0% found this document useful (0 votes)
8 views

Module 1 ICT Introduction Basic Web Concept

Uploaded by

adamsimpliest
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Module 1 ICT Introduction Basic Web Concept

Uploaded by

adamsimpliest
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 55

Information and Communication

Technology (ICT)

Lesson 1 – Quarter 3
THE SESSION IS DIVIDED INTO FOUR
LESSONS, NAMELY:
1. Basic Web Concept
2. Web design and principle
3. Netiquettes in Web
4. Web safety and security
AFTER GOING THROUGH THIS
SESSION, YOU ARE EXPECTED TO:
1. Learn different concept in Web such as
termonilogies, history and other factors;
2. Understand Web designs and principles;
3. List and identify the different typefaces.
4. Acquire knowledge on how to be safe/secure in
Web;
5. Identify the 10-core rule in Netiquette;
6. Appreciate the essence of learning web safety.
LESSON PROPER
Web page is a single document on the Internet. It can include any of
various types of content, including text, images, video material, other
sorts of code or it could also be blank.

Home page is usually the first web


page of a web site which usually
provides information about the web
site, its purpose and contents.

Splash page is a web page that


may come first before the home
page. It usually contains a
multimedia which is designed to
be attractive and intriguing in
order to create curiosity and
invite anyone to see its contents.
There are different types of Home
page:

Text base - Considered the simplest


form of pages you can create on the
web. The only requirement is your text
for they are very fast to process. It is
often used for academic sites or
research.
Personal - Used for personal statement
about the user or with other persons.
This includes personal things of the user.
Commercial - It is used to publish or
promote your business that includes a
company’s logo and its service can
offer.
WEBSITE IS A COLLECTION
OF WEB PAGES THAT ARE
LINKED TOGETHER. THEY
USUALLY SHARE A
COMMON DOMAIN
NAME.
DIFFERENTIATE WORLD WIDE WEB
TO INTERNET

The Internet is a series of huge computer networks that


allows many computers to connect and communicate
with each other globally.
It started in the 1960s as a way for government
researchers to share information. Computers in the '60s
were large and immobile and in order to make use of
information stored in any one computer
DIFFERENTIATE WORLD WIDE WEB
TO INTERNET

The World Wide Web (WWW),


commonly known as the Web, is
an information system where
documents and other resources are
identified by URL which may be
interlinked by Hypertext and are
accessible over the Internet.
The World Wide Web uses three
protocols:
• HTML (Hypertext markup language) - The
language that we write our web pages in.
• HTTP (Hypertext Transfer Protocol) - Allows for
the retrieval of linked resources from across
the web.
• URL/URI (Uniform resource locator/identifier) -
The last part of the puzzle required to allow
the web to work is a URL. This is the address
which indicates where any given document
lives on the web. It can be defined as
Domain is the official name of a computer (host) connected to
the Internet. It is a component of a Uniform Resource Locator
(URL) used to access websites.
The domain name system is a hierarchical naming system for
computers, services or any resource connected to the Internet
or a private network.
A British computer scientist and
English engineer invented the
World Wide Web in 1989. He TIM BERNERS-LEE
wrote the first web browser in
1990 while employed at CERN.
near Geneva, Switzerland. The
browser was released outside
CERN in 1991, first to other
research institutions starting in
January 1991 and then to the
general public in August 1991.
The World Wide Web has been
central to the development of
the Information Age and is the
primary tool billions of people
use to interact on the Internet.
Dial-up connection is connecting the internet through
telephone lines. The method of connection is done like
making a call over the telephone line with the aid of
modem.

Digital Subscriber Line is also the method of connecting to


the internet using telephone line but provides both data
and voice communication. It is several times faster and
more reliable compared to dial-up. DSL is an example of

HOW TO ACCESS
Dedicated line a type of always on method and provide
constant connection.

THE WEB?
Cable Internet-Is an online connection to the web by the
use of cable lines already used by the cable TV provider.
Cable lines can carry TV and data signals faster since they
are dedicated line originally intended for TV.

Wireless Internet is the internet connection provided by


wireless service providers. Wherein wireless enabled
computers and gadgets can access too.
LESSON 2: WEB DESIGNS
AND PRINCIPLES
BALANCE

– a feeling of visual equality in shape, form, value, color, etc. It can


be symmetrical - evenly balanced, or asymmetrical - unevenly
balanced. Objects, values, colors, textures, shapes, forms, etc. can
be used in creating balance in a composition.
EMPHASIZE

refers to the importance or


value given to a part of
the text-based content.
APPROPRIATENESS

refers to how fitting or


suitable the text is used
for a specific
audience, purpose or
event.
PROXIMITY
refers to how near or how
far are the text elements
from each other. When
two things are closely
related, we bring them
close together.
Otherwise, we put text
elements far from each
other.
ALIGNMENT
refers to how the text is
positioned in the page. This
can be left, right, center or
justified.
ORGANIZATION
refers to a conscious effort to
organize the different text
elements in a page. It ensures
that while some text elements are
separated from each other they
are still somehow connected with
the rest of the elements in the
page.
REPETITION
concerns consistency of
elements and the unity
of the entire design.
Repetition encourages
the use of repeating
some typefaces within
the page.
CONTRAST

creates visual interest


to text elements.
Contrast is achieved
when two elements are
different from each
other.
Web audience have very limited time and have a lot of choices of
web sites to pick from. The most of them are looking for useful
information they can apply in school, workplace, hobby or simply
for personal advancement. So, make that your website has the
following:
1. Accuracy that ensures the reliability of information,
2. Understandable on presenting the content of the web page.
3. The message must be Concise in conveying information,
4. Undergo in Ethical and Legal process before publishing a
website. Use words pictures and videos that you yourself created.
Displays the browser’s title bar. It is the name assigned to the page if you
TITLE
add it to the browser’s list of favorites.

HEADING A larger font size text, usually bold or italic in style, showing the different sections of a page.

BODY Contains the information of the browser window.

NORMAL TEXT The text that makes up the main content of the web page. It has many formats. It can be in
paragraph form or bulleted list.

BACKGROUND The wallpaper of the web page. It can be a solid color, a picture or a graphic, or a default
standard with white or gray background.

ANIMATED IMAGES Inline images that include motion and animation. These images are more attractive to the user.

LINKS Text, phrases, or graphics that help the user to navigate more on the Web page.

ELEMENTS OF A WEB PAGE


Typeface also called font, font type, or type that refers to
the representation or style of a text in the digital format and
usually comprised of alphabets, numbers, punctuation
marks, symbols and other special characters.
In Formal Text the based-on materials are created and
distributed by established institutions (such as publishing
companies, news agencies, etc.) and go through a rigorous
process of editing or evaluation and are usually governed by
censorship of the state, While in Informal Text the based
materials, come from personal opinions or views on different
issues, processes, etc.
Sans Serif
Serif Ex: Arial, Tahoma, Slab Serif
Verdana and
Ex: Times New Rockwell and
Roman, Garamond Calibri.
and Baskerville. Playbill.
Decorative
Ex: Chiller,
Script
Edwardian,
Jokerman, TYPEFACES
and Curlz MT
Vladimir, and
Kunstler.
1.What is Netiquette?
2.List 10 examples of
Netiquette.
HOMEWORK 3.Identify the meaning
of the following: Email
Spam, Spyware,
Computer Virus, Virus
Protection and
Firewall.
LESSON 3: NETIQUETTES IN WEB
https://www.youtube.com/watch?v=FWMk_Zv7nB8
WHAT IS NETIQUTTE?
Is short for "internet etiquette."
Just like etiquette is a code of
polite behavior in society,
netiquette is a code of good
behavior on the internet. This
includes several aspects of
the internet, such
as email, social media, online
chat, web forums, website
comments, multiplayer
gaming, and other types of
online communication.
Rule 1: Remember the human
The golden rule your parents and your kindergarten teacher
taught you was pretty simple: Do unto others as you'd have
others do unto you. Imagine how you'd feel if you were in the
other person's shoes. Stand up for yourself, but try not to hurt
people's feelings.
Rule 3: Adhere to the same standards of behavior online
that you follow in real life
If you encounter an ethical dilemma in cyberspace, consult
the code you follow in real life. Chances are good, you'll find
the answer.
Rule 2: Know where you are in cyberspace
Lurk before you leap when you enter a domain of
cyberspace that's new to you, take a look around. Spend a
while listening to the chat or reading the archives. Get a
sense of how the people who are already there act.
Rule 4: Respect other people's time and bandwidth
When you send email or post to a discussion group, you're
taking up other people's time (or hoping to). It's your
responsibility to ensure that the time they spend reading
your posting isn't wasted.
Rule 5: Make yourself look good online
Pay attention to the content of your writing. Be sure you
know what you're talking about and make sense. Be
pleasant and polite. Don't use offensive language, and
don't be confrontational for the sake of confrontation.
Rule 6: Share expert knowledge
The strength of cyberspace is in its numbers. The
reason asking questions online works is that a lot of
knowledgeable people are reading the questions.
And if even a few of them offer intelligent answers,
the sum total of world knowledge increases.
Rule 7: Help keep flame wars under control
"Flaming" is what people do when they express a
strongly held opinion without holding back any
emotion. It's the kind of message that makes people
respond, "Oh come on, tell us how you really feel".
Rule 8: Respect other people's privacy
You'd never dream of going through your
colleagues' desk drawers. So naturally you wouldn't
read their email either. Unfortunately, a lot of
people would.
Rule 9: Don't abuse your power
Some people in cyberspace have more power than others.
Experts in every office, and system administrators in every
system but knowing more than others, or having more
power than they do, does not give them the right to take
advantage of others. For example, admins should never
read private email.
Rule 10: Be forgiving of other people's mistakes
Everyone was a network newbie once and not everyone had
the benefit of using media, so when someone makes a mistake
whether it's a spelling error, an obvious question or an
unnecessarily long answer be kind about it. If you decide to
inform someone of a mistake, point it out politely, and
preferably by private email rather than in public. Give people
the benefit of the doubt.
LESSON 4: WEB SAFETY AND
SECURITY
47

EMAIL SPAM
• Also known as junk email, it
is usually unsolicited commercial
email sent from one source with
identical message sent to a
multiple recipient.
• Dangerous spams carry
virus like Trojan Horse and other
malicious software. Spammer is
the term used to refer to person
who create electronic spam.
• Spamming is projected to
continue because it is a cheap
means of advertising.
48

Email Spoofing
• This refers to deceitful
email practice in which the
sender address is changed, so
that it would appear to have
come from a different source
usually someone you know.
• Email spoofing is usually used
by the spammer to hide the
origin of the spam.
49

HACKER
• A person who is able
to enter and control other
people’s computer without
authorization. A hacker is
able to enter another’s
computer, usually
vandalizes the victim’s
website, steal information,
and performs credit fraud

DANGERS ON THE INTERNET


PHISHING
• A deceitful practice
of trying to get confidential
information such as
passwords and username,
and credit cards details by
making it appear as if it
comes from a trustworthy
source. It is usually done by
email or other similar means
using a popular entity and
financial institution.
51

PHARMING
• A dangerous hacker
attack on a website which
directs all traffic to that
web site to another
fictitious website. The main
objective of Pharming is to
obtain username and
password as well as
financial information to
steal their money
electronically.
52

SPYWARE
• This is a computer
program that is installed
covertly on a personal
computer to collect
information or even take
control over the computer
without the knowledge of the
user.

• Spyware program
would be able to monitor and
collect information about the
user and his internet habits and
practices.
53

COMPUTER VIRUS
• is a program that duplicates
itself and infects the computer. It
spreads like a real biological virus.
• Some Worm Virus deleted files
and other interrupted the network
function and stiil, other send junk
mail from infected computers.
• Trojan Horse is a malware fronting
to perform a good task but
convertly performs undesirable
function. This can disable the
computer defences opening it to
unauthorized entry. DANGERS ON THE INTERNET
54

FIREWALL
• Helps in protecting
your computer from
unauthorized entries, viruses
and even hackers. It is
recommended to keep this
setting turned on.

SECURITY CENTER
55

AUTOMATIC UPDATE
• Another feature of
microsoft that when your
turned on will
automatically download
updated from MS Windows
website. Usually meant to
update features and fix
bugs in OS.

SECURITY CENTER
56

VIRUS PROTECTION
• Is usually about the
current anti-virus installed in
your computer. This option
is recommend to be turned
on always. It is meant to
locate, find, and remove
virus threats that are
already in your computer.
This program should be
constantly updated.

SECURITY CENTER

You might also like