Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Week 1 Emptech

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 37

Introduction to ICT

Empowerment and Technologies


Objectives:

At the end of the lesson, you should be able to:


1. Compare and contrast the nuances of varied online platforms,
sites, and content to best achieve specific class objectives or
address situational challenges
2. Apply online safety, security, ethics, and etiquette standards
and practice in the  use of ICTs as it  would relate to their specific
professional tracks
3. Use the Internet as  a tool for credible  research and
information  gathering to best  achieve specific class objectives or
address situational
Answer the ff. honestly

1. How many times have you checked your phone during class
today?
2. How many status updates have you made in FaceBook or
Twitter today?
3. Did you use the internet within an hour after you woke up this
morning?
4. Do you stalk a celebrity via their social media account?
So what the bleep is ICT?

Stands for Information and Communications Technology.


deals with the use of different communications technology
to:
• locate,
• save,
• send and
• edit information.
ICT (information and communications technology - or
technologies)

is an umbrella term that includes any communication device or


application, encompassing: radio, television, cellular phones,
computer and network hardware and software, satellite systems
and so on, as well as the various services and applications
Evolution of the Web

Web 1.0 (Static Web Pages)


Web 2.0 (Dynamic Web Pages)
Web 3.0 (Semantic Web Pages)

Image Source:
https://www.thinglink.com/scene/832303703254892546
Web 1.0 or Static Web Pages

When the World Wide Web was invented, most web pages are
static. When we say static, the page is “as is” and cannot be
manipulated by the user. The content is also the same for all
users. This is referred to as Web 1.0.

Web 2.0 or Dynamic Web Pages


What I see is not what another person sees.
Examples:
Google search results differ depending on your location.
Online Ads you see are usually from local brands.
What is Web 3.0?

The aim of Web 3.0 is to have machines (or servers) understand


the user’s preferences to be able to deliver web content
specifically targeting the user.

The internet is able to predict the best possible feedback to your


inquiry by “learning” from your previous choices.
Trends in ICT
What has made your life possible are these trends we tend to
ignore.

Trends:
• Convergence
• Social Media
• Mobile Technologies
• Assistive Media
Technological Convergence
Technology can do more things than its basic function. For
example, besides using your personal computer to create word
documents, you can now use your smartphone.

Social Media
• Social Networks
• Bookmarking Sites
• Social News
• Media Sharing
• Microblogging
• Blogging and Forums
Social Media
a) Social Networks – These are sites allow you to connect with
other people with the same interests or background. Once the user
creates his/her account, he/she can set up a profile, add people,
share content, etc.
Example: Facebook and Google+

b) Bookmarking Sites –These are sites that allow you to store and
manage links to various website and resources. Most of the sites
allow you to create a tag to others.
Example. Stumble Upon, Pinterest
c) Social News – These sites allow users to post their own
news items or links to other news sources. The users can also
comment on the post and comments may be rank.
Example. Reddit and Digg

d) Media Sharing – sites that allow you to upload and share


media content like images, music and video.
Example. Flickr, YouTube and Instagram
Microblogging – focus on short updates from the user. Those
that subscribed to the user will be able to receive these updates.
Example. Twitter and Plurk

f) Blogs and Forums – allow user to post their content. Other


users are able to comment on the said topic.
Example. Blogger, WordPress and Tumblr
Mobile Technologies

iOS – use in apple devices such as iPhone and iPad

Android – an open source OS developed by Google. Being open


source means mobile phone companies use this OS for free.

Blackberry OS – use in blackberry devices


Mobile Technologies

Windows phone OS – A closed source and proprietary


operating system developed by Microsoft.

Symbian – the original smartphone OS. Used by Nokia devices

Web OS- originally used in smartphone; now in smart TVs.


 
Online safety, security,
ethics, and
etiquette/Contextualized
online search and
research skill

Empowerment and Technologies


INTERNET SAFETY- it refers to the online security or safety of
people and their information when using internet.

NETIQUETTE- is network etiquette, the do’s and don’ts of online


communication.
 
Online Safety and Security

The internet is one of the most dangerous places especially if you


do not know what you
  are doing.
Internet Threats Key Terms:

Cybercrime- a crime committed or assisted with the use of the


Internet.

Organizations who handles cybercrime


Republic Act No. 10175
Or the Cybercrime Prevention Act of 2012

is a law in the Philippines approved on September 12, 2012 which


aims to address legal issues concerning online interactions and
the Internet
 

Republic Act No. 10175


Among the cybercrime offenses included in the bill are
cybersquatting,cybersex, child pornography, identity theft,
illegal access to data and libel.
CYBER
relating to, or involving computers or computer networks (such as
the Internet)

Cyberspace
refers to the virtual computer   world, and more specifically,
is an electronic medium used to form a global computer
network to facilitate online communication
Cybercrime
refers to the criminal activities carried out by means of computers
or the Internet

Cyberbullying
the use of electronic communication
 
to bully a person,
typically by sending messages of an intimidating or
threatening nature
Hacking
refers to the practice of modifying or altering computer
software and hardware to accomplish a goal that is
considered to be outside of the creator's original objective.

Those individuals who engage   in computer hacking


activities are typically referred to as “hackers”.
Phishing
is the attempt to obtain sensitive information such as
usernames, passwords, and credit card details (and,
indirectly, money), often for malicious reasons, by
disguising as a trustworthy entity in an electronic
communication.  

Identity Theft
is the deliberate use of someone else's identity, usually as
a method to gain a financial advantage or obtain credit and
other benefits in the other person's name, and perhaps to
the other person's disadvantage or loss
Cyber Defamation
is an unprivileged false statement of fact which tends to
harm the reputation of a person or company

2 Types of Defamation:
1. Libel - written  

2. Slander - verbal
CYBERSEX
also called computer sex, Internet sex, netsex
is a virtual sex encounter in which two or more people
(connected remotely via internet) send each other
sexually explicit contents or sexually
 
explicit acts
Internet Threats Key Terms:

Privacy Policy/Terms of Services (ToS) – tells the


user how the website will handle its data.

 
Internet Threats Key Terms:

Malware- stands for malicious software. 

 
Internet Threats Key Terms:

Virus - a malicious program designed to transfer from one


computer to another in any means possible.
 

Worms – a malicious program designed to replicate itself and


transfer from one file folder to another and transfer to other
computers.
Internet Threats Key Terms:

Trojan - a malicious program designed that is disguised as a


useful program but once downloaded or installed leaves your PC
unprotected and allows hacker to get your information.

 
Spyware – a program that runs in the background without you
knowing it. It has the ability to monitor what you are currently doing
and typing through key logging.
Internet Threats Key Terms:

Adware - a program designed to send you advertisement, mostly


pop-ups.

Spam – unwanted email mostly from


 
bots or advertisers.

Phishing - acquires sensitive personal information like passwords and


credits card details.

Pharming - a more complicated way of phishing where it exploits the DNS


system.
Internet Threats Key Terms:

Key loggers - used to record the keystrokes done by user. This


is done to steal passwords or any other sensitive information.

Rogue security software – is   a form of malicious software


and internet fraud that misleads users into believing there is a
virus on their computer, and manipulates them into paying money
for a fake malware removal tool.
Online Research Skills

Copyright Infringement – if you create something – an idea,


invention, literary work or research, you have the right of how to
use it. This is called an intellectual property.

 
Copyright - a part of law, wherein you have the rights to work,
anyone who uses it w/o your consent is punishable by law.

Fair Use - means that an intellectual property may be used w/o


consent as long as it is used in commentaries, criticism, parodies,
research etc.
How to avoid Copyright Infringement

• Understand
• Be responsible
• Be creative
 
• Know the law
REFERENCES:

• Adrian Harold L. Lapiz.(2018 ). Empowerment Technology. REX Book Store


• Deped.gov.ph. (2016). K to 12 Senior High School Applied Track Subject – Empowerment
Technologies (for the Strand). Viewed on July 07, 2020
• Photo Credits: NPC and PNP
• Photo Credits: https://time.com/4950677/andy-rubin-essential-interview/
• Photo Credits: https://www.allamericanspeakers.com/celebritytalentbios/Rich+Miner/394685
•  
Photo Credits: https://www.biography.com/inventor/steve-wozniak
• Photo Credits: https://www.facebook.com/assistivetechnologyintheclassroom
• Photo Credits: https://www.google.com/search?q=information+communication+technology
• Photo Credits: https://www.google.com/search?q=trends+in+ict&tbm
• Photo Credits: https://www.pinterest.ph/pin/218354281917321230/
• Regis Joyce. (2018). Empowerment Technology. https://ictcom444251764.wordpress.com/blog/.
Viewed on July 07, 2020
• Retrieved from: Empowerment Technology.pdf

You might also like