Emptech Module 2022
Emptech Module 2022
b. When paper was finally produced from the papyrus plant, storing of
information was revolutionized.
b. 1844, American inventor named Samuel Morse successfully introduced the first
single circuit telegraph, which gave rise to the Morse code.
4. Electronic Period
- It started in the 1940s and continues to the present. The highlight of this period is focused on
the advent of solid state devices or electronic devices.
- 1958, An American electrical engineer named Jack Kilby was credited for
introducing the integrated circuit (IC).
g. Integrated Circuit (IC)
- A device that is composed of a group of transistors and circuit elements
compressed in a single package.
ST. VINCENT COLLEGE OF CABUYAO
Mamatid, City of Cabuyao Laguna
SENIOR HIGH SCHOOL DEPARTMENT
First Semester SY.2022-2023
II. Objectives:
State the events that led to the current Technologies, processes, and techniques used
in ICT.
Used internet as tools for credible research and information gathering to best achieve
specific class objectives or address situational challenges.\
Apply online safety, security, ethics etiquette standards and practices in the use of
ICT as it would relate to a specific professional track.
- The system that enables you to access hypertext documents and other files over the internet.
1989 – The technology proposed by Tim Berners, Which a database interface will be implemented to
associate links in readable documents.
a. Web 1.0 or the Read-only Web, wherein the information or hypertext file is
accessed by the user. There were no facilities to interact with it other than to read or
view the content.
b. Web 2.0 or the Read-and-Write-Web, started with the need to interact with the web
pages. User wanted to e-mail Web sites and interact on social networking sites. Web
2.0, enabled user or viewers to edit the content of the files they were accessing.
c. Web 3.0 or the Semantic executing Web, envisioned to be a smarter access of
hypertext files and a version that would enable a wider range of search in a fast
manner
5. The Social Media
- This application started together with the web 2.0 and is used in communicating and
socializing with other application user in virtual communities and networks. The media
platform contains different formats.
*Some of these forms of social media are blogs, enterprise social networks, forums, photo-
sharing sites, product selling and review sites, research sharing sites, special interest groups,
social games, social networks, and video sharing.
Research and Information Seeking
Research Indexing Sites – These are web sites dedicated to complete and index researchers
done by academic researchers, engineers, social scientist, and so on.
Massive Online Open Course (MOOC) sites or tutorial sites – these are
World Wide Web dedicated to teach and inform users focused on
different areas.
Employment Web sites – These are Web sites that enable companies to
post job vacancies and also accommodate job seeker by providing a resume-
submission facility.
The inherited property of web 2.0 and its later version give viewers the privilege to influence
content or give anyone the freedom to publish his or her own web sites regardless of content.
Published Author’s Name – publishing the name of the one who wrote the article or
information is one sign that the information is valid, credible, and legitimate.
Credible Web Sites – Error-Free articles are more likely published by credible web sites. These
are web sites of big international or local companies involved in the field you are searching for.
Rating, Number of Viewers, and number of shares – A credible article is more likely receive a
high rating or a normally high number of stars from reviewers.
Reference and related Articles – Most of the credible articles include a list of references or
articles related to the published one.
- Each individual when accessing the World Wide Web is concerned with the safety of his or
her terminal or computer and the information that will be transmitted or received.
Spam – This refers to the transmission of unsolicited messages from various origins using
electronic messaging system such as email and chat messengers.
Phishing – This is defined as a software or a program used by an attacker to obtain personal
information.
Malware – This is the short term for malicious software, which is a computer software sent by
attackers to inflict chaos on a computer’s operation and process.
- The Philippine government ensures the welfare of its people in their ICT experience by
enacting various laws and regulations.
Republic Act 10627 or Anti-Bullying Act of 2013 – Bullying defined as “serve or repeated used
by one or more students of a written, verbal or electronic expression, or a physical gestures, or
any combination thereof, directed to another student that has effect of actually causing or
placing the latter in reasonable fear of physical or emotional harm or damage of his property”.
Republic Act 10175 or Cybercrime prevention ACT or 2012 – This law protects an individual
from various unwanted online and cyber acts that may harm or evade one’s privacy or integrity.