INFORMATION AND COMMUNICATION - The first development of World Wide Web
TECHNOLOGY where web pages are static. It is also
known as a flat or stationary page and it
ARCHE L. BIONA, LPT
cannot be manipulated by users.
LESSON 1: EMPOWERMENT TECHNOLOGY
WEB 2.0
INFORMATION AND COMMUNICATION
- It is a dynamic web page where users can
TECHNOLOGY
interact like creating a user account,
- It refers to the use of different posting comments, uploading files and
communication technologies such as images, and others.
mobile phones, telephone, internet, etc. - Example: Blog sites, Facebook, Twitter,
To locate, save, send, and edit Instagram, YouTube
information.
FEATURES OF WEB 2.0
ICT IN THE PHILIPPINES
1. FOLKSONOMY – users can classify and
- Philippines is dubbed as the “ICT HUB OF arrange information by adding tag or label.
ASIA” because of the huge growth of ict- Pound sign (#) is used in Facebook,
related jobs, one of which is BPO Twitter, Instagram and other social
(business process outsourcing) or call networking sites.
centers.
- Ict department (DICT) in the philippines is Example in tagging on Facebook:
reponsible for the planning, development #TeamKawayan, #Single, #ootd
and promotion of country’s information
and communications technology (ICT) 2. RICH USER EXPERIENCE – user can
agenda in support of national have high interaction with the content of
development. the page and can achieve level of
expertise.
COMPUTER
- An electronic device for storing and 3. USER PARTICIPATION – user can put
content on their own in web page lke
processing date, typically in binary form,
comment, evaluation, and etc.
according to instructions given to it in a
variable program.
4. LONG TAIL – a site that offers services
INTERNET and brings individual and businesses into
selling different goods and commodities
- Is the global system of interconnected such as shopping site like OLX, Lazada,
computer networks that us the internet Shopee, Zalora and others.
protocol suite (TCIP/IP) to link billions of
devices worlwide. 5. SOFTWARE AS A SERVICE – users can
WEB subscribe to a software when they need it
instead of purchasing them.
- Is an interconnected system of public web
pages. 6. MASS PARTICIPATION – sharing of
diverse information through universal web
WORLD WIDE WEB
access.
- Also known as WWW or W3 introduced by
Tim Berners-Lee.
WEB 3.0/THE SEMANTIC WEB
- It consists of different pages that are
formatted in a markup language called - A new paradigm in web interaction
HTML (Hypertext Markup Language) and extension of led by World Wide Web
linked to each other that conatain text, Consortium (W3C) where it provides
graphics, multimedia files, hyperlinks etc. framework that allows date to be shared
and reuse.
WEB 1.0/READ-ONLY WEB
TRENDS IN ICT
1. CONVERGENCE – it refers to fusing of NETIQUETTE
technological advancement to work on a
similar task. - Is network etiquette, the dos and don’ts of
Example: Using smartphone as camera in online communication.
taking pictures instead of DSLR camera.
2. SOCIAL MEDIA – an application and
website where user can communicate, TIPS ON HOW TO BE SAFE ONLINE
create and share content, and participate
in online communities. Do not share your password with anyone.
Add friends you know in real life.
TYPES OF SOCIAL MEDIA
Do not visit untrusted websites.
Social Network – A website where Add password to your WIFI at home to
people with the same content come make it private.
together to share information. Install and update antivirus on your
Examples: Twitter, Facebook, Instagram computer.
Social News – A website where usercan Do not give your personal information to
post stories and are ranked based on the anyone.
popularity through voting. Think before you click.
Example: Digg, Reddit, Propeller, Never post about your future vacation.
Slashdot, Fark
Microblogging – a website that allows INTERNET RISK
you to broadcast short messages. Cyberbullying – it happens when
Example: Twitter, Tumblr, Meetme someone is intentionally abused,
Blogs and Forums – a discussion harassed, and mistreated by another
website that allows users to ask questions person using electronic communication.
and comment on a journal posted by and Identity Theft – It is a crime of stealing
individual or group. personal information for the purpose of
Example: Wordpress, Blogger assuming that person’s name or identity to
Mobile Technologies – a technology make any forms of transactions.
used in cellular and other devices such as Cyber Stalking - a criminal practice
netbook, laptop, tablet, smartphones, etc. where electronic communication is used to
Assistive Media – A platform that assist stalk or harass an individual or group.
people with disability. It will guide the Sexting – the act of sending sexually
individual like a blind person by using an explicit text messages, images, and
audio recording. videos.
Example: Hearing Aid
Bookmarking Sites – A website that INTERNET THREATS
allows you to share and store internet
MALWARE – also known as malicious
bookmarks, articles, posts, blogs, images
software.
and others.
Examples: Pinterest, StumbleUpon, TYPES OF MALWARE
Dribble
Media Sharing – A website that allows 1. Virus – a malicious program that replicate
you to share and store multimedia files itself by copying itself to another program.
such as video, photos, and music. 2. Trojan Horse – a malicious program that
Examples: Instagram, Youtube, Flickr disguised as legitimate program that user
will accept and use but take control of
LESSON 2: ONLINE SAFETY, SECURITY, your computer.
ETHICS AND ETIQUETTE 3. Worm – malicious program that copies
itself and spreads to other computers.
INTERNET SAFETY
4. Spyware – A malicious program that
- It refers to the online safety or security of gathers information from victim’s computer
people and their information when using and send it to the hacker.
the internet. 5. Adware – An unwanted advertisement
that will pop-up several times on victim’s
computer then behave abnormally and - There are millions of information that we
tedious to close them. can get from the internet. Some of this
6. Keylogger – A program that runs in the information are free but others are not.
background and steals user credentials They are protected by a copyright law.
and confidential information and send
back to hack by recording keystroke that a
user makes on their computer or device. COPYRIGHT
7. Botnet – a collection of infected internet-
connected devices such as PC and mobile - A protection given to the owner of the
phone that are controlled by a common rights in an original work such as books,
type of malware. musical works, films, paintings, and other
8. Rootkit – A software tool used by hackers works,and computer programs.
to gain control over a computer on a - This original work is called intellectual
network without being exposed. property which is protected under
9. Ransomware – A ransom virus that block Republic Act 8293 known as the
the user from accessing the programs or “Intellectual Property Code of the
files and demands to pay the ransom Philippines”.
through online method for the removal of
COPYRIGHT INFRINGEMENT
the virus.
- This happend when the copyrighted work
SPAM – also known as junk email or is used by another person without
unwanted emailsend by advertiser or bot. permission from the author or copyright
It can be used to send malware. holder. Any person who is infringing the
copyright protected work would be liable
PHISHING – a cyberattack method using under the law.
deceptive emails and websites to
acquiring sensitive personal information. FAIR USE
CYBERCRIME - Is the use of copyrighted material for
comment, teaching, crticism, news
- A crime in which computer is used as an reporting, research, scholarship and other
object or tool in committing a crime such similar purpose is not an infringement of
as hacking, phishing, spamming, child copyright.
pornography, libel, hate crimes, identity
thief and others. GUIDELINES FOR FAIR USE
CYBERCRIME LAW Majority of the contents created must be
yours.
- A law that deals with all forms of Give credit to the owner
cybercrime. Don’t make profit of the copyrighted work.
LESSON 3: CONTEXTUALIZED ONLINE
SEARCH AND RESEARCH SKILLS
INTERNET RESEARCH
- Is a research method in collecting and
gathering information via internet by using
search engine such as Google.
SEARCH ENGINE
- Is a program that allows users to search
for content on internet.
Example: Google, Mozilla, Ask, Ecosia,
Yandex, Internet Archive, Yahoo,
DuckDuckGo,Aol.
COPYRIGHT ISSUES