OFAD 40023 Internet and Web Design COMMON
OFAD 40023 Internet and Web Design COMMON
INSTRUCTIONAL MATERIALS
FOR
OFAD 40023
Internet and Web Design with
Lab for Administrative Professionals
Prepared by:
Administration and
1
Overview
The COVID 19 pandemic has considerably affected education systems on a global scale. With
schools and universitiesstruggles not to hamperthe education of the students, the teachers are doing their
best to keep learning going during this pandemic. PUP has adopted the flexible/blended learning in order
to reach the students at home and continue theireducation.
Welcome to Internet and Web Design for Administrative Professionals. This course of the
programBachelor of Science in Office Administration (BSOA) is designed to provide you with the skills and
knowledge you will need to succeed as Administrative Professionals. Every topic that you will study in this
course is directly related to one or more of many administrative tasks.
In(Part1), youwill learn the nature of internet, how internet works through data communication
and networking. Also, youwill learn some laws and threats to consider before using electronic payments
in the internet. Lastly, on the latter part of part 1, you will learn the different social media platform you
can use effectively in the office to perform your job as Administrative Professionals.
In (Part 2) you will learn the basics of photography as a foundation of a well-ordered website.
Website domain and hosting will also be discussed in the second part of this module as a backbone in
starting a website. As much as possible, all trainings and hands on activities are done in a free and open
source application. Thus, creating google account were also tackle for the students to have an access
inmakinggoogle site. Lastly, different techniques and contemplationswere discussed before creating your
site to successfully crease the target audience of your website.
The topics in this modules are carefully gathered and selected to get the latest information to
match the advanced technology of the administrative professionals in the modern systems and facilities.
There are learning objectives to be achieved and assessments/activities to be accomplished by the student
at the end of the per week topics. Book references used are available at PUP Main Library, NALLRC
Building, Sta. Mesa, Manila. Web references and links are also provided to get the latest information in
the modern office.
Questions, suggestions, comments and feedback matter. The teacher/adviser may be contacted by
joining the google classroom created for the class with code number
and at mobile no.
or through email address at .
2
The student shall submit all requirements of the course via official courier of the University on
January 13, 2021 to the respective teacher at the College of Business Administration, Department of
Office Administration, PUP, Main Campus, Sta. Mesa, Manila.
It’s definitely not easy to keep the learning going during this pandemic, but as we just saw, it is
possible. You can go with whatever time frame suits you, but, don’t forget that you can do it in several
sittings throughout the day instead of one. With few changes to your approach, smart use of online
learning, and acknowledging the situation, you can do it. All the best and keep safe!
3
OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals
OFAD 40023
Internet and Web Design with Lab for Administrative
Overview………………………………..……………………………………………………… 2
Course Outcomes……………………………………………………………………………. 5
Internet ………………………………………………………………………………………… 6
Data Communication………………………………………………………………….……… 12
Networking………………………………………………………………………………..…… 18
Internet Security and Payment Systems……………………………………………………. 25
Ethics, Law, and E-Commerce……………………………………………………………… 39
Social Media and Electronic Platform for Administrative Professionals………………… 45
Midterm Examination………………………………………………………………….……… 58
Concepts of Photography……………………………………………………………….…… 64
Terminology, Starting a Website, Domain and Hosting……………………………...…… 77
Creating Google Account……………………………………………………………..……… 80
Pointers to Consider Before Creating a Website……………………………..…………… 85
Naming your Website and Filename………………………………………………..….…… 88
Adding Them to your Website…………………………………………………….….……… 91
Inserting textbox, images and embedding URL and
youtube video on your webpage.………………………….…………….…………… 95 Page
preview before publishing your website……………………………………………… 98 Practice
Application…………………………………………………………………………… 100 Final
Examination……………………………………………………………………………… 101
References……………………………………………………………………………………... 102
Grading System………………………………………………………………………………… 103
OFAD 40023
INTERNET AND WEB DESIGN WITH
LAB FOR ADMINISTRATIVE PROFESSIONALS
COURSE OUTCOMES:
∙ Define internet security and netiquette in using the internet and other social media platform. ∙
Week 2: INTERNET
OBJECTIVES:
INTERNET - The internet is the interconnection of computers on a global scale. It is the biggest
network in the world today, connecting computer from all over the world.
INTERNET SERVICE PROVIDER (ISP)- provides internet connection. Examples are: PLDT
DSL, Globe, Smartbro, Converge
World Wide Web (WWW)- the infrastructure or application to support email, and peer-to peer
networks for file sharing and telephony.
Web site- is a collection of web pages connected with each other through hyperlinks. Web
pages are simply text documents. These text documents are written in Hypertext Markup
Language or HTML for short, with HTML, web pages can display text, images and videos. Web
pages can also play sound, and call on programs to run applications, games, animation and so
on..
Web browsers are application or software that allows us to see web sites. A web browser
simply interprets the HTML document (e.g. the Web page) and displays the content as specified
in the HTML document.
∙ Internet Explorer
∙ Mozilla Firefox
∙ Opera
∙ Safari
∙ Google Chrome
∙ Konqueror
∙ Arora
∙ Dillo
∙ K-Meleon
∙ Lynx
∙ Kazekhase
∙ Amaya
Web Addresses
Web sites and the pages they contain each have a unique worldwide address. This address (or
Uniform Resource Locator, URL, in Internet jargon). The address for Microsoft is
www.microsoft.com. For most sites, this is all you need to specify and it defaults to the main
page (or home page) for the site. In some cases, you may also need or want to specify the path
and file name such as www.microsoft.com/office2016.
Note the extension .com after microsoft. There are six of extensions that help to divide the
computers on the Internet into understandable groups or domains.
∙ .com = commercial
∙ .gov = government
∙ .edu = education
∙ .org = organizations
∙ .net = networks
∙ .mil = military.
There are also extensions for sites outside of the U.S. including:
∙ .jp = Japan,
∙ .uk = United Kingdom,
∙ .fr = France
∙ .ph = Philippines
∙ .sg = Singapore
There are basically three major search services available for handling different tasks:
Directories, Search Engines, and Meta Search Engines.
Directories are sites that, like a gigantic phone book, provide a listing of the sites on the web.
Sites are typically categorized and you can search by descriptive keywords. Directories do not
include all of the sites on the Web, but generally include all of the major sites and companies.
Yahoo is a great directory.
Search Engines read the entire text of all sites on the Web and creates an index based on the
occurrence of key words for each site. AltaVista and Infoseek are powerful search engines.
Meta Search Engines submit your query to both directory and search engines. Metacrawler is
a popular meta search engine.
Downloading Software
In addition to serving Web pages to your browser, the Web also provides opportunities
to easily download programs and files.
Browser Extensions
Both Netscape Navigator and Microsoft Internet Explorer browsers provide the ability to extend
the functionality of your browser by downloading additional programs that work within the
browser.
Navigator calls such programs "Plug-Ins" and you can find a collection of these at
www.netscape.com/plugins. Microsoft calls them "ActiveX Controls" and can be found at
www.activex.com.
File Compression
Most files are compressed to make them smaller in size and faster to download. You will need
to know how it was compressed and have the corresponding decompression program to view
the file (most decompression programs are available as shareware). There are different
compression programs for different computers, but the most common for the PC include WinZip
and PKZIP (files end in .zip), and for the Mac, BinHex (.hqx) and Stuffit (.sit).
Web Multimedia
The Web is rapidly evolving from primarily text-based documents to multimedia experience of
sight, sound and motion which rival CD-ROM titles. There are a number of new multimedia
technologies and browser add-ins that can enhance your Web surfing.
Audio
Hear live broadcasts, sample songs from your favorite bands, or even use the Web to have two
way "web phone" conversations. Some good sites to start include:
Video
∙ RealVideo at www.realnetworks.com
∙ CU-SeeMe at www.whitepine.com
3D
Animation
Interact with some of the most engaging and entertaining sites on the web.
Electronic mail, often abbreviated as email, e.mail or e-mail, is a method of exchanging digital
messages. E-mail systems are based on a store-and-forward model in which e-mail computer
server systems accept, forward, deliver and store messages on behalf of users, who only need
to connect to the e-mail infrastructure, typically an e-mail server, with a network-enabled device
(e.g., a personal computer) for the duration of message submission or retrieval. Originally, e mail
was always transmitted directly from one user's device to another's; nowadays this is rarely the
case.
An electronic mail message consists of two components, the message header, and the
message body, which is the e-mail’s content.
The message header contains control information, including, minimally, an originator's email
address and one or more recipient addresses. Usually additional information is added, such as
a subject header field.
Originally a text-only communications medium, email was extended to carry multi-media content
attachments, which were standardized in with RFC 2045 through RFC 2049, collectively called,
Multipurpose Internet Mail Extensions (MIME).
∙ Header — structured into fields such as summary, sender, receiver, and other
information about the e-mail.
∙ Body — the message itself as unstructured text; sometimes containing a signature block at
the end. This is exactly the same as the body of a regular letter.
Message header
Each message has exactly one header, which is structured into fields. Each field has a name
and a value. RFC 5322 specifies the precise syntax.
Informally, each line of text in the header that begins with a printable character begins a
separate field. The field name starts in the first character of the line and ends before the
separator character ":". The separator is then followed by the field value (the "body" of the field).
The value is continued onto subsequent lines if those lines have a space or tab as their first
character. Field names and values are restricted to 7-bit ASCII characters. Non-ASCII values
may be represented using MIME encoded words.
Julius C. Sabando/Ronnie A. Idian Page 9
OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals
Header fields
∙ From: The e-mail address, and optionally the name of the author(s). In many e-mail
clients not changeable except through changing account settings.
∙ To: The e-mail address(es), and optionally name(s) of the message's recipient(s). Indicates
primary recipients (multiple allowed), for secondary recipients see Cc: and Bcc: below.
∙ Subject: A brief summary of the topic of the message.
∙ Date: The local time and date when the message was written. Like the From: field, many
email clients fill this in automatically when sending. The recipient's client may then
display the time in the format and time zone local to her.
∙ Message-ID: Also an automatically generated field; used to prevent multiple delivery
and for reference in In-Reply-To: (see below).
Note that the "To:" field is not necessarily related to the addresses to which the message is
delivered. The actual delivery list is supplied separately to the transport protocol, SMTP, which
may or may not originally have been extracted from the header content. The "To:" field is similar
to the addressing at the top of a conventional letter which is delivered according to the address
on the outer envelope. Also note that the "From:" field does not have to be the real sender of the
e-mail message. One reason is that it is very easy to fake the "From:" field and let a message
seem to be from any mail address. It is possible to digitally sign e-mail, which is much harder to
fake, but such signatures require extra programming and often external programs to verify.
Some Internet service providers do not relay e-mail claiming to come from a domain not hosted
by them, but very few (if any) check to make sure that the person or even e-mail address named
in the "From:" field is the one associated with the connection. Some Internet service providers
apply e-mail authentication systems to e-mail being sent through their MTA to allow other MTAs
to detect forged spam that might appear to come from them.
RFC 3864 describes registration procedures for message header fields at the IANA; it provides
for permanent and provisional message header field names, including also fields defined for
MIME, netnews, and http, and referencing relevant RFCs. Common header fields for email
include:
∙ Bcc: Blind Carbon Copy; addresses added to the SMTP delivery list but not (usually)
listed in the message data, remaining invisible to other recipients.
∙ Cc: Carbon copy; Many e-mail clients will mark e-mail in your inbox differently
depending on whether you are in the To: or Cc: list.
∙ Content-Type: Information about how the message is to be displayed, usually a MIME
type.
∙ In-Reply-To: Message-ID of the message that this is a reply to. Used to link related
messages together.
∙ Precedence: commonly with values "bulk", "junk", or "list"; used to indicate that
automated "vacation" or "out of office" responses should not be returned for this mail,
eg. to prevent vacation notices from being sent to all other subscribers of a
mailinglist.
∙ Received: Tracking information generated by mail servers that have previously handled a
message, in reverse order (last handler first).
∙ References: Message-ID of the message that this is a reply to, and the message-id of
the message the previous was reply a reply to, etc.
Ping is a computer network administration utility used to test the reachability of a host on an
Internet Protocol (IP) network and to measure the round-trip time for messages sent from the
originating host to a destination computer. The name comes from active sonar terminology
which sends a pulse of sound and listens for the echo to detect objects underwater.
Assignment:
1. Differentiate internet connectivity from the late 2000 to today’s internet connection.
2. Create Google account (exclusive used for this subject only)
Quiz:
a. Website
b. HTML
c. Web browser
9. Is a computer network administration utility used to test the reachability of a host on
an Internet Protocol
a. Message header
b. Ping
c. Meta search engine
10. The interconnection of computers on a global scale. It is the biggest network in the
world today, connecting computer from all over the world.
a. Website
b. Web Browser
c. Internet
OBJECTIVES:
• Bits per Second (bps): A measure of transmission speed. The number of bits (0 0r 1)
which can be transmitted in a second.
Packets
∙ Transmissions are broken up into smaller units or data transmissions called packets
Example
Transmission Direction
- E-mail
- Voice Mail
- Fax
- Smart Phone
- Instant Messaging
- Telecommuting
- Video-conferencing
- Groupware
- Telephony
- E-Commerce
- The Internet
- The Web
- Global positioning system
Ethernet
TCP/IP
∙ Developed in 1973 for use on the ARPANET which was a defense force research network.
∙ Adopted in 1983 as the Internet standard. all hosts on the Internet are required to use
TCP/IP.
∙ Allows transfer of data using packet switching
LAN vs WAN
LAN is “local Area network” which is a network confined to a small geographic area which
is a building or a group of buildings.
WAN is “wide area network” which is a network spread over a large geographic area. The
largest WAN is the internet.
Examples of LANS
Ring
Bus
Star
What is a Network?
Internet
Intranet
Extranet
Intranet that has been extended to include access to or from selected external
organizations such as customers, but not general public.
Transmission Media
∙ Coaxial cable –Thick black cable used for higher bandwidth communications than twisted
pair (i.e. Optus cable)
∙ Fibre optic – data transferred through pulses of light. Extremely fast. ∙ Non
cable methods such as satellite, microwave, wireless and Bluetooth
Network Hardware
SERVERS: Help to manage the network and the resources of that network. On larger networks
servers commonly have specialized tasks such as: File Servers: stores and manages files, Print
Servers: manages printers and print jobs, Mail Server: Manages email, Web Server: manages
web access.
Routers: connects multiple networks and are protocol independent. can be used in place of a
switch or bridge.
Switches: smart hubs which transmit packets to the destination port only
Hubs: like double adapters /power boards in the home except instead of plugging in extension
cords we are plugging in computers to allow them to communicate.
Week 4: NETWORKING
OBJECTIVES:
Network Types – Computer networks vary in shape and size depending on usage.
- WAN
- LAN
- Peer to Peer
Switches and Hubs – The central device within a network that transmit data.
Servers – The central storage device for the names and locations of various
data. - IP Addresses
- Bus
- Ring
network. Routers – The device that let messages flow between networks.
Fiber Optic
• Data travels faster through switches because data is not sequenced as it is in a hub
• Information travels more efficiently through a switch because travels directly to it’s
destination as opposed to being broadcast to all PC’s on the network hub.
Users are connected to certain servers which will fulfill the required request.
Print Servers
File Servers
Web Servers
“IP” stands for Internet Protocol. IP Addresses serve as the location of websites on the Internet
as well as the workstations that are connected to the web. IP addresses are made up of four
sets of numbers called “Octets”. There are two types of IP Addresses: Static and Temporary.
Below is a description of both.
Static IP Addresses Temporary IP Addresses
Static IP addresses are found only on Temporary IP addresses are found only on
servers and remain the same. PC’s are constantly changing each time it is
logged on
Network Topology refers to the shape of a network, or the network's layout. How different nodes
in a network are connected to each other and how they communicate are determined by the
network's topology.
1. Star
2. Ring
3. Bus
Star Topology
hub or switch.
Star Topology
Bus Topology
∙ Allows for computers to be moved easily without having to worry about wires or cables
OBJECTIVES:
∙ Describe the features and functionality of electronic billing and payment systems; ∙
Identify the key security threats in electronic payment system;
∙ Describe how technology helps secure internet communications;
∙ Appreciate the importance of policies, procedures, and laws in creating security.
Cybercrime is becoming a more significant problem for both organizations and consumers.
Both networks, DDoS attacks, Trojans, phishing, ransomeware, data theft, identify fraud, credit
card faud, and spyware are just some of the threats that are making daily headlines. Social
networks also have had security breaches. But despite the increasing attention being paid to
cybercrime, it is difficult to accurately estimate the actual amount of such crime, in part because
many companies are hesitant to report it due to the fear of losing the trust of their customers,
and because if crime is reported, it may be difficult to quantify the actual dollar amount of the
loss.
Dimensions of E-Commerce
Integrity refers to the ability to ensure that information being displayed on a Web site, or
transmitted or received over the Internet, has not been altered in anyway by an unauthorized
party.
Nonrepudiation refers to the ability to ensure that e-commerce participatants do not deny (i.e.,
repudiate) their online actions.
Authenticity refers to the ability to identify the identity of a person or entity with whom you are
dealing on the Internet.
Confidentiality refers to the ability to ensure that messages and data are available only to those
who are authorized to view them.
Privacy refers to the ability to control the use of information a customers provides about himself
or herself to an e-commerce merchant.
From a technology perspective, there are three key points of vulnerability where dealing with e
commerce; the client, the server, and the communications pipeline.
In this section, we describe a number of the most common and most damaging forms of security
threats to e-commerce consumers and site opeerators; malicious code, potentially unwanted
programs, phishing, hacking and cybervandalism, credit card potentially unwanted programs,
phishing, hacking and cybervandalism, credit card fraud/theft, spoofing, pharming, spam (junk
Web sites link farms), identity fraud.
E-COMMERCE TRANSACTION
In a typical
e-commerce
transaction,
the
customer
uses a credit
card and the
existing
credit
payment
system.
Fig. 5.2 VULNERABLE POINTS IN AN E-COMMERCE TRANSACTION
Julius C. Sabando/Ronnie A. Idian Page 27
OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals
There are three major vulnerable points in e-commerce transaction: Internet communication,
servers, and clients
Malicious Code
Exploit Kits are collections of exploits bundled together and rented or sold as a commercial
product, often with slick user interfaces and in-depth analytics functionality. Use of an exploit kit
typically does not require much technical skill, enabling novices to become cybercriminals.
Exploit kits typically target software that is widely deployed, such as Microsoft Windows, Internet
Explorer, Adobe Flash and Reader, and Oracle Java .
Maladvertising One of the latest innovations in malicious code distribution is to embed it in the
online advertising chain known as Maladvertising
Drive-by download malware that comes with a downloaded file that a user requests
Virus is a computer program that has the ability to replicate or make copies of itself, and spread
to other files. In addition to the ability to replicate, most computer viruses deliver a “payload.”
The payload may be relatively benign, such as the display of a message or image, or it may be
highly destructive- destroying files, reformatting the computer hard drive, or causing programs to
run improperly.
Raonsomeware (scareware) is a type of malware (often a worm) that locks your computer or
files to stop you from accessing them. Ransomware will often display a notice that says an
authority such as FBI, Department of Justice, or IRS has detected illegal activity on your
computer and demands that you pay a fine in order to unlock the computer and avoid
prosecution.
Trojan horse appears to be benign, but then does something other than expected. The Trojan
horse is not itself a virus because it does not replicate, but is often a way for viruses or other
malicious code such as bots or rootkits (a program whose aim is to subvert control of the
computer’s operating system) to be introduced into a computer system.
Backdoor is a feature of viruses, worms, and Trojans that allows an attacker to remotely
access a compromised computer.
Adware is typically used to call for pop-up ads to display when the user visits certain sites.
While annoying, adware is not typically used for criminal activities. A browser parasite is a
program that can monitor and change the settings of a user’s browser, for instance, changing
the browser’s home page, or sending information about the sites visited to a remote computer.
Spyware, on the other hand, can be used to obtain information such as user’s keystrokes,
copies of e-mail and instant messages, and even take screenshots (and thereby capture
passwords or other confidential data)
Phishing
Social engineering relies on human curiosity, greed and gullibility in order to trick people into
taking an action that will result in the downloading of malware. Keven Mitnick, until his capture
and imprisonment in 1999, was one of the America’s most wanted computer criminals. Mitnick
used simple deceptive techniques to obtain password, social security, and police records all
without the use of any sophisticated technology (Mitnick, 2011).
Phishing is any deceptive, online attempt by a third party to obtain confidential information for
financial gain. Phishing attacks typically do not involve malicious code but instead rely on
straightforward mispresentation and fraud, so-called “social engineering” techniques. One of
the most popular phishing attacks is the e-mail scam letter.
Data Breaches
A data breach occurs whenever organizations lose control over corporate information to
outsiders. According to Symantec, the total number of data breaches in 2014 grew by 20%
compared to 2013 Symantec, 2015).
Theft of credit card data is one of the most feared occurrences on the Internet. Fear that credit
card information will be stolen prevents users from making online purchase in many cases.
Interestingly, this fear appears to be largely unfounded. Incidences of stolen credit card
information are actually much lower than users think, around 0.9% of all online card transactions
(CyberSource, 2015). Online merchants use a variety of techniques to combat credit card fraud,
including using automated fraud detections tools, manually reviewing orders, and rejection of
suspect orders.
Identity Fraud
Identity fraud involves the unauthorized use of another person’s personal data, such as social
security, driver’s license, and/or credit card numbers, as well as user names and password, for
illegal financial benefit. Criminals can use such data to obtain loans, purchase merchandise, or
obtain other services, such as mobile phone or other utility services. Cybercriminals employ
many of the techniques described previously, such as spyware, phishing, data breaches, and
credit card theft, for the purpose of identity fraud.
Spoofing a Web site sometimes involves Pharming, automatically redirecting a Web link to an
address different from the intended one, with the site masquerading as the intended destination.
Links that are designed to lead to one site can be reset to send users to totally unrelated site
one that benefits the hacker.
Spam (junk) Web sites (also sometimes referred to as link farms) are a little different. These
are sites that promise to offer some product or service, but in fact are just a collection of
advertisements for other sites, some of which contain malicious code. For instance, you may
search for “[name of town] weather,” and then click on a link that promises your local weather,
but then discover that all the site does is display ads for weather-related products or other Web
sites. Junk or spam Web sites typically appear on search results, and do not involve e-mail.
These sites cloak their identities by using doman names similar to legitimate firm names, and
redirect traffic to known spammer-redirection domains such as topsearch10.com
Many security threats prey on poorly designed software, sometimes in the operating system and
sometimes in the application software, including browsers. The increase in complexitiy and size
of software programs, coupled with demands for timely delivery to markets, has contributed to
an incrase in software flaws or vulnerabilities that hackers can exploit. For instance, SQL
injection attacks take advantage of vulnerabilities in poorly coded Web application software
that fails to properly validate or filter data entered by a user on a Web page to introduce
malicious program code into a company’s systems and networks.
Social networks like Facebook, Twitter, LinkedIn, Pinterest, and Tumblr provide a rich and
rewarding environment for hackers. Viruses, site takeovers, identity fraud, malware-loaded
apps, click hijacking, phishing and spam are all found on social networks. According to
Symantec, the most common type of scam on social media sites in 2014 were manual sharing
scams, where victims unwittingly shared videos, stories and pictures that included links to
malicious site. Fake offerings that invite victims to join a fake event or group with incentives
such as free gift cards and that require a user to share his or her information with the attacker
were another common technique.
Other techniques include fake Like Buttons, when clicked, install malware and post updates to
the user’s Newsfeed, further spreading the attack, and fake apps (Symantec, 2015). By
sneaking in among our friends, hackers can masquerade as friends and dupe users into scams.
The explosion in mobile devices has broadened opportunities for hackers. Mobile users are
filling their devices with personal and financial information, and using them to conduct an
increasing number of transaction, from retail purchases to mobile banking, making them
excellent targets for hackers. In general, mobile devices face all the same risks as any Internet
device as well as some new risks associated with wireless network security. For instance,
public Wi-Fi networks that are not secured are very susceptible to hacking.
By the end of 2014, Symantec had identified more than 1 million apps that it classified as
malware, and it expects the growth in mobile malware to continue in 2015 and become more
aggressive in targeting mobile payment and mobile banking applications. The majority of
mobile malware still targets the Android platform.
The move of so many Internet services into the cloud also raises security risks. From an
infrastructure standpoint, DDoS attacks threaten the availability of cloud services on which more
and more companies are relying. According to Alert Logic, Which analyzed 1 billion security
events in the IT environments of more than 3,000 enterprise customers, attacks against cloud
based services and applications increased by 45% in 2014.
Technology Solutions
At first glance, it might seem like there is not much that can be done about the onslaught of
security breaches on the Internet. Reviewing the security threats in the previous section, it is
clear tht the threats to e-commerce are very real, potentially devastating for individuals,
businesses, and entire nations, and likely to be increasing in intensity along the growth in e
commerce. But in fact a great deal of progress has been made by private security firms,
corporate and home users, network administrators, technology firms, and government agencies.
There are two lines of defense: technology solutios and policy solutions.
Because e-commerce transactions must flow over the public Internet, and therefore involve
thousands of routers and servers through which the transaction packets flow, security experts
believe the greatest security threats occur at the level of Internet communications. This is very
different from a private network where dedicated communication line is established between two
parties. A number of tools are available to protect the security of Internet communications, the
most basic of which is message encryption.
Encryption
Encryption is the process of transforming plain text or data into cipher text that cannot be read
by anyone other than the sender and the receiver. The purpose of encryption is
∙ Message integrity – provides assurance that the message has not been altered. ∙
Nonrepudiation – prevents the user from denying he or she sent the message. ∙
Authentication – provides verification of the identity of the person (or computer sending
the message.
∙ Confidentiality – gives assurance that the message was not read by others.
Tools Available to Achieve Site Security
The Data Encryption Standard (DES) was developed by the National Security Agency (NSA)
and IBM in the 1950s. DES uses a 56-bit encryption key. To cope with much faster computers,
it has been improved by the Triple DES Encryption Algorithm (TDEA) – essentially encrypting
the message three times, each with a separate key. Today, the most widely used symmetric key
algorihm is Advanced Encryption Standard (AES), which offers key sizes of 128, 192, and
256 bits. AES had been considered to be relatively secure, but in 2011, researchers from
Microsoft and a Belgian university announced that they had discovered a way to break the
algorihm, and with this work, the “safety margin” of AES continues to erode.
In 1976, a new way of encrypting messages called public key cryptography was invented by
Whitfield Diffie and Martin Hellman. Public key cryptography (also referred to as asymmetric
cryptography) solves the problem of exchanging keys. In this method, two mathematically
related digital keys are used: a public key and a private key.
The private key is kept secret by the owner, and the public key is widely disseminated. Both
keys can be used to encrypt and decrypt a message. However, once the keys are used to
encrypt a message, the same key cannot be used to unencrypt the message.
Julius C. Sabando/Ronnie A. Idian Page 33
OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals
cryptography, the sender encrypts a message using the recipients, public key, and then sends it
over the Internet. The only person who can decrypt this message is the recipient, using his or
her private key.
A virtual private network (VPN) allows remote users to securely access a corporation’s local
area network via the Internet, using a variety of VPN protocols. VPNs use both authentication
and encryption to secure information from unauthorized persons (providing confidentiality and
integrity). Authentication prevents spoofing and misrepresentation of identities. A remote user
can connect to a remote private local network using a local ISP. The VPN protocols will
establish the link from the client to the corporate network as if the user had dialed into the
corporate network directly. The process of connecting one protocol through another (IP) is
called tunneling, because the VPN creates a private connection by adding an invisible wrapper
around a message to hide its content. As the message travels through the Internet between the
ISP and the corporate network, it is shielded from prying eyes by an encrypted wrapper.
Accessing the Internet via a wireless (Wi-fi) network has its own particular security issues. Early
Wi-Fi networks used a security standard called Wired equivalent Privacy (WEP) to encrypt
information. WEP was very weak, and easy for hackers to crack. A new standard, Wi-Fi
Protected Access (WPA), was developed that provided a higher standard of protection, but this
too soon became vulnerable to intrusion. Today, the current standard is WPA2, which uses the
AES algorithm for encryption and CCMP, a more advanced authentication code protocol.
Protecting Networks
Once you have protected communications as well as possible, the next set of tools to consider
are those that can protect your networks, as well as the servers and clients on those networks.
Firewalls
Firewalls and proxy servers are intended to build a wall around your network and the attached
servers and client, just like physical-world firewalls protect you from fires for a limited period of
time. Firewalls and proxy servers share some similar functions, but they are quite different.
A firewall refers to either hardware or software that filters communications packets and
prevents some packets from entering or exiting the network based on a security policy. The
firewall controls traffic to and from servers and clients, forbidding communications from
untrustworthy sources, and allowing other communications from trusted sources to proceed.
Every message that is to be sent or received from the network is processed by the firewall,
which determines if the message meets security guidelines established by the business. If it
does, it is permitted to be distributed, and if it doesn’t the message is blocked.
Proxy Servers
Proxy servers (proxies) are software servers often dedicated computer that handle all
communications originating from or being sent to the Internet by local clients, acting as a
spokesperson or bodyguard for the organization. Proxies act primarily to limit access of internal
clients to external Internet servers, although some proxy servers act as firewall as well.
In addition to a firewall and proxy server, an intrusion detection and/or prevention system can be
installed. An intrusion detection system (IDS) examines network traffic, watching to see if it
matches certain patterns or preconfigured rules indicative of an attack. If it detects suspicious
activity, the IDS will set off an alarm alerting administrators and log the event in a database.
An intrusion prevention system (IPS) has all the functionality of an IDS, with the additional
ability to take steps to prevent and block suspicious activities. For instance, an IPS can
terminate a session and reset a connection, block traffic from a suspicious IP address, or
reconfigure firewall or router security controls.
Operating system features and anti-virus software can help further protect servers and client
from certain types of attacks.
The most obvious way to protect servers and clients is to take advantage of automatic computer
security upgrades. The Microsoft, Apple, and Linux/Unix operating systems are continuously
updated to patch vulnerabilities discovered by hackers. These patches are automatic; that is,
when using these operating systems on the Internet, you are prompted and informed that
operating system enhancements are available. Users can easily download these security
patches for free.
In April 2014, Microsoft ended security support and updates for its Windows XP operating
system. Despite this, many organizations continue to use XP-based systems, and as a result,
many security experts anticipate a wave of strike against such system.
Anti-Virus Software
The easiest and least-expensive way to prevent threats to system integrity is to install anti-virus
software. Programs by McAfee, Symantec (Norton Antivirus), and many other provide
inexpensive tools to identify and eradicate the most common types of malicious code as they
enter a computer, as well as destroy those already lurking on a hard drive.
Anti-virus suite packages and stand-alone programs are available to eliminate intruders such as
bot programs, adware, and other security risks. Such programs work much like anti-virus
software in that they look recognized hacker tools or signature actions of known intruders.
A security plan begins with risk assessment – an assessment of the risks and point of
vulnerability. The first step is to inventory the information and knowledge assets of the e
commerce site and company. What information is at risk? Is it customer information, proprietary
designs, business activities, secret process, or other internal information, such as price
schedules, executive compensation, or payroll? Based on your qualified list of risks, you can
start to develop a security policy – a set of statements prioritizing the information risks,
identifying acceptable risks targets, and identifying the mechanisms for achieving these targets.
Next, consider an implementation plan – the steps you will take to achieve the security plan
goals. Specificially, you must determine how you will translate the levels of acceptable risk into
a set of tools, technologies, policies, and procedures. What new technologies will you deploy to
achieve the goals, and what new employees procedures will be needed?
Security Organization educates and trains users, keeps management ware of security threats
and breakdowns, and maintains the tools chosen to implement security.
Authentication procedures include the use of digital signatures, certificates of authority, and
public key infrastructure
Biometric devices can also be used to verify physical attributes associated with an individual,
such as a fingerprint or retina (eye) scan or speech recognition system.
Security token- physical device or software that generates an identifier that can be used in
addition to or in place of a password.
Authorization policies determine differing levels of access to information assets for differing
levels of users
Authorization management system establishes where and when a user is permitted to access
certain parts of a Web site
Security audit involves the routine review of access logs (identifying how outsiders are using
the site as well as how insiders are accessing the site’s assets)
(2). SSL does not authenticate either the merchant or the consumer. The transacting parties
have to trust one another.
Once the consumer credit card information is received by the merchant, the merchant software
contacts a clearing house
(3) As previously noted, a clearing house is a financial intermediary that authenticates credit
cards and verifies account balances. The clearing house contacts the issuing bank to verify the
account information.
(4). Once verified, the issuing bank credits the account of the merchant at the merchant’s bank
(usually this occurs at night in a batch process)
(5) The debit to the consumer account is transmitted to the consumer in a monthly statement.
Online stored value payment system Permits consumers to make instant, online payments to
merchants and other individuals based on value stored in an online account.
The limitations of the online credit card system have opened the way for the development of a
number of alternative online payment systems. Chief among them is PAYPAL.
PAYPAL (purchased by e-Bay in 2002 and then spun-off as an independent company again in
2015 enables individuals and businesses with e-mail account to make an receive payments up
to specified limit. Paypal is an example of an ONLINE STORED VALUE PAYMENT SYSTEM,
which permits consumers to make instant, online payments to merchants and other individuals
based on value stored in an online account.
PAYPAL has:
The beauty of PayPal is that no personal credit information has to be shared among the users,
the service can bee used by individuals to pay one another even in small amounts. However,
one issue with Paypal is its relatively high cost.
For example, to send or request money, the cost ranges from 2.9% to 5.99% of the amount
(depending on the type of transaction) plus a small fixed fee (typically $0.30) per transaction.
The use of mobile devices as payment mechanism is already well established in Europe and
Asia and is now exploding in the Unite4d States, where the infrastructure to support mobile
payment is finally being put in place. The U.S. mobile online retail payments are expected to
grow from $76 billion in 2014 to $217 billion by 2019. Physical goods are the most common
purchase in mobile online shopping, with over 50% of mobile buyers reporting that they had
purchased such goods (Javelin Strategy & Research, 2015)
Near field communication (NFC) is one of the enabling technologies for mobile payment
systems. Near field communication (NFC) is a set of short-range wireless technologies used
to share information among devices within about 2inches of each other (50mm). NFC devices
are either powered or passive. A connection requires one powered unit (the initiator), and one
target unpowered unit that can respond to requests from the powered unit
NFC peer-to-peer communication is possible where both devices are powered. An NFC
quipped smartphone, for instance, can be swiped by a merchant’s reader to record a payment
wirelessly and without contact.
In addition to using a mobile device as vehicle for e-commerce and as a payment method at
physical point-of-sale, another type of mobile payment transaction is becoming increasingly
popular: social/mobile peer-to-peer payments.
Services such as venom, Square Cash, Snapcash, the newly refocused Google Wallet, and the
new Facebook Messenger Payment service all enable users to send another person money
through a mobile application or Web site, funded by a checking account, debit card, credit card,
or a digital wallet balance.
Assignment
1. What are the different electronic payment systems that we can use here in the
Philippines. Cite atleast (3) and give their advantages and disadvantages.
2. Had you ever been a victim of online scam? If Yes, cite your experience and how it
could have been avoided. If No, research someone who had been a victim of online
scam and suggest how these online scam could have been avoided.
Week 6: ETHICS, LAW, AND E-COMMERCE
OBJECTIVES:
∙ Explain basic concepts related to privacy and information rights, the practices of e-commerce
companies that threaten privacy, and the different methods that can be used to protect online
privacy.
∙ Adeptness on major public safety and welfare issues raised by e-commerce.
∙ Practice the right to information and how it will be applied in the performance of administrative
duties;
Determining how or whether personal information should be retained or deleted on the Internet
is just one of many ethical, social, and political issues raised by the rapid evolution of the
Internet and e-commerce. For instance, whether individuals lose control over all personal
information once it is placed on the Internet is still up for debate in the United States. In Europe,
in contrast, individuals do retain rights to their personal information. These questions are not just
ethical questions that we as individuals have to answer; they also involve social institutions such
as family, schools, business firms and in some cases, entire nation-states. And these questions
have obvious political dimensions because they involve collective choices about how we
should live and what laws we would like to live under.
The Internet and its use in e-commerce have raised pervasive ethical, social, and political
issues on a scale unprecedented for computer technology. Entire sections of daily newspapers
and weekly magazines are devoted to the social impact of the Internet. But why is this so? Why
is the Internet at the root of so many contemporary controversies? Part of the answer lies in the
underlying features of Internet technology itself, and the ways in which it has been exploited by
business firms. Internet technology and its use in e-commerce disrupt existing social and
business relationships and understandings Consider for instance Table 1.2 (in Chapter 1),
which lists the unique features of Internet technology. Instead of considering the business
consequences of each unique feature, Table 8.1 examines the actual or potential ethical, social,
and/or political consequences of the technology.
We live in an "information society," where power and wealth increasingly depend on information
and knowledge as central assets. Controversies over information are often disagreements over
power, wealth, influence, and other things thought to be valuable. Like other technologies, such
as steam, electricity, telephones, and television the Internet and e-commerce can be used to
achieve social progress, and for the most part, this has occurred. However, the same
technologies can be used to commit crimes, despoil the environment, and threaten cherished
social values. Before automobiles there was very little interstate crime and very little federal
jurisdiction over crime. Likewise with the Internet: before the Internet, there was very little
"cybercrime."
Information rights: What rights to their own personal information do individual have in a public
marketplace, or in their private homes, when Internet technologies make information collection
so pervasive and efficient? What rights do individuals have to access information about
business firms and other organizations?
Property rights: How can traditional intellectual property rights be enforced in an Internet world
where perfect copies of protected works can be made and easily distributed worldwide in
seconds?
Governance: Should the Internet and e-commerce be subject to public laws? And so, what law
making bodies have jurisdiction-state, federal, and/or international
Ethics is at the heart of social and political debates about the Internet. Ethics is the study of
principles that individuals and organizations can use to determine right and wrong courses of
action. It is assumed in ethics that individuals are free moral agents who are in a position to
make choices. When faced with alternative courses of action, what is the correct moral choice?
Extending ethics from individuals to business firms and even entire societies can be difficult, but
it is not impossible. As long as there is a decision-making body or individual (such as a board of
directors or CEO in a business firm, or a governmental body in a society), their decisions can be
judged against a variety of ethical principles.
If you understand some basic ethical principles, your ability to reason about larger social and
political debates will be improved. In western culture, there are four basic principles that all
ethical schools of thought share: responsibility, accountability, liability, and due process.
Responsibility means that as free moral agents, individual’s organizations, and societies are
responsible for the actions they take. Accountability means that individuals, organizations, and
societies should be held accountable to others for the consequences of their actions. The third
principle-liability-extends the concepts of responsibility and accountability to the area of law.
Liability is a feature of political systems in which a body of law is in place that permits individuals
to recover the damages done to them by other actors, systems, or organizations. Due process
is a feature of law-governed societies and refers to a process in which law are known and
understood, and there is an ability to appeal to higher authorities to ensure that the laws have
been correctly applied.
Privacy is the moral right of individuals to be left alone, free from surveillance or interference
from other individuals or organizations, including the state. Privacy is a girder supporting
freedom: Without the privacy required to think, write, plan, and associate independently and
without fear, social and political freedom is weakened, and perhaps destroyed.
Information privacy is a subset of privacy. The right to information privacy includes both the
claim that certain information should not be collected at all by governments or business firms,
and the claim of individuals to control the use of whatever information is collected about them.
Individual control over personal information is at the core of the privacy concept. Implicit in the
claim to control one's own personal information is the claim to be able to edit and even delete
personal information from the Web. This is often called the "right to be forgotten as discussed in
the opening case (Rosen, 2012).
The proposed Freedom of Information (FOI) Act aims to mandate the disclosure of public
documents. The proposed bill also outlines the exceptions for public disclosure and the
procedures for accessing public documents.
In President Aquino’s message on the National Budget for Fiscal Year 2016, he reiterated that
greater fiscal transparency leads to a more responsive government. To ensure the permanency
of transparency policies, he has urged Congress to pass the Freedom of Information Act.
Both bills below follow the proposed FOI bill approved by President Benigno S. Aquino III, which
was transmitted to the previous Congress by the Secretary of Budget and Management,
Florencio Abad. Secretary Abad resubmitted the bill to the current Congress as well.
This FOI bill is an integral element of the Aquino Good Governance and Anti-Corruption Plan of
2012-2016. This plan lays out reforms and initiatives that pursue greater transparency,
accountability, and citizen participation in governance.
This draft bill is a result of a consultative process conducted by an administration study group
after careful study of similar legislation in order to balance the government’s legitimate needs for
secrecy with the public’s right to know.
Senate
On Monday, March 10, 2014, the Senate passed the FOI bill on third and final reading, with 22
affirmative votes, no abstention, and no negative votes.
House of Representatives
LATEST: On March 4, 2015, the bill passed the Committee on Appropriations; as of this date, it
is awaiting 2nd reading.
The Committee of Public Information of the House of Representatives has formed a technical
working group (TWG) to expedite the passage of the house version. The TWG has conducted
regular meetings to discuss the provisions last February to June. Resource persons from the
different offices from the executive participated in the meetings. The Office of the President was
represented by Undersecretary Manuel L. Quezon III.
On October 23, 2013, Camarines Sur Third District Representative Maria Leonor G. Robredo
and Batanes Representative Henedina R. Abad filed House Bill No. 3237, otherwise known as
“An Act to Strengthen the Right of Citizens to Information held by the Government.”
Q AND A
∙ The records of minutes and advice given and opinions expressed during decision making
or policy formulation, invoked by the Chief Executive to be privileged by reason of the
sensitivity.
∙ Information pertaining to internal and/or external defense, law enforcement, and border
control.
∙ Drafts of orders, resolutions, decisions, memoranda, or audit reports by any executive,
administrative, regulatory, constitutional, judicial, or quasi-judicial body.
∙ Information obtained by any committee of either house of Congress in executive
session.
∙ Personal information of a natural person other than the requesting party. (See Section 6f
for details.)
∙ Information pertaining to trade secrets and commercial or financial information that
would seriously prejudice industrial, financial, or commercial competition. (See Section
6g for details.)
∙ Information classified as privileged communications in legal proceedings by law or by the
Rules of Court.
∙ Information exempted by law or the Constitution.
What are the advantages of this bill compared to the prior bills filed in Congress?
– Important legislative acts and resolutions of a public nature of the Congress of the Philippines;
– Executive and administrative orders and proclamations of general application; – Decisions or
abstracts of decisions of the Supreme Court and the Court of Appeals or other courts of similar
rank, as may be deemed of sufficient importance to be so published; – Such documents or
classes of documents as the President shall determine to have general application.
∙ The bill asks government agencies to translate key information into major Filipino
languages and present them in popular form and means.
∙ All government agencies are required to prepare a Freedom of Information Manual that
will contain details and procedures and serve as a guide on the matter.
∙ The bill integrates open data provisions, which mandates a regular and pro-active
release of government data in open and machine-readable formats.
Procedure of access
1. Request
Submit a request to the government agency concerned either personally, by mail, or through
electronic means.
2. Receiving
The request will be stamped by the government agency, indicating the date, time, and other
details of receipt (refer to Section 16b). In case the request is submitted by electronic means,
the government agency shall provide for an equivalent means by which the requirements shall
be met.
3. Waiting time
The government agency shall comply with such request as soon as practicable, and in any case
within 15 working days from receipt. The period may be extended for specific cases. (Refer to
Section 16e.)
4. Notification
The government agency shall, in writing or through electronic means, notify the person making
the request of the extension, the reasons for extension, and the date the information will be
made available (no more than 20 working days).
∙ The government agency shall notify the person making the request of such denial in
writing or through electronic means within 15 working days from the receipt of the
request.
∙ The notice shall clearly set forth the ground for denial and the circumstances on which
the denial is based. Failure to notify shall be deemed a denial of the request for access
to information.
∙ Following the proper procedure, denial of a request for access to information may be
appealed to the head of agency, then Ombudsman, then a verified petition for
mandamus may be filed in the proper court.
∙ The Judiciary shall however will be governed by such remedies as promulgated by the
Supreme Court.
Is the Admin Bill a watered down version of the previously filed bills in Congress?
∙ No. The Admin Bill in fact expanded the list of mandatory information for disclosure,
provided a specific procedure for access, stated the exemptions in a very clear and
transparent manner, and directed that the exemptions are to be strictly construed.
∙ Now that the FOI has been approved on the committee level in both the Senate and
House, the bill will be taken up in plenary.
How does FOI relate to the other governance reforms under the Aquino Good
Governance and Anti-Corruption Plan 2012-2016?
∙ Greater access to information will, in general, empower citizens to hold their public officials
accountable and to participate in government processes that are being opened to them
by this administration. For instance, greater access to information on government
projects through open governance initiatives such as Open Data Philippines will allow
civil society organizations to make more meaningful and accurate inputs to the
Participatory Budget and Participatory Audit processes that this administration has
initiated. The mandatory posting of SALNs will also empower our government
investigators and their citizen-partners to run after corrupt officials.
OBJECTIVES:
∙ Identify the different social media platform that the Administrative Professionals can use in the
office.
∙ Appreciate the advantage of the social media platform as means of information dissemination and
evaluate its disadvantage to avoid problems;
∙ Demonstrate responsible use of social media platform.
In this age of the internet, knowledge can be shared instantly and people are able to access
information quicker and easier than ever before. Social Media is the most effective tool for
sharing and marketing. Scientists and researchers need to use this tool to their advantage in
order to promote their work and share information with the world. But to promote any kind of
item, including academic research, a knowledge of social media and its impact is required.
through publishing research in academic journals. However, this is now just one part of scientific
knowledge dissemination.
With the rise of the internet and social media specifically, people are wanting to be more and
more involved in the work that is being done around the world. People want to know what is
being studied and why it is important for them. The communication of science has become
immensely important in the world of academia and it is likely that it will only continue to grow.
Understanding this and using it to your advantage will help you share your work with not only
the science community but also the world.
Blogging and vlogging (video blogging) have become a new way for scientists to share their
work with the general public. Science news media is a growing industry, with magazines,
websites, TV shows and documentaries. Scientists need to take advantage of these platforms in
order to share their work with more of the world.
This type of long-form content can give your readers a look into your research without them
having to read and understand a journal article. But in order for these interested readers to find
your long-form content, social networking sites are the essential parts of any news site. Many
social media marketing plans include long-form website content as well as promotion on
common social media platforms. These plans provide short and essential information to those
who are interested in quick learning, and readers that are interested in “diving deeper” can
read/watch more about the topic in the long-form.
There are different types of social networking platforms that scientists can take advantage of.
Each of them have their own pros and cons, and it is important to understand the different
strategies behind the sites.
Using Twitter
Twitter is arguably the best social media platform for sharing scientific research and knowledge.
It is a microblogging system that enables real-time interaction between posters and followers.
The advantage to using twitter is the ability to post links to other websites and tag certain
themes to attract readers to your posts. For example, if you post a link to your recently
published paper, you can write a short blurb giving readers information about the topic, and then
you can tag (#hastag) #scicomm, #science, #research, #biology. Basically, by tagging certain
keywords, interested people are more likely going to see your post.
One advantage of microblogging on Twitter is the opportunity for real time review of work, or
active debates on an issue. Formally, scientific research needs to go through an extensive peer
review process before being published. While this still needs to be done, many scientists take to
Twitter for a quick review of their work by other scientists and science communicators.
Using Instagram
Instagram is similar to Twitter, in that it is another microblogging platform, but it largely focuses
on pictures and short video content. It has been flooded with content creators and influencers
that post gorgeous photos and attempt to sell followers products they are paid to promote. While
this might not seem like a platform that welcomes scientific research and its promotion, when
used correctly, it can be an excellent place to share scientific knowledge. Like Twitter, you can
use tags to bring people to your posts and page. But, what really brings people to your page
and increase your followers is excellent pictures. So before deciding to start an Instagram
account, figure out if your research enables you to take relevant and eye-catching photos
(Caplehorne, 2018).
The advantage of Instagram over Twitter is you can write as much as your heart desires on your
posts. You have to keep in mind however, that not everyone is going to read all the way to the
end. It still might be a good idea to limit the amount you actually write on social media and direct
people to your actual paper.
The disadvantage to Instagram, other than the focus on pictures, is that you can’t post links to
other websites directly on your posts. One thing that people frequently do is post links to their
papers or portfolios in their bio description, and when they are directing people there, they write
“link in my bio”, so people are aware.
Using Facebook
The use of Facebook is on the decline. However, it is important to be aware of Facebook
because most people have an active account simply because it offers easy communication
tools. The main advantage to Facebook is the ability to create groups and pages. By doing this,
you can create a sort of community of people to collaborate on projects, discuss news, and
learn together.
For the goal of knowledge dissemination, Facebook is much different than Twitter and
Instagram. Facebook users are primarily looking for engagement instead of simply acquiring
information. In a study looking to determine the engagement rate of Facebook users with
information associated with dermatology, it was found that people were more likely to be
engaged with the information when it was found on “patient-centered” pages instead of
academic journals and professional groups (Kim, 2014). This means that users are more
interested in being in a community of people similar to them on Facebook – they are more likely
to engage with information when they feel it is specifically important to them.
One disadvantage of using Facebook is the challenge of standing out. The Facebook algorithm
makes it so that users see only what interests them. Facebook shows them targeted ads, the
posts of their closest friends, and their favorite pages to keep users interested and on the site
longer. It can be hard to build a new following on Facebook.
Using LinkedIn
In the past, social media platforms have largely been about sharing information about your
personal life; pictures, stories, etc. LinkedIn is different. When social media became universal, it
became more than a place to connect with friends, the internet became a place where you could
connect with professionals and with potential employers. LinkedIn was created to give people a
place to document their professional life.
LinkedIn is now a social networking platform that enables users to connect with other
professionals and share information that they find interesting and relevant. The advantage of
using LinkedIn for knowledge dissemination is that the people who are likely to engage with your
work and posts are those with the goal of professionalism. The disadvantage is that it is not a
very wide-reaching platform, in that you are not going to reach a diverse group of readers. One
study found that LinkedIn users were more likely to use the platform to actively engage and
seek advice from people compared to Twitter users who were more likely to use the platform for
general knowledge inquiry (Huang, 2019). That means that there are two very different
audiences when it comes to LinkedIn and Twitter. You have to decide what your specific goals
are and what platforms they align with.
Using Reddit and other Forum Platforms
Reddit is an open-source community where users can submit original content or content taken
from somewhere else. Users then vote on the content posted, and the most popular content is
shared with all users. Within Reddit there are “subreddits” or specific pages designated for
certain topics, like r/science.
These forum platforms have become increasingly popular and the value of Reddit specifically is
the ability to engage with people on the site like Twitter, but there are no “followers”. If your
content is popular, you don’t need to have a large following for it to be seen – it will be shared.
On Reddit, users have created a series where people can ask questions and scientists are able
to answer them. While this isn’t strategically posting about your new research, engaging in this
activity can bring people to your other platforms to read your work. If users appreciate your
responses and like the answers you give, they might be more inclined to search out your work.
All you need is one person to resonate or connect with your post and your work. Having just a
couple of people share your posts can exponentially increase your reach. What’s more, social
media networks share, with users, posts that they think are most interesting to them. This is
socially known as “the algorithm” – it takes information about what specific users like and dislike
and then send them suggestions like people to follow, or posts to check out.
Another way to increase your reach is by sharing and responding to other posts on social media
that you connect with. Is there another research group that you frequently check in with? Follow
them. Is there is science communicator that you really enjoy listening to or reading about?
Follow them and share/like their posts. Social media is all about connecting, so once you join or
create a community of like-minded people, the followers will come and your work will be
constantly shared.
audiences
There are millions of people using social media platforms. It’s a great opportunity for your
business to reach a large pool of people that are interested in your products or services.
According to Pew Research Center, these are the percentages of U.S. adults that use social media
sites online or on mobile:
∙ YouTube: 73%
∙ Facebook: 68%
∙ Instagram: 35%
∙ Pinterest: 29%
∙ Snapchat: 27%
∙ LinkedIn: 25%
∙ Twitter: 24%
U.S. adults use many of these sites, which creates great opportunities for your business to
reach leads. You have numerous opportunities to reach leads and can engage them on these
different platforms.
The ability to reach large audiences is a huge advantage of social media. It opens the door for
your business to find more leads that want your products or services.
A coffee shop in Washington, D.C., for instance, could use social media to reach locals and
tourists. They could target users within a certain radius or location when creating social ads or
boosting organic posts. Both these strategies could help bring foot traffic to the shop.
Social media is one of the few marketing strategies that allow you to connect directly with your
audience. You know who is interested in your business because they choose to follow your
social media account.
∙ You get to know them better: When you know your audience better, you can deliver more
valuable content to them. You make the content more personalized to their interests, which
leads to more engagement on your page and with your business.
∙ You provide better customer service: A direct connection with your audience allows you to
resolve issues easier. You can address them personally, deal with their issues 1-on-1, and
build your brand in a positive light in the process.
∙ You gain valuable insight about your customers: The direct connection with your audience
helps you get to know your audience better. You see who interacts with your posts and how
they interact with them. It helps you adapt your strategy to make it better for your followers.
∙ You see how your audience perceives your business: It’s always good to know how others
view your business. With social media marketing, you know what your audience thinks of
your company. It’s a huge advantage of social media marketing because you can capitalize
on aspects people like about your business and fix elements they don’t like.
The direct connection with your audience is a great way to improve your overall marketing
campaign. You’ll get insight from your followers and be able to adapt your social media strategy
better to meet their needs.
The ability to post organic content for free is an incredible benefit of social media for business.
This opens many opportunities for your company to connect with valuable leads at no cost. It’s
one of the reasons why companies love using these platforms.
You can post as much content as you want to engage your audience too.
These platforms enable you to post photos, videos, and more, depending upon the social media
network. It’s a great way to put your brand out in front of people interested in your business and
help them get more familiar with it.
If you want to go beyond organic posting, there is an option to run paid advertisements. Each
social platform offers its own form of paid advertising. Your social media advertising capabilities will
vary depending upon your platform.
Paid advertisements offer your business the opportunity to connect with interested leads that
haven’t found your business yet. Social media platforms allow you to tailor your ads to appear in
the feeds of people who are looking for your products and services.
This creates a great opportunity for your business to expand your reach and obtain new leads.
You help more interested leads find your business, which results in new followers, as well as
conversions for your business.
One advantage of social media marketing is the ability to build your brand. When you connect
with interested leads, you expose them to your brand. The ability to post organic content for free
allows you to build brand recognition repeatedly with your audience.
This builds brand loyalty. The more people get exposed to your brand, the more they become
familiar with it. Brand familiarity leads to more conversions down the line because people tend
to buy from brands they know well.
It’s an excellent way for you to gain new leads. You can reach leads that you wouldn’t reach
otherwise. It helps you grow your followers and earn more leads.
Social media is a great catalyst for driving traffic to your business’s website.
Most social media platforms allow you to post content with a link to your website. When you
create compelling content, you can entice your audience click on the link. This directs them to
your site, where they can learn more about your business.
It’s a great opportunity for you to help your audience get more familiar with your
business. They can check out your website and learn about your products and services.
Depending on your business, you can even let people use your site to book appointments or
pay bills. A dental social media marketing strategy, for example, may direct people to the practice’s
website to book their first appointment and complete any new patient forms.
More traffic on your site also helps your other marketing efforts because you’ll drive more
relevant traffic to your page.
The last advantage to social media marketing is the ability to assess your performance.
Whenever you run a marketing campaign, you want to know how it’s performing. Social media
platforms make it easy for you to track your campaign to see if you’re driving valuable results.
When you can evaluate your social media strategy’s performance, you can optimize it and
improve it to drive better results.
One of the biggest advantages of social media marketing is that it is entirely free to start. None
of the largest platforms have signup fees of any sort, so the only investment you’ll need to make
is in the form of time.
That being said, there are paid advertising options on most social media platforms. These can
be a great tool for growing your following and reaching more users, but are by no means
mandatory for businesses.
Perhaps the most unique advantage of social media is the ability to get help from your followers.
People love to share things with their networks, from photos and recipes to interesting articles
and hot deals.
Unlike other forms of Internet marketing, like your site and paid advertisements, content on
social media is often shared. However wide your reach, your followers can share with their
followers, who then share with their followers, giving you a wider reach (with lower cost) than a
traditional marketing campaign.
You can also use social media to gain valuable information about your customers that will help
you make smarter business decisions. For example, social listening allows you to discover how
What do people like about your business? How can you improve your products and services to
better meet the needs of your target audience? Understanding the answers to these questions
can your business stand out from the competition and reach more people.
With any marketing strategy, there are always disadvantages. The disadvantages don’t mean
that the approach isn’t effective, but rather, present potential hurdles you may have to jump
through during your campaign.
People use social media to post content they love, but they also use it to share experiences
they didn’t love. If someone had a poor experience with your business, it opens a door of
opportunity for them to share their poor experience with others.
This negative feedback comes in different forms. On platforms like Facebook, someone can
leave a negative review on your page and share their negative experience. When someone
checks out your business next, they’ll look at the reviews and see the negative feedback.
On sites like Twitter, users can tag a company in their posts and share their negative experience.
People can retweet that poor experience and spread it across the network.
Having too much negative feedback can negatively impact your future marketing efforts.
People trust others to give them insight into your company, especially if it’s the first time they
are hearing of your business. With social media, it’s possible that negative feedback can hinder
your business from earning leads.
How to adapt to this social media disadvantage: Whenever you receive negative feedback
on social media, respond to it. Don’t leave people’s complaints and concerns unaddressed. Not
everyone is going to have a positive experience with your business, but addressing the issues
can speak volumes about your company and its values.
It’s easy for posts to go viral on social media. People keep a close eye on the good and the bad
on social media. If you aren’t careful about the content you post, you can end up embarrassing
your company and getting caught in an awkward situation.
For example, at one point, the hashtag “WhyIStayed” was trending on social media. This
hashtag was about victims of domestic violence sharing their story. The hashtag took social
media by storm and became a facilitator for conversations about abusive relationships.
DiGiorno Pizza saw this hashtag trending and decided to jump in on an opportunity for brand
exposure. They shared a tweet that said, “#WhyIStayed you had pizza.” Within minutes, people
became outraged at the company for their tweet.
The pizza company hadn’t researched the tweet beforehand to realize what it was regarding.
The tweet was deleted in minutes, but the impact lasted a long time. People were still talking
about the tweet long after it was removed.
When you post on social media, there is always an opportunity to embarrass your business on
accident. This is a big downside to social media.
How to adapt to this social media disadvantage: Always do your research before posting
content on social media. Whether it’s a photo, a hashtag, or a video, do your research to see if
there is any way it could be construed the wrong way. Research helps you adapt your content to
prevent your company from embarrassment.
Social media isn’t a one and done type of marketing method. You must constantly create new
content, post content, and engage with your audience on these platforms. A big drawback to
social media is that it is time-consuming for companies.
If you have a small business, small marketing department, or limited resources, it’s challenging
to manage a social media marketing campaign.
You have to find time to balance posting content, monitoring that content, responding to people,
and measuring your content’s impact. If you don’t have the resources, it can be an
overwhelming task.
If you aren’t doing enough with your social networks because you don’t have time, people, or
programs to help you run your marketing strategy, your campaigns will suffer. You won’t be as
effective as someone who has the necessary aspects to run a successful social media
campaign.
How to adapt to this social media disadvantage: If you don’t have the resources, consider
outsourcing your social media marketing campaign to a social marketing company. You can
hire a social media marketing company to handle your campaign for you while you run your
business. Not to mention, you’ll partner with people who have years of experience running
campaigns and know how to drive success!
When companies invest in marketing strategies, they want to see immediate results. You want
to know that your strategies are working and that the investment is worth your time. With social
media marketing, you don’t see immediate results.
Social media marketing’s success is predicated on the campaign’s overall success. Posting one
piece of content doesn’t determine the success of your campaign. You must post multiple
pieces of content over a period of time to determine the true success of your campaign.
This is a downside of social media because you have to wait to see results. You must be patient
and wait a few weeks to see results before you can adjust your campaign.
Week 8: Midterm
EXAMINATION FORM
Note:
⮚ You can write your answer into this test questionnaire.
Please write legibly
⮚
Name:
6. The greater the bandwidth, the larger the amount of data can be
transmitted.
13. Cat 5e and Cat 6 cables are capable of handling data up to 1gbps
14. Wireless router can transfer data faster than Wired or ordinary
router.
15. Fiber optic cables have higher noise tolerance compare to other
cable.
Part II Instruction: Encircle the letter of the correct Number of Number of
answer. items: 20 point/s per
item: 1
A. Streaming C. Youtube
B. Wi-Fi D. 4G
A. Bandwidth C. Protocol
B. Google D. Plug-ins
Julius C. Sabando/Ronnie A. Idian Page 59
OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals
19. ___________ appear while you're typing to help you improve your
search.
B. Internet D. WAN
B. Immune to electromagnetic
noise and corrosive chemicals
A. Connection between
computers None of the above
28. The term 'full duplex' refers to the ability of the data receiving stations to
echo back a
C. Can send or receive data one
A. Can do one way data at a time
transmission only
D. Cannot talk at once
B. Can receive and send data
simultaneously
A. Bridge C. Hub
B. Gateway D. Repeater
B. Modem D. Protocol
A. Facebook C. Internet
B. Garena D. Wan
34. The ______ connection can used twisted pair and coaxial cable
A. Lan C. Wireless
B. Wired D. Wan
A. Crossover C. Loop
36. Is a computer program that has the ability to replicate or make copies of itself, and
spread to other files.
37. Involves the unauthorized use of another person’s personal data, such as social security,
driver’s license, and/or credit card numbers for illegal financial benefit.
38. Is the process of transforming plain text or data into cipher text that cannot be read by
anyone other than the sender and the receiver.
39. Refers to either hardware or software that filters communications packets and prevents
some packets from entering or exiting the network based on a security policy
40. Is a feature of viruses, worms, and Trojans that allows an attacker to remotely access a
compromised computer.
41. Is the moral right of individuals to be left alone, free from surveillance or interference from
other individuals or organizations, including the state.
42. A bill also outlines the exceptions for public disclosure and the procedures for accessing
public documents
43.
Refers to the ability to ensure that information being displayed on a Web site, or
transmitted or received over the Internet, has not been altered in anyway by an
unauthorized party.
44.
One of the latest innovations in malicious code distribution is to embed it in the online
advertising chain
45.
Is any deceptive, online attempt by a third party to obtain confidential information for
financial gain
46. These are sites that promise to offer some product or service
47. are software servers often dedicated computer that handle all communications
originating from or being sent to the Interent by local clients
48. 48-50 Cite at least three (3) social media platform that Administrative
Professionals can used for information Dessimination
Prepared by: Reviewed/Validated by:
OBJECTIVES:
∙ Appreciate the importance of photography in preparation for the creation and designing a web; ∙
Identify the different kinds of photography;
∙ Recognize a good exposure photograph to a bad exposure (over expose photograph); ∙
Create a good composition photograph;
Concepts of Photography
Photography is all about light. To let the camera "see" what you wish, you have tools controlling
how much light reaches the camera sensor: the aperture and shutter speed controls. With too
little light, your photo will be too dark. With too much light, it will be too bright. In both cases
some details will be lost. You use aperture and shutter speed to achieve the proper exposure,
while taking into account some important side-effects you should be aware about.
Imagine that you are looking through a small round hole in a fence. How much of the scene
behind the fence will you see and comprehend? I would say it depends on two factors:
1. How large the hole is. The larger it is, the more you will see.
2. How long you look. The longer you look, the more details you will notice.
Same story happens in a photo camera. I am now probably risking to get a negative evaluation
of my physics knowledge, which would unfortunately be quite fair... However, although the
physical reasons might differ, the conceptual comparison seems to be quite adequate. When
shooting with a photo camera, you let the sensor see the scene through a hole in the lens
called aperture. The larger this hole is, the more light reaches the sensor. Normally the sensor
is closed by a curtain called shutter. When shooting, the shutter opens, light reaches the sensor
through the aperture hole, and then it closes again. The longer the opening lasts, the more light
reaches the sensor. This time is called shutter speed.
Julius C.
Sabando/Ronnie A. Idian Page 64
OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals
When shooting, your goal is to expose the right amount of light to the camera sensor (that's
why it is called exposure). If you provide insufficient amount of light, the photo will be too dark. If
you expose too much light, the photo will be too bright. The larger the deviation from the normal
exposure is, the more chance you have to hopelessly lose image data. Software post
processing can fix the perceived exposure (for example make a dark photo look brighter), but it
cannot re-create the image data lost while shooting. For example, a very common landscape
photography problem is loosing clouds in a bright sky. When it is overexposed (too much light
reaches the sensor), the whole sky becomes completely white, and the clouds cannot be
distinguished any more. On the other hand, with underexposure (too little light reaches the
sensor), shadowed parts of the image lose details, become completely black. Software cannot
rescue such details, because they do not exist in the original image.
overexposed sky with lost cloud details.Typical problem: hopelessly underexposed land
with lost shadow details.
Thus, it is very important to get the exposure right when shooting. But what is "right"? Does it
mean "the photo must look so bright/dark as I want it to be on the final photograph"? No! By
"right" I mean that the exposure must be such that the maximum number of the scene details is
captured by the sensor. Recording the visual information, as much as possible - that's what the
camera is for! In fact, the best properly exposed photos often look terribly dull before software
post-processing.
Fortunately modern photo cameras often provide accurate automatic exposure evaluation. At
least with a natural, more or less even lighting, their evaluation is usually great. In automatic
mode, the camera suggests the aperture and shutter speed values to use. They guarantee a
good exposure. But are these really the best possible values? Why not to enlarge the aperture
hole twice and halve the shutter speed? The amount of light reaching the sensor will be the
same, thus it does not make any difference, does it? Well, in fact it does. Although the exposure
is still the same (and correct), this change can make a great difference in the resulting
photograph. Both aperture and shutter speed affect more aspects than just how much light
reaches the sensor, and a photographer must always keep them in mind to get good results.
However good your camera is, it is still unable to read your mind, and thus to know what exactly
you want. Let's look at the aperture and shutter speed in more detail, and discuss their
important side effects.
In practice, depending on the lens you have, you usually use F- values from about F4 (large
aperture) to approximately F16 (small aperture). Some quality lenses support much larger
apertures, for example my favorite Nikon lenses (85mm and 50mm) get to F1.8 or even F1.4.
These are very light-sensitive lenses saving you in dark conditions.
In addition to the amount of light reaching the sensor, aperture affects another very important
aspect: the depth of field. Imagine several objects located at different distances from the
camera. Say a person 5 meters away, a bear 7 meters away, and a tree 10 meters away. The
camera sees them all, but the question is: which objects are in focus? The larger the depth of
field is, the more objects are in focus. And the smaller the aperture (the larger the F-number) is,
the larger the depth of field is. Thus, to get only the person in focus (with the bear and tree out
of focus), focus on the person and set the maximum aperture, such as F1.8. This is great for
portraits with nice blurred backgrounds. To capture the whole scene, you also want the bear
and tree in focus - use a greater F-number, such as F8 or more.
Note that aperture is not the only parameter affecting the depth of field. For example, the
distance between the photographer and the subjects also plays a very important role. The
closer you are to the first subject, the smaller depth of field becomes.
Shallow depth of field due to the wide Larger depth of field with smaller
aperture F1.4. The lion is in focus, the aperture F8. The focus is still on the lion,
bear behind is out of focus. but the bear is also in focus.
Shutter Speed
Shutter speed is the time while the shutter curtain is open, exposing the sensor to light. Don't
worry, there are no frightening F-numbers here :-). Shutter speed is measured in normal
seconds. At bright day light, we usually use hundredths of a second. When cloudy, in shade
etc., might be tenths of a second. At night it comes to full seconds.
While the shutter is open, the sensor records everything it sees. It does not realize what the
objects are, it just divides the scene into millions of dots and records the color of every dot
during the exposure time. Imagine that it is quite dark, and we are shooting a moving car at the
shutter speed of 1 second. With the speed of only 50 km per hour, the car will move by almost
14 meters during this time. The sensor will see the car at the initial position at the first moment.
Then the car will move to a place where the sensor previously saw only the background, and
the sensor will now see only the background at the car's initial position. And so on until the final
car position. What will be on the resulting photo? A 14-meters long semi-transparent car! :-)
The car we obtained is not sharp, it has what is called motion blur. The motion blur is the result
of shooting moving objects with long shutter speeds. This is the shutter speed side-effect you
should always keep in mind. If you want to get a sharp object, make sure the shutter speed is
fast enough to freeze its motion. If you want to get a motion-blurred object to emphasize the
movement, make sure the shutter speed is slow enough.
Fast shutter speed of 1/100 second froze Slow shutter speed of 0.6 second
the cars' movement. created a motion blur, a "ghost effect".
ISO SENSITIVITIY
When you cannot get the right exposure with the aperture and shutter speed, it is time to think
about the ISO sensitivity (also called ISO speed). It defines how sensitive the camera sensor is
to light. With the same amount of available light, the higher the ISO sensitivity is, the more light
will be captured by the sensor.
The ISO sensitivity is measured in... numbers! :-) I do not know what exactly these numbers
mean, never needed it (now, when writing this, I became curious :-) ). The "normal" ISO speed
depends on your camera. In my experience it is either ISO 100 or ISO 200. This is what you
start with. If you cannot get the right exposure by altering aperture and shutter speed, try to
adjust the ISO speed. I cannot remember a situation when I needed to reduce the normal ISO
speed. Aperture and shutter speed can reduce the amount of light as much as needed in most
cases, with rare exceptions. There are also other ways to reduce the amount of light, such as
lens filters. The ISO sensitivity control is usually useful with insufficient light. When ISO 100 is
not enough, try ISO 200, ISO 400, etc.
This is not so simple, however. Aperture and shutter speed controls can be considered safe,
because they alter a natural measure: the amount of light. The ISO sensitivity is more artificial,
its increase comes at a price. The more sensitive the sensor becomes, the more image noise it
creates. This is when the equipment quality becomes important in photography: expensive
professional cameras usually allow much higher ISO speeds before the image noise becomes
prohibitive. With my entry-level DSLR Nikon D80 I never shot above ISO 800.
Which type of photography should I master? That is probably the most challenging decision to
make when you are starting your pursuit of photography as a career. When you think of all of
the various subjects there are to capture, and all of the different ways to create the image, the
field of photography really is dynamic and varied. There is something for everyone in
photography, and the types of photography jobs are just as exciting.
We have compiled the most popular 15 genres of photography. Of course, this list is not all
inclusive, since there are many careers made in various niches within our industry. And there
are also many careers that are not related directly to photography that require good
photographic skills to complete. In today's social media connected world, many workers are
taking photographs and sharing their experiences as part of their jobs.
Here are the 15 types of photography genres you can pursue as a professional
photographer:
#1 - Wedding Photography
Wedding photography is
pretty intense, with an
element of getting the best
shot you can on the first try
and not really getting a
second chance in some
situations. Wedding
photographers have to be
quick on their feet, moving
around during the reception and ceremony, and there are substantial sales and customer
service components to their jobs. They also have to be adaptable, ready to shoot outdoors on a
sunny day and indoors for dimly lit receptions and dances. Couples will expect the direction
from the photographer for posing shots and settings, so the photographer must be confident and
communicate well with the bride and groom.
The great wedding photographers are the ones who love their jobs. Many beginning
photographers start shooting weddings because, as they say, “that’s where the money is.” But
this mindset will ultimately lead to a disappointing business model if the photographer’s heart
isn’t in their work.
#2 - Event Photography
In the same vein, event photography is a dynamic and fast-paced way to make a buck with your
camera. Whether your beat is corporate events or wild and crazy rock concerts, event
photographers work in a variety of settings. Event photography styles often involve a mixture of
photojournalistic documentary work and portraiture. Some organizations use their event photos
for publicity purposes, while other use party photos as souvenirs or keepsakes.
#3 - Portrait Photography
Portraiture is one of the most common types of photographer that we think of when we consider
career options. The kinds of photography that can be included in portraits is astounding. Retail
customers seek out portrait photographers for every phase of life: maternity and newborns,
school photos, senior photos, and general family photos. Corporate portraits are also commonly
needed as employees update their headshots for websites and publicity materials. Furthermore,
aspiring and professional models are in constant need of updated portfolios with a catalog of
current shots to market themselves for agencies and jobs.
Portrait photography is a great place to start out as a photographer. Building a great portfolio
of quality shots can lead to more business. It can often lead to more work for families and
weddings as word of mouth marketing does its magic. It can also lead to fashion and product
photography gigs.
#4 - Product Photography
More specific than working in advertising, product photography is a great specialization. Think
about all of the products you have recently shopped for: everything needs to be photographed.
The photos are used for online and print catalogs, as well as for labels and packaging. Most
product photography is studio based, with careful control of backgrounds, shadows, and
lighting. Studio rentals can be fairly expensive so consider building a home photography studio
on a budget.
Product photography covers a lot of ground. Food photography is a specialized niche, and
restaurants need to advertise their meals and create their menus. Jewelry is another favorite
type of product photography since this requires the perfect balance of light and preparation.
While some product shoots might involve models, many times you will be working solo in a
studio doing still life photographs of small objects.
#6 - Fashion Photography
Fashion photography is
one of the more
glamorous and more
difficult to enter
photography jobs. From
cover shots of the top
fashion magazines to
documenting the latest
styles and trends on the
runway, fashion
photographers work in the
design districts of New
York, Paris, and Milan.
Catalog and magazine shoots might also occur on location, from tropical beaches to subway. In
this style of glamour photography, the look of the photographs is everything. Lighting must be
perfect. This is a job that is also focused on the model, so a majority of the photographers time
is spent posing and directing models and scenes to get the look desired from the publication.
Fashion shoots are all about teamwork, and they are done by a group of people. The
photographer is just one cog in the wheel. Stylists, wardrobe specialists, makeup artists, art
directors, and others make up a team that keeps the shoot on track and make the magic
happen.
#7 - Architectural Photography
While many find taking pictures of buildings to be a fun hobby, many specialized photographers
make careers out of it. Employed by architectural agencies or working as freelancers, these
photographers capture the essence of buildings from inception to completion. Details captured
include the exteriors and interiors, and subtle details that make the building's design unique.
Architectural photography requires some special techniques and equipment to minimize
distortion and perspective problems that become apparent on a building’s many right angles. A
subdivision is real estate photography. Realtors always need excellent photographs, especially
in today's market where many customers view many properties online before
deciding to go see them. High-quality architectural pictures are difficult to get right, and realtors
will pay for professional photos especially in the high-end market.
#8 - Travel Photography
Do you love to travel? Would you like to get paid for it? Who doesn’t? Travel photography allows
you to do just that while having fun with your camera in dynamic settings. Travel photography
blends many different types of photography into one. On one trip you might want to focus on the
people and the lifestyles present in a place, while also capturing the landscapes and the natural
world in which it’s located. Macro details and wildlife photography might be included too. Be it
on the beaches of Bali or the ice fields of Antartica, the job of a travel photographer is to
transport their audience to that place without them having to leave home.
Advertising photography can include a range of subjects, like street photography, lifestyle
photography, fashion photography, or product photography. Advertising photographers can
work as freelancers, selling images on a project-by-project basis, or they might work directly for
major ad agencies. Either way, this is a dynamic field where you may be shooting for a print ads
campaign one day and shooting internet ads the next, always with a new subject.
#10 - Photojournalism
Julius C.
Sabando/Ronnie A. Idian Page 74
OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals
If your perfect subject is a furry friend, then pet photography might be for you. This is a growing
sector and is very similar in working conditions and type of styles to portraiture; only your
subjects may require treats when they are good. If you love animals, then there is no better job
as a photographer. Pet photography involves a fun mix of studio sessions and outdoor, on
location shoots. With connections to your local pet daycare facilities and dog show circuits, you
can build your business fairly quickly. A great way to start out is to volunteer your time to your
local pound, taking pictures of the animals and helping them find their forever homes.
If you love sports, then being a sports photographer is a great gig. From the sidelines, sports
photographers use quick cameras and long lenses to zoom in on the action and capture the
winning shots. Photos wind up in publicity materials for teams, in advertising and marketing, and
in the news media online and in print.
Many fields rely on great photography for publications, training materials, and record keeping.
Many scientific and medical research companies employ photographers to document new
findings and discoveries.
Many other industries rely on photos to conduct surveys and studies. For example, in Florida,
aerial wildlife studies are routinely performed to study the numbers of manatees and birds living
in remote areas. Many insurance companies rely on photographers to inspect homes and
buildings, sending their photographic findings to the company to document damage or
condition.
These are just a few examples of the specialized fields that use photography regularly. With
open eyes and ears, working photographers can find remarkable jobs working with governments
and private companies all over the world.
If all of these types of photography jobs sounded good to you, you might make a great stock
photographer. Stock photographers sell the rights to use their images through catalogs. They
can work as a freelancer, but more often than not photographers allow agencies to handle their
sales. Stock sales usually don’t pay very much per use, but the goal of a successful stock
photographer is to have an extensive catalog of images that sell often. As a result, once the
photos are uploaded and being sold, they provide a source of on-going passive income.
Quiz:
OBJECTIVES:
∙ Discuss how hosting a website works using the different terminologies learned; ∙
Identify a free hosting website the students can use to publish their website. ∙
Differentiate the difference between domain and hosting;
Google Domains offers you several choices for creating and managing your web presence:
∙ Use your domain name as a custom domain for Google App Engine, Blogger, or Google
Sites.
∙ Use one of the third-party web hosting providers you can link to seamlessly from Google
Domains to create a new account or use one you already have set up.
∙ Use another third-party web hosting provider.
∙ Use the web forwarding feature to redirect traffic to your domain directly to an existing
site
Choose your web hosting provider below to learn how to start a trial plan or connect to your
existing account with one of the integrated third-party web hosting providers, Google web tools,
other third-party web hosting providers, or simply forward your domain to an existing site.
Choose a web hosting provider to start:Google web tools (Blogger, Google App Engine, Google
Sites)ShopifySquarespaceWeeblyWixWordPress by BluehostOther third-party web hosting
providerWeb forwarding to an existing website
Web hosting is a service that allows organizations and individuals to post a website or web
page onto the Internet. A web host, or web hosting service provider, is a business that provides
the technologies and services needed for the website or webpage to be viewed in the Internet.
Websites are hosted, or stored, on special computers called servers. When Internet users
want to view your website, all they need to do is type your website address or domain into their
browser. Their computer will then connect to your server and your webpages will be delivered
to them through the browser.
Most hosting companies require that you own your domain in order to host with them. If you do
not have a domain, the hosting companies will help you purchase one.
Julius C. Sabando/Ronnie A. Idian Page 78
OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals
Here are some features you should be expecting from your hosting provider:
Email Accounts As mentioned earlier, most hosting providers require users to have their own
domain name. With a domain name (e.g. www.yourwebsite.com) and email account features
provided by your hosting company, you can create domain email accounts (e.g.
[email protected]).
FTP Access The use of FTP lets you upload files from your local computer to your web
server. If you build your website using your own HTML files, you can transfer the files from
your computer to the web server through
FTP, allowing your website to be accessed through the internet.
powers over 25% of websites on the internet.
Most hosting providers will tell you right away if
WordPress Support their plans are WordPress-compatible or not.
WordPress is an online website creation tool. It The simple requirements for hosting your
is a powerful blogging and website content WordPress websites include: PHP version 7 or
management system, which is a convenient greater; MySQL version 5.6 or greater.
way to create and manage website. WordPress
If you decide to create and host your website with Website.com, in addition to access to the
drag and drop site builder, you can get a custom domain, email addresses, and web hosting
all bundled into one subscription.
An advantage of using a website builder is that it allows you to simply drag and drop content
to create your site, and publish your site to live with a few clicks. No technical experience is
required. With the Website.com site builder, you will not need to build your website with
coding, and you will not need to transfer files from your desktop computer to
∙ Doteasy (Recommended)
∙ Liquid Web
∙ Rackspace
In order to publish your website online, your business website requires a web hosting service.
However, a web host gives business owners more than just web hosting services! For
example, web hosting firms typically employ in-house technicians to make sure their clients'
websites are up and running 24/7. Plus, when website owners are in need of help or
troubleshooting (e.g. script debutting, email not able to send/receive, domain name renewal,
and more), the web host's in-house support are the go-to people. A professional web hosting
service ensures a hassle-free experience for business owners, so they can efficiently focus
their time and effort on their businesses.
OBJECTIVES
1. Demonstrate how to create a google account and enjoy sharing their accounts to other students in
the class;
2. Describe the different google products and how to use them in creating website;
3. Discuss the different techniques to maximize the use of google account;
4. Establish functioning website;
Create a Google Account
A Google Account gives you access to many Google products. With a Google Account, you can
do things like: