a category. Customizable templates will be displayed for you to choose from according to the
selected

category. If you are not decided on what category to use, choose anything and the selection can be
changed later.

g. Click Go and you’re ready to create your own website.

h. To log out to your Wix account, hover to the arrow beside your username and then click Logout.

You might also like