ETech-Lesson-1-2-Slides-and-Notes
ETech-Lesson-1-2-Slides-and-Notes
2
Information is necessary to make decisions and to predict the future. For
example, scientists can detect the formation of a typhoon using the latest
technology and warn the public to avoid disasters in the affected areas.
3
4
Philippines is considered as the ICT Hub of Asia because of the tremendou
s
growth of ICT related jobs like Business Process Outsourcing, or call centers
. It
started with Accenture in 1992 with Frank Holz who was responsible for
developing and marketing the first Global Resource Center in Manila.
5
Web 1.0 refers to the first generation of the Internet when most websites w
ere read-only or static. Webpages are usually just single files in Hypertext
Markup Language (html or htm) format that are displayed in a web browse
r when the URL is entered. Users are merely audiences or readers who abso
rb information from websites.
Web 2.0 means the second generation of the Internet. It is dynamic and fo
cuses on user participation. There is a give-and-take relationship between a
website and its users, in which the latter has the power to share different ty
pes of information such as texts, images, sounds, and videos. This allows fo
r the creation of interactive application with more real-life uses like online
banking, online shopping, and media-sharing.
6
growth conditions, nutrient requirements, and more.
The third version of the internet which is an upgrade of Web 2.0. It’s main
characteristics include but are not limited to: 1. Real-time Events and infor
mation are made available to users as they take place. 2. Everywhere Inter
net can be accessed by users in all places. 3. Machine learning Computers
and mobile devices can create data and make decisions based on the user’
s previous actions.
6
For example, a system can be used for calling and texting, browsing the int
ernet or creating a word document using the smartphone.
-Telephone
-Printer ; Scanner ; Fax
7
8
There are six types of social media:
a. Social Networks - enables people to connect with other people with the
same interests or background (e.g. ,Facebook and Twitter).
b. Bookmarking Sites - allow user to store, manage links or create a tag to
various websites and resources that allows you and others to easily sear
ch or share them (e.g. ,StumbleUpon and Pinterest).
c. Social News - sites that allow users to post their own news articles or li
nks to other news sources and comment to the post or vote on the ne
ws articles of the website (e.g. ,Reddit, Digg)
d. Media Sharing - sites that allow users to upload and share media conte
nt like music, images and video (e.g. ,Flicker, Youtube and Instagram)
e. Microblogging - sites that focus on short updates from the user wherei
n subscribers of this user will be able to receive these updates. (e.g. ,Twi
tter and Plurk)
f. Blogs and Forums - websites that allow users to post their content wher
e users are able to comment to the said topic. Some of the free bloggin
g platforms are Blogger, Wordpress, and Tumblr.
9
Mobile Technologies including content, learning platforms, and applications
.
10
It enables people to perform tasks that they can’t accomplish or great diffic
ulty of accomplishing it by changing methods of interacting with the techn
ology needed to accomplish such tasks.
11
12
13
This means that everyone with access to this highway has the ability to pla
ce and retrieve information.
14
15
6. Hackers' ability to position themselves between you and the connection
point is one of the most serious dangers to free WiFi. As a result, instead o
f
speaking directly with the hotspot, you send your data to the hacker. Any
information you provide or gain access to on these networks is gone in a b
link of an eye.
16
17
11. To avoid conflicts, use only one antivirus software.
18
Even if your profile is already set to private, hackers can find a backdoor an
d
steal your information online, thus it is your responsibility to secure it. A ha
cker may steal information in order to harm people through identity theft,
damage or shut down systems, and, in certain cases, keep those systems h
ostage in
exchange for a ransom payment.
19
20
Most of our email accounts come with a ‘Spam’ or ‘Junk’folder.
21
2. A valid technique of generating advertising money that help fund develo
pment is frequently included in many shareware or freeware downloads. So
me websites, on the other hand, are tainted with dangerous adware that is
downloaded to your computer automatically.
22
4. They usually attach themselves discreetly to downloads. Antivirus softwar
e is often attached to files for download, shares virus-infected email attach
ments,
or loaded onto computers via CDs, DVDs, and USB sticks.
5. Malicious email attachments or USB sticks are the most common ways fo
r
worms to get onto a computer. When a worm infects your computer, it will
most likely send itself to every email account on your machine. Your email
will
appear innocent to the recipient until they read it and find themselves infec
ted by the same worm.
23
6. Official-looking emails impersonating a well-known source, such as a ba
nk,
are frequently sent. It is the purpose of these emails to acquire people's
passwords and credit card information.
24
8. The majority of keyloggers will hunt for easily identifiable key entries, su
ch as bank card numbers and passwords. Identity and intellectual property
theft are
frequently tied to keylogging.
25
26
Email, social media, online chat, web forums, website comments, multiplaye
r gaming, and other forms of online communication are all examples of thi
s.
27
28
29
Because you rarely see or hear the people with whom you
communicate online, the Internet provides a sense of anonymity. That isn't
to
say that you can't have bad manners or make provocative statements. Som
e
people believe they can hide behind their keyboard or smartphone when it
comes to posting online, but the truth is that they are the ones who are ac
tually publishing the content. Remember that if you make inappropriate co
mments
online and the veil of anonymity is gone, you will be held accountable for
your actions.
In summary, good netiquette benefits both you and others on
the Internet. Posting a positive comment rather than a negative one just mi
ght make someone's day.
30