0% found this document useful (0 votes)
12 views3 pages

LESSON1&2

EMPOWERMENT TECHNOLOGIES
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views3 pages

LESSON1&2

EMPOWERMENT TECHNOLOGIES
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

LESSON 1: INTRODUCTION TO INFORMATION AND COMMUNICATION

TECHNOLOGIES

EMPOWERMENT TECHNOLOGIES the product, contents are dynamic and responsive,


they can do more other than reading.
- provides you basic knowledge and skills needed to
 LONG TAIL – services are offered on demand rather
succeed in environments that require the use of
than one-time purchase, synonymously related to a
computer and the internet
data plan that charges you for the amount of time you
- enables us to do tasks that are previously needing
spent on the internet
professional help
 USER PARTICIPATION- the owner of the website is
IMPORTANCE OF EMPOWERMENT TECHNOLOGIES not the only one who can manage the website, users
can participate by means of placing comments, liking
- easier access of life in different aspects and sharing the content
- helps us conserve time and be more productive  SOFTWARE A S A SERVICE- users will only
- becoming aware of proper etiquettes of using subscribe to software when needed rather than
technologies to avoid violence that could lead to harm purchasing them
DIGITAL NATIVES- generations born after 1980, people  MASS PARTICIPATION- diverse information sharing
who were born during digital age, they are comfortable thru web access to users all over the world
using technologies and surrounded by it their entire lives INFORMATION AND COMMUNICATION TECHNOLOGIES
DIGITAL IMMIGRANTS/ REFUGEE- people age 30 or - deals with the use of different communication
older, they were able to learn technologies as some point technologies such as mobiles phones, telephone,
during their adult life Internet, etc. to locate, save, send, and edit
WWW( WORLD WIDE WEB) information.

- Invented by English Computer Scientist named Tim Philippines is considered as the “ICT Hub of Asia” due to huge
Berners-Lee in 1989 growth of ICT industry around the country including BPO
- Consists of different pages formatted by HTML (Business Process Outsourcing) or call center-related jobs.
( Hypertext Markup Language) and linked to each TRENDS IN ICT
other containing multimedia files and hyperlinks , etc.
- Can be either static or dynamic CONVERGENCE-combining technological advancements to
work into a single service
WEB 1.O WEB 2.O WEB 3.O
SOCIAL MEDIA – online channel for users to create, co-create
read-only web read and write read-write-
discuss, modify and exchange user-generated content
web execute web
Static web Dynamic/ Semantic web  TYPES OF SOCIAL MEDIA
Interactive web
Creator (owner of Community User preference  SOCIAL NETWORKS- for building
the website) preference connections with other people with the same
preference interests or background
 BOOKMARKING SITES – save and share
links to websites with other users
FEATURES OF WEB 2.0  SOCIAL NEWS- for posting news items or
links to news sources
 FOLKSONOMY- digital way of classifying/ organizing
 MEDIA SHARING- sharing of media content
information using freely selected words (using
 MICROBLOGGING- contents are mostly
hashtags #)
short updates from the user
 RICH USER EXPERIENCE – it aims to provide
 BLOGS AND FORUMS- allow users to post
positive experiences to users to keep them loyal to
their content
MOBILE TECHNOLOGIES-the major usage of smartphones and tablets due to its capability to do tasks that were previously done on
computers
KINDS OF OPERATIONG SYSTEMS IN MOBILE TECHNOLOGIES

 IOS
 ANDROID
 SYMBIAN
 BLACKBERRY OS
 WEB OS
 WINDOWS PHONE OS
 WINDOWS MOBILE
ASSISTIVE MEDIA- nonprofit service designed to help people with disabilities like visual and hearing impairment

Lesson 2: RULES OF NETIQUETTE


(ONLINE SAFETY, SECURITY, ETHICS AND ETIQUETTE/ ONLINE SEARCH AND RESEARCH SKILLS)

NETIQUETTE- rules of conduct for correct manners for 6. If you have Wi-Fi at home, make it a private network by
communication on the internet, often referred to as “etiquette adding a password.
for the internet” 7. Avoid visiting and downloading anything from untrusted
websites.
o Adhere to the same behavior online that you follow in
real life. 8. Buy the software, do not use pirated ones.
o Respect other people’s time and bandwidth.
9. Do not reply or click links from suspicious emails.
o Make yourself look good online.
o Respect other people’s privacy. 10. Make Online Purchases from Secure Sites.
o Don’t abuse your power. 11. Do not share your password with anyone.
o Be forgiving of other people’s mistakes.
12. Add friends you know in real life.

INTERNET- global network of computers and electronic


devices, often referred as “information superhighway” anyone INTERNET RISKS
can access, place, and grab information
o CYBERBULLYING- someone is intentionally abusing
or harassing the other person using electronic
TIPS TO STAY SAFE ONLINE communication
o IDENTITY THEFT- stealing credentials of the victim
1. Be mindful of what you share online and what site you share and play their identity to make any form of
it with. transactions
2. Do not just accept terms and conditions; read it. o CYBER STALKING- criminal practice where
electronic communication is used to harass an
3. Know the security features of the social networking site you individual or group
use. By keeping your profile private, search engines will not be
o SEXTING- the act of sending explicit text messages,
able to scan your profile.
images or videos
4. Avoid logging in to public networks/Wi-Fi. Browsing in.
Incognito (or private)
mode will NOT protect you from hackers.
5. Install and update antivirus software on your computer.
INTERNET THREATS PROTECTING REPUTATIONS ONLINE
net-based threats and broad scopes of danger that expose o Think before you click.
users to harm online o Before you post something on the web, acknowledge
the people who can possibly see your post.
MALWARE- malicious software; cyber-attack to harm a
o If some posts meant to distress you or other people’s
computer user
reputation, ask the other posted it to pull it down or
 VIRUS- a program that can copy itself and corrupt a directly report it as inappropriate.
computer without permission, it can also be
transferred to another computer COPYRIGHT- if you create something, you have the right as to
 WORM- malware that can replicate itself without how it should be used by others for it is considered as your
human activations thru a network “intellectual property”, it is a protection given to the owner of
 TROJAN- it disguises itself as non-malicious program the rights in an original work, this is also protected under RA
and after being installed, it allows hackers to steal 8293 (Intellectual Property Code of the Philippines)
information COPYRIGHT INFRIGEMENT-using copyrighted work without
 SPYWARE- spy program, can monitor your activities giving proper credit or without permission of the author
and record it using keylogging.
o KEYLOGGER- used to record the keystroke FAIR USE- using copyrighted works or material for different
done by users to steal sensitive information and purposes but without copyright violation
credentials
 ADWARE- malware sending advertisement and pop-
ups
 RANSOMWARE- threatening the victims to publicize
their personal information to gain money as ransom
SPAM- unnecessary emails that clogs users’ inboxes
PHISHING- attackers masking as a trusted entity to steal user
data including credit card numbers
==============================================
INTERNET RESEARCH- collecting information thru internet
using search engine.
SEARCH ENGINE- programs allowing user to gather data or
search for content on internet (ex: Google, Yahoo Search,
Bing, Ask)

TIPS FOR EFFECTIVE INTERNET RESEARCH BY GEORGE


MATHEWS
1. Know what kind of research you want to do.
2. Make a list of keywords you will use in your search.
3. Enclose keywords in quotation marks.
4. Use the minus sign (-).
5. Try specialized search engines.
6. Skim through search results on web pages.
7. Bookmark
8. Review your bookmarks.

You might also like