0% found this document useful (0 votes)
10 views

ETech-Lesson-1-2-Slides-and-Notes

Etech notes for Grade 12

Uploaded by

vanillafei321
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

ETech-Lesson-1-2-Slides-and-Notes

Etech notes for Grade 12

Uploaded by

vanillafei321
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

1

2
Information is necessary to make decisions and to predict the future. For
example, scientists can detect the formation of a typhoon using the latest
technology and warn the public to avoid disasters in the affected areas.

Before, people transmit messages through signs or symbols and performin


g
drama and poetry. However, these ‘older’ forms of communication are less
utilized due to the advent of technology like the use of the Internet, e-mail
or
video conferencing.

3
4
Philippines is considered as the ICT Hub of Asia because of the tremendou
s
growth of ICT related jobs like Business Process Outsourcing, or call centers
. It
started with Accenture in 1992 with Frank Holz who was responsible for
developing and marketing the first Global Resource Center in Manila.

Annual Survey of Philippines Business and Industries in 2010 revealed that


the
ICT industry shares 19.3% of the total employment population. Moreover,
according to 2013 edition of Measuring the Information Society by the
International Telecommunication Union, in the year 2012 there were 106.8
cell phones per 100 Filipinos. While Time magazines declared Makati City,
Philippines- Rank 1 as the “Selfiest Cities around the world, and Rank 9 is
Cebu City. With these statistics, Philippines is indeed the ICT hub of Asia.

5
Web 1.0 refers to the first generation of the Internet when most websites w
ere read-only or static. Webpages are usually just single files in Hypertext
Markup Language (html or htm) format that are displayed in a web browse
r when the URL is entered. Users are merely audiences or readers who abso
rb information from websites.

Web 2.0 means the second generation of the Internet. It is dynamic and fo
cuses on user participation. There is a give-and-take relationship between a
website and its users, in which the latter has the power to share different ty
pes of information such as texts, images, sounds, and videos. This allows fo
r the creation of interactive application with more real-life uses like online
banking, online shopping, and media-sharing.

Features of Web 2.0 1. Folksonomy: It is a way to classify and to find infor


mation. It enables users to find information in an organized way, like taggi
ng photos, websites, or links. Some social networking sites use tags that st
art with a pound sign (#) which is termed as hashtag. 2. Rich user experie
nce It has a dynamic and interactive content. For instance a user can click
on an image of a flower to get more information about that flower like its

6
growth conditions, nutrient requirements, and more.

The third version of the internet which is an upgrade of Web 2.0. It’s main
characteristics include but are not limited to: 1. Real-time Events and infor
mation are made available to users as they take place. 2. Everywhere Inter
net can be accessed by users in all places. 3. Machine learning Computers
and mobile devices can create data and make decisions based on the user’
s previous actions.

6
For example, a system can be used for calling and texting, browsing the int
ernet or creating a word document using the smartphone.
-Telephone
-Printer ; Scanner ; Fax

7
8
There are six types of social media:
a. Social Networks - enables people to connect with other people with the
same interests or background (e.g. ,Facebook and Twitter).
b. Bookmarking Sites - allow user to store, manage links or create a tag to
various websites and resources that allows you and others to easily sear
ch or share them (e.g. ,StumbleUpon and Pinterest).
c. Social News - sites that allow users to post their own news articles or li
nks to other news sources and comment to the post or vote on the ne
ws articles of the website (e.g. ,Reddit, Digg)
d. Media Sharing - sites that allow users to upload and share media conte
nt like music, images and video (e.g. ,Flicker, Youtube and Instagram)
e. Microblogging - sites that focus on short updates from the user wherei
n subscribers of this user will be able to receive these updates. (e.g. ,Twi
tter and Plurk)
f. Blogs and Forums - websites that allow users to post their content wher
e users are able to comment to the said topic. Some of the free bloggin
g platforms are Blogger, Wordpress, and Tumblr.

9
Mobile Technologies including content, learning platforms, and applications
.

Mobile devices use different operating systems:


a. iOS - used in Apple devices like iPhone or iPad
b. Android - open source operating system developed by Google.
c. Blackberry OS- used in Blackberry devices
d. Symbian – an original smartphone OS used by Nokia devices.
e. WebOS - used for smartphones but now used for smart TVs
f. Windows Mobile - developed by Microsoft for smartphones and pocket
PCs.

10
It enables people to perform tasks that they can’t accomplish or great diffic
ulty of accomplishing it by changing methods of interacting with the techn
ology needed to accomplish such tasks.

11
12
13
This means that everyone with access to this highway has the ability to pla
ce and retrieve information.

As a result, Facebook is constantly improving its security features.

14
15
6. Hackers' ability to position themselves between you and the connection
point is one of the most serious dangers to free WiFi. As a result, instead o
f
speaking directly with the hotspot, you send your data to the hacker. Any
information you provide or gain access to on these networks is gone in a b
link of an eye.

16
17
11. To avoid conflicts, use only one antivirus software.

18
Even if your profile is already set to private, hackers can find a backdoor an
d
steal your information online, thus it is your responsibility to secure it. A ha
cker may steal information in order to harm people through identity theft,
damage or shut down systems, and, in certain cases, keep those systems h
ostage in
exchange for a ransom payment.

19
20
Most of our email accounts come with a ‘Spam’ or ‘Junk’folder.

21
2. A valid technique of generating advertising money that help fund develo
pment is frequently included in many shareware or freeware downloads. So
me websites, on the other hand, are tainted with dangerous adware that is
downloaded to your computer automatically.

3. Trojans frequently disguise themselves as harmless computer programs i


n
order for hackers to gain access to your computer without being detected
by
you.

22
4. They usually attach themselves discreetly to downloads. Antivirus softwar
e is often attached to files for download, shares virus-infected email attach
ments,
or loaded onto computers via CDs, DVDs, and USB sticks.

5. Malicious email attachments or USB sticks are the most common ways fo
r
worms to get onto a computer. When a worm infects your computer, it will
most likely send itself to every email account on your machine. Your email
will
appear innocent to the recipient until they read it and find themselves infec
ted by the same worm.

23
6. Official-looking emails impersonating a well-known source, such as a ba
nk,
are frequently sent. It is the purpose of these emails to acquire people's
passwords and credit card information.

7. Spyware is another type of malware. Known as spyware, it is an all


encompassing internet ailment that is commonly associated with downloadi
ng file pop-ups. Spyware can monitor your keystrokes, read, and destroy yo
ur files, reformat your hard drive, and access your apps once it is installed
on your
computer. Without your knowledge, the individual in charge of the spyware
has access to your personal information.

24
8. The majority of keyloggers will hunt for easily identifiable key entries, su
ch as bank card numbers and passwords. Identity and intellectual property
theft are
frequently tied to keylogging.

9. Pharming is a more sophisticated form of phishing that takes advantage


of
the DNS system. Pharmers frequently construct web pages that look like th
ose of a reputable company, such as an online banking log-in page. Users
will then submit their credentials, assuming they are logging in to their reg
ular service,
and the pharmer will steal their credentials.

25
26
Email, social media, online chat, web forums, website comments, multiplaye
r gaming, and other forms of online communication are all examples of thi
s.

While there is no official list of netiquette rules or guidelines, the general i


dea is to respect others online.

27
28
29
Because you rarely see or hear the people with whom you
communicate online, the Internet provides a sense of anonymity. That isn't
to
say that you can't have bad manners or make provocative statements. Som
e
people believe they can hide behind their keyboard or smartphone when it
comes to posting online, but the truth is that they are the ones who are ac
tually publishing the content. Remember that if you make inappropriate co
mments
online and the veil of anonymity is gone, you will be held accountable for
your actions.
In summary, good netiquette benefits both you and others on
the Internet. Posting a positive comment rather than a negative one just mi
ght make someone's day.

30

You might also like