0% found this document useful (0 votes)
76 views86 pages

OFAD 40023 Internet and Web Design COMMON

The document provides an overview and outline of topics for a course on Internet and Web Design for Administrative Professionals. The course covers topics such as how the internet works, data communication, networking, internet security, social media, photography concepts, starting a website, and creating a website using Google Sites.

Uploaded by

elmocarianga
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
76 views86 pages

OFAD 40023 Internet and Web Design COMMON

The document provides an overview and outline of topics for a course on Internet and Web Design for Administrative Professionals. The course covers topics such as how the internet works, data communication, networking, internet security, social media, photography concepts, starting a website, and creating a website using Google Sites.

Uploaded by

elmocarianga
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 86

Polytechnic University of the Philippines

College of Business Administration


DEPARTMENT OF OFFICE ADMINISTRATION
BACHELOR OF SCIENCE IN OFFICE
ADMINISTRATION

INSTRUCTIONAL MATERIALS

FOR

OFAD 40023
Internet and Web Design with
Lab for Administrative Professionals

Prepared by:

Instructor Julius C. Sabando


Faculty, Department of Office

Administration and

Assoc. Prof. Ronnie A. Idian


Faculty, Department of Office Administration

1
Overview
The COVID 19 pandemic has considerably affected education systems on a global scale. With
schools and universitiesstruggles not to hamperthe education of the students, the teachers are doing their
best to keep learning going during this pandemic. PUP has adopted the flexible/blended learning in order
to reach the students at home and continue theireducation.

Welcome to Internet and Web Design for Administrative Professionals. This course of the
programBachelor of Science in Office Administration (BSOA) is designed to provide you with the skills and
knowledge you will need to succeed as Administrative Professionals. Every topic that you will study in this
course is directly related to one or more of many administrative tasks.

In(Part1), youwill learn the nature of internet, how internet works through data communication
and networking. Also, youwill learn some laws and threats to consider before using electronic payments
in the internet. Lastly, on the latter part of part 1, you will learn the different social media platform you
can use effectively in the office to perform your job as Administrative Professionals.

In (Part 2) you will learn the basics of photography as a foundation of a well-ordered website.
Website domain and hosting will also be discussed in the second part of this module as a backbone in
starting a website. As much as possible, all trainings and hands on activities are done in a free and open
source application. Thus, creating google account were also tackle for the students to have an access
inmakinggoogle site. Lastly, different techniques and contemplationswere discussed before creating your
site to successfully crease the target audience of your website.

The topics in this modules are carefully gathered and selected to get the latest information to
match the advanced technology of the administrative professionals in the modern systems and facilities.
There are learning objectives to be achieved and assessments/activities to be accomplished by the student
at the end of the per week topics. Book references used are available at PUP Main Library, NALLRC
Building, Sta. Mesa, Manila. Web references and links are also provided to get the latest information in
the modern office.

Questions, suggestions, comments and feedback matter. The teacher/adviser may be contacted by
joining the google classroom created for the class with code number
and at mobile no.
or through email address at .

2
The student shall submit all requirements of the course via official courier of the University on
January 13, 2021 to the respective teacher at the College of Business Administration, Department of
Office Administration, PUP, Main Campus, Sta. Mesa, Manila.

It’s definitely not easy to keep the learning going during this pandemic, but as we just saw, it is
possible. You can go with whatever time frame suits you, but, don’t forget that you can do it in several
sittings throughout the day instead of one. With few changes to your approach, smart use of online
learning, and acknowledging the situation, you can do it. All the best and keep safe!

3
OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

OFAD 40023
Internet and Web Design with Lab for Administrative

Professionals Table of Contents

Overview………………………………..……………………………………………………… 2
Course Outcomes……………………………………………………………………………. 5
Internet ………………………………………………………………………………………… 6
Data Communication………………………………………………………………….……… 12
Networking………………………………………………………………………………..…… 18
Internet Security and Payment Systems……………………………………………………. 25
Ethics, Law, and E-Commerce……………………………………………………………… 39
Social Media and Electronic Platform for Administrative Professionals………………… 45
Midterm Examination………………………………………………………………….……… 58
Concepts of Photography……………………………………………………………….…… 64
Terminology, Starting a Website, Domain and Hosting……………………………...…… 77
Creating Google Account……………………………………………………………..……… 80
Pointers to Consider Before Creating a Website……………………………..…………… 85
Naming your Website and Filename………………………………………………..….…… 88
Adding Them to your Website…………………………………………………….….……… 91
Inserting textbox, images and embedding URL and
youtube video on your webpage.………………………….…………….…………… 95 Page
preview before publishing your website……………………………………………… 98 Practice
Application…………………………………………………………………………… 100 Final
Examination……………………………………………………………………………… 101
References……………………………………………………………………………………... 102
Grading System………………………………………………………………………………… 103

Julius C. Sabando/Ronnie A. Idian Page 4


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

OFAD 40023
INTERNET AND WEB DESIGN WITH
LAB FOR ADMINISTRATIVE PROFESSIONALS

COURSE OUTCOMES:

At the end of the course, the student should be able to:

∙ Understand how internet, data communication and networking works.

∙ Define internet security and netiquette in using the internet and other social media platform. ∙

Explain the significance of some terminologies in the World Wide Web.

∙ Value the basic concepts of creating a Website

∙ Appreciate Google Site as free online resources for website creation

∙ Develop skills in creating website using Google Site.

∙ Create a functioning website.

Julius C. Sabando/Ronnie A. Idian Page 5


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

Week 2: INTERNET
OBJECTIVES:

1. Discuss the basic concept of the internet and how it works;


2. Demonstrate familiarization on the function of a web browser.
3. Apply effective and efficient technique in searching information on the web using the selected web
browser;
4. Send and receive electronic mail (E-Mail) applying the knowledge on the different function of
every part of the email message.

INTERNET - The internet is the interconnection of computers on a global scale. It is the biggest
network in the world today, connecting computer from all over the world.

INTERNET SERVICE PROVIDER (ISP)- provides internet connection. Examples are: PLDT
DSL, Globe, Smartbro, Converge

World Wide Web (WWW)- the infrastructure or application to support email, and peer-to peer
networks for file sharing and telephony.

Web site- is a collection of web pages connected with each other through hyperlinks. Web
pages are simply text documents. These text documents are written in Hypertext Markup
Language or HTML for short, with HTML, web pages can display text, images and videos. Web
pages can also play sound, and call on programs to run applications, games, animation and so
on..

Web browsers are application or software that allows us to see web sites. A web browser
simply interprets the HTML document (e.g. the Web page) and displays the content as specified
in the HTML document.

Example of Web Browser:

∙ Internet Explorer
∙ Mozilla Firefox
∙ Opera
∙ Safari
∙ Google Chrome
∙ Konqueror
∙ Arora
∙ Dillo
∙ K-Meleon
∙ Lynx
∙ Kazekhase
∙ Amaya

Julius C. Sabando/Ronnie A. Idian Page 6


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals
∙ NetPositive
∙ Planetweb
∙ Netscape Navigator

Web Addresses

Web sites and the pages they contain each have a unique worldwide address. This address (or
Uniform Resource Locator, URL, in Internet jargon). The address for Microsoft is
www.microsoft.com. For most sites, this is all you need to specify and it defaults to the main
page (or home page) for the site. In some cases, you may also need or want to specify the path
and file name such as www.microsoft.com/office2016.

Note the extension .com after microsoft. There are six of extensions that help to divide the
computers on the Internet into understandable groups or domains.

These six domains include:

∙ .com = commercial
∙ .gov = government
∙ .edu = education
∙ .org = organizations
∙ .net = networks
∙ .mil = military.

There are also extensions for sites outside of the U.S. including:

∙ .jp = Japan,
∙ .uk = United Kingdom,
∙ .fr = France
∙ .ph = Philippines
∙ .sg = Singapore

How to Search the Web

There are basically three major search services available for handling different tasks:
Directories, Search Engines, and Meta Search Engines.

Directories are sites that, like a gigantic phone book, provide a listing of the sites on the web.
Sites are typically categorized and you can search by descriptive keywords. Directories do not
include all of the sites on the Web, but generally include all of the major sites and companies.
Yahoo is a great directory.

Search Engines read the entire text of all sites on the Web and creates an index based on the
occurrence of key words for each site. AltaVista and Infoseek are powerful search engines.

Meta Search Engines submit your query to both directory and search engines. Metacrawler is
a popular meta search engine.

Julius C. Sabando/Ronnie A. Idian Page 7


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

Downloading Software

In addition to serving Web pages to your browser, the Web also provides opportunities
to easily download programs and files.

Browser Extensions

Both Netscape Navigator and Microsoft Internet Explorer browsers provide the ability to extend
the functionality of your browser by downloading additional programs that work within the
browser.

Navigator calls such programs "Plug-Ins" and you can find a collection of these at
www.netscape.com/plugins. Microsoft calls them "ActiveX Controls" and can be found at
www.activex.com.

File Compression

Most files are compressed to make them smaller in size and faster to download. You will need
to know how it was compressed and have the corresponding decompression program to view
the file (most decompression programs are available as shareware). There are different
compression programs for different computers, but the most common for the PC include WinZip
and PKZIP (files end in .zip), and for the Mac, BinHex (.hqx) and Stuffit (.sit).

Web Multimedia

The Web is rapidly evolving from primarily text-based documents to multimedia experience of
sight, sound and motion which rival CD-ROM titles. There are a number of new multimedia
technologies and browser add-ins that can enhance your Web surfing.

Audio

Hear live broadcasts, sample songs from your favorite bands, or even use the Web to have two
way "web phone" conversations. Some good sites to start include:

∙ Real Audio at www.realaudio.com


∙ Web Phone at www.webphone.com

Video

Participate in a live video-conference or see the latest movie clips.

∙ RealVideo at www.realnetworks.com
∙ CU-SeeMe at www.whitepine.com

3D

Manipulate three dimensional objects and experience virtual reality on the

Web. ∙ VRML at www.vrml.sgi.com


Julius C. Sabando/Ronnie A. Idian Page 8
OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

Animation

Interact with some of the most engaging and entertaining sites on the web.

∙ Macromedia Shockwave at www.macromedia.com


∙ Narrative Enliven at www.narrative.com

Electronic mail, often abbreviated as email, e.mail or e-mail, is a method of exchanging digital
messages. E-mail systems are based on a store-and-forward model in which e-mail computer
server systems accept, forward, deliver and store messages on behalf of users, who only need
to connect to the e-mail infrastructure, typically an e-mail server, with a network-enabled device
(e.g., a personal computer) for the duration of message submission or retrieval. Originally, e mail
was always transmitted directly from one user's device to another's; nowadays this is rarely the
case.

An electronic mail message consists of two components, the message header, and the
message body, which is the e-mail’s content.

The message header contains control information, including, minimally, an originator's email
address and one or more recipient addresses. Usually additional information is added, such as
a subject header field.

Originally a text-only communications medium, email was extended to carry multi-media content
attachments, which were standardized in with RFC 2045 through RFC 2049, collectively called,
Multipurpose Internet Mail Extensions (MIME).

Internet e-mail messages consist of two major sections:

∙ Header — structured into fields such as summary, sender, receiver, and other
information about the e-mail.
∙ Body — the message itself as unstructured text; sometimes containing a signature block at
the end. This is exactly the same as the body of a regular letter.

The header is separated from the body by a blank line.

Message header

Each message has exactly one header, which is structured into fields. Each field has a name
and a value. RFC 5322 specifies the precise syntax.

Informally, each line of text in the header that begins with a printable character begins a
separate field. The field name starts in the first character of the line and ends before the
separator character ":". The separator is then followed by the field value (the "body" of the field).
The value is continued onto subsequent lines if those lines have a space or tab as their first
character. Field names and values are restricted to 7-bit ASCII characters. Non-ASCII values
may be represented using MIME encoded words.
Julius C. Sabando/Ronnie A. Idian Page 9
OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

Header fields

The message header should include at least the following fields:

∙ From: The e-mail address, and optionally the name of the author(s). In many e-mail
clients not changeable except through changing account settings.
∙ To: The e-mail address(es), and optionally name(s) of the message's recipient(s). Indicates
primary recipients (multiple allowed), for secondary recipients see Cc: and Bcc: below.
∙ Subject: A brief summary of the topic of the message.
∙ Date: The local time and date when the message was written. Like the From: field, many
email clients fill this in automatically when sending. The recipient's client may then
display the time in the format and time zone local to her.
∙ Message-ID: Also an automatically generated field; used to prevent multiple delivery
and for reference in In-Reply-To: (see below).

Note that the "To:" field is not necessarily related to the addresses to which the message is
delivered. The actual delivery list is supplied separately to the transport protocol, SMTP, which
may or may not originally have been extracted from the header content. The "To:" field is similar
to the addressing at the top of a conventional letter which is delivered according to the address
on the outer envelope. Also note that the "From:" field does not have to be the real sender of the
e-mail message. One reason is that it is very easy to fake the "From:" field and let a message
seem to be from any mail address. It is possible to digitally sign e-mail, which is much harder to
fake, but such signatures require extra programming and often external programs to verify.
Some Internet service providers do not relay e-mail claiming to come from a domain not hosted
by them, but very few (if any) check to make sure that the person or even e-mail address named
in the "From:" field is the one associated with the connection. Some Internet service providers
apply e-mail authentication systems to e-mail being sent through their MTA to allow other MTAs
to detect forged spam that might appear to come from them.

RFC 3864 describes registration procedures for message header fields at the IANA; it provides
for permanent and provisional message header field names, including also fields defined for
MIME, netnews, and http, and referencing relevant RFCs. Common header fields for email
include:

∙ Bcc: Blind Carbon Copy; addresses added to the SMTP delivery list but not (usually)
listed in the message data, remaining invisible to other recipients.
∙ Cc: Carbon copy; Many e-mail clients will mark e-mail in your inbox differently
depending on whether you are in the To: or Cc: list.
∙ Content-Type: Information about how the message is to be displayed, usually a MIME
type.
∙ In-Reply-To: Message-ID of the message that this is a reply to. Used to link related
messages together.
∙ Precedence: commonly with values "bulk", "junk", or "list"; used to indicate that
automated "vacation" or "out of office" responses should not be returned for this mail,
eg. to prevent vacation notices from being sent to all other subscribers of a
mailinglist.
∙ Received: Tracking information generated by mail servers that have previously handled a
message, in reverse order (last handler first).
∙ References: Message-ID of the message that this is a reply to, and the message-id of
the message the previous was reply a reply to, etc.

Julius C. Sabando/Ronnie A. Idian Page 10


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

∙ Reply-To: Address that should be used to reply to the message.


∙ Sender: Address of the actual sender acting on behalf of the author listed in the From:
field (secretary, list manager, etc.).

Ping is a computer network administration utility used to test the reachability of a host on an
Internet Protocol (IP) network and to measure the round-trip time for messages sent from the
originating host to a destination computer. The name comes from active sonar terminology
which sends a pulse of sound and listens for the echo to detect objects underwater.
Assignment:

1. Differentiate internet connectivity from the late 2000 to today’s internet connection.
2. Create Google account (exclusive used for this subject only)
Quiz:

1. A home network is an example of a __________.


a. LAN
b. WAN
c. Server
2. Web pages are stored on a
a. Modem
b. Client
c. Server
3. Telephone service over the internet is known as
a. Instant Messaging
b. VOIP
c. Social Networking
4. What type of media downloads while it’s playing?
a. Wi-Fi
b. Streaming
c. 4G
5. The speed of an internet connection is known as its
a. Bandwidth
b. ISP
c. Wireless access point
6. Which type of internet service uses existing phone lines and allows separate internet
and phone usage?
a. Dial-up
b. DSL
c. Cable
7. A URL is usually typed in a browser’s
a. Google
b. Plug-in
c. Address bar
8. A collection of web pages connected with each other through hyperlinks

Julius C. Sabando/Ronnie A. Idian Page 11


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

a. Website
b. HTML
c. Web browser
9. Is a computer network administration utility used to test the reachability of a host on
an Internet Protocol
a. Message header
b. Ping
c. Meta search engine
10. The interconnection of computers on a global scale. It is the biggest network in the
world today, connecting computer from all over the world.
a. Website
b. Web Browser
c. Internet

Week 3: DATA COMMUNICATION

OBJECTIVES:

∙ Appreciate the value of data communication;


∙ Exhibit familiarization on communication protocol
∙ Discuss the different types of transmission mode

Data transmission, digital transmission, or digital communications is the physical transfer


of data (a digital bit stream) over a point-to-point or point-to-multipoint communicationchannel.
Examples of such channels are copper wires, optical fibres, wireless communication channels,
storage media and computer buses. The data are represented as anelectromagnetic signal,
such as an electrical voltage, radiowave, microwave, or infrared signal.
While analog transmission is the transfer of a continuously varying analog signal, digital
communications is the transfer of discrete messages. The messages are either represented by a
sequence of pulses by means of a line code (baseband transmission), or by a limited set of
continuously varying wave forms (passband transmission), using a digital modulationmethod.
The passband modulation and corresponding demodulation (also known as detection) is carried
out by modem equipment. According to the most common definition ofdigital signal, both
baseband and passband signals representing bit-streams are considered as digital
transmission, while an alternative definition only considers the baseband signal as digital, and
passband transmission of digital data as a form of digital-to-analog conversion.
Data transmitted may be digital messages originating from a data source, for example a
computer or a keyboard. It may also be an analog signal such as a phone call or a video
signal, digitized into a bit-stream for example using pulse-code modulation (PCM) or more
advanced source coding (analog-to-digital conversion and data compression) schemes. This
source coding and decoding is carried out by codec equipment.
5 Basic Components of Data Communication

1. Data Source – Where the data originates


2. Transmitter – Device used to transmit data

Julius C. Sabando/Ronnie A. Idian Page 12


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

3. Transmission Medium – Cables or Non Cable


4. Receiver – Device used to receive data
5. Destination – Where the data will be placed

Transmission Media Speed


• Bandwidth:The amount of data which can be transmitted on a medium over a fixed
amount of time (second). It is measured on Bits per Second or Baud

• Bits per Second (bps): A measure of transmission speed. The number of bits (0 0r 1)
which can be transmitted in a second.

Packets

∙ Transmissions are broken up into smaller units or data transmissions called packets

Example

∙ A data file is divided into packets.


∙ It does not matter what the transmission is. It could be Word document, a PowerPoint
or an MP3.

Julius C. Sabando/Ronnie A. Idian Page 13


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

Transmission Direction

1. Simplex: One direction only

2. Half Duplex Transmission

half duplex: Both directions but only one


direction at a time
Julius C. Sabando/Ronnie A. Idian Page 14
OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

3. Full Duplex Transmission

full duplex: send and receive both directions at once

Examples of Communication Systems

- E-mail
- Voice Mail
- Fax
- Smart Phone
- Instant Messaging
- Telecommuting
- Video-conferencing
- Groupware
- Telephony
- E-Commerce
- The Internet
- The Web
- Global positioning system

Ethernet

∙ Developed at Xerox in 1976.


∙ First protocol approved as an industry standard protocol 1983
∙ LAN protocol used on bus and star
∙ Most popular LAN protocol
∙ Inexpensive

TCP/IP

∙ Developed in 1973 for use on the ARPANET which was a defense force research network.

Julius C. Sabando/Ronnie A. Idian Page 15


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

∙ Adopted in 1983 as the Internet standard. all hosts on the Internet are required to use
TCP/IP.
∙ Allows transfer of data using packet switching

LAN vs WAN

 LAN is “local Area network” which is a network confined to a small geographic area which
is a building or a group of buildings.

 WAN is “wide area network” which is a network spread over a large geographic area. The
largest WAN is the internet.

Examples of LANS

3 different types of LANS are:

 Ring

 Bus

 Star

What is a Network?

∙ A network is a number of computers and peripheral devices connected together so as to


be able to communicate (i.e. transfer data)
∙ Each device in a network is called a node.
∙ Terminals are data entry points which can also display.
Internet, Intranet, Extranet

Internet

∙ public/international network which is used to access information, e-shopping, e-banking,


email

Intranet

∙ private network (LAN or WAN) used to share resources in secure environment ∙


uses web pages (HTML to view) and TCP/IP protocols (to make connection)

Extranet

Intranet that has been extended to include access to or from selected external
organizations such as customers, but not general public.

Note: Connections via leased lines, or network interconnections.

Transmission Media

∙ Twisted pair – telephone cable

Julius C. Sabando/Ronnie A. Idian Page 16


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

∙ Coaxial cable –Thick black cable used for higher bandwidth communications than twisted
pair (i.e. Optus cable)
∙ Fibre optic – data transferred through pulses of light. Extremely fast. ∙ Non
cable methods such as satellite, microwave, wireless and Bluetooth

Network Hardware

SERVERS: Help to manage the network and the resources of that network. On larger networks
servers commonly have specialized tasks such as: File Servers: stores and manages files, Print
Servers: manages printers and print jobs, Mail Server: Manages email, Web Server: manages
web access.

Routers: connects multiple networks and are protocol independent. can be used in place of a
switch or bridge.

Switches: smart hubs which transmit packets to the destination port only

Hubs: like double adapters /power boards in the home except instead of plugging in extension
cords we are plugging in computers to allow them to communicate.

Quiz: Week 3: Data Communication

1. Which of the following is NOT a type of transmission media?


a. Coaxial
b. Twisted Pair
c. Modem
d. Microwave
2. Each website on the internet can be accessed by entering a unique address. This
address referred to as
a. URL
b. HTML
c. FTP
d. None of the above
3. Uploading and downloading data to or from a remote computer is done using:
a. File Transfer Protocol
b. Inter relay chat
c. Blogging
d. Instant messaging
4. A communication simultaneously, both directions, between two stations is know as:
a. Simplex
b. Half duplex
c. Full duplex
d. Duplex type
5. An example of a medium is
a. Coaxial cable

Julius C. Sabando/Ronnie A. Idian Page 17


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

b. Fiber optic cable


c. Radio waves
d. All of the above
6. A communication one direction only is called
a. Simplex
b. Half duplex
c. Full duplex
d. Duplex type
7. What is distinctive about fiber-optic cable compared to other transmission media types?
a. It uses glass or plastic to carry the data signal
b. It is mainly use by the network provider nowadays
c. It has the capacity to handle data on a gigabit connection
d. All of the above
8. Which of the following refers to a private communication path over a public network?
a. Facebook Messenger
b. VPN
c. Yahoo Messenger
d. Skype
9. In which network type do network users take responsibility for resource sharing and access
security?
a. Peer to peer
b. Network connection
c. Internet
d. Social Networking
10. Each Website on the internet can be accessed by entering a unique address. This address
is referred to as the:
a. URL
b. HTML
c. FTP
d. P2P

Week 4: NETWORKING

OBJECTIVES:

∙ Appreciate the importance of learning the system of networking;


∙ Discuss the types of networking systems, structures and components;
∙ Differentiate the features of high speed LAN and Wireless LAN; and the features of wired and
wireless connection;

Julius C. Sabando/Ronnie A. Idian Page 18


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

What is a Computer Network

net·work: [net-wurk] – noun, a system containing any combination of computers, computer


terminals, printers, audio or visual display devices, or telephones interconnected by
telecommunication equipment or cables: used to transmit or receive information.

Network Diagram – Basic Layout and map of a traditional computer network.

Network Types – Computer networks vary in shape and size depending on usage.

- WAN

- LAN

- Peer to Peer

Fiber Optic Cable – One of the Latest innovations in network cabling.

Switches and Hubs – The central device within a network that transmit data.

Servers – The central storage device for the names and locations of various

data. - IP Addresses

Topologies – The layouts of various network designs.


- Star

- Bus

- Ring

Firewalls – The network software that keeps destructive forces from a

network. Routers – The device that let messages flow between networks.

Wireless Networks - Allows computers to be moved without wires or cables.

The Internet – The world’s largest network.

Julius C. Sabando/Ronnie A. Idian Page 19


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals
The Three Types of Networks

• A Wide Area Network exist over a large area

• Data travels through telephone or cable lines

• Usually requires a Modem

• The world’s largest Wide Area Network in the Internet

• A Local Area Network spans a relatively small area

• LAN are usually confined to one building or a group of


buildings

• Data travel between network devices via network


cables.

• The most common type of Local Area Network is called


Ethernet

Julius C. Sabando/Ronnie A. Idian Page 20


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

• Usually very small networks

• Each workstation has equivalent capabilities and


responsibilities

• Does not require a switch or a hub.

• These types of networks do not perform well under


heavy data loads.

Fiber Optic

• Reduces interference in the network

• Transmit data faster than copper network cable

• Allows for more bandwidth

• Smaller and more fragile than copper cable


Network Switches Network Hubs Network Switches

• Data travels faster through switches because data is not sequenced as it is in a hub

Julius C. Sabando/Ronnie A. Idian Page 21


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

• Information travels more efficiently through a switch because travels directly to it’s
destination as opposed to being broadcast to all PC’s on the network hub.

Users are connected to certain servers which will fulfill the required request.

There are 3 Principle Types of Servers

Print Servers

Contains the name and location of all printers that are on


the Network

File Servers

Contain the location and names of the various drives,


files, and folders on a Network

Web Servers

Contain the Programs, Files, and Internet Web Sites


IP Addresses

“IP” stands for Internet Protocol. IP Addresses serve as the location of websites on the Internet
as well as the workstations that are connected to the web. IP addresses are made up of four
sets of numbers called “Octets”. There are two types of IP Addresses: Static and Temporary.
Below is a description of both.
Static IP Addresses Temporary IP Addresses

Static IP addresses are found only on Temporary IP addresses are found only on
servers and remain the same. PC’s are constantly changing each time it is
logged on

A Domain Name Server assigns a “human Temporary IP addresses are assigned by an


readable” web address to each static IP ISP (Internet Service Provider) each time it
address to make it more user friendly. is logged on to the Internet.

Julius C. Sabando/Ronnie A. Idian Page 22


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

Network Topology refers to the shape of a network, or the network's layout. How different nodes
in a network are connected to each other and how they communicate are determined by the
network's topology.

There are three basic topologies:

1. Star
2. Ring
3. Bus

Star Topology

• All devices are connected to a central hub.

• Nodes communicate across the network by passing data


through the

hub or switch.
Star Topology

• All devices are connected to one another in the shape of


a closed loop.

• Each device is connected directly to two other devices,


one on either side of it.

Julius C. Sabando/Ronnie A. Idian Page 23


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

Bus Topology

• All devices are connected to a central


cable, called the bus or backbone.

• There are terminators at each end of the


bus that stops the signal and keeps it from
traveling backwards.

• A firewall is a software that can be loaded on to a network that can


serve as a barrier that keeps destructive forces away from a network
of computers.

• Packets of data are analyzed against a set of criteria or


standards called filters.
∙ Whether a Router is traditional or wireless, its purposes remain the same. ∙ Routers are
specialized computers that send your messages and those of every other Internet user
speeding to their destinations along thousands of pathways. ∙ Routers are crucial devices
that let messages flow between networks, rather than within networks.

∙ Allows for computers to be moved easily without having to worry about wires or cables

Julius C. Sabando/Ronnie A. Idian Page 24


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

How Information Travel Through the Internet

A page on the Internet—


whether it's full of words,
images or both—doesn't
come to you in one
shipment. It's translated
into digital information,
chopped into 1500 byte
pieces called PACKETS,
and sent to you like a
puzzle that needs to be
reassembled. Each part of the packet has a specific function:

How Information Travel Through the Internet


When you connect
to a Web site
through an ISP
and start
exchanging
information, there
isn't a fixed
connection
between your
computer and the
Web server
computer hosting
the Web site.
Instead, information is exchanged using the best possible path at that particular time. Special
computers called routers determine these paths, avoiding slow links and favoring fast ones.

WEEK 5: INTERNET SECURITY AND PAYMENT SYSTEMS

OBJECTIVES:

∙ Describe the features and functionality of electronic billing and payment systems; ∙
Identify the key security threats in electronic payment system;
∙ Describe how technology helps secure internet communications;
∙ Appreciate the importance of policies, procedures, and laws in creating security.

Julius C. Sabando/Ronnie A. Idian Page 25


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

Cybercrime is becoming a more significant problem for both organizations and consumers.
Both networks, DDoS attacks, Trojans, phishing, ransomeware, data theft, identify fraud, credit
card faud, and spyware are just some of the threats that are making daily headlines. Social
networks also have had security breaches. But despite the increasing attention being paid to
cybercrime, it is difficult to accurately estimate the actual amount of such crime, in part because
many companies are hesitant to report it due to the fear of losing the trust of their customers,
and because if crime is reported, it may be difficult to quantify the actual dollar amount of the
loss.

Dimensions of E-Commerce

There are six key dimensions to e-commerce security: integrity, nonrepudiation,


authenticity, confidentiality, privacy, and availability.

Integrity refers to the ability to ensure that information being displayed on a Web site, or
transmitted or received over the Internet, has not been altered in anyway by an unauthorized
party.
Nonrepudiation refers to the ability to ensure that e-commerce participatants do not deny (i.e.,
repudiate) their online actions.

Authenticity refers to the ability to identify the identity of a person or entity with whom you are
dealing on the Internet.

Confidentiality refers to the ability to ensure that messages and data are available only to those
who are authorized to view them.

Privacy refers to the ability to control the use of information a customers provides about himself
or herself to an e-commerce merchant.

Security threats in the E-Commerce Environment

From a technology perspective, there are three key points of vulnerability where dealing with e
commerce; the client, the server, and the communications pipeline.

In this section, we describe a number of the most common and most damaging forms of security
threats to e-commerce consumers and site opeerators; malicious code, potentially unwanted
programs, phishing, hacking and cybervandalism, credit card potentially unwanted programs,
phishing, hacking and cybervandalism, credit card fraud/theft, spoofing, pharming, spam (junk
Web sites link farms), identity fraud.

Julius C. Sabando/Ronnie A. Idian Page 26


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals Figure 5.1 A TYPICAL

E-COMMERCE TRANSACTION

In a typical
e-commerce
transaction,
the
customer
uses a credit
card and the
existing
credit
payment
system.
Fig. 5.2 VULNERABLE POINTS IN AN E-COMMERCE TRANSACTION
Julius C. Sabando/Ronnie A. Idian Page 27
OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

There are three major vulnerable points in e-commerce transaction: Internet communication,
servers, and clients

Malicious Code

Malicious code (sometimes referred to as “malware”) includes a variety of threats such as


viruses, worms, Trojan horses, ransomeware, and bots. Some malicious code, sometimes
referred to as an exploit, is designed to take advantage of software vulnerabilities in a
computer’s operating system.

Exploit Kits are collections of exploits bundled together and rented or sold as a commercial
product, often with slick user interfaces and in-depth analytics functionality. Use of an exploit kit
typically does not require much technical skill, enabling novices to become cybercriminals.
Exploit kits typically target software that is widely deployed, such as Microsoft Windows, Internet
Explorer, Adobe Flash and Reader, and Oracle Java .

Maladvertising One of the latest innovations in malicious code distribution is to embed it in the
online advertising chain known as Maladvertising

Drive-by download malware that comes with a downloaded file that a user requests

Virus is a computer program that has the ability to replicate or make copies of itself, and spread
to other files. In addition to the ability to replicate, most computer viruses deliver a “payload.”
The payload may be relatively benign, such as the display of a message or image, or it may be
highly destructive- destroying files, reformatting the computer hard drive, or causing programs to
run improperly.

Raonsomeware (scareware) is a type of malware (often a worm) that locks your computer or
files to stop you from accessing them. Ransomware will often display a notice that says an
authority such as FBI, Department of Justice, or IRS has detected illegal activity on your
computer and demands that you pay a fine in order to unlock the computer and avoid
prosecution.

Trojan horse appears to be benign, but then does something other than expected. The Trojan
horse is not itself a virus because it does not replicate, but is often a way for viruses or other
malicious code such as bots or rootkits (a program whose aim is to subvert control of the
computer’s operating system) to be introduced into a computer system.

Backdoor is a feature of viruses, worms, and Trojans that allows an attacker to remotely
access a compromised computer.

Potentially Unwanted Programs (PUPS)

In addition to malicious code, the e-commerce security environment is further challenged by


potentially unwanted programs (PUPS) such as adware, browser paratises, spyware, and other
applications that install themselves on a computer, such as rogue security software, typically
without the user’s informed consent. Such programs are increasingly found on social network
and user-generated content sites where users are fooled into downloading them.

Julius C. Sabando/Ronnie A. Idian Page 28


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

Adware is typically used to call for pop-up ads to display when the user visits certain sites.
While annoying, adware is not typically used for criminal activities. A browser parasite is a
program that can monitor and change the settings of a user’s browser, for instance, changing
the browser’s home page, or sending information about the sites visited to a remote computer.

Spyware, on the other hand, can be used to obtain information such as user’s keystrokes,
copies of e-mail and instant messages, and even take screenshots (and thereby capture
passwords or other confidential data)

Phishing

Social engineering relies on human curiosity, greed and gullibility in order to trick people into
taking an action that will result in the downloading of malware. Keven Mitnick, until his capture
and imprisonment in 1999, was one of the America’s most wanted computer criminals. Mitnick
used simple deceptive techniques to obtain password, social security, and police records all
without the use of any sophisticated technology (Mitnick, 2011).

Phishing is any deceptive, online attempt by a third party to obtain confidential information for
financial gain. Phishing attacks typically do not involve malicious code but instead rely on
straightforward mispresentation and fraud, so-called “social engineering” techniques. One of
the most popular phishing attacks is the e-mail scam letter.

Data Breaches

A data breach occurs whenever organizations lose control over corporate information to
outsiders. According to Symantec, the total number of data breaches in 2014 grew by 20%
compared to 2013 Symantec, 2015).

Credit Card Fraud/Theft

Theft of credit card data is one of the most feared occurrences on the Internet. Fear that credit
card information will be stolen prevents users from making online purchase in many cases.
Interestingly, this fear appears to be largely unfounded. Incidences of stolen credit card
information are actually much lower than users think, around 0.9% of all online card transactions
(CyberSource, 2015). Online merchants use a variety of techniques to combat credit card fraud,
including using automated fraud detections tools, manually reviewing orders, and rejection of
suspect orders.

Identity Fraud

Identity fraud involves the unauthorized use of another person’s personal data, such as social
security, driver’s license, and/or credit card numbers, as well as user names and password, for
illegal financial benefit. Criminals can use such data to obtain loans, purchase merchandise, or
obtain other services, such as mobile phone or other utility services. Cybercriminals employ
many of the techniques described previously, such as spyware, phishing, data breaches, and
credit card theft, for the purpose of identity fraud.

Spoofing, Pharming and Spam (Junk) Web Sites

Julius C. Sabando/Ronnie A. Idian Page 29


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals
Spoofing involves attempting to hide a true identity by using someone else’s e-mail or IP
address. For instance, a spoofed e-mail will have forged sender e-mail will have a forged
sender e-mail address designed to mislead the receiver about who sent the e-mail. IP spoofing
involves the creation of TCP/IP packets that use someone else’s source IP address, indicating
that the packets are coming from a trusted host. Most current routers and firewalls can offer
protection against IP spoofing.

Spoofing a Web site sometimes involves Pharming, automatically redirecting a Web link to an
address different from the intended one, with the site masquerading as the intended destination.
Links that are designed to lead to one site can be reset to send users to totally unrelated site
one that benefits the hacker.

Spam (junk) Web sites (also sometimes referred to as link farms) are a little different. These
are sites that promise to offer some product or service, but in fact are just a collection of
advertisements for other sites, some of which contain malicious code. For instance, you may
search for “[name of town] weather,” and then click on a link that promises your local weather,
but then discover that all the site does is display ads for weather-related products or other Web
sites. Junk or spam Web sites typically appear on search results, and do not involve e-mail.
These sites cloak their identities by using doman names similar to legitimate firm names, and
redirect traffic to known spammer-redirection domains such as topsearch10.com

Poorly Designed Software

Many security threats prey on poorly designed software, sometimes in the operating system and
sometimes in the application software, including browsers. The increase in complexitiy and size
of software programs, coupled with demands for timely delivery to markets, has contributed to
an incrase in software flaws or vulnerabilities that hackers can exploit. For instance, SQL
injection attacks take advantage of vulnerabilities in poorly coded Web application software
that fails to properly validate or filter data entered by a user on a Web page to introduce
malicious program code into a company’s systems and networks.

Social Network Security Issues

Social networks like Facebook, Twitter, LinkedIn, Pinterest, and Tumblr provide a rich and
rewarding environment for hackers. Viruses, site takeovers, identity fraud, malware-loaded
apps, click hijacking, phishing and spam are all found on social networks. According to
Symantec, the most common type of scam on social media sites in 2014 were manual sharing
scams, where victims unwittingly shared videos, stories and pictures that included links to
malicious site. Fake offerings that invite victims to join a fake event or group with incentives
such as free gift cards and that require a user to share his or her information with the attacker
were another common technique.

Other techniques include fake Like Buttons, when clicked, install malware and post updates to
the user’s Newsfeed, further spreading the attack, and fake apps (Symantec, 2015). By
sneaking in among our friends, hackers can masquerade as friends and dupe users into scams.

Julius C. Sabando/Ronnie A. Idian Page 30


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals
Mobile Platform Security Issues

The explosion in mobile devices has broadened opportunities for hackers. Mobile users are
filling their devices with personal and financial information, and using them to conduct an
increasing number of transaction, from retail purchases to mobile banking, making them
excellent targets for hackers. In general, mobile devices face all the same risks as any Internet
device as well as some new risks associated with wireless network security. For instance,
public Wi-Fi networks that are not secured are very susceptible to hacking.

By the end of 2014, Symantec had identified more than 1 million apps that it classified as
malware, and it expects the growth in mobile malware to continue in 2015 and become more
aggressive in targeting mobile payment and mobile banking applications. The majority of
mobile malware still targets the Android platform.

Cloud Security Issues

The move of so many Internet services into the cloud also raises security risks. From an
infrastructure standpoint, DDoS attacks threaten the availability of cloud services on which more
and more companies are relying. According to Alert Logic, Which analyzed 1 billion security
events in the IT environments of more than 3,000 enterprise customers, attacks against cloud
based services and applications increased by 45% in 2014.

Technology Solutions

At first glance, it might seem like there is not much that can be done about the onslaught of
security breaches on the Internet. Reviewing the security threats in the previous section, it is
clear tht the threats to e-commerce are very real, potentially devastating for individuals,
businesses, and entire nations, and likely to be increasing in intensity along the growth in e
commerce. But in fact a great deal of progress has been made by private security firms,
corporate and home users, network administrators, technology firms, and government agencies.
There are two lines of defense: technology solutios and policy solutions.

Protecting Internet Communications

Because e-commerce transactions must flow over the public Internet, and therefore involve
thousands of routers and servers through which the transaction packets flow, security experts
believe the greatest security threats occur at the level of Internet communications. This is very
different from a private network where dedicated communication line is established between two
parties. A number of tools are available to protect the security of Internet communications, the
most basic of which is message encryption.

Encryption

Encryption is the process of transforming plain text or data into cipher text that cannot be read
by anyone other than the sender and the receiver. The purpose of encryption is

(a) to secure stored information and


(b) to secure information transmission

Julius C. Sabando/Ronnie A. Idian Page 31


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals
Encryption can provide four of the six key dimensions of e-commerce security.

∙ Message integrity – provides assurance that the message has not been altered. ∙
Nonrepudiation – prevents the user from denying he or she sent the message. ∙
Authentication – provides verification of the identity of the person (or computer sending
the message.
∙ Confidentiality – gives assurance that the message was not read by others.
Tools Available to Achieve Site Security

The Data Encryption Standard (DES) was developed by the National Security Agency (NSA)
and IBM in the 1950s. DES uses a 56-bit encryption key. To cope with much faster computers,
it has been improved by the Triple DES Encryption Algorithm (TDEA) – essentially encrypting
the message three times, each with a separate key. Today, the most widely used symmetric key
algorihm is Advanced Encryption Standard (AES), which offers key sizes of 128, 192, and
256 bits. AES had been considered to be relatively secure, but in 2011, researchers from
Microsoft and a Belgian university announced that they had discovered a way to break the
algorihm, and with this work, the “safety margin” of AES continues to erode.

Julius C. Sabando/Ronnie A. Idian Page 32


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

Public Key Cryptography

In 1976, a new way of encrypting messages called public key cryptography was invented by
Whitfield Diffie and Martin Hellman. Public key cryptography (also referred to as asymmetric
cryptography) solves the problem of exchanging keys. In this method, two mathematically
related digital keys are used: a public key and a private key.

The private key is kept secret by the owner, and the public key is widely disseminated. Both
keys can be used to encrypt and decrypt a message. However, once the keys are used to
encrypt a message, the same key cannot be used to unencrypt the message.
Julius C. Sabando/Ronnie A. Idian Page 33
OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

cryptography, the sender encrypts a message using the recipients, public key, and then sends it
over the Internet. The only person who can decrypt this message is the recipient, using his or
her private key.

Virtual Private Networks (VPNs)

A virtual private network (VPN) allows remote users to securely access a corporation’s local
area network via the Internet, using a variety of VPN protocols. VPNs use both authentication
and encryption to secure information from unauthorized persons (providing confidentiality and
integrity). Authentication prevents spoofing and misrepresentation of identities. A remote user
can connect to a remote private local network using a local ISP. The VPN protocols will
establish the link from the client to the corporate network as if the user had dialed into the
corporate network directly. The process of connecting one protocol through another (IP) is
called tunneling, because the VPN creates a private connection by adding an invisible wrapper
around a message to hide its content. As the message travels through the Internet between the
ISP and the corporate network, it is shielded from prying eyes by an encrypted wrapper.

Wireless (Wi-Fi) Networks

Accessing the Internet via a wireless (Wi-fi) network has its own particular security issues. Early
Wi-Fi networks used a security standard called Wired equivalent Privacy (WEP) to encrypt
information. WEP was very weak, and easy for hackers to crack. A new standard, Wi-Fi
Protected Access (WPA), was developed that provided a higher standard of protection, but this
too soon became vulnerable to intrusion. Today, the current standard is WPA2, which uses the
AES algorithm for encryption and CCMP, a more advanced authentication code protocol.

Protecting Networks

Once you have protected communications as well as possible, the next set of tools to consider
are those that can protect your networks, as well as the servers and clients on those networks.

Firewalls

Firewalls and proxy servers are intended to build a wall around your network and the attached
servers and client, just like physical-world firewalls protect you from fires for a limited period of
time. Firewalls and proxy servers share some similar functions, but they are quite different.

A firewall refers to either hardware or software that filters communications packets and
prevents some packets from entering or exiting the network based on a security policy. The
firewall controls traffic to and from servers and clients, forbidding communications from
untrustworthy sources, and allowing other communications from trusted sources to proceed.
Every message that is to be sent or received from the network is processed by the firewall,
which determines if the message meets security guidelines established by the business. If it
does, it is permitted to be distributed, and if it doesn’t the message is blocked.

Julius C. Sabando/Ronnie A. Idian Page 34


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

Proxy Servers

Proxy servers (proxies) are software servers often dedicated computer that handle all
communications originating from or being sent to the Internet by local clients, acting as a
spokesperson or bodyguard for the organization. Proxies act primarily to limit access of internal
clients to external Internet servers, although some proxy servers act as firewall as well.

Intrusion Detection and Prevention System

In addition to a firewall and proxy server, an intrusion detection and/or prevention system can be
installed. An intrusion detection system (IDS) examines network traffic, watching to see if it
matches certain patterns or preconfigured rules indicative of an attack. If it detects suspicious
activity, the IDS will set off an alarm alerting administrators and log the event in a database.
An intrusion prevention system (IPS) has all the functionality of an IDS, with the additional
ability to take steps to prevent and block suspicious activities. For instance, an IPS can
terminate a session and reset a connection, block traffic from a suspicious IP address, or
reconfigure firewall or router security controls.

Protecting Servers and Clients

Operating system features and anti-virus software can help further protect servers and client
from certain types of attacks.

Operating System Security Enhancements

The most obvious way to protect servers and clients is to take advantage of automatic computer
security upgrades. The Microsoft, Apple, and Linux/Unix operating systems are continuously
updated to patch vulnerabilities discovered by hackers. These patches are automatic; that is,
when using these operating systems on the Internet, you are prompted and informed that
operating system enhancements are available. Users can easily download these security
patches for free.

In April 2014, Microsoft ended security support and updates for its Windows XP operating
system. Despite this, many organizations continue to use XP-based systems, and as a result,
many security experts anticipate a wave of strike against such system.

Anti-Virus Software

The easiest and least-expensive way to prevent threats to system integrity is to install anti-virus
software. Programs by McAfee, Symantec (Norton Antivirus), and many other provide
inexpensive tools to identify and eradicate the most common types of malicious code as they
enter a computer, as well as destroy those already lurking on a hard drive.

Anti-virus suite packages and stand-alone programs are available to eliminate intruders such as
bot programs, adware, and other security risks. Such programs work much like anti-virus
software in that they look recognized hacker tools or signature actions of known intruders.

Julius C. Sabando/Ronnie A. Idian Page 35


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

A Security Plan: management Policies

A security plan begins with risk assessment – an assessment of the risks and point of
vulnerability. The first step is to inventory the information and knowledge assets of the e
commerce site and company. What information is at risk? Is it customer information, proprietary
designs, business activities, secret process, or other internal information, such as price
schedules, executive compensation, or payroll? Based on your qualified list of risks, you can
start to develop a security policy – a set of statements prioritizing the information risks,
identifying acceptable risks targets, and identifying the mechanisms for achieving these targets.

Next, consider an implementation plan – the steps you will take to achieve the security plan
goals. Specificially, you must determine how you will translate the levels of acceptable risk into
a set of tools, technologies, policies, and procedures. What new technologies will you deploy to
achieve the goals, and what new employees procedures will be needed?

Security Organization educates and trains users, keeps management ware of security threats
and breakdowns, and maintains the tools chosen to implement security.

Access control determine who can gain legitimate access to a network

Authentication procedures include the use of digital signatures, certificates of authority, and
public key infrastructure

Biometric devices can also be used to verify physical attributes associated with an individual,
such as a fingerprint or retina (eye) scan or speech recognition system.

Security token- physical device or software that generates an identifier that can be used in
addition to or in place of a password.

Authorization policies determine differing levels of access to information assets for differing
levels of users

Authorization management system establishes where and when a user is permitted to access
certain parts of a Web site

Security audit involves the routine review of access logs (identifying how outsiders are using
the site as well as how insiders are accessing the site’s assets)

Julius C. Sabando/Ronnie A. Idian Page 36


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

Fig. 5.3 HOW AN ONLINE CREDIT CARD TRANSACTION WORKS


As shown in Figure 5.3 , an online credit card transaction begins with a purchase
(1). When a consumer wants to make a purchase, he or she adds the item to the merchant’s
shopping cart. When the consumer wants to pay for the items, in the shopping cart, a secures
tunnel through the Internet is created using SSL/TLS. Using encryption, SSL/TLS secures the
session during which credit card information will be sent to the merchant and protects the
information from interlopers on the Internet.

(2). SSL does not authenticate either the merchant or the consumer. The transacting parties
have to trust one another.

Once the consumer credit card information is received by the merchant, the merchant software
contacts a clearing house

(3) As previously noted, a clearing house is a financial intermediary that authenticates credit
cards and verifies account balances. The clearing house contacts the issuing bank to verify the
account information.

Julius C. Sabando/Ronnie A. Idian Page 37


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

(4). Once verified, the issuing bank credits the account of the merchant at the merchant’s bank
(usually this occurs at night in a batch process)

(5) The debit to the consumer account is transmitted to the consumer in a monthly statement.

Online stored value payment system Permits consumers to make instant, online payments to
merchants and other individuals based on value stored in an online account.

Alternative Online Payment Systems

The limitations of the online credit card system have opened the way for the development of a
number of alternative online payment systems. Chief among them is PAYPAL.

PAYPAL (purchased by e-Bay in 2002 and then spun-off as an independent company again in
2015 enables individuals and businesses with e-mail account to make an receive payments up
to specified limit. Paypal is an example of an ONLINE STORED VALUE PAYMENT SYSTEM,
which permits consumers to make instant, online payments to merchants and other individuals
based on value stored in an online account.

PAYPAL has:

1. 173 million active customers account as of September 2015


2. In 2014 processed 4 billion payments, of which 1 billion where on mobile devices.
3. It operates in 203 countries around the world.
4. It allows customers to be paid in more than 100 currencies, to withdraw funds to their
bank account in 57 currencies, and to hold balances in their
5. Paypal builds on the existing financial infrastructure of the countries in which it opeates.
You establish a Paypal account by specifying a credit, debit or checking account you wish to
have charged or paid when conducting online transactions. When you make a payment using
PayPal, you e-mail the payment to the merchant’s PayPal account. PayPal transfer the amount
from your credit or checking account to the merchant’s bank account.

The beauty of PayPal is that no personal credit information has to be shared among the users,
the service can bee used by individuals to pay one another even in small amounts. However,
one issue with Paypal is its relatively high cost.

For example, to send or request money, the cost ranges from 2.9% to 5.99% of the amount
(depending on the type of transaction) plus a small fixed fee (typically $0.30) per transaction.

MOBILE PAYMENT SYSTEMS: YOUR SMARTPHONE WALLET

The use of mobile devices as payment mechanism is already well established in Europe and
Asia and is now exploding in the Unite4d States, where the infrastructure to support mobile
payment is finally being put in place. The U.S. mobile online retail payments are expected to
grow from $76 billion in 2014 to $217 billion by 2019. Physical goods are the most common
purchase in mobile online shopping, with over 50% of mobile buyers reporting that they had
purchased such goods (Javelin Strategy & Research, 2015)

Julius C. Sabando/Ronnie A. Idian Page 38


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

Near field communication (NFC) is one of the enabling technologies for mobile payment
systems. Near field communication (NFC) is a set of short-range wireless technologies used
to share information among devices within about 2inches of each other (50mm). NFC devices
are either powered or passive. A connection requires one powered unit (the initiator), and one
target unpowered unit that can respond to requests from the powered unit

NFC peer-to-peer communication is possible where both devices are powered. An NFC
quipped smartphone, for instance, can be swiped by a merchant’s reader to record a payment
wirelessly and without contact.

SOCIAL/MOBILE PEER-TO-PEER SYSTEMS

In addition to using a mobile device as vehicle for e-commerce and as a payment method at
physical point-of-sale, another type of mobile payment transaction is becoming increasingly
popular: social/mobile peer-to-peer payments.

Services such as venom, Square Cash, Snapcash, the newly refocused Google Wallet, and the
new Facebook Messenger Payment service all enable users to send another person money
through a mobile application or Web site, funded by a checking account, debit card, credit card,
or a digital wallet balance.

Assignment

1. What are the different electronic payment systems that we can use here in the
Philippines. Cite atleast (3) and give their advantages and disadvantages.

2. Had you ever been a victim of online scam? If Yes, cite your experience and how it
could have been avoided. If No, research someone who had been a victim of online
scam and suggest how these online scam could have been avoided.
Week 6: ETHICS, LAW, AND E-COMMERCE

OBJECTIVES:

∙ Explain basic concepts related to privacy and information rights, the practices of e-commerce
companies that threaten privacy, and the different methods that can be used to protect online
privacy.
∙ Adeptness on major public safety and welfare issues raised by e-commerce.
∙ Practice the right to information and how it will be applied in the performance of administrative
duties;

Determining how or whether personal information should be retained or deleted on the Internet
is just one of many ethical, social, and political issues raised by the rapid evolution of the
Internet and e-commerce. For instance, whether individuals lose control over all personal

Julius C. Sabando/Ronnie A. Idian Page 39


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

information once it is placed on the Internet is still up for debate in the United States. In Europe,
in contrast, individuals do retain rights to their personal information. These questions are not just
ethical questions that we as individuals have to answer; they also involve social institutions such
as family, schools, business firms and in some cases, entire nation-states. And these questions
have obvious political dimensions because they involve collective choices about how we
should live and what laws we would like to live under.

UNDERSTANDING ETHICAL, SOCIAL, AND POLITICAL ISSUES IN E-COMMERCE

The Internet and its use in e-commerce have raised pervasive ethical, social, and political
issues on a scale unprecedented for computer technology. Entire sections of daily newspapers
and weekly magazines are devoted to the social impact of the Internet. But why is this so? Why
is the Internet at the root of so many contemporary controversies? Part of the answer lies in the
underlying features of Internet technology itself, and the ways in which it has been exploited by
business firms. Internet technology and its use in e-commerce disrupt existing social and
business relationships and understandings Consider for instance Table 1.2 (in Chapter 1),
which lists the unique features of Internet technology. Instead of considering the business
consequences of each unique feature, Table 8.1 examines the actual or potential ethical, social,
and/or political consequences of the technology.

We live in an "information society," where power and wealth increasingly depend on information
and knowledge as central assets. Controversies over information are often disagreements over
power, wealth, influence, and other things thought to be valuable. Like other technologies, such
as steam, electricity, telephones, and television the Internet and e-commerce can be used to
achieve social progress, and for the most part, this has occurred. However, the same
technologies can be used to commit crimes, despoil the environment, and threaten cherished
social values. Before automobiles there was very little interstate crime and very little federal
jurisdiction over crime. Likewise with the Internet: before the Internet, there was very little
"cybercrime."

Information rights: What rights to their own personal information do individual have in a public
marketplace, or in their private homes, when Internet technologies make information collection
so pervasive and efficient? What rights do individuals have to access information about
business firms and other organizations?

Property rights: How can traditional intellectual property rights be enforced in an Internet world
where perfect copies of protected works can be made and easily distributed worldwide in
seconds?

Governance: Should the Internet and e-commerce be subject to public laws? And so, what law
making bodies have jurisdiction-state, federal, and/or international

BASIC ETHICAL CONCEPTS: RESPONSIBILITY, ACCOUNTABILITY, AND LIABILITY

Ethics is at the heart of social and political debates about the Internet. Ethics is the study of
principles that individuals and organizations can use to determine right and wrong courses of
action. It is assumed in ethics that individuals are free moral agents who are in a position to

Julius C. Sabando/Ronnie A. Idian Page 40


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

make choices. When faced with alternative courses of action, what is the correct moral choice?
Extending ethics from individuals to business firms and even entire societies can be difficult, but
it is not impossible. As long as there is a decision-making body or individual (such as a board of
directors or CEO in a business firm, or a governmental body in a society), their decisions can be
judged against a variety of ethical principles.

If you understand some basic ethical principles, your ability to reason about larger social and
political debates will be improved. In western culture, there are four basic principles that all
ethical schools of thought share: responsibility, accountability, liability, and due process.
Responsibility means that as free moral agents, individual’s organizations, and societies are
responsible for the actions they take. Accountability means that individuals, organizations, and
societies should be held accountable to others for the consequences of their actions. The third
principle-liability-extends the concepts of responsibility and accountability to the area of law.
Liability is a feature of political systems in which a body of law is in place that permits individuals
to recover the damages done to them by other actors, systems, or organizations. Due process
is a feature of law-governed societies and refers to a process in which law are known and
understood, and there is an ability to appeal to higher authorities to ensure that the laws have
been correctly applied.

Privacy is the moral right of individuals to be left alone, free from surveillance or interference
from other individuals or organizations, including the state. Privacy is a girder supporting
freedom: Without the privacy required to think, write, plan, and associate independently and
without fear, social and political freedom is weakened, and perhaps destroyed.

Information privacy is a subset of privacy. The right to information privacy includes both the
claim that certain information should not be collected at all by governments or business firms,
and the claim of individuals to control the use of whatever information is collected about them.
Individual control over personal information is at the core of the privacy concept. Implicit in the
claim to control one's own personal information is the claim to be able to edit and even delete
personal information from the Web. This is often called the "right to be forgotten as discussed in
the opening case (Rosen, 2012).

Freedom of Information Bill (FOI)

The proposed Freedom of Information (FOI) Act aims to mandate the disclosure of public
documents. The proposed bill also outlines the exceptions for public disclosure and the
procedures for accessing public documents.

In President Aquino’s message on the National Budget for Fiscal Year 2016, he reiterated that
greater fiscal transparency leads to a more responsive government. To ensure the permanency
of transparency policies, he has urged Congress to pass the Freedom of Information Act.

Both bills below follow the proposed FOI bill approved by President Benigno S. Aquino III, which
was transmitted to the previous Congress by the Secretary of Budget and Management,
Florencio Abad. Secretary Abad resubmitted the bill to the current Congress as well.

Julius C. Sabando/Ronnie A. Idian Page 41


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

This FOI bill is an integral element of the Aquino Good Governance and Anti-Corruption Plan of
2012-2016. This plan lays out reforms and initiatives that pursue greater transparency,
accountability, and citizen participation in governance.

This draft bill is a result of a consultative process conducted by an administration study group
after careful study of similar legislation in order to balance the government’s legitimate needs for
secrecy with the public’s right to know.

The administration study group was composed of Communications Undersecretary Manuel L.


Quezon III (lead), Presidential Spokesperson Edwin Lacierda, Secretary Florencio B. Abad, and
Deputy Presidential Spokesperson Abigail Valte, in coordination with the stakeholders.

Senate

On Monday, March 10, 2014, the Senate passed the FOI bill on third and final reading, with 22
affirmative votes, no abstention, and no negative votes.

House of Representatives

LATEST: On March 4, 2015, the bill passed the Committee on Appropriations; as of this date, it
is awaiting 2nd reading.

The Committee of Public Information of the House of Representatives has formed a technical
working group (TWG) to expedite the passage of the house version. The TWG has conducted
regular meetings to discuss the provisions last February to June. Resource persons from the
different offices from the executive participated in the meetings. The Office of the President was
represented by Undersecretary Manuel L. Quezon III.

On October 23, 2013, Camarines Sur Third District Representative Maria Leonor G. Robredo
and Batanes Representative Henedina R. Abad filed House Bill No. 3237, otherwise known as
“An Act to Strengthen the Right of Citizens to Information held by the Government.”
Q AND A

Who can ask for information?

Every Filipino citizen.

To whom can we ask for information?

All government agencies (specifically defined under section 3 of the proposed

bill). What information will be made available?

All information pertaining to official acts, transactions, or decisions, as well as government


research data used as a basis for policy development, regardless of its physical form or
format.

Julius C. Sabando/Ronnie A. Idian Page 42


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

What information will remain classified?

Information specifically authorized to be kept secret under guidelines established by an


executive order, and properly classified.

∙ The records of minutes and advice given and opinions expressed during decision making
or policy formulation, invoked by the Chief Executive to be privileged by reason of the
sensitivity.
∙ Information pertaining to internal and/or external defense, law enforcement, and border
control.
∙ Drafts of orders, resolutions, decisions, memoranda, or audit reports by any executive,
administrative, regulatory, constitutional, judicial, or quasi-judicial body.
∙ Information obtained by any committee of either house of Congress in executive
session.
∙ Personal information of a natural person other than the requesting party. (See Section 6f
for details.)
∙ Information pertaining to trade secrets and commercial or financial information that
would seriously prejudice industrial, financial, or commercial competition. (See Section
6g for details.)
∙ Information classified as privileged communications in legal proceedings by law or by the
Rules of Court.
∙ Information exempted by law or the Constitution.

What are the advantages of this bill compared to the prior bills filed in Congress?

∙ This proposed bill expanded access to financial information, such as SALNs of


government officials, and access to other kinds of information, such as transactions by
incorporating a provision making the posting/publication mandatory. (See list in Sections
7 and 8.)
∙ The public is spared the tedious work of trying to access certain information from
different agencies when the information is made available in one portal, the Official
Gazette website (www.officialgazette.gov.ph) being the official publication for the
following information:

– Important legislative acts and resolutions of a public nature of the Congress of the Philippines;
– Executive and administrative orders and proclamations of general application; – Decisions or
abstracts of decisions of the Supreme Court and the Court of Appeals or other courts of similar
rank, as may be deemed of sufficient importance to be so published; – Such documents or
classes of documents as the President shall determine to have general application.

∙ The bill asks government agencies to translate key information into major Filipino
languages and present them in popular form and means.
∙ All government agencies are required to prepare a Freedom of Information Manual that
will contain details and procedures and serve as a guide on the matter.
∙ The bill integrates open data provisions, which mandates a regular and pro-active
release of government data in open and machine-readable formats.

Julius C. Sabando/Ronnie A. Idian Page 43


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

Procedure of access

1. Request

Submit a request to the government agency concerned either personally, by mail, or through
electronic means.

2. Receiving

The request will be stamped by the government agency, indicating the date, time, and other
details of receipt (refer to Section 16b). In case the request is submitted by electronic means,
the government agency shall provide for an equivalent means by which the requirements shall
be met.

3. Waiting time

The government agency shall comply with such request as soon as practicable, and in any case
within 15 working days from receipt. The period may be extended for specific cases. (Refer to
Section 16e.)

4. Notification

The government agency shall, in writing or through electronic means, notify the person making
the request of the extension, the reasons for extension, and the date the information will be
made available (no more than 20 working days).

5. Grant and Payment


Once a decision is made to grant the request, the person making the request shall be notified of
such and pay the required access and processing fees.

What will happen if my request is not granted?

∙ The government agency shall notify the person making the request of such denial in
writing or through electronic means within 15 working days from the receipt of the
request.
∙ The notice shall clearly set forth the ground for denial and the circumstances on which
the denial is based. Failure to notify shall be deemed a denial of the request for access
to information.
∙ Following the proper procedure, denial of a request for access to information may be
appealed to the head of agency, then Ombudsman, then a verified petition for
mandamus may be filed in the proper court.
∙ The Judiciary shall however will be governed by such remedies as promulgated by the
Supreme Court.

Is the Admin Bill a watered down version of the previously filed bills in Congress?

Julius C. Sabando/Ronnie A. Idian Page 44


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

∙ No. The Admin Bill in fact expanded the list of mandatory information for disclosure,
provided a specific procedure for access, stated the exemptions in a very clear and
transparent manner, and directed that the exemptions are to be strictly construed.

What is the status of FOI?

∙ Now that the FOI has been approved on the committee level in both the Senate and
House, the bill will be taken up in plenary.

How does FOI relate to the other governance reforms under the Aquino Good
Governance and Anti-Corruption Plan 2012-2016?

∙ Greater access to information will, in general, empower citizens to hold their public officials
accountable and to participate in government processes that are being opened to them
by this administration. For instance, greater access to information on government
projects through open governance initiatives such as Open Data Philippines will allow
civil society organizations to make more meaningful and accurate inputs to the
Participatory Budget and Participatory Audit processes that this administration has
initiated. The mandatory posting of SALNs will also empower our government
investigators and their citizen-partners to run after corrupt officials.

WEEK 7: SOCIAL MEDIA AND ELECTRONIC PLATFORM FOR ADMINISTRATIVE


PROFESSIONALS

OBJECTIVES:
∙ Identify the different social media platform that the Administrative Professionals can use in the
office.
∙ Appreciate the advantage of the social media platform as means of information dissemination and
evaluate its disadvantage to avoid problems;
∙ Demonstrate responsible use of social media platform.

The social media as means of information dissemination

In this age of the internet, knowledge can be shared instantly and people are able to access
information quicker and easier than ever before. Social Media is the most effective tool for
sharing and marketing. Scientists and researchers need to use this tool to their advantage in
order to promote their work and share information with the world. But to promote any kind of
item, including academic research, a knowledge of social media and its impact is required.

Changing the Way Scientific Knowledge is Disseminated


Why do scientists study science? For most of them, it is to help the world. An important part of
helping the world is sharing what you research and your results. In the past, this has been done

Julius C. Sabando/Ronnie A. Idian Page 45


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

through publishing research in academic journals. However, this is now just one part of scientific
knowledge dissemination.

With the rise of the internet and social media specifically, people are wanting to be more and
more involved in the work that is being done around the world. People want to know what is
being studied and why it is important for them. The communication of science has become
immensely important in the world of academia and it is likely that it will only continue to grow.
Understanding this and using it to your advantage will help you share your work with not only
the science community but also the world.

Blogging and vlogging (video blogging) have become a new way for scientists to share their
work with the general public. Science news media is a growing industry, with magazines,
websites, TV shows and documentaries. Scientists need to take advantage of these platforms in
order to share their work with more of the world.

This type of long-form content can give your readers a look into your research without them
having to read and understand a journal article. But in order for these interested readers to find
your long-form content, social networking sites are the essential parts of any news site. Many
social media marketing plans include long-form website content as well as promotion on
common social media platforms. These plans provide short and essential information to those
who are interested in quick learning, and readers that are interested in “diving deeper” can
read/watch more about the topic in the long-form.

There are different types of social networking platforms that scientists can take advantage of.
Each of them have their own pros and cons, and it is important to understand the different
strategies behind the sites.

Using Twitter
Twitter is arguably the best social media platform for sharing scientific research and knowledge.
It is a microblogging system that enables real-time interaction between posters and followers.
The advantage to using twitter is the ability to post links to other websites and tag certain
themes to attract readers to your posts. For example, if you post a link to your recently
published paper, you can write a short blurb giving readers information about the topic, and then
you can tag (#hastag) #scicomm, #science, #research, #biology. Basically, by tagging certain
keywords, interested people are more likely going to see your post.
One advantage of microblogging on Twitter is the opportunity for real time review of work, or
active debates on an issue. Formally, scientific research needs to go through an extensive peer
review process before being published. While this still needs to be done, many scientists take to
Twitter for a quick review of their work by other scientists and science communicators.
Using Instagram
Instagram is similar to Twitter, in that it is another microblogging platform, but it largely focuses
on pictures and short video content. It has been flooded with content creators and influencers
that post gorgeous photos and attempt to sell followers products they are paid to promote. While
this might not seem like a platform that welcomes scientific research and its promotion, when
used correctly, it can be an excellent place to share scientific knowledge. Like Twitter, you can
use tags to bring people to your posts and page. But, what really brings people to your page
and increase your followers is excellent pictures. So before deciding to start an Instagram
account, figure out if your research enables you to take relevant and eye-catching photos
(Caplehorne, 2018).

Julius C. Sabando/Ronnie A. Idian Page 46


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

The advantage of Instagram over Twitter is you can write as much as your heart desires on your
posts. You have to keep in mind however, that not everyone is going to read all the way to the
end. It still might be a good idea to limit the amount you actually write on social media and direct
people to your actual paper.

The disadvantage to Instagram, other than the focus on pictures, is that you can’t post links to
other websites directly on your posts. One thing that people frequently do is post links to their
papers or portfolios in their bio description, and when they are directing people there, they write
“link in my bio”, so people are aware.
Using Facebook
The use of Facebook is on the decline. However, it is important to be aware of Facebook
because most people have an active account simply because it offers easy communication
tools. The main advantage to Facebook is the ability to create groups and pages. By doing this,
you can create a sort of community of people to collaborate on projects, discuss news, and
learn together.

For the goal of knowledge dissemination, Facebook is much different than Twitter and
Instagram. Facebook users are primarily looking for engagement instead of simply acquiring
information. In a study looking to determine the engagement rate of Facebook users with
information associated with dermatology, it was found that people were more likely to be
engaged with the information when it was found on “patient-centered” pages instead of
academic journals and professional groups (Kim, 2014). This means that users are more
interested in being in a community of people similar to them on Facebook – they are more likely
to engage with information when they feel it is specifically important to them.

One disadvantage of using Facebook is the challenge of standing out. The Facebook algorithm
makes it so that users see only what interests them. Facebook shows them targeted ads, the
posts of their closest friends, and their favorite pages to keep users interested and on the site
longer. It can be hard to build a new following on Facebook.

Using LinkedIn
In the past, social media platforms have largely been about sharing information about your
personal life; pictures, stories, etc. LinkedIn is different. When social media became universal, it
became more than a place to connect with friends, the internet became a place where you could
connect with professionals and with potential employers. LinkedIn was created to give people a
place to document their professional life.

LinkedIn is now a social networking platform that enables users to connect with other
professionals and share information that they find interesting and relevant. The advantage of
using LinkedIn for knowledge dissemination is that the people who are likely to engage with your
work and posts are those with the goal of professionalism. The disadvantage is that it is not a
very wide-reaching platform, in that you are not going to reach a diverse group of readers. One
study found that LinkedIn users were more likely to use the platform to actively engage and
seek advice from people compared to Twitter users who were more likely to use the platform for
general knowledge inquiry (Huang, 2019). That means that there are two very different
audiences when it comes to LinkedIn and Twitter. You have to decide what your specific goals
are and what platforms they align with.
Using Reddit and other Forum Platforms

Julius C. Sabando/Ronnie A. Idian Page 47


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

Reddit is an open-source community where users can submit original content or content taken
from somewhere else. Users then vote on the content posted, and the most popular content is
shared with all users. Within Reddit there are “subreddits” or specific pages designated for
certain topics, like r/science.

These forum platforms have become increasingly popular and the value of Reddit specifically is
the ability to engage with people on the site like Twitter, but there are no “followers”. If your
content is popular, you don’t need to have a large following for it to be seen – it will be shared.
On Reddit, users have created a series where people can ask questions and scientists are able
to answer them. While this isn’t strategically posting about your new research, engaging in this
activity can bring people to your other platforms to read your work. If users appreciate your
responses and like the answers you give, they might be more inclined to search out your work.

Effectively Sharing your Work on Social Media


Regardless of the platform you use, the advantage of sharing your work on social media is that
it spreads easily. If you use the platforms correctly, your work can become extremely popular
and it is possible that you could gain opportunities that you never knew existed, like speaking at
conferences, or on podcasts, or writing for magazines.

All you need is one person to resonate or connect with your post and your work. Having just a
couple of people share your posts can exponentially increase your reach. What’s more, social
media networks share, with users, posts that they think are most interesting to them. This is
socially known as “the algorithm” – it takes information about what specific users like and dislike
and then send them suggestions like people to follow, or posts to check out.

Another way to increase your reach is by sharing and responding to other posts on social media
that you connect with. Is there another research group that you frequently check in with? Follow
them. Is there is science communicator that you really enjoy listening to or reading about?
Follow them and share/like their posts. Social media is all about connecting, so once you join or
create a community of like-minded people, the followers will come and your work will be
constantly shared.

What are the advantages of social media?

Social media is an excellent opportunity for you to grow your business.

Here are seven benefits of using social media marketing.


Julius C. Sabando/Ronnie A. Idian Page 48
OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals 1. You reach large

audiences

There are millions of people using social media platforms. It’s a great opportunity for your
business to reach a large pool of people that are interested in your products or services.

According to Pew Research Center, these are the percentages of U.S. adults that use social media
sites online or on mobile:

∙ YouTube: 73%

∙ Facebook: 68%

∙ Instagram: 35%

∙ Pinterest: 29%

∙ Snapchat: 27%

∙ LinkedIn: 25%
∙ Twitter: 24%

U.S. adults use many of these sites, which creates great opportunities for your business to
reach leads. You have numerous opportunities to reach leads and can engage them on these
different platforms.

Julius C. Sabando/Ronnie A. Idian Page 49


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

The ability to reach large audiences is a huge advantage of social media. It opens the door for
your business to find more leads that want your products or services.

A coffee shop in Washington, D.C., for instance, could use social media to reach locals and
tourists. They could target users within a certain radius or location when creating social ads or
boosting organic posts. Both these strategies could help bring foot traffic to the shop.

2. You have a direct connection with your audience

Social media is one of the few marketing strategies that allow you to connect directly with your
audience. You know who is interested in your business because they choose to follow your
social media account.

This social media advantage helps your business in numerous ways:

∙ You get to know them better: When you know your audience better, you can deliver more
valuable content to them. You make the content more personalized to their interests, which
leads to more engagement on your page and with your business.
∙ You provide better customer service: A direct connection with your audience allows you to
resolve issues easier. You can address them personally, deal with their issues 1-on-1, and
build your brand in a positive light in the process.

∙ You gain valuable insight about your customers: The direct connection with your audience
helps you get to know your audience better. You see who interacts with your posts and how
they interact with them. It helps you adapt your strategy to make it better for your followers.

∙ You see how your audience perceives your business: It’s always good to know how others
view your business. With social media marketing, you know what your audience thinks of
your company. It’s a huge advantage of social media marketing because you can capitalize
on aspects people like about your business and fix elements they don’t like.

The direct connection with your audience is a great way to improve your overall marketing
campaign. You’ll get insight from your followers and be able to adapt your social media strategy
better to meet their needs.

3. You can create organic content

The ability to post organic content for free is an incredible benefit of social media for business.
This opens many opportunities for your company to connect with valuable leads at no cost. It’s
one of the reasons why companies love using these platforms.

You can post as much content as you want to engage your audience too.

Julius C. Sabando/Ronnie A. Idian Page 50


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

These platforms enable you to post photos, videos, and more, depending upon the social media
network. It’s a great way to put your brand out in front of people interested in your business and
help them get more familiar with it.

4. You have access to paid advertising services

If you want to go beyond organic posting, there is an option to run paid advertisements. Each
social platform offers its own form of paid advertising. Your social media advertising capabilities will
vary depending upon your platform.
Paid advertisements offer your business the opportunity to connect with interested leads that
haven’t found your business yet. Social media platforms allow you to tailor your ads to appear in
the feeds of people who are looking for your products and services.

This creates a great opportunity for your business to expand your reach and obtain new leads.
You help more interested leads find your business, which results in new followers, as well as
conversions for your business.

5. You build your brand

One advantage of social media marketing is the ability to build your brand. When you connect
with interested leads, you expose them to your brand. The ability to post organic content for free
allows you to build brand recognition repeatedly with your audience.

This builds brand loyalty. The more people get exposed to your brand, the more they become
familiar with it. Brand familiarity leads to more conversions down the line because people tend
to buy from brands they know well.

Julius C. Sabando/Ronnie A. Idian Page 51


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals
Social media also helps you build your brand because it enables sharing. You can share,
retweet, and re-pin content on these platforms. This means that followers can share your
content with their friends and family, which helps expose your brand to more people.

It’s an excellent way for you to gain new leads. You can reach leads that you wouldn’t reach
otherwise. It helps you grow your followers and earn more leads.

6. You drive traffic to your website

Social media is a great catalyst for driving traffic to your business’s website.

Most social media platforms allow you to post content with a link to your website. When you
create compelling content, you can entice your audience click on the link. This directs them to
your site, where they can learn more about your business.

It’s a great opportunity for you to help your audience get more familiar with your

business. They can check out your website and learn about your products and services.

Depending on your business, you can even let people use your site to book appointments or
pay bills. A dental social media marketing strategy, for example, may direct people to the practice’s
website to book their first appointment and complete any new patient forms.

More traffic on your site also helps your other marketing efforts because you’ll drive more
relevant traffic to your page.

7. You can evaluate your performance

The last advantage to social media marketing is the ability to assess your performance.
Whenever you run a marketing campaign, you want to know how it’s performing. Social media
platforms make it easy for you to track your campaign to see if you’re driving valuable results.

Julius C. Sabando/Ronnie A. Idian Page 52


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals
You can determine how many people see your posts, comment, like, share, and more. If you
run an advertising campaign, you can view metrics for that, too. You’ll see metrics like
impressions, clicks, and conversions.

When you can evaluate your social media strategy’s performance, you can optimize it and
improve it to drive better results.

7. You can join social media networks for free

One of the biggest advantages of social media marketing is that it is entirely free to start. None
of the largest platforms have signup fees of any sort, so the only investment you’ll need to make
is in the form of time.

That being said, there are paid advertising options on most social media platforms. These can
be a great tool for growing your following and reaching more users, but are by no means
mandatory for businesses.

8. You can create viral content

Perhaps the most unique advantage of social media is the ability to get help from your followers.
People love to share things with their networks, from photos and recipes to interesting articles
and hot deals.

Unlike other forms of Internet marketing, like your site and paid advertisements, content on
social media is often shared. However wide your reach, your followers can share with their
followers, who then share with their followers, giving you a wider reach (with lower cost) than a
traditional marketing campaign.

9. You can uncover valuable insights

You can also use social media to gain valuable information about your customers that will help
you make smarter business decisions. For example, social listening allows you to discover how

Julius C. Sabando/Ronnie A. Idian Page 53


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals
people feel about your company and brand. With social listening, you can uncover
conversations about your business and answer questions about your offerings.

What do people like about your business? How can you improve your products and services to
better meet the needs of your target audience? Understanding the answers to these questions
can your business stand out from the competition and reach more people.

WHAT ARE THE DISADVANTAGES OF SOCIAL MEDIA

With any marketing strategy, there are always disadvantages. The disadvantages don’t mean
that the approach isn’t effective, but rather, present potential hurdles you may have to jump
through during your campaign.

Here are four downsides to social media:

1. You can receive negative feedback

People use social media to post content they love, but they also use it to share experiences
they didn’t love. If someone had a poor experience with your business, it opens a door of
opportunity for them to share their poor experience with others.

This negative feedback comes in different forms. On platforms like Facebook, someone can
leave a negative review on your page and share their negative experience. When someone
checks out your business next, they’ll look at the reviews and see the negative feedback.

On sites like Twitter, users can tag a company in their posts and share their negative experience.
People can retweet that poor experience and spread it across the network.

Julius C. Sabando/Ronnie A. Idian Page 54


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals
Social media platforms are catalysts for complaining and leaving negative feedback. People use
their profiles to help others understand their poor experience. Many people feel there is a social
obligation to share their experience to prevent others from having the same experience.

Having too much negative feedback can negatively impact your future marketing efforts.

People trust others to give them insight into your company, especially if it’s the first time they
are hearing of your business. With social media, it’s possible that negative feedback can hinder
your business from earning leads.

How to adapt to this social media disadvantage: Whenever you receive negative feedback
on social media, respond to it. Don’t leave people’s complaints and concerns unaddressed. Not
everyone is going to have a positive experience with your business, but addressing the issues
can speak volumes about your company and its values.

2. You open up the potential for embarrassment

It’s easy for posts to go viral on social media. People keep a close eye on the good and the bad
on social media. If you aren’t careful about the content you post, you can end up embarrassing
your company and getting caught in an awkward situation.

For example, at one point, the hashtag “WhyIStayed” was trending on social media. This
hashtag was about victims of domestic violence sharing their story. The hashtag took social
media by storm and became a facilitator for conversations about abusive relationships.

DiGiorno Pizza saw this hashtag trending and decided to jump in on an opportunity for brand
exposure. They shared a tweet that said, “#WhyIStayed you had pizza.” Within minutes, people
became outraged at the company for their tweet.

The pizza company hadn’t researched the tweet beforehand to realize what it was regarding.
The tweet was deleted in minutes, but the impact lasted a long time. People were still talking
about the tweet long after it was removed.

Julius C. Sabando/Ronnie A. Idian Page 55


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals
This was an embarrassing moment for DiGiorno that blew up over social media. They spent the
next few weeks doing damage control and addressing their mistake with thousands of people on
Twitter. The carelessness of the tweet made people have a negative perception of DiGiorno.

When you post on social media, there is always an opportunity to embarrass your business on
accident. This is a big downside to social media.

How to adapt to this social media disadvantage: Always do your research before posting
content on social media. Whether it’s a photo, a hashtag, or a video, do your research to see if
there is any way it could be construed the wrong way. Research helps you adapt your content to
prevent your company from embarrassment.

3. You must spend a lot of time on your campaigns

Social media isn’t a one and done type of marketing method. You must constantly create new
content, post content, and engage with your audience on these platforms. A big drawback to
social media is that it is time-consuming for companies.

If you have a small business, small marketing department, or limited resources, it’s challenging
to manage a social media marketing campaign.

You have to find time to balance posting content, monitoring that content, responding to people,
and measuring your content’s impact. If you don’t have the resources, it can be an
overwhelming task.

If you aren’t doing enough with your social networks because you don’t have time, people, or
programs to help you run your marketing strategy, your campaigns will suffer. You won’t be as
effective as someone who has the necessary aspects to run a successful social media
campaign.

Julius C. Sabando/Ronnie A. Idian Page 56


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

How to adapt to this social media disadvantage: If you don’t have the resources, consider
outsourcing your social media marketing campaign to a social marketing company. You can
hire a social media marketing company to handle your campaign for you while you run your
business. Not to mention, you’ll partner with people who have years of experience running
campaigns and know how to drive success!

4. You have to wait to see results

When companies invest in marketing strategies, they want to see immediate results. You want
to know that your strategies are working and that the investment is worth your time. With social
media marketing, you don’t see immediate results.

Social media marketing’s success is predicated on the campaign’s overall success. Posting one
piece of content doesn’t determine the success of your campaign. You must post multiple
pieces of content over a period of time to determine the true success of your campaign.

This is a downside of social media because you have to wait to see results. You must be patient
and wait a few weeks to see results before you can adjust your campaign.

Julius C. Sabando/Ronnie A. Idian Page 57


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

Week 8: Midterm

Polytechnic University of the Philippines


Sta. Mesa, Manila

EXAMINATION FORM

SUBJECT CODE: OFAD SUBJECT DESCRIPTION:


40023 Internet and Web Design with Lab for Administrative
Professionals

COURSE/YEAR: X Midterm Examination Final Examination

Note:
⮚ You can write your answer into this test questionnaire.
Please write legibly

Name:

Yr. and Sec.

Part I Instruction: Right T if the statement is Number of Number of


Correct and F if the statement is Wrong. items: 15 point/s per
Write your answer before the number. item: 1

1. Fiber optic cable are cable commonly used by ISP

2. Twisted pair Category 6 cable can handle up to 1Gbps of


connection

3. Coaxial Cable is design for T.V. viewing purposes only.

4. Simplex transmission can simultaneously exchange data from


sender to receiver.

5. Data over the internet are divided into packets.

6. The greater the bandwidth, the larger the amount of data can be
transmitted.

7. Broadband determine the speed of your internet connection.


8. Philippine has the fastest internet Connection in Asia.

Julius C. Sabando/Ronnie A. Idian Page 58


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

9. In Metro Manila, PLDT and Globe is the most stable internet


connection.

10. Noise of your classmate and neighbor affect your internet


connection so every person near your router or computer must
always be quiet.

11. Modem are used to modulate and demodulate data.

12. Cat 5 Cables are capable of handling data up to 100mbps

13. Cat 5e and Cat 6 cables are capable of handling data up to 1gbps

14. Wireless router can transfer data faster than Wired or ordinary
router.

15. Fiber optic cables have higher noise tolerance compare to other
cable.
Part II Instruction: Encircle the letter of the correct Number of Number of
answer. items: 20 point/s per
item: 1

16. What type of media downloads while it's playing?

A. Streaming C. Youtube

B. Wi-Fi D. 4G

17. The speed of an internet connection is known as its _________.

A. Bandwidth C. Protocol

B. ISP D. Wireless Access Point

18. A URL is usually typed in a browser's __________.

A. Address Bar C. HTML

B. Google D. Plug-ins
Julius C. Sabando/Ronnie A. Idian Page 59
OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

19. ___________ appear while you're typing to help you improve your
search.

A. Plugins C. Search suggestions B. Search bars D. All of


the above

20. Telephone service over the internet is known as __________.

A. Instant Messaging C. VOIP

B. Social Networking D. VPN

21. A communication one direction only is known as:

A. Full Duplex C. Simplex

B. Half Duplex D. None of the above

22. A communication simultaneously, both directions, between two stations


is known as:

A. Full Duplex C. Simplex

B. Half Duplex D. None of the above

23. An example of a medium is

A. Coaxial cable C. Microwave

B. Fiber Optic D. All of the above

24. Which of the following refers to a network deployed in the smallest


geographic area?

A. DUAL WAN C. LAN

B. Internet D. WAN

25. Which of the following refers to a private communication path over a


public network?

A. Facebook Messenger C. VPN


B. Skype D. Yahoo Messenger

26. Fiber Optic is:

A. Capacity of higher bandwidth C. Thin and lightweight

Julius C. Sabando/Ronnie A. Idian Page 60


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals
D. All of the above

B. Immune to electromagnetic
noise and corrosive chemicals

27. An example of infrared is: C. Remote on VCR and TV D.

A. Connection between
computers None of the above

B. Connection between satellite


and cellular phone

28. The term 'full duplex' refers to the ability of the data receiving stations to
echo back a
C. Can send or receive data one
A. Can do one way data at a time
transmission only
D. Cannot talk at once
B. Can receive and send data
simultaneously

29. Which of the following device is used to connect two systems,


especially if the systems use different protocols?

A. Bridge C. Hub

B. Gateway D. Repeater

30. The slowest transmission speeds are those of

A. Coaxial cable C. Twisted-pair wire (Cat 5) B. Fiber-optic cable D.

Twisted-pair wire (Cat 6) 31. Which of the following is NOT a

DISADVANTAGE of WIRELESS LAN?

A. Interference of transmissions C. Slower data transmission


from different computers
B. Higher error rate D. All of the above 32. Which of the following is

used for modulation and demodulation? A. Gateway C. Multiplexer

B. Modem D. Protocol

Julius C. Sabando/Ronnie A. Idian Page 61


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

33. It is the global interconnection of computers around the world

A. Facebook C. Internet

B. Garena D. Wan

34. The ______ connection can used twisted pair and coaxial cable

A. Lan C. Wireless

B. Wired D. Wan

35. The _______ connection is used to connect computer and router

A. Crossover C. Loop

B. Hover over D. Straight


Part Instruction: Identify the correct answer. Number of Number of
III Choose your answer at the box below items: point/s per
item:

36. Is a computer program that has the ability to replicate or make copies of itself, and
spread to other files.

37. Involves the unauthorized use of another person’s personal data, such as social security,
driver’s license, and/or credit card numbers for illegal financial benefit.

38. Is the process of transforming plain text or data into cipher text that cannot be read by
anyone other than the sender and the receiver.

39. Refers to either hardware or software that filters communications packets and prevents
some packets from entering or exiting the network based on a security policy

40. Is a feature of viruses, worms, and Trojans that allows an attacker to remotely access a
compromised computer.
41. Is the moral right of individuals to be left alone, free from surveillance or interference from
other individuals or organizations, including the state.

42. A bill also outlines the exceptions for public disclosure and the procedures for accessing
public documents

Julius C. Sabando/Ronnie A. Idian Page 62


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

43.
Refers to the ability to ensure that information being displayed on a Web site, or
transmitted or received over the Internet, has not been altered in anyway by an
unauthorized party.
44.
One of the latest innovations in malicious code distribution is to embed it in the online
advertising chain

45.
Is any deceptive, online attempt by a third party to obtain confidential information for
financial gain

46. These are sites that promise to offer some product or service

47. are software servers often dedicated computer that handle all communications
originating from or being sent to the Interent by local clients

48. 48-50 Cite at least three (3) social media platform that Administrative
Professionals can used for information Dessimination
Prepared by: Reviewed/Validated by:

JULIUS C. SABANDO MA. LOLITA V. ABECIA

Professor Chairperson- Department Dean


of Office Administration

Julius C. Sabando/Ronnie A. Idian Page 63


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

WEEK 9: CONCEPTS OF PHOTOGRAPHY

OBJECTIVES:
∙ Appreciate the importance of photography in preparation for the creation and designing a web; ∙
Identify the different kinds of photography;
∙ Recognize a good exposure photograph to a bad exposure (over expose photograph); ∙
Create a good composition photograph;

Concepts of Photography

Photography is all about light. To let the camera "see" what you wish, you have tools controlling
how much light reaches the camera sensor: the aperture and shutter speed controls. With too
little light, your photo will be too dark. With too much light, it will be too bright. In both cases
some details will be lost. You use aperture and shutter speed to achieve the proper exposure,
while taking into account some important side-effects you should be aware about.
Imagine that you are looking through a small round hole in a fence. How much of the scene
behind the fence will you see and comprehend? I would say it depends on two factors:
1. How large the hole is. The larger it is, the more you will see.
2. How long you look. The longer you look, the more details you will notice.
Same story happens in a photo camera. I am now probably risking to get a negative evaluation
of my physics knowledge, which would unfortunately be quite fair... However, although the
physical reasons might differ, the conceptual comparison seems to be quite adequate. When
shooting with a photo camera, you let the sensor see the scene through a hole in the lens
called aperture. The larger this hole is, the more light reaches the sensor. Normally the sensor
is closed by a curtain called shutter. When shooting, the shutter opens, light reaches the sensor
through the aperture hole, and then it closes again. The longer the opening lasts, the more light
reaches the sensor. This time is called shutter speed.

Julius C.
Sabando/Ronnie A. Idian Page 64
OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

DSLR camera structure

When shooting, your goal is to expose the right amount of light to the camera sensor (that's
why it is called exposure). If you provide insufficient amount of light, the photo will be too dark. If
you expose too much light, the photo will be too bright. The larger the deviation from the normal
exposure is, the more chance you have to hopelessly lose image data. Software post
processing can fix the perceived exposure (for example make a dark photo look brighter), but it
cannot re-create the image data lost while shooting. For example, a very common landscape
photography problem is loosing clouds in a bright sky. When it is overexposed (too much light
reaches the sensor), the whole sky becomes completely white, and the clouds cannot be
distinguished any more. On the other hand, with underexposure (too little light reaches the
sensor), shadowed parts of the image lose details, become completely black. Software cannot
rescue such details, because they do not exist in the original image.

Typical problem: hopelessly

overexposed sky with lost cloud details.Typical problem: hopelessly underexposed land
with lost shadow details.

Thus, it is very important to get the exposure right when shooting. But what is "right"? Does it
mean "the photo must look so bright/dark as I want it to be on the final photograph"? No! By
"right" I mean that the exposure must be such that the maximum number of the scene details is
captured by the sensor. Recording the visual information, as much as possible - that's what the
camera is for! In fact, the best properly exposed photos often look terribly dull before software
post-processing.
Fortunately modern photo cameras often provide accurate automatic exposure evaluation. At
least with a natural, more or less even lighting, their evaluation is usually great. In automatic
mode, the camera suggests the aperture and shutter speed values to use. They guarantee a
good exposure. But are these really the best possible values? Why not to enlarge the aperture
hole twice and halve the shutter speed? The amount of light reaching the sensor will be the
same, thus it does not make any difference, does it? Well, in fact it does. Although the exposure
is still the same (and correct), this change can make a great difference in the resulting
photograph. Both aperture and shutter speed affect more aspects than just how much light
reaches the sensor, and a photographer must always keep them in mind to get good results.
However good your camera is, it is still unable to read your mind, and thus to know what exactly
you want. Let's look at the aperture and shutter speed in more detail, and discuss their
important side effects.

Julius C. Sabando/Ronnie A. Idian Page 65


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

Aperture and depth of field


As explained above, aperture defines how large the hole is through which the sensor sees the
world. In photography, aperture is measured in units called F-numbers, F-stops or whatever
else with this F-. Without going into details about what exactly this F- is (I would need to look it
up myself to explain, physics again), all you really need to know is the following. The smaller the
F-number is, the larger the aperture hole is, and the more light reaches the sensor. From now
on by "large aperture" I will mean a large aperture hole (and a small F-number), and vice versa
by "small aperture".

In practice, depending on the lens you have, you usually use F- values from about F4 (large
aperture) to approximately F16 (small aperture). Some quality lenses support much larger
apertures, for example my favorite Nikon lenses (85mm and 50mm) get to F1.8 or even F1.4.
These are very light-sensitive lenses saving you in dark conditions.

In addition to the amount of light reaching the sensor, aperture affects another very important
aspect: the depth of field. Imagine several objects located at different distances from the
camera. Say a person 5 meters away, a bear 7 meters away, and a tree 10 meters away. The
camera sees them all, but the question is: which objects are in focus? The larger the depth of
field is, the more objects are in focus. And the smaller the aperture (the larger the F-number) is,
the larger the depth of field is. Thus, to get only the person in focus (with the bear and tree out
of focus), focus on the person and set the maximum aperture, such as F1.8. This is great for
portraits with nice blurred backgrounds. To capture the whole scene, you also want the bear
and tree in focus - use a greater F-number, such as F8 or more.
Note that aperture is not the only parameter affecting the depth of field. For example, the
distance between the photographer and the subjects also plays a very important role. The
closer you are to the first subject, the smaller depth of field becomes.
Shallow depth of field due to the wide Larger depth of field with smaller
aperture F1.4. The lion is in focus, the aperture F8. The focus is still on the lion,
bear behind is out of focus. but the bear is also in focus.

Julius C. Sabando/Ronnie A. Idian Page 66


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

Shutter Speed

Shutter speed is the time while the shutter curtain is open, exposing the sensor to light. Don't
worry, there are no frightening F-numbers here :-). Shutter speed is measured in normal
seconds. At bright day light, we usually use hundredths of a second. When cloudy, in shade
etc., might be tenths of a second. At night it comes to full seconds.
While the shutter is open, the sensor records everything it sees. It does not realize what the
objects are, it just divides the scene into millions of dots and records the color of every dot
during the exposure time. Imagine that it is quite dark, and we are shooting a moving car at the
shutter speed of 1 second. With the speed of only 50 km per hour, the car will move by almost
14 meters during this time. The sensor will see the car at the initial position at the first moment.
Then the car will move to a place where the sensor previously saw only the background, and
the sensor will now see only the background at the car's initial position. And so on until the final
car position. What will be on the resulting photo? A 14-meters long semi-transparent car! :-)
The car we obtained is not sharp, it has what is called motion blur. The motion blur is the result
of shooting moving objects with long shutter speeds. This is the shutter speed side-effect you
should always keep in mind. If you want to get a sharp object, make sure the shutter speed is
fast enough to freeze its motion. If you want to get a motion-blurred object to emphasize the
movement, make sure the shutter speed is slow enough.
Fast shutter speed of 1/100 second froze Slow shutter speed of 0.6 second
the cars' movement. created a motion blur, a "ghost effect".

ISO SENSITIVITIY

When you cannot get the right exposure with the aperture and shutter speed, it is time to think
about the ISO sensitivity (also called ISO speed). It defines how sensitive the camera sensor is

Julius C. Sabando/Ronnie A. Idian Page 67


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

to light. With the same amount of available light, the higher the ISO sensitivity is, the more light
will be captured by the sensor.
The ISO sensitivity is measured in... numbers! :-) I do not know what exactly these numbers
mean, never needed it (now, when writing this, I became curious :-) ). The "normal" ISO speed
depends on your camera. In my experience it is either ISO 100 or ISO 200. This is what you
start with. If you cannot get the right exposure by altering aperture and shutter speed, try to
adjust the ISO speed. I cannot remember a situation when I needed to reduce the normal ISO
speed. Aperture and shutter speed can reduce the amount of light as much as needed in most
cases, with rare exceptions. There are also other ways to reduce the amount of light, such as
lens filters. The ISO sensitivity control is usually useful with insufficient light. When ISO 100 is
not enough, try ISO 200, ISO 400, etc.
This is not so simple, however. Aperture and shutter speed controls can be considered safe,
because they alter a natural measure: the amount of light. The ISO sensitivity is more artificial,
its increase comes at a price. The more sensitive the sensor becomes, the more image noise it
creates. This is when the equipment quality becomes important in photography: expensive
professional cameras usually allow much higher ISO speeds before the image noise becomes
prohibitive. With my entry-level DSLR Nikon D80 I never shot above ISO 800.

15 types of photography genres you can pursue as a professional photographer

Which type of photography should I master? That is probably the most challenging decision to
make when you are starting your pursuit of photography as a career. When you think of all of
the various subjects there are to capture, and all of the different ways to create the image, the
field of photography really is dynamic and varied. There is something for everyone in
photography, and the types of photography jobs are just as exciting.

Julius C. Sabando/Ronnie A. Idian Page 68


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

We have compiled the most popular 15 genres of photography. Of course, this list is not all
inclusive, since there are many careers made in various niches within our industry. And there
are also many careers that are not related directly to photography that require good
photographic skills to complete. In today's social media connected world, many workers are
taking photographs and sharing their experiences as part of their jobs.

Here are the 15 types of photography genres you can pursue as a professional
photographer:

#1 - Wedding Photography

The first type of photography


job involves weddings and
events. Many people go their
entire lives and only pay for
professional photography
once, but nearly everyone
hires a photographer for their
wedding.

Wedding photography is
pretty intense, with an
element of getting the best
shot you can on the first try
and not really getting a
second chance in some
situations. Wedding
photographers have to be
quick on their feet, moving
around during the reception and ceremony, and there are substantial sales and customer
service components to their jobs. They also have to be adaptable, ready to shoot outdoors on a
sunny day and indoors for dimly lit receptions and dances. Couples will expect the direction
from the photographer for posing shots and settings, so the photographer must be confident and
communicate well with the bride and groom.

The great wedding photographers are the ones who love their jobs. Many beginning
photographers start shooting weddings because, as they say, “that’s where the money is.” But
this mindset will ultimately lead to a disappointing business model if the photographer’s heart
isn’t in their work.

#2 - Event Photography

In the same vein, event photography is a dynamic and fast-paced way to make a buck with your
camera. Whether your beat is corporate events or wild and crazy rock concerts, event
photographers work in a variety of settings. Event photography styles often involve a mixture of
photojournalistic documentary work and portraiture. Some organizations use their event photos
for publicity purposes, while other use party photos as souvenirs or keepsakes.

Julius C. Sabando/Ronnie A. Idian Page 69


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

#3 - Portrait Photography
Portraiture is one of the most common types of photographer that we think of when we consider
career options. The kinds of photography that can be included in portraits is astounding. Retail
customers seek out portrait photographers for every phase of life: maternity and newborns,
school photos, senior photos, and general family photos. Corporate portraits are also commonly
needed as employees update their headshots for websites and publicity materials. Furthermore,
aspiring and professional models are in constant need of updated portfolios with a catalog of
current shots to market themselves for agencies and jobs.

Portrait photography is a great place to start out as a photographer. Building a great portfolio
of quality shots can lead to more business. It can often lead to more work for families and
weddings as word of mouth marketing does its magic. It can also lead to fashion and product
photography gigs.

Julius C. Sabando/Ronnie A. Idian Page 70


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

#4 - Product Photography
More specific than working in advertising, product photography is a great specialization. Think
about all of the products you have recently shopped for: everything needs to be photographed.
The photos are used for online and print catalogs, as well as for labels and packaging. Most
product photography is studio based, with careful control of backgrounds, shadows, and
lighting. Studio rentals can be fairly expensive so consider building a home photography studio
on a budget.

Product photography covers a lot of ground. Food photography is a specialized niche, and
restaurants need to advertise their meals and create their menus. Jewelry is another favorite
type of product photography since this requires the perfect balance of light and preparation.
While some product shoots might involve models, many times you will be working solo in a
studio doing still life photographs of small objects.

Julius C. Sabando/Ronnie A. Idian Page 71


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

#5 - Fine Art Photography


Of all of the types of photography, this is the one with no rules. Fine art photographers create
art. They display their work in galleries and at art shows, and generally, they sell a finished,
framed print product to their customers. Fine art photography can be of any subject at all, but
landscape and portrait artists are probably the most common. Fine art images are about
capturing emotional responses and communicating with the audience.

#6 - Fashion Photography

Fashion photography is
one of the more
glamorous and more
difficult to enter
photography jobs. From
cover shots of the top
fashion magazines to
documenting the latest
styles and trends on the
runway, fashion
photographers work in the
design districts of New
York, Paris, and Milan.

Julius C. Sabando/Ronnie A. Idian Page 72


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

Runway shoots require an element of documentary photography, while posed shoots on


location demand one-on-one work with the model.

Catalog and magazine shoots might also occur on location, from tropical beaches to subway. In
this style of glamour photography, the look of the photographs is everything. Lighting must be
perfect. This is a job that is also focused on the model, so a majority of the photographers time
is spent posing and directing models and scenes to get the look desired from the publication.

Fashion shoots are all about teamwork, and they are done by a group of people. The
photographer is just one cog in the wheel. Stylists, wardrobe specialists, makeup artists, art
directors, and others make up a team that keeps the shoot on track and make the magic
happen.

#7 - Architectural Photography

While many find taking pictures of buildings to be a fun hobby, many specialized photographers
make careers out of it. Employed by architectural agencies or working as freelancers, these
photographers capture the essence of buildings from inception to completion. Details captured
include the exteriors and interiors, and subtle details that make the building's design unique.
Architectural photography requires some special techniques and equipment to minimize
distortion and perspective problems that become apparent on a building’s many right angles. A
subdivision is real estate photography. Realtors always need excellent photographs, especially
in today's market where many customers view many properties online before

Julius C. Sabando/Ronnie A. Idian Page 73


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

deciding to go see them. High-quality architectural pictures are difficult to get right, and realtors
will pay for professional photos especially in the high-end market.

#8 - Travel Photography
Do you love to travel? Would you like to get paid for it? Who doesn’t? Travel photography allows
you to do just that while having fun with your camera in dynamic settings. Travel photography
blends many different types of photography into one. On one trip you might want to focus on the
people and the lifestyles present in a place, while also capturing the landscapes and the natural
world in which it’s located. Macro details and wildlife photography might be included too. Be it
on the beaches of Bali or the ice fields of Antartica, the job of a travel photographer is to
transport their audience to that place without them having to leave home.

#9 - Advertising or Lifestyle Photography

Everywhere we go we are surrounded by photography. Photography is on billboards, street


signs, magazine ads, even in our pockets on our smartphones. Captivating photography makes
the advertising world tick, and photography has never been more in demand than it is right now.

Advertising photography can include a range of subjects, like street photography, lifestyle
photography, fashion photography, or product photography. Advertising photographers can
work as freelancers, selling images on a project-by-project basis, or they might work directly for
major ad agencies. Either way, this is a dynamic field where you may be shooting for a print ads
campaign one day and shooting internet ads the next, always with a new subject.

#10 - Photojournalism

Julius C.
Sabando/Ronnie A. Idian Page 74
OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

Whether it be in war zones, political rallies, natural disasters, or community celebrations,


photojournalists cover breaking news. Newspapers, magazines, and online publications are all
in need of still photographs to help tell their stories. Photojournalism is one of the documentary
types of photography, and the goal of a photojournalist is to document the events as they
unfold. While there may be some portraiture, the majority of work is done candidly and as
unobtrusively as possible. The photos tell a story of events that are happening all over the
world.

#11 - Pet Photography

If your perfect subject is a furry friend, then pet photography might be for you. This is a growing
sector and is very similar in working conditions and type of styles to portraiture; only your
subjects may require treats when they are good. If you love animals, then there is no better job
as a photographer. Pet photography involves a fun mix of studio sessions and outdoor, on
location shoots. With connections to your local pet daycare facilities and dog show circuits, you
can build your business fairly quickly. A great way to start out is to volunteer your time to your
local pound, taking pictures of the animals and helping them find their forever homes.

#12 - Sports Photography

If you love sports, then being a sports photographer is a great gig. From the sidelines, sports
photographers use quick cameras and long lenses to zoom in on the action and capture the
winning shots. Photos wind up in publicity materials for teams, in advertising and marketing, and
in the news media online and in print.

Julius C. Sabando/Ronnie A. Idian Page 75


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

#13 - Aerial Photography


A burgeoning field of
photography born
from modern
technology is the
aerial photographer.
Sure, aerial images
have been around as
long as manned flight
and cameras have
been. But today,
unmanned aerial
vehiclesaerial
vehicles, also called
drones, are making
aerials within the
realm of all
photographers. In the
US and most countries, commercial drone pilots must be licensed. The process is relatively
simple and usually requires only a written exam. Aerial photography is now used for everything
from architectural and real estate photography to weddings and events. The unique perspective
given by drones can’t be beaten for uniqueness and beauty.

#14 - Scientific or Specialty Photography

Many fields rely on great photography for publications, training materials, and record keeping.
Many scientific and medical research companies employ photographers to document new
findings and discoveries.

Many other industries rely on photos to conduct surveys and studies. For example, in Florida,
aerial wildlife studies are routinely performed to study the numbers of manatees and birds living
in remote areas. Many insurance companies rely on photographers to inspect homes and
buildings, sending their photographic findings to the company to document damage or
condition.

These are just a few examples of the specialized fields that use photography regularly. With
open eyes and ears, working photographers can find remarkable jobs working with governments
and private companies all over the world.

#15 - Stock Photography

If all of these types of photography jobs sounded good to you, you might make a great stock
photographer. Stock photographers sell the rights to use their images through catalogs. They
can work as a freelancer, but more often than not photographers allow agencies to handle their
sales. Stock sales usually don’t pay very much per use, but the goal of a successful stock
photographer is to have an extensive catalog of images that sell often. As a result, once the
photos are uploaded and being sold, they provide a source of on-going passive income.

Julius C. Sabando/Ronnie A. Idian Page 76


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals
The advantage of selling stock photos is that you can sell any type of image you want. These
images are used by major ad agencies and small websites. Whether you like to shoot sunsets,
people, kids, pets, or wildlife, you can probably sell your images as stock. Once the photos are
captured, a lot of time is spent cataloging and keywording images to ensure that customers can
find them.

Quiz:

1. What are the function of the following:


a. ISO
b. Shutter Speed
c. Aperture
2. Discuss atleast five (5) kinds of Photography.

WEEK 10 - TERMINOLOGY, STARTING A WEBSITE, DOMAIN AND HOSTING

OBJECTIVES:

∙ Discuss how hosting a website works using the different terminologies learned; ∙
Identify a free hosting website the students can use to publish their website. ∙
Differentiate the difference between domain and hosting;

What is a Web Domain?


A web domain is an actual presence on the Internet, such as a web page. A web domain name
is a substitute that replaces the Internet Protocol (IP) address. For example, we can replace the
IP address 207.97.195.109 with a domain name such as www.study.com.
Making the translation from an IP address to a domain name is accomplished through the
Domain Name System (DNS). Using our previous example, you can see that it is much easier to
remember the domain name than the IP address.
Let's look at our domain name a little closer. Our domain name is www.study.com. The www is
a third-level domain, informing your browser to look for the domain name on the web. The
second portion, 'study,' is unique and is considered the second-level domain name, and the
.com portion represents the top-level domain, or TLD. A domain name breakdown is
illustrated below.

What is the Purpose of a Domain Name?


The primary purpose of a domain name is to help visitors locate your web site with minimal
effort. Your web domain name is your identity on the Internet and should be distinctive
enough to set you apart from your competition while being descriptive enough to impart
important information about you or your organization. In other words, a web site with a quality
domain name creates a picture of what is inside, similar to a business having unique and
fashionable storefront windows. By looking into the windows (your domain), prospective
customers are able to get a good glimpse of what your web site is about. One additional note:
You can incorporate your domain name as part of multiple email addresses, enabling you to
maintain separation between departments and services.
Julius C. Sabando/Ronnie A. Idian Page 77
OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

How Does a Domain Name Work?


The DNS works by translating the assigned IP address into an easier to remember and equally
viable name created by you. Both the domain name and its related IP address are unique, and a
duplication cannot be used. Non-duplication guarantees that emails are received by the
intended recipient and that customers reach the desired web site after entering a valid domain
name. As an added benefit, your domain name remains unchanged even if you change the
server hosting your web site. The only thing required on your part is to notify the DNS about
your new server. In other words, if you move from Detroit, Michigan, to Los Angeles, California,
your domain name remains the same; all you need to do is contact the post office advising them
of your new address

Google Domains offers you several choices for creating and managing your web presence:

∙ Use your domain name as a custom domain for Google App Engine, Blogger, or Google
Sites.
∙ Use one of the third-party web hosting providers you can link to seamlessly from Google
Domains to create a new account or use one you already have set up.
∙ Use another third-party web hosting provider.
∙ Use the web forwarding feature to redirect traffic to your domain directly to an existing
site

Choose your web hosting provider below to learn how to start a trial plan or connect to your
existing account with one of the integrated third-party web hosting providers, Google web tools,
other third-party web hosting providers, or simply forward your domain to an existing site.

Choose a web hosting provider to start:Google web tools (Blogger, Google App Engine, Google
Sites)ShopifySquarespaceWeeblyWixWordPress by BluehostOther third-party web hosting
providerWeb forwarding to an existing website

What is Web Hosting?

Web hosting is a service that allows organizations and individuals to post a website or web
page onto the Internet. A web host, or web hosting service provider, is a business that provides
the technologies and services needed for the website or webpage to be viewed in the Internet.
Websites are hosted, or stored, on special computers called servers. When Internet users
want to view your website, all they need to do is type your website address or domain into their
browser. Their computer will then connect to your server and your webpages will be delivered
to them through the browser.

Most hosting companies require that you own your domain in order to host with them. If you do
not have a domain, the hosting companies will help you purchase one.
Julius C. Sabando/Ronnie A. Idian Page 78
OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

Here are some features you should be expecting from your hosting provider:

Email Accounts As mentioned earlier, most hosting providers require users to have their own
domain name. With a domain name (e.g. www.yourwebsite.com) and email account features
provided by your hosting company, you can create domain email accounts (e.g.
[email protected]).

FTP Access The use of FTP lets you upload files from your local computer to your web
server. If you build your website using your own HTML files, you can transfer the files from
your computer to the web server through
FTP, allowing your website to be accessed through the internet.
powers over 25% of websites on the internet.
Most hosting providers will tell you right away if
WordPress Support their plans are WordPress-compatible or not.
WordPress is an online website creation tool. It The simple requirements for hosting your
is a powerful blogging and website content WordPress websites include: PHP version 7 or
management system, which is a convenient greater; MySQL version 5.6 or greater.
way to create and manage website. WordPress

If you decide to create and host your website with Website.com, in addition to access to the
drag and drop site builder, you can get a custom domain, email addresses, and web hosting
all bundled into one subscription.

An advantage of using a website builder is that it allows you to simply drag and drop content
to create your site, and publish your site to live with a few clicks. No technical experience is
required. With the Website.com site builder, you will not need to build your website with
coding, and you will not need to transfer files from your desktop computer to

Julius C. Sabando/Ronnie A. Idian Page 79


OFAD 40023 – Internet and Web Design with Lab for Administrative Professionals

the server through FTP.

If you would rather build your


website through coding or a
CMS tool like WordPress, we've
handpicked a few hosting
providers based on their
features and price:

∙ Doteasy (Recommended)
∙ Liquid Web
∙ Rackspace

How can my online business


benefit from a web hosting
service?

In order to publish your website online, your business website requires a web hosting service.
However, a web host gives business owners more than just web hosting services! For
example, web hosting firms typically employ in-house technicians to make sure their clients'
websites are up and running 24/7. Plus, when website owners are in need of help or
troubleshooting (e.g. script debutting, email not able to send/receive, domain name renewal,
and more), the web host's in-house support are the go-to people. A professional web hosting
service ensures a hassle-free experience for business owners, so they can efficiently focus
their time and effort on their businesses.

WEEK 11: CREATING GOOGLE ACCOUNT

OBJECTIVES

1. Demonstrate how to create a google account and enjoy sharing their accounts to other students in
the class;
2. Describe the different google products and how to use them in creating website;
3. Discuss the different techniques to maximize the use of google account;
4. Establish functioning website;
Create a Google Account

A Google Account gives you access to many Google products. With a Google Account, you can
do things like:

∙ Send and receive email using Gmail


∙ Find your new favorite video on YouTube
∙ Download apps from Google Play

Julius C. Sabando/Ronnie A. Idian Page 80

You might also like