0% found this document useful (0 votes)
27 views22 pages

It Era Reviewer Final

The document discusses the history and development of the internet and world wide web. It provides details on hardware, software, protocols and technologies used to connect to the internet and browse the web. Key topics covered include internet infrastructure, connection types, IP addresses, browsers, URLs, HTML, portals and search engines.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views22 pages

It Era Reviewer Final

The document discusses the history and development of the internet and world wide web. It provides details on hardware, software, protocols and technologies used to connect to the internet and browse the web. Key topics covered include internet infrastructure, connection types, IP addresses, browsers, URLs, HTML, portals and search engines.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 22

IT ERA REVIEWER

Lesson 11- The world wide web


The Internet or the International Network consists of hundreds of thousands of smaller
networks linking educational, commercial, nonprofit, and military organizations, as well as
individuals.
Client computer is a computer requesting data or services.
A server, or host computer, is a central computer supplying data or services requested.
The internet started from the Advanced Research Projects Agency’s Wide Area Network called
the ARPANET. It was established by the s U.S. Department of Defense in the 1960 so that the
military’s research unit could collaborate or partner with business and government laboratories.
The advancement of hypertext-based technology known as the World Wide Web, WWW, or just
simply the Web, has provided channels for displaying text, graphics, animations, etc.
Internet2 is a not-for-profit networking consortium founded in 1996 by 34 university research
institutions in the US.
The Philippines, via the Philippine Research, Education and Government Information Network
(PREGINET), is among the international peers reachable via Trans-Eurasia Information Network
(TEIN), one of the internet2's peering relationships.
The number of internet users as of January 2018 is 4012 billion
Three important things to connect with the internet:
1. an access device, such as a personal computer with a modem;
2. a means of connection, such as a telephone line, cable hookup, or wireless capability; and
3. An internet access provider, such as an internet service provider (ISP), a commercial online
service provider, or a wireless internet service provider.
Bandwidth, or channel capacity, expresses how much data—text, voice, video, and so on—can
be sent through a communications channel in a given amount of time.
Baseband transmission is a type of data transmission that allows only one signal at a time.
Broadband transmission is a type of data transmission that allows several signals to be
transmitted at once, it's called.
Broadband—very high speed—connections include various kinds of high-speed wired
connections (such as coaxial and fiber-optic), DSL, cable, satellite, and other wireless
connections.
The Principal Means of Internet Connection are:
(1) telephone (dial-up) modem;
(2) several high-speed phone lines— ISDN, DSL, and T1;
(3) cable modem;
(4) wireless—satellite and other through-the-air links.
Data is transmitted in characters or collections of bits
A bit is the smallest unit of information used by computers.
Transmission speeds are measured in bits, kilobits, megabits, and gigabits per second.
The download is the transmission of data from a remote computer to a local computer, from a
website to a PC.
Upload is the transmission of data from a local computer to a remote computer, from someone's
PC to a website someone is constructing.
A narrowband, or low-bandwidth connection, mainly consists of dial-up connections— the use of
telephone modems to connect computers to the internet.
• POTS—“plain old telephone system” connection with a high-speed adaptation. Among the
choices are ISDN, DSL, and T1.
• ISDN (Integrated Services Digital Network) consists of hardware and software that allow
voice, video, and data to be communicated over traditional copperwire telephone lines.
• DSL (digital subscriber line) uses regular phone lines, a DSL modem, and special technology to
transmit data in megabits per second. • T1 line is essentially a traditional trunk line that carries
24 normal telephone circuits and has a transmission rate of 1.5 to 6 Mbps.
A cable modem connects a personal computer to a cable-TV system that offers an internet
connection.
A communications satellite is a space station that transmits radio waves called microwaves from
Earth-based stations.
Satellite internet connections are always on.
Internet wireless networks use radio waves to transmit data.
WI-FI, Short for Wireless Fidelity, is the name given to any of several standards—socalled
802.11 standards—set by the Institute of Electrical and Electronics Engineers (IEEE) for wireless
transmission.
Many airports, hotels, libraries, convention centers, and fast-food facilities offer so-called
hotspots.
THREE KINDS OF INTERNET ACCESS PROVIDERS
1. INTERNET SERVICE PROVIDERS (ISPs) is a company that connects online users through
their communications lines to the company’s server, which links them to the internet via another
company’s network access points. Examples are EarthLink and United Online.
2. COMMERCIAL ONLINE SERVICES is a member-only company that provides internet
access and other specialized content, such as news, games, and financial data. The two best-
known subscriber-only commercial online services are AOL (America Online) and MSN
(Microsoft Network). WIRELESS
3. INTERNET SERVICE PROVIDERS. A wireless internet service provider (WISP) enables
users with computers containing wireless modems—mostly laptops/notebooks—and web-
enabled mobile smartphones and personal digital assistants to gain access to the internet.
Examples are Cingular, Sprint, T-Mobile, and Verizon.
POINT OF PRESENCE (POP) is a local access point to the internet—a collection of modems
and other equipment in a local area.
NETWORK ACCESS POINT is a routing computer at a point on the internet where several
connections come together.
The four original NAPs in the United States are in San Francisco, Washington, D.C., Chicago,
and New Jersey. These NAPs were established in 1993 when the original network that became
the Internet was privatized.
INTERNET BACKBONE is high-speed, high-capacity transmission line that use the newest
communications technology to transmit data across the internet.
PROTOCOLS is a set of rules that computers must follow to transmit data electronically.
PACKETS are fixed-length blocks of data for transmission.
IP ADDRESSES. An Internet Protocol (IP) address uniquely identifies every computer and
device connected to the Internet.
A dynamic IP address changes each time you connect to the internet. A static IP address remains
constant each time a person logs on to the internet.
In June 1998, Internet Corporation for Assigned Names and Numbers (ICANN) was established
to regulate human-friendly internet domain names—those addresses ending with .com, .org, .net,
and so on, that overlie IP addresses and identify the website type.
The Internet and the World Wide Web are not the same.
The part of the internet called the web is a multimedia-based technology that enables one to
access more than just a text.
In 1994, Berners-Lee founded the World Wide Web Consortium (W3C) at the Massachusetts
Institute of Technology.
A browser, or web browser, is software that enables you to find and access the various parts of
the web.
A website, or simply a site, is a location on a particular computer on the web that has a unique
address.
A web page is a document on the World Wide Web that can include text, pictures, sound, and
video.
The URL (Uniform Resource Locator) is a string of characters that points to a specific piece of
information anywhere on the web. In other words, the URL is the website’s unique address.
A URL consists of
(1) the web protocol,
(2) the domain name or web server name,
(3) the directory (or folder) on that server, and
(4) the file within that directory (perhaps with an extension such as html or htm)
Hypertext markup language (HTML) is the set of special instructions (called “tags” or
“markups”) that are used to specify document structure, formatting, and links to other
multimedia documents on the web.
Extensible hypertext markup language (XHTML) is the successor to and the current version of
HTML.
Hypertext links —hyperlinks, hotlinks, or just links—are connections to other documents or web
pages containing related information;
Status Bar -the main purpose of the status bar is to display the URL of a link when you hover the
mouse over it.
Address Bar: -It is found at the top of your browser window, and its purpose is to show the whole
URL or website address.
Title Bar:- It is found at the absolute top of your browser, the color blue for the major browsers.
Toolbar Icons:- It is found directly under the Title Bar.
Display Window:- It is the space in which one can view the actual website content.
Scroll Bars:- It is usually located to the right of the Display Window; it allows one to “scroll”
(move down or up the web page) so the user can view information that is below or above on
what is currently in the Display Window.
A web portal, or simply a portal, is a type of gateway website that functions as an “anchor site”
and offers a broad array of resources and services, online shopping malls, email support,
community forums, current news and weather, stock quotes, travel information, and links to
other popular subject categories.
Horizontal Portal emphasizes a wide array of interests and topics. Horizontal portals target the
entire Internet community.
Knowledge portal enhances the efficiency of knowledge employees by providing easy access to
information that is helpful to them in one or more explicit roles.
Enterprise portal (Intranet Portals) developed and maintained for access by members of
Marketspace portals exist to endorse the B2B (Business-to-business- it is a transaction or
business conducted between one business and another) and B2C ecommerce (business-to-
consumer that refers to the process of selling products and services directly between a business
and consumers who are the end-users of its products or services). Mthe enterprise network.
Search services are organizations that maintain databases accessible through websites to help
users find information on the internet.
Search Engines are programs that enable the user to ask questions or use keywords to help locate
information on the web.
There are many types of search tools, but the most popular versions can be categorized as (1)
individual search engines,
(2) subject directories,
(3) metasearch engines, and
(4) specialized search engines.
Hits are defined as the sites that a search engine returns after running a keyword search.
An individual search engine compiles its searchable database on the web.
A subject directory is created and maintained by human editors, not electronic spiders, and
allows you to search for information by selecting lists of categories or topics.
A metasearch engine allows you to search several search engines simultaneously.
A specialized search engine helps locate specialized subject matter, such as material about
movies, health, and jobs.
Lesson 12- . Information as a Resource
Information can be simply defined as “facts about something or someone that are provided or
learned.”
Expandable Information can be expanded without compromising its integrity.
Compressible although expanded information can give a more detailed explanation, it may not
always be needed.
Transportable Information, especially digital information, is easily transportable.
▪ Send via email
▪ Share via Facebook
▪ Copy onto a flash drive
▪ Upload on Youtube
Diffuse Gossip or rumors tend to spread easily.
Sharable since information can be easily spread, it is considered sharable as well.
Create: This is probably better named Create/Update because it applies to creating or changing a
data/content element, not just a document or database.
Explicit Knowledge- documented, easy to transfer and access, stored in the form of data.
Tacit Knowledge- Exists in minds, difficult to transfer and access, based on insights and
experience.
Store: Storing is the act of committing the data to some storage repository.
Knowledge is stored and categorized in a centralized repository such as:
1.1 Customized information systems
1.2 Team collaboration platforms
1.3 Online storage platforms
Use: Data is viewed, processed, or used in some sort of activity.
Share: Data is exchanged between users.
Knowledge is shared through:
1.1 People (during meetings, consultations, and conversations
1.2 1.2 Technology (such as web pages, help files, and information systems)
Archive: Data leaves active use and enters long-term storage.
Destroy/Delete: Data is permanently destroyed using physical or digital means (e.g., crypto
shredding).
Value of Information
Accurate- Information is error-free. There is what we call informal and formal information.
Complete- The information should contain all the information facts.
Economical-The information should be economical to produce.
Reliable- the information could be depended on. In many cases, the reliability of
Flexible-this information can be used for different purposes.
Relevant-this information is important to the decision-maker.
Simple-this information should also be simple, not overly complex.
Timely-this information is delivered when it is needed.
Verifiable-this information can be checked for correctness and authenticity.
Accessible-the information should be easily accessible by authorized users to be obtained in the
right format at the right time to meet their needs.
Effect of Information Overload
• Experience adverse mental and social health issues
• Experience behavioral, learning, and attention problems
• Adverse effects on mental health and management problems
• Could be an underlying cause of adolescent suicides, retarded reading skills, or the inability to
complete tasks
• Symptoms of dysfunction, unease, frustration, and reduced tolerance
• Confuse the individual, affect their ability to set priorities, or makes prior information harder to
recall
• Adversely affect quick decision-making. When the information is too much, the individual
needs more time to reach a decision affecting the ability of creative problem.

Lesson 13. Information Control and Privacy


Information control is a mechanism where the control actions are of implicit, indirect nature, and
the information given to the controlled object is an informative picture, which is used by the
object to work out an allegedly autonomous line of behavior.

Intellectual Property (Republic Act No. 8293)- Intellectual property (IP) is a legal concept that
refers to creations of the mind for which exclusive rights are recognized. It is An Act Prescribing
the Intellectual Property Code and Establishing “The Intellectual Property Office, Providing for
Its Powers and Functions, and for Other Purposes. Section 1 of this Act state that this act shall be
known as the "Intellectual Property Code of the Philippines."
According to the World Intellectual Property Organization (WIPO), intellectual property (IP) is
divided into two categories: industrial property and copyright.
The term "intellectual property rights" consists of:
• Copyright and Related Rights
• Trademarks and Service Marks
• Geographic Indications
• Industrial Designs
• Patents
• Layout-Designs (Topographies) of Integrated Circuits
• Protection of Undisclosed Information

The Intellectual Property Office of the Philippines (IP Philippines) is the government agency in
charge of the implementation of the law protecting intellectual property rights in the Philippines
as provided for under RA 8293 or the Intellectual Property Code of the Philippines and the
revised IP Code of the Philippines known as RA 10372.
Copyright is a collection of rights that automatically vest to someone who creates an original
work of authorship – like a literary work, song, movie, or software.
Terms of Protection: Generally, throughout the author's life plus 50 years after his or her death.
Penalty: 1st offensePhp 50,000.00 to Php 150,000.00 and/ or 1-3 years imprisonment; 2nd
offense- Php 150,000.00 to Php 500,000.00 and/ or 3-6 years imprisonment. 3rd offense- Php
500,000.00 to 1.5 M and/or 6-9 years of imprisonment.
A trademark is a word, phrase, symbol, and/or design that identifies and distinguishes the source
of the goods of one party from those of others. While a service mark is a word, phrase, symbol,
and/or design that identifies and distinguishes the source of a service rather than goods.
A geographical indication (GI) is a sign used on products with a specific geographical origin and
possesses qualities or a reputation due to that origin—for example, Mangoes of Cebu, Cashew
nuts of Palawan, etc.
An industrial design may consist of three-dimensional features, such as the shape of an article, or
two-dimensional features, such as patterns, lines, or color. For example, coca-cola bottle design,
iPod/iPhone/iPad, etc.
A patent is a grant of a right to the inventor by the government.
Terms of Protection: 20 years (time-bound). Penalty: not less than Php 100,000.00 to not
more than Php 300,000.00 and/ or not less than six months to not more than three years
imprisonment.
Layout designs (topographies) of integrated circuits are a threedimensional arrangement of
elements forming an integrated circuit intended for manufacturing.
Undisclosed information refers to information that is secret and has commercial value because it
is secret.
Digital Rights Management (DRM)- It is used to describe the processes by which the author or
publisher of work exerts their rights to control what the purchaser of the work is entitled to do.
Encryption- It is converting data or information so that only authorized parties can understand.
Serial keys- Also known as a product or software key, it is a series of alphanumeric characters
acting as a key to denote that the product or software is original.
Scrambling- Data scrambling is done to hide sensitive information from authorized users.
Tag embedding- Similar to how pictures can include watermarks to denote information on the
owner of the picture, tag embedding does the same to information content.
Information Privacy DATA PRIVACY ACT OF 2012 (Republic Act 10173)
This act aims to safeguard every individual's right to privacy while ensuring the free flow of
information for innovation, growth, and national development.
Personal Information -It refers to any information from which an individual's identity is apparent
or can be ascertained by the entity holding the information or when put together with other
information that would directly and certainly identify an individual.
Department of Information and Communications Technology Act of 2015 (Republic Act
No. 10844)
Another law that is closely related to the management of information and communication
technology is RA 10844, or the Department of Information and Communications Technology Act
of 2015.

Lesson 14. IT, Culture, and the Society


Lower Communication Cost -Compared with the previous generation, communication,
especially long distance calls, was so expensive.
Reliable Mode of Communication- In the history of transmitting information, people used others
to transmit information verbally, where misconception/ misunderstanding is possible.
Effective Sharing of Information- With the advancement of ICT, information can be shared by
people worldwide. People can share and exchange opinions, news, and information through
discussion groups, mailing lists, and forums on the Internet. It enables knowledge sharing, which
will contribute to developing a knowledge-based society.
Security- With the advancement of technology, eyeing your personal belongings could also be
possible even without physical presence, i.e., CCTV.
Faster Communication Speed -With the capability of today’s connection (internet, signal, etc.)
and equipment or gadgets for transmitting messages, communication is just one text.
Paperless Environment ICT technology has created the term paperless environment. This term
means information can be stored and retrieved through digital mediums instead of paper all away
biometrics in the form of fingerprint, facial, and voice recognition.
Borderless Communication- The Internet offers fast information retrieval, interactivity,
accessibility, and versatility. It has become a borderless source of services and information.
Create Employment - With the demand for IT, new IT-related works need to be attended to. Thus,
new IT positions and IT professionals are needed to work on them.
Negative Effects of Information Technology
1. Individualistic and introvert
2. Moral decedent and threats to the society
3. Health Problems
4. Unemployment Situation
5. Security
Individualistic and introvert-They have reduced personal interaction and physical activity.
Moral decedent and threats to the society - Some ICT users use ICT tools for fraud, identity theft,
Pornography, Hacking, etc. That could result in a moral decedent and generate threats to society.
Health Problems -A computer may harm users if they use it for long hours.
Unemployment Situation- Some jobs have been lost due to computers being used to do the same
work that people used to do; for example, many factories have fully automated production lines,
and some of their processes no longer need volumes of human workers.
Security- ICT brings not only improvement but also a threat to security. Data or files must
always be kept secure and safe.
Benefits of ICT in Education
• Helps to expand access to Education A powerful tool for extending educational opportunities. It
has the ability to transcend time and space.
• Helps To Prepare Individuals For The Workspace Representing a Competitive edge in an
increasingly globalizing job market.
• Helps to Improve The quality of Education Enhance the quality of education by increasing
learner Motivation and by enhancing teacher training. Benefits of ICT in Health Care
• Computers and ICT technologies make health care for all patients more efficient and accurate.
• Improved health care can bring down the medical costs by reducing the number of days, the
patient has to stay in hospital.
• It assists Medical surgeons during critical operations.
• Clinics and hospitals use computers with standard software packages to manage schedules for
visiting wards.
Benefits of ICT in Governance
• Exchange of information with citizens and businesses by various government departments to
provide rules and regulations.
• Re-structuring of administrative processes, making them more efficient.
• Reducing costs of public works or increasing revenue, or improving tax or stamp duty
collection.
• Speedier and more efficient delivery of citizen services and review of development work being
undertaken.
Influence of IT on Culture -It has been said from the very beginning of this module that IT
changes civilization. It changes the way how a man must live and make his living.
Decision-making - Let's take, for example, Online Reviews. With the proliferation of online
information, finding details on a certain movie or book is easy.
Social Interaction -Nowadays, food bloggers post pictures of their restaurant meals and food
review.
Learning Preference- Youtube is one of the most popular social media sites.

Lesson 15. Cyberbullying and Netiquette


Cyberbullying - is bullying with the use of digital technologies. It can occur on social media,
messaging, gaming, and mobile phones. It is a behavior aimed at scaring, angering, or shaming
those who are targeted.

The Top 10 Questions on Cyberbullying


The Unicef for Every Child answered ten questions concerning Cyberbullying:
1. Am I being bullied online? How could I tell the difference between a joke and bullying?
UNICEF: Others joke with each other, but sometimes it is hard to tell if they are having
fun or mean to hurt someone, primarily online. Often, laugh it off with "just kidding" or
“don’t take it so seriously” words.
The joke has gone too far if someone feels hurt or thinks others are laughing at them
instead of laughing with them. If it continues even after they have asked the person to
stop and still feel upset about it, this could be bullying.
When bullying takes place online, it could result in unwanted attention from a wide range
of people, including strangers. Wherever it may happen, they should not have to stand for
it if they are not happy about it.
If the victim feels bad and does not stop, it is worth getting help. Stopping cyberbullying
is not just about calling out bullies but also recognizing that everyone deserves respect –
online or in real life.
2. What are the effects of cyberbullying? UNICEF: When bullying happens online, it can feel
like someone is attacked everywhere, even inside their home. It could seem like there is no
escape. The effects can last a long time and affect a person in many ways:
• Mentally — feeling upset, embarrassed, stupid, and even angry
• Emotionally — feeling ashamed or lose interest in the things they like
• Physically — tired (loss of sleep) or experiencing symptoms like stomach aches and headaches
The feeling of being laughed at or harassed by others could prevent people from speaking up or
dealing with the problem. In extreme cases, cyberbullying could even lead to suicide.
3. Who should I talk to if someone is bullying me online? Why is reporting important?
UNICEF:
If someone is being bullied, the first step is to seek help from someone they are trusted,
such as parents, a close family member, or another trusted adult.
Contact a counselor, sports coach, or favorite teacher in the school.
And if they are uncomfortable talking to someone, search for a helpline in your country
to speak to a professional counselor.
If the bullying is happening on a social platform, consider blocking the bully and
formally reporting their behavior on the platform itself. Social media companies are
obligated to keep their users safe.
Collecting evidence – text messages and screenshots of social media posts – could help
show what has been happening. For bullying to stop, it needs to be identified, and
reporting it is the key. It can also help to show the bully that their behavior is
unacceptable.
If the victim is in immediate danger, contact the police or emergency services.

4. I’m experiencing cyberbullying but I am afraid to talk to my parents about it. How
can I approach them? UNICEF:
If someone is experiencing cyberbullying, speaking to a trusted adult – someone they
feel safe talking to – is one of the most important first steps.
Talking to parents is not easy for everyone. But some things could help. Choose a
time to talk. Explain how serious the problem is. Remember, they might not be as
familiar with technology, so there must be extra assistance and explanation to help
them to understand what is happening.
They might not have instant answers, but they will likely want to help and find a
solution together. Two heads are always better than one! If it is still unsure what to
do, consider contacting other trusted people. There are often more people who care
and are willing to help.
5. How can I help my friends report a case of cyberbullying, especially if they do not
want to do it? UNICEF:
Anyone can become a victim of cyberbullying. If it is happening to someone, try to
offer support.
It is important to listen to a friend. Let them know they do not have to report
anything formally, but talking to someone who can help is crucial.
Remember, a friend may feel fragile, so be kind to them. Help them think through
what they might say and to whom. Offer to go with them if they decide to report.
Most importantly, remind them that they are never alone.
If a victim still does not want to report the incident, support them in finding a trusted
adult to help them deal with the situation. Remember that in certain situations, the
consequences of cyberbullying can be life-threatening.
Doing nothing can leave the person feeling that everyone is against them or that
nobody cares. Words can make a difference.
6. How do we stop cyberbullying without giving up access to the Internet? UNICEF:
Being online has so many benefits. However, like many things in life, it comes
with risks that one needs to protect against.
If the users experience cyberbullying, they may want to delete certain apps or stay offline to
give themselves time to recover. But getting off the Internet is not a longterm solution. The
victims did nothing wrong, so why should they be disadvantaged? It may even send the bullies a
bad signal — encouraging their unacceptable behavior.
We all want cyberbullying to stop, which is one of the reasons reporting cyberbullying is so
important. But creating the Internet, we want goes beyond calling out bullying. We must be
thoughtful about what we share or say that may hurt others. We need to be kind to one another
online and in real life. It always depends on us.
7. How do users prevent their personal information from being used to manipulate or
humiliate on social media? UNICEF:
Think twice before posting or sharing anything online – it may stay forever and be
used to harm later. Do not give personal details such as an address, telephone number,
or school name.
Learn about the privacy settings of social media apps.
• Adjust the account privacy settings by deciding who can see the profile, send direct
messages, or comment on posts.
• Report hurtful comments, messages, and photos and request that they be removed.
• Besides ‘unfriending,’ users can block people to stop them from seeing or
contacting their profile.
• Choose to have comments by certain people appear only to them without completely
blocking them.
• Delete posts on the profile or hide them from specific people. • Most social media,
people aren't notified when they are blocked, restricted, or reported.
8. Is there a punishment for cyberbullying?
UNICEF:
Most schools take bullying seriously and will take action against it. If other students
are cyberbullying users, report it to the school they are enrolled in or connected to.
Victims of any form of violence, including bullying and cyberbullying, have a right
to justice and to have the offender held accountable.
In countries with specific laws on cyberbullying, online behavior that deliberately
causes severe emotional distress is seen as criminal activity. In some of these
countries, victims of cyberbullying can seek protection, prohibit communication
from a specified person and restrict the use of electronic devices used by that
person for cyberbullying, temporarily or permanently.
However, it is essential to remember that punishment is not always the most
effective way to change the behavior of bullies. It is often better to focus on
repairing the harm and mending the relationship.
9. Internet companies don’t seem to care about online bullying and harassment. Are they
being held responsible?
UNICEF:
Internet companies are increasingly paying attention to the issue of online bullying.
Many are introducing ways to address it and better protect their users with new
tools, guidance, and ways to report online abuse.
Technology companies are responsible for protecting their users, especially children and young
people.
10. Are there any online anti-bullying tools for children or young people? UNICEF:
Each social platform offers different tools that allow the user to restrict who can comment on or
view their posts or who can connect automatically as a friend and report cases of bullying. Many
involve simple steps to block, mute, or report cyberbullying.
Social media companies also provide educational tools and guidance for children, parents, and
teachers to learn about risks and ways to stay safe online.
Also, the first line of defense against cyberbullying could be the user itself. Think about where
cyberbullying happens in the community and how the user could help – by using their voices,
calling out bullies, reaching out to trusted adults, or creating awareness of the issue. Even a
simple act of kindness can go a long way.
Anti-Bullying Act of the Philippines (R.A. no. 10627)- It is an act requiring all elementary and
secondary schools to adopt policies to prevent and address the acts of bullying in their
institutions.
Netiquette
Netiquette is short for "Internet etiquette."
Etiquette is a code of polite behavior in society.
Netiquette is a code of good conduct on the Internet that includes email, social media, online
chat, web forums, website comments, multiplayer gaming, and other types of online
communication.
Lesson 16. IT Trends, Issues, and Challenges
Internet of Things -is a set-up of devices and objects connected in a given network. Their
connection, often wirelessly, is possible using both hardware and software.
Capabilities of IoT:
1. Integration across technology and business
2. Data analysis and synchronization
3. Security and service
4. Applications of IoT
Augmented reality (AR) adds digital elements to a live view, often by using the camera on a
smartphone.
Virtual reality (VR)-It is fully immersive that tricks the senses into thinking in a different
environment or world apart from the real world.
In a Mixed Reality (MR) experience, which combines elements of both AR and VR, real-world
and digital objects interact.
Extended Reality (XR) is an umbrella term covering all of the various technologies that
enhance our senses, whether providing additional information about the actual world or creating
unreal, simulated worlds for us to experience.
MachineLearning- It is a branch of artificial intelligence (AI) that focuses on building
applications that learn from data and improve their accuracy over time without being
programmed to do so.
Automation -is the creation and application of technology to monitor and control the production
and delivery of products and services.
Two Common Methods in Implementing IT Automation:
1. Robotic Process Automation (RPA) The Institute of Robotic Process Automation and
Artificial Intelligence (IRPAAI) defined robotic process automation (RPA) as the application
of technology that allows employees in a company to configure computer software or a
"robot" to capture and interpret existing applications for processing a transaction,
manipulating data, triggering responses and communicating with another digital system." 2.
Sensors These are hardware devices that can measure an event, object, or any physical
quality that is happening. Examples include a person's heart rate, temperature, brightness,
etc.
Classification of Sensors
1. Temperature Sensor
2. Infrared Sensor
3. Ultrasonic Sensor
4. Touch Sensor
5. Proximity Sensor
6. Pressure Sensor
7. Level Sensor
8. Smoke/ Gas Sensor, etc.
Big Data is a collection of data that is huge in volume yet growing exponentially with time.
Characteristics of Big Data
The following characteristics can describe big data:
1. Volume 2. Variety 3. Velocity 4. Variability
Volume – The name Big Data itself is related to its enormous size.
Variety – The next aspect of Big Data is its variety.
Velocity – The term 'velocity' refers to the speed of data generation.
Variability – This refers to the inconsistency which can be shown by the data at times, thus
hampering the process of handling and managing the data effectively.
TYPES OF BIG DATA
The following are the types of Big Data:
Structured- Any data that can be stored, accessed, and processed in a fixed format is termed
'structured' data.
Unstructured -Any data with an unknown form or structure is classified as unstructured data.
Semi-structured - data can contain both forms of data.
IT Issues
Truth issues—manipulation of sound and images in digital data
• Security issues—accidents, natural hazards, terrorism hazards, and crime
• Quality-of-life issues—environment, mental health, child protection, the workplace
• Economic and political issues—employment and the haves/have-nots
TRUTH ISSUES
The ability to manipulate digitized output—images and sounds—has brought a wonderful new
tool to art.
Manipulation of Sound
Pop music vocals have been sounding “note- and pitch-perfect,"
Manipulation of Photos
There are many apps/applications nowadays that can manipulate a photo. Perhaps, for some
people, outputs from these editing apps could make them say these are cool because their face
could be enhanced, such as acne would be erased.
Manipulation of Video & Television
Films and videotapes are widely thought to represent real scenes accurately.
Security issues go right to the heart of the workability of computer and communications systems.
The following are the threats:
• Errors and accidents • Natural hazards • Computer crimes • Computer criminals

PROCEDURAL ERRORS. Some spectacular computer failures have occurred because


someone didn’t follow procedures.
SOFTWARE ERRORS. Examples of software errors are “software glitches” or “software
bugs.” A software bug is a program error that causes it not to work properly.
“DIRTY DATA” PROBLEMS. Dirty data is incomplete, outdated, or otherwise inaccurate
data.
ELECTROMECHANICAL PROBLEMS: are “normal accidents” inevitable?

Natural Hazards
Whatever is harmful to property (and people) is harmful to computers and communications
systems.

Computer Crimes Computer crime can be of two types.


(1) It can be an illegal act perpetrated against computers or telecommunications, or
(2) it can be using computers or telecommunications to accomplish an illegal act.
The following are crimes of both types:
• THEFT OF HARDWARE.- Hardware theft can range from shoplifting an accessory in a
computer store to removing a laptop or cellular phone from someone’s car.
THEFT OF SOFTWARE -Pirated software is obtained illegally, as when you make an illegal
copy of a commercial videogame.
THEFT OF ONLINE MUSIC & MOVIES- Many students may feel that illegally downloading
music and movies is a victimless crime.
THEFT OF TIME & SERVICES - The theft of computer time is more common than you might
think.
THEFT OF INFORMATION- As we all know, information nowadays is as precious as gems
already. Your information could be sold out there.
INTERNET-RELATED FRAUD- Internet or online service fraud is a runaway problem.
Phishing- (sending emails that appear to come from a trusted source, which direct you to a
website where you’re asked to reveal personal information),
Wi-Fi phishing, known as the Evil Twin attack, in which a hacker or cracker sets up a Wi-Fi hot
spot or access point that makes your computer think it’s accessing a safe public network or your
home network and then monitors your communications and steals data you enter into a website,
Pharming (in which malicious software is implanted in your computer that redirects you to an
impostor web page), and
Trojan horses (a program such as a screen saver that carries viruses that perpetuate mischief
without your knowledge).
Zombie, or drone, a computer has taken over covertly and programmed to respond to instructions
sent remotely, often by instant-messaging channels.
The botnet, short for “robot network,” is a network of computers compromised by means of a
Trojan horse that plants instructions within each PC to wait for commands from the person
controlling that network.
Attacks on power-control systems: One possibility that concerns security specialists are
cyberattacks on the nation's water, power, transportation, and communications systems, causing
them to crash and disrupting services to thousands, even millions, of people.
Attacks on the internet—could be the entire net crash. There is the possibility of an attack on the
internet that could crash the whole worldwide network.
ENFORCING LAWS. Campus administrators are no longer being as easy on offenders and
turning them over to the police.
CERT: THE COMPUTER EMERGENCY RESPONSE TEAM
CERT stands ready to lend assistance whenever it gets a report of an electronic snooper,
whether on the internet or a corporate email system.
Encryption is the process of altering readable data into unreadable forms to prevent unauthorized
access, and it is what has given people the confidence to do online shopping and banking.
MANUFACTURING & USAGE BY-PRODUCTS. Almost everybody wants to have
technologies in their houses and/ or companies, but little do they know they also harm human
health.
DISPOSAL BY-PRODUCTS- Technologies are quickly going obsolete. It means there is always
a new version of the new ones.
ENVIRONMENTAL BLIGHT Call it “techno-blight.”
ISOLATION. Because of this, socialization, a natural trait of humans, would die.
Pornography- websites for pornography are one just-one-click-away. With smartphones, free
public wifi, and high-specification gadgets, “xxx” movies became easy to access for children.
Sexual Predators- are individuals who sexually abuse children that begin or occur on the Internet.
Online Bullies Cyberbullying -is bullying with the use of digital technologies.

IT Challenges
Workload -Because of the increasing demand in production that is also caused by the anticipation
that with the use of technology, the work may be exceeded the usual number of outputs, the IT
professionals/ workers become exhausted.
Cybersecurity -Technologies brought too many opportunities and instant access to information. It
could be positive on the other side however a negative on the other.
Skills gaps/ Digital transformation/ Hiring/ Career Growth Practicing -IT skills is not that easy; it
involves time, effort, a cracking mind, and money.
Cloud computing/ Analytics and data management- The opportunities for cloud computing are
high. It is the ultimate enabler, opening new revenue channels by leveraging technologies like
artificial intelligence (AI) and the Internet of Things (IoT).
Budget -A lack of budget and resources is another major concern for both IT staff and decision-
makers.
Automation - Since workload is the biggest challenge for IT professionals, finding ways to
automate more mundane and time-consuming tasks such as email send and social media posting
is crucial.

IT CHALLENGES IN SOME SPECIFIC ASPECTS OF THE COMMUNITY


Worm. It is a stand-alone malware that replicates itself to spread to other computers.
Trojan. It refers to a malicious program that initially appears to be useful, routine, or interesting
to persuade a victim to install it.
Spyware. It is software that aims to gather information about the entity (organization or person)
without the entity’s knowledge.
Ransomware. It is a type of malware that can block victim data access.
Banking -Most of our banks nowadays are luring users to avail of their online banking services.
Education
Adaptability struggle - Not all changes are always better, and not all better changes are easily
adapted.
Technical issues- Some students don't have the high bandwidth, computer, and strong internet
connection that online courses require.
Computer literacy- The assumption that youngsters of today’s generation are better at knowing
how to operate the computer is given.
Time Management- Online commitments do not necessarily rely on time since it is available 24
hours. It is the users that need to find time for them to learn.
Self-motivation- Acquiring learning online is a challenging task, especially nowadays, as not all
are prepared for e-learning (financially, emotionally, technically, etc.).
The most important technologies in 2021
1. AI and machine learning,
2. 5G
3. IoT
Industries that most believe will be impacted by technology in 2021
1. Manufacturing (19%),
2. healthcare (18%),
3. financial services (15%) and
4. education (13%)

You might also like