ICT REVIEWER                                                    3.
Hardware
UNIT 1 – LESSON 1:                                                   -    physical or tangible parts of an ICT system
                                                                4. Software
                                                                     -    programs and applications installed on your
Information and Communications Technology
                                                                          smarthone
(ICT)                                                                -    responsible for providing sets of intructions that
  -   refers to all electronic and communication technologies             computer has to follow tpa ccomplish a specific
      that enable the management and distribution of                      task
      information.
  -   “basic information handling tools”
                                                                5. Data
                                                                     -    raw facts or figures that can be processed,
COMPONENTS OF ICT                                                         stored, and transmitted by an ICT
  1. People
         -   individuals who are responsible in ICT system;
                                                                6. Information
             input and supply of data.
                                                                     -    result of processed, organized, and structured
         -   computer programmers, computer engineers,
                                                                          data
             technician, graphic designer, web developer,
                                                                     -    output of an ICT system
             encoders, system analysts
  2. Procedures
         -   actions performed in a certain order and
             condition to make sure an ICT systems runs
             smoothly
         -   important in guiding the people or system
IMPACT OF ICT ON THE SOCIETY                                        7. ICT and the Entertainment Industry
     Computers pave the way for a more convenient,                         -   online video streaming
     efficient and effective way of performing day to day
     transactions.
                                                                 UNIT 1 – LESSON 2
  1. ICT at Home
                                                                 Friendster – 2000s media site
       - provide security at home
  2. ICT as a Communication Tool                                 Social Media
       - the development of mobile phones                           -   websites or applications that give people the capability
                                                                        to exchange with oe another.
  3. ICT and Education
                                                                 TYPERS OF SOCIAL MEDIA:
        -   enhanced facilitation of learning
                                                                    1. Social Networking Sites
                                                                           -   used for communication, where users can
  4. ICT and Employment                                                        communicate via text chat, phone call, or video call.
       - work without the need to leave the comforts of
                                                                           Ex: Facebook, Twitter, LinkedIn
          their home
                                                                    2. Media Sharing Sites
  5. ICT and Government                                                    -   users can communicate via text chat, phone call, or
        -   effective tool in delivering quality and efficient                 video call
            services to its people
                                                                           Ex: Youtube, Vimeo, Instagram
  6. ICT and Commerce
        -   online shops
3. Discussion Site                                           MOBILE MEDIA
      -   facilitate the active exchange of views,
          comments, and opinions on issues and matters         - refers to electronic devices that are characterized by
          discussed among its participants of the same            their portability or their ability to be carried or
          interest or expertise                                   transported easily. Despite their small size, mobile
                                                                  media are packed with internet connectivity and
      Ex: Reddit and Quora                                        powerful features. Smartphones, tablets, game
                                                                  consoles, e-readers, Personal Digital Assistant (PDA),
                                                                  and laptop computers are just some of the popular
4. Bookmarking and Content Curation Sites
                                                                  mobile media devices.
      -   aid users in discovering, sharing and discussing
          the lates and trending content and media
      Ex: Pinterest, StumpleUpon, Digg                       ASSISTIVE MEDIA
                                                               - are electronic devices or programs that aim to provide
5. Blogging and Publishing Network Sites                          support for people with disabilities. It generally seeks to
     - provide its users with the tools that will help            increase or improve the functional capability of
        them to publish their content in a creative and           individuals who face mental or physical challenges
        engaging manner.
      Ex: Wordpress, Wix, Tumblr, Medium
                                                               1. Assistive Media for the Visually Impaired
                                                                    - enable blind or visually impaired visuals to read
6. Consumer Review Network
                                                                    - text to text speech devices, reading pen,
      -  provides a way for user to inform other people or
                                                                       magnifiers, talking devices, braille displays
         organizations about their views regarding a
         particular product or service.
      Ex: Yelp, Glassdoor
                                                               2. Assitive Media for People with Hearing
                                                                  Impairements
     - for people who are deaf or who experience
         difficulty in hearing                              UNIT 1 – LESSON 3
     -   sound amplification, conversion of sounds into
         visual cues, and conversion of sounds into         Technological Convergence
         sensory signals like vibrations.                     -   state where to or more technology entities and
     -   includes hearing aids, amplified telephones,             functions are combined into one device
         devices with vibrating alarms, speech-to-text
         devices, and captioning devices
                                                            3CS of Technology Convergence
3. Assistive Media for People with Speech                     1. Computing Technology – improvements made
  Difficulty                                                     on electronic devices by combining the function of two
     -   aid people who are mute                                 or more devices into one gadget
     -   converts visual cues to audible speech               2. Content Technology – combining different media
     -   speech generating devices, voice amplification          formats such as text, etc. into one multimedia content
         devices, stuttering aids, artificial larynx, and     3. Communication Technology – observable with
         communication boards.                                   the fast and effective transfer of info like WIFI
4. Assistive Media for People with Learning                 Website
  Difficulty                                                  -   composed of     hyperlinks   and   sometimes    web
     - used to help people individuals who experience             applications
         difficulty in learning and comprehension
                                                            Webpage
     -   instructional supports
     -   memory aids                                          - individual links or pages of a website
                                                              1. Static Web Pages – fixed content, a web page shows
                                                                 the same content every time it is accesed
  2. Dynamic web pages – changeable, web page’s             -   employs technologies such as semantic web, artificial
     content can change each time it is accessed                intelligence
THE EVOLUTION OF TEH WEB (1989 – Present)
                                                            -   can deliver customized service
                                                            Machine Learning
  A) Web 1.0
  - read-only phase                                         -   equipped ICT devices with the ability to learn and
  - characterized by static web pages; no interaction           interpret the meaning of words in his or her online
                                                                activities
      Hypertext Markup Language (HTML)
                                                            Artificial Intelligence
        -   used to encode how a webpage will be
            represented                                     -   system that enables computer devices to think and act
                                                                like human beings
      Cascading Style Sheets (CSS)
        -   encode how the web page will look in terms of
            layout, fonts, and colors
  B) Web 2.0
  -   writable phase
  -   users can interact by filling out forms, posting
      comments, or sharing multimedia
  -   also refered to as social web
  C) Web 3.0
  - executable phase
                                                                  3. Server – hardware that serves as the storage house
                                                                     of data coming in and out of the system
                                                                  4. Processing System – “information system” ; is a
UNIT 1 – LESSON 4                                                    group of hardware and software that is designed to
                                                                     collect, process, store, and distribute information.
Uses of Internet:
                                                                ONLINE PLATFORMS
   -   Internet as a Communication Tool
   -   Internet as a Tool in Performing Business Transactions           -   refer to websites and applications taht offer
   -   Internet as a Tool for Researching                                   services through the internet
   -   Internet as an Entertainment Tool                        CLASSIFICATION OF ONLINE PLATFORMS
                                                                  1. Business – role is the seller of goods or provider of
ONLINE SYSTEM                                                        services offered on the internet
                                                                  2. Customer – one who makes purchases or avails the
          -   collaboration of hardware, software,       and
                                                                     goods and services produced
              telecommunication technologies
                                                                ONLINE PLATFORMS SERVICES
COMPONENTS OF AN ONLINE SYSTEM
                                                                   SOCIAL MEDIA PLATFORMS
   1. Terminal Devices – such as desktop computers,
                                                                        -   internet services that promote social interaction
      laptop, tablets or smartphones taht are used to send
                                                                            and information sharing among members of
      requests or instructions over the internet.
                                                                            virtual communities
   2. Network – collection of computers that are used to
      carry data from one device to another
                                                                   WEB SEARCH ENGINES
                                                                        -   internet based systems that are used to locate
                                                                            information on the World Wide Web
 ONLINE PAYMENT SYSTEM
    -   web-application that allows customers to send
        payment for their purchases
 ONLINE ADVERTISING PLATFORM
    -   an internet service that allows business
        organizations to post their advertisements to
        websites and online applications
 CREATIVE CONTENT OUTLETS
    -   web services that offer assistance to individuals
        and organizations in the development of
        innovative and engaing multimedia content for
        their websites
                                                                  1. Virtual World
                                                                  - provides us with a “second life space” where we can
                                                                     make digital representation of ourselves
                                                                  - create several digital personalities
UNIT 2 – LESSON 1                                                 2. INTERACTION
                                                                  - environment where social intearctions such as chatting,
                                                                     sharing ideas on an online comminity
CYBER WORLD – “cyberspace”                                        - public and open to anyone who wants it
  - composed of complex interconnected networks that
      provides a virtual environment for different users to       3. INFORMATION SOURCE
      interact with each other                                    - data are readily available to anyone as long as they
                                                                     can connect to the internet
DIGITAL FOOTPRINTS
  -   permanent marks of your identity and activities on the    DANGERS AND THREATS ON THE INTERNET
      internet that could lead and be traced abck to you          1. Exposure to Unsuitable Contents
                                                                  - Photo and video contents are uploaded everywhere.
                                                                     Some are inappropriate or not suitable to be viewed by
COOKIES                                                              children and teenagers.
  -   small files stored in your computer by the websites you
      visit                                                          a) Pornography – images or videos of naked people
  -   advertisers use this information to create ads                 b) Graphic violence – shown on online games
                                                                     c) Verbal Obscenity – curses or rude words
CATEGORIES OF CYBER WORLD
                                                                  2. Crime-Related Dangers
-   criminals that are lurking online                                         network; infects the computer through a
    a) Hackers- acess private info in order to steal for their own            downloaded file
       benefit                                                             c) Trojan – also known as trojan horse; disguised as a
    b) Identity Theft - steal important and personal info to                  legitimate and helpful software
       fake an identity
                                                                           d) Spyware – secretly invades your computer and
           Phishing – message with shortened link
                                                                              targets sensitive information
    c) Internet Predators – individuals who lure children
       or teenagers                                                        e) Adware – used to gather data from your computer
    d) Cyberbullies – cyberbullying is an online form of                      while providing you with advertisements
       bullying with the aid of internet
                                                                           f)   Ransomware – often part of a phishing scam. the
                                                                                criminals behind the malware will then ask for
                                                                                money before they unlock your files or system
3. Privacy Related Dangers
- occurs due to carelessness of the user or caused by                      g) Fileless Malware – It does not need to install any
   unauthorized access of a person’s private info                             software on your system in order to work, instead it
                                                                              uses the current vulnerabilities of your computer
                                                                              system.
4. Malicious Software- Related Dangers
- websites offering free services
                                                                     ONLINE SAFETY AND SECURITY
           Malware – created to invade and destroy the
           computer system                                           - some tips on how to be safe online and how to detect an
                                                                     online threat.
                                                                     1. Think before you click. This is to avoid leaking information
    TYPES OF MALWARE
                                                                     that you do not want to be used against you.
    a) Virus – software that inserts its code into files and
                                                                     2. Do not share personal information. Keep your personal
       programs infecting other software
                                                                     details private such as your address, age, birthday, full name,
    b) Worms – rapidly spread form one computer to
                                                                     and contact number.
       another by replicating itself through the computer
3. Beware of phishing and scam. Never click links coming       Techterms defined Netiquette as an informal term which is
from unknown contacts because these might contain              short for "internet etiquette."
malwares.
                                                               Etiquette - is a set of proper behavior in the real world
4. Keep your device secure. Make sure that the software
                                                               Netiquette - is a set of proper behavior in the virtual world
installed on your gadgets are up-to-date.
                                                               The term was initially used as a joke in a forum in 1982, which
5. Never give out your password. Your password should be
                                                               was also the same year the word internet was first used.
kept somewhere safe because it allows you to access your
accounts.
6. Never agree to meet anyone you just met on online           CORE RULES OF NETIQUETTE FROM THE BOOK
chat rooms. Never agree to meet strangers.                     NETIQUETTE BY VIRGINIA SHEA
7. Tell your guardian if something is making you
uncomfortable online. They can help you be safe by
confronting the cyberbully or predator.                        RULE 1: REMEMBER THE HUMAN.
8. Cover your webcam. This will prevent the invader from          -   The quote “do unto others as you would have them do
getting your image and using it to harm you.                          unto you” is considered to be the golden rule in life. It
                                                                      simply means to treat others how you wanted to be
9. Use a strong password. Follow the guidelines for creating          treated.
a strong password
                                                               RULE 2: ADHERE TO THE SAME STANDARDS OF
10. Make sure you log out when using a public device.          BEHAVIOR ONLINE THAT YOU FOLLOW IN REAL LIFE.
Make sure that all your accounts are logged out before you
leave.                                                            -   Everyone follows standards of behavior in real life. This
                                                                      should not be lowered in the virtual world.
                                                               RULE 3: KNOW WHERE YOU ARE IN CYBERSPACE.
UNIT 2 – LESSON 2:
                                                                  -   It is always important to know where you are online.
Netiquette                                                            Lurk before you leap.
RULE 4: RESPECT OTHER PEOPLE’S TIMES AND                          -   Although it is good to have more knowledge when it
BANDWIDTH.                                                            comes to cyberspace, it does not give someone the
                                                                      right to take advantage of them. Always remember rule
  -   It is important to understand that people have lives
                                                                      #1: remember the human.
      outside cyberspace as you do
RULE 5: MAKE YOURSELF LOOK GOOD ONLINE.
                                                                RULE 10: BE       FORGIVING      OF    OTHER     PEOPLE’S
  -   One of the best things in cyberspace is your anonymity.
                                                                MISTAKES.
      Take advantage of the lack of judgment on your
      physical appearance like the color of your skin, eyes,      -   Give people the benefit of the doubt; assume they just
      hair, height, weight, age, or even your clothing.               do not know as you have different experiences. Think
                                                                      twice before reacting.
RULE 6: SHARE EXPERT KNOWLEDGE.
  -   Information sharing is one of the reasons why the
      internet was created. make sure that the information
      you’re sharing is reliable and credible to avoid the
      spread of fake news.
RULE 7: HELP KEEP FLAME WARS UNDER CONTROL.
  -   While it is not necessarily forbidden in cyberspace, if
      flame wars cannot be avoided, it is best to keep it
      under control.
RULE 8: RESPECT OTHER PEOPLE’S PRIVACY.
  -   Always be careful with this information as they are
      meant or not meant to be exposed
RULE 9: DON’T ABUSE YOUR POWER.