0% found this document useful (0 votes)
82 views4 pages

Key Points on Empowerment Technology

The document outlines key concepts in Empowerment Technology, covering topics such as information and communications technology, social media, online safety, and internet laws. It details various types of digital content, online interactions, and the importance of netiquette, while also addressing potential dangers in the cyber world. Additionally, it discusses the advantages and disadvantages of online research, as well as legal frameworks governing online activities and privacy.

Uploaded by

Okeeh Kaayu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
82 views4 pages

Key Points on Empowerment Technology

The document outlines key concepts in Empowerment Technology, covering topics such as information and communications technology, social media, online safety, and internet laws. It details various types of digital content, online interactions, and the importance of netiquette, while also addressing potential dangers in the cyber world. Additionally, it discusses the advantages and disadvantages of online research, as well as legal frameworks governing online activities and privacy.

Uploaded by

Okeeh Kaayu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

EMPOWERMENT TECHNOLOGY –Key Points

Prepared by: Raiel Arayan Borja

UNIT 1

1. Information and communications technology refers to technologies that are used to support the processing,
storing, securing, and transmitting of information.
2. People - individuals responsible for the development, improvement, and maintenance of an ICT system.
3. Procedures - actions performed in a certain order and conditions to make sure an ICT system runs smooth
4. Hardware - technical term used to describe physical or tangible parts of a computer system
5. Software - generic term for computer programs and applications installed in your hardware
6. Data - raw facts or figures that can be processed, stored, and transmitted by an ICT system
7. Information - result of processed, organized, and structured data
8. Social media can be described as websites or applications that give people the capability to share and receive
information and media contents with one another.
9. Social Networking Sites - provide users with a real-time conversation via text messages, audio, or video chat
10. Media-Sharing Sites - primary purpose is to share multimedia contents like photographs, audio files, or video.
11. Discussion Sites - designed for individuals who are avid fans of forums and debates
12. Bookmarking and Content Curation Sites - platforms for people who are searching for information or ideas
that will help them on a project they are working on.
13. Blogging and Publishing Network Sites - provide users with the tools that will help them to publish their content
in a creative and engaging manner
14. Consumer Review Networks - for people who want to provide and share information about different products.
15. Mobile Media - refers to communication devices that are characterized by portability or their ability to be moved
or carried easily.
16. Assistive Media - electronic devices or programs that seek to reach out to PWDs by providing the support that
will increase or improve their functional capabilities through the use of technology.
17. Technological convergence refers to a state where two or more technology entities and functions are combined
into one device or system.
18. Computing technology refers to the improvements made on electronic devices or gadgets by combining the
functions of two more devices into one gadget.
19. Content technology - combining different media formats such as text, pictures, sounds, and videos into one
multimedia content.
20. Communication Technology refers to the fast and effective transfer of information through the collaboration of
different communication technologies
21. A web page refers to the individual links or pages of a website that act like the pages of a book.
22. Website is composed of web pages hyperlinked together.
23. Static web pages are characterized by their fixed content, which means that a web page shows the same content
every time it is accessed.
24. Dynamic web pages are known for being changeable, which means that a web page’s content can change each
time it is accessed.
25. Web 1.0 was the “read-only phase” of web evolution that is characterized by static web pages that only display
text and graphics on the screen, leaving the users with limited to no interaction.
26. Web 2.0 refers to the “writable phase” of web evolution. In this generation of websites, users can interact with
the web pages by filling out forms, posting comments, or sharing multimedia content on web pages."
27. Web 3.0 is the "executable phase" of web evolution that employs technologies such as semantic web, artificial
intelligence, machine learning, and mobile media.
28. The uses of the Internet are: Internet as a Communication Tool, Internet as a Tool for Performing
Business Transactions, Internet as a Tool for Researching, and Internet as an Entertainment Tool.
29. An online system is a collaboration of hardware, software, and telecommunication technologies that facilitates the
transfer and processing of data to and from internet-enabled devices.
30. Terminal devices are electronic devices such as desktop computers, laptop computers, tablets, or smartphones
that are used to send requests or instructions over the Internet.
31. A network is a collection of computers, internet devices, and communication media that are used to carry data
from one device to another.
32. A server refers to the software system that serves as the storage house of data coming in and out of the system.
33. The processing system, also referred to as the “information system,” is a group of hardware and software that is
designed to collect, process, store, and distribute information.
34. Online platforms refer to websites and applications that offer services through the Internet.
35. A business is an individual or organization whose role is the seller of goods or provider of services offered on the
Internet.
36. The customer is the one who makes purchases or avails the goods and services produced by business
organizations.
37. Social media platforms are internet services that promote social interaction and information sharing among
members of virtual communities.
38. Web search engines are internet-based systems that are used to locate information on the World Wide Web.
39. Online payment system is a web-based application that allows customers to send payment for their purchases
using a facility that organizes the transfer of monetary funds from the customer’s bank account to the company’s
account.
40. Online advertising platform is an internet service that allows business organizations to post their advertisements
to websites and online applications.
41. Creative content outlets are web services that offer assistance to individuals and organizations in the
development of innovative and engaging multimedia content for their websites.

UNIT 2

1. The cyber world, also known as cyberspace, is composed of complex interconnected networks that provides a
virtual environment for different users to interact with each other.
2. Digital footprints are the trail like the simple act of going online like chatting, sharing photos, liking a page of
your favorite artists, or even simply browsing the web.
3. Cookies are used by social networking sites and various websites to keep track of your activities.
4. Virtual Self is a digital representation of humans to interact in virtual world.
5. Source of Information - The cyber world contains a lot of information whether it may be factual or not.
6. Social Interaction - provides us with an environment such as chatting, sharing ideas on an online community,
teaming up with players on an online game, or finding people with similar interests.
7. Unsuitable Contents
a. Pornography - that contains images or videos of naked people
b. graphic violence often shown on online games and videos
c. verbal obscenity such as curses and rude words.
8. Crime-related Dangers
a. Hackers / Hacking - will try to access private information, accounts, websites, or servers in order to steal,
manipulate, destroy, sell or use the information gathered for their own benefit.
b. Identity Thieves / Identity Theft - These criminals steal important and personal information from their
target in order to fake an identity.
c. Internet Predators - are individuals who lure children or teenagers into engaging to sexual acts or
relationship online.
d. Cyberbullying / Cyberbullies - an online act of humiliation and/or threats that is done with and by
children and teenagers. (hate speech, racism, and curse words)
9. Privacy-related Dangers
a. circulating a person’s private photos on social media
b. accessing someone’s private conversation
c. unauthorized tracking of an individual’s location or activities.
10. Malicious Software-related Dangers (Malware) - is created to invade and destroy the computer system.
a. Virus - a software that inserts its code into files and programs infecting other softwares inside the computer
system.
b. Worms - are software that can rapidly spread from one computer to another by replicating itself through
the computer network even without human interaction.
c. Trojan - also known as trojan horse, is disguised as a legitimate and helpful software but once it has been
installed, it will gain access to private and sensitive information stored in your computer and slows it down.
d. Spyware - secretly invades your computer and targets sensitive information. The criminal can gain remote
access to the system and control it from a different location.
e. Adware - is used to gather data from your computer while providing you with advertisements. Although
this kind of malware is not always dangerous, it can redirect you to untrusted websites that might contain
viruses or worms.
f. Ransomware - is often part of a phishing scam. When you click an untrusted link, it will download a file
and encrypt the sensitive information, denying access to your device. The criminals behind the malware
will then ask for money before they unlock your files or system.
g. Fileless Malware - It does not leave any trace on your computer making it hard to detect and uses the
current vulnerabilities of your computer system.
11. Online Safety and Security
a. Tips to Stay Safe Online
i. Think before you click.
ii. Do not share personal information.
iii. Beware of phishing and scam.
iv. Keep your device secure.
v. Never share passwords.
vi. Never agree to meet anyone you just met online.
vii. Tell your guardian if something goes wrong online.
viii. Cover your webcam when not in used.
ix. Use a strong password.
x. Make sure to logout your account in public devices.
12. Netiquette is short for "internet etiquette", is a set of proper behavior in the virtual world.
13. Core Rules of Netiquette by Virginia Shea
a. Rule 1: Remember the human
b. Rule 2: Adhere to the same standards of behavior online that you follow in real life.
c. Rule 3: Know where you are in cyberspace.
d. Rule 4: Respect other people’s time and bandwidth.
e. Rule 5: Make yourself look good online.
f. Rule 6: Share expert knowledge.
g. Rule 7: Help keep flame wars under control.
h. Rule 8: Respect other people’s privacy.
i. Rule 9: Don’t abuse your power.
j. Rule 10: Be forgiving of other people’s mistakes.
14. Internet Law (cyberlaw) - refers to the set of legal principles applied in using the Internet and computer-related
actions and interactions of people.
15. Laws are the most common way of regulating the cyber world.
16. Architecture deals with the information transmission on the internet. It is responsible for limiting or allowing access
to data or network.
17. Norms are all about the standard behavior of people when interacting online.
18. Market regulation drives the cyber world to innovate and improve to engage users, websites and businesses
should create good marketing strategies.
19. Policies for Online Marketing
a. Business Opportunity Rule states that sellers and service providers should present enough information
about their products and services to prospective customers and clients.
b. Telephone Consumer Protection Act (TCPA) aims to control the increasing number of telemarketer
(telephone marketer) calls to protect customers by restricting automatic dialing and pre-recorded phone
calls.
c. CAN-SPAM Act states that businesses cannot send bulk messages to customers without their consent and
avoid spam messages.
d. Native Advertising Guidelines gives a set of rules for placing native ads on different websites, whether
on social media, publishing, or e-commerce websites.
e. RA 7394 – Consumer Act of the Philippines
f. RA 8792 – Electronic Commerce Act of 200
20. Laws for Intellectual Property
a. Digital Millennium Copyright Act (DMCA) aims to regulate the access, use, and copyright of digital
media. It imposes penalties.
b. Fair Use deals with the copying and using of copyrighted materials for a limited purpose even without the
direct permission of the creator given that the user still acknowledges the copyright.
c. Anti-Cybersquatting Consumer Protection Act (ACPA) is an act to protect the right of a trademark
holder from online abuse.
d. Cybersquatting - copying the domain name of popular websites to gain profit.
e. RA 8293 – Intellectual Property Code of the Philippines
f. Consumer Protection Act
21. Laws for Online Privacy
a. Gramm-Leach-Bliley Act requires institutions and businesses that provide financial products to
explain their data protection policies to their customers.
b. Health Insurance Portability and Accountability Act (HIPAA) ensures that the data collected from
the patients will remain confidential and undisclosed. Patient’s consent is needed to disclose specific
information.
c. Children’s Online Privacy Protection Act (COPPA) lets parents or guardians control the information
that different websites collect from their children.
d. Computer Fraud and Abuse Act (CFAA) regulates the access of people to different networks and
computers without proper authorization.
22. Online research is a method that involves the collection of information from the internet.
a. Advantages
i. Easy access to large information
ii. Acquire diverse information
iii. Save more time
iv. Up-to-date and relevant information
v. Reduce the cost of conducting research
b. Disadvantages
i. Inconsistent information
ii. Unreliable information
iii. Charged with payment
iv. Difficult to locate information
v. Risk online security and privacy
23. 5 Simple Search Process
a. Clarify c. Delve e. Cite
b. Search d. Evaluate

You might also like