0% found this document useful (0 votes)
39 views7 pages

Emtech Fact Sheets For Q1

Uploaded by

Katherine Dumaog
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views7 pages

Emtech Fact Sheets For Q1

Uploaded by

Katherine Dumaog
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Information and Communications knowledge).

Ubiquitous computing or
Technology (ICT) is an extended term “information processing which has been
for information technology (IT) which stresses thoroughly integrated into everyday objects
the role of unified communications and the and activities” (York 2004)
integration
of telecommunications (telephone lines and With these current trends, they can be a form
wireless signals), computers as well as of development of global interactivity
necessary enterprise software, middle- including teaching and learning. Although
ware, storage, and audio-visual systems, which there are some risks associated with these
enable users to access, store, transmit, and (identity theft or scamming), the overall
manipulate information. It also study the benefits in terms of the amount of information
business of developing and using technology available and the many different ways of
to process information and aid teaching this information, out-weighs the
communications. negative aspects in ICT. This is why, our
knowledge in ICT is important.
The term ICT is also used to refer to
the convergence of audio-visual and telephone Philippines is dub as the “ICT Hub of Asia”
networks with computer networks through a because of huge growth of ICT-related jobs,
single cabling or link system. There are large one which is BPO (Business Process
economic incentives (huge cost savings due to Outsourcing) or call centers. ICT Department
elimination of the telephone network) to merge in the Philippines is responsible for the
the telephone network with the computer planning, development, and promotion of the
network system using a single unified system country’s information and communication
of cabling, signal distribution and technology agenda in support of national
management. development.

The Internet links different devices worldwide Internet is the global system of
using the Internet Protocol (IP) suite. Also interconnected computer network that use the
called as “the net”, it is a network of networks Internet Protocol Suite (TCP/IP) to link
that links different users from one computer to billions of devices worldwide and is
get information from any other computer. The sometimes called simply “the Net.” Router IP
World Wide Web or commonly known as is 192.168.1.1
www, is an information system on the internet
that allows documents and other web sources
that are identified by URLs and can be VINTON G. CERF- father of Internet
accessed via the use of the internet. In order to
access the World Wide Web, a Web browser is World Wide Web was Invented by
needed. A web browser is a software (TIMOTHY JOHN BERNERS LEE) Tim-
application used to manipulate, present, and Berners Lee, an information system on the
retrieve information on the World Wide Web. Internet that allows documents to be connected
From Web 1.0 to 3.0, the advancement of the to other documents by hypertext links,
internet is a fascinating thing, considering the enabling the user to search for information by
evolution of our minds and our need for new moving from one document to another. Also
technologies. Trends in ICT includes social an information space where documents and
media, mobile technologies, convergence and other web resources are identified by Uniform
assistive media. Resource Locator’s (URL’s).

ICT starts viewing students as Web Page is a hypertext document connected


designers, interactors and constructors of to the World Wide Web (WWW).
information themselves not just absorbers of
information. This therefore means that
computers (as mind tools) interacting with Web Site is location connected to the internet
students (as designers) results in new that maintains one or more pages on the World
Wide Web.
Web Browser is a software application for  Compatibility – HTML files and
retrieving, presenting, trans-versing current web browsers are not
information resources on the World Wide supported;
Web.  Security – Machine is saving
his/her preferences;
 Vastness – World Wide Web
Static Web Page (THE WEB) or Web 1.0 is
known as flat page or stationary page in sense contains billions of Webpages;
 Vagueness – Certain words are
that the page is “as is” and cannot be
manipulated by the user. imprecise;
 Logic – Misunderstanding
between the user and the machine
Dynamic Web Page(THE SOCIAL WEB) or
Web 2.0 is the evolution of Web 1.0 by adding ONLINE PLATFORMS AND SITES
dynamic web pages that allow users to interact
with the page, the user may be able to Online Platform- is a specially developed
comment or create a user account. platform using internet technology.

Features of Web 2.0: 1. PRESENTATION OR


VISUALIZATION PLATFORM-allows you
*Folksonomy – Classifies Information. to present and share presentations,
infographics and videos with other people.

*Rich User Experience – Content is dynamic 2. CLOUD COMPUTING PLATFORM-is


and is responsive to user’s input; called as “The Cloud”. It is the practice of
using a network of remote servers hosted on
*User Participation – Owner of the website is the internet.
not the only one who is able to put content but
also others are able to place a content of their 3. FILE MANAGEMENT PLATFORM- is
own means of comments, reviews, and used for the storing, naming, sorting and
evaluation; handling of computer files.

*Long Tail – Services that are offered on 4. MAPPING PLATFORM- is a


demand rather than purchasing them; transformation taking the points of one space
into the points of one space into the points of
the same or another space
*Software as a Service – Users will be
subscribing only to a software only when 5. SOCIAL MEDIA PLATFORM- is a
needed rather than purchasing them; computer-mediated tools that allow large
group of people to create, share or exchange
*Mass Participation – Diverse information information, interest and the information
sharing through universal access. Content is shared can be in the form of ideas, pictures,
based on people from various culture. videos or anything that you want to create
and share to virtual communities. It can be in
Web 3.0(SEMANTIC WEB) is a movement the following platforms:
led by the World Web Consortium, where its
standard encourages web develops to include *Social Networks. These sites allow you to
semantic web pages, a component of Web 3.0 connect with other people with the same
that provide a common framework that allows interests or background.
data to be shared and reused across apps, *Bookmarking Sites. These are sites that
enterprises, and community boundaries. In
allow you to store and manage links to various
spite of the good features, there are some
websites and resources.
problems with the Web 3.0:
*Social News. These are sites that allow  Buy the software; do not use
users to post their own news items or links to pirated ones.
other news sources.  Do not reply or click links from
*Media Sharing. These are sites that allow suspicious email/s.
you to upload and share media content like
images, music, and video. Media sharing sites Online Threats- is deemed any malicious
act that attempts to gain access to a
can be specific for video sharing, photo
computer network without authorization or
sharing, slide sharing, social bookmarking, and
permission from the owners.
gaming.
*Microblogging. These are sites that focus
on short updates from the user. Those Kinds of online threat
subscribed to the user will be able to receive
these updates. Posts are brief that range 1.Phishing- its goal is to acquire sensitive
typically from 140 – 200 characters. personal information like password.
*Blogs and Forums. These are websites that
allow users to post their content. Other users -happens when an email is sent from an
can comment on the said topic. internet criminal disguised as an email from a
legitimate, trustworthy source. The message
Rules of Netiquette is about the proper and is meant to lure you into revealing sensitive or
polite way to communicate with other people confidential information.
when you are using the Internet. This rules
will help you avoid hackers, spam and other
cyber-crimes on the Internet.

Here are some tips to stay safe online:

 Be mindful of what you share and


what site you share it to.
 Do not just accept terms and
conditions; read it.
 Check out the Privacy Policy page
of a website.
 Know the security features of the
social networking site you use. 2.Pharming- happens when a hacker (or
 Do not share password with “pharmer”) directs an internet user to a
anyone. fake website instead of a legitimate one.
 Avoid logging in to public
networks/Wi-Fi.
-usually focus on websites in the
 Do not talk to strangers whether
financial sector, including banks, online
online or face-to-face.
payment platforms, or other e-commerce
 Never post anything about future
destinations.
vacations/trips.
 Add friends you know in real life.
 Avoid visiting untrusted websites
 Install and update an antivirus
software on your computer.
 If you have Wi-Fi at home, make
it a private network by adding a
password.
 Avoid downloading anything from
untrusted websites.
unprotected and allows hackers to
get your information. It is the most
dangerous malware type.
4. Spyware, a program that runs in
the background without you
knowing it. It is a malware that
secretly observes the computer
user’s activities without
permission and reports it to the
software’s author.
5. Adware, a program designed to
send you advertisements, mostly
3.Internet Scam- generally refers to as pop-ups.
someone using internet services or 6. Ransomware -is a form of
software to defraud or take advantage malware that locks you out of
of victims, typically for financial gain. your device and/or encrypts
your files, then forces you to
pay a ransom to get them
back.

6. Spam- an unwanted email mostly from


bots or advertisers.
-are unsolicited emails, instant
messages coming from recipients that are not
granted verifiable permission for the message
to be sent. Spam messages can be damaging if
you open or respond to it.

7.Cyberstalking refers to the use of the


4. Internet robots are also known as internet or other electronic device to harass
spiders, crawlers, and web bots. It is a or stalk individuals or organizations.
software application that is
programmed to do certain tasks. 8.Cyberbullying refers to the act of
tormenting, harassing, or embarrassing
Bots are automated, which means they another person using the internet.
run according to their instructions
without a human user. 9.Spoofing happens when someone or
something pretends to be something else to
gain our confidence, get access to our
5. Malware or Malicious software
systems, steal data, steal money, or spread
malware.
1. Virus, a malicious program
designed to replicate itself and
transfer from one computer to
another THINK BEFORE YOU CLICK
2. Worm, a malicious program that
transfers from one computer to T– Is it true?
another by any type of means
3. Trojan or Trojan horse, a
H– Is it helpful?
malicious program that is
disguised as a useful program but
once downloaded or installed, I- Is it inspiring?
leaves your Personal Computer
N– Is it necessary?

K– Is it kind?

The Rules of Netiquette is to Understand the


copyright protect literary works, photographs,
paintings, drawings, films, music (and lyrics),
choreography, and sculptures; Be Responsible
even if a material does not say that it is
copyrighted, it is not a valid defense against
copyright; Be Creative to ask yourself whether A URL is one type of Uniform Resource
what you are making is something that came Identifier (URI). It is a generic term for all
from you or something made from somebody types of names and addresses that refer to
else’s creativity and; Know the Law of some objects on the world wide web. Knowing the
limitations to copyright laws. URL endings will give you clues to who is
sponsoring the website and help evaluate the
1. Have questions in mind – Focus on a
question you want to be answered.
Anatomy of a URL

2. Narrow it down – Search engines like https://www.searchenginejournal.com/alternative-


Google, Bing or Yahoo use several filters to searchengines/271409/#close
determine the most appropriate result for
you. sources.
Popular Domains
3. Advance Search- The best way to foster
information
7. Named
1. Protocol 4. Top-level Domain
4. Look for credible sources – because some anchor
sites contains wrong information.
2. Subdomain 5. Folders/ Paths
5. Give Credits- cite the original author
3. Domain 6. Page

Lesson 3.1: Searching the Web


Search Engines are websites used for
retrieval of data, files, or documents Top- level Country code top
Domains level domains
from data bases. Some search
.edu – .ph –
engines we use today are:
educational Philippines
institution .eu –
.org – non-profit European
organization Union
.gov – .uk – United
government site Kingdom
.com – .au - Australia
commercial site
.net - network
search term
immediately following it.
Ex. A not B

2. Phase Searching – is used to


search for famous quotes,
proper names,
Search Skills
recommendations, etc. It
and Tools A B
encloses the phrase in
1.
quotation marks.
Ex. “Jane Doe” “To be or not to
Boolean Logic – narrows,
be”
broadens, or eliminates search
3. Plus (+) – indicates that the
term.
word after the sign is a
a. Boolean “or” – this
required word must be found in
operator will find pages
search. Example: +fire
4. Minus (–) sign – indicates to
exclude a word from your
search that is not required on
the result. Example: Jaguar
speed –car
5. Ampersand (@) is used to find
that include either of the
social tags. Example:
search terms.
@SteveJobs
Ex. A or B
6. Hashtag (#) is used to find
popular hashtags. Example:
b. Boolean “and” – this
#LawOfClassroom
operator will retrieve
7. Finding Documents – using
only pages containing
the filetype refines the search
both terms
for documents on the web.
Ex. A and B
o filetype:pdf
o filetype:doc
o filetype:xls
c. Boolean “not” – this Ex. ICT in the Philippines
operator will find pages pdf
that do not include 8. Searching Site – the sites find
webpage from a website.
Ex.: National Geographic
information in Australia
Search: Australia site:
NationalGeographic.com

You might also like