CONCEPT-NOT
CONCEPT-NOT
1. CONVERGENCE
● It is an evolution of technological developments that merge into a new system bringing together different types of applications and
media.
2. SOCIAL MEDIA
● A website, application or online channel that enable web users to create. Co-create discuss, modify and exchange user
generated content.
FACEBOOK - A website which allows users, who sign-up for free profiles, to connect with friends, work colleagues or
people they don't know, online
TWITTER - To connect its users and allow them to share their thoughts with their followers and others through the use of
hashtags.
INSTAGRAM – A free photo and video sharing app available on iPhone and Android. People can upload photos or videos
to our service and share them with their followers or with a select group of friends.
SNAPCHAT- Allows users to send and receive "self-destructing" photos and videos. Photos and videos taken with the app
are called snaps. Snapchat uses the device's camera to capture snaps and send them out to other Snapchat users.
MOBILE MEDIA
● A range of handheld devices, from mobile phones, tablets, and e-readers to game consoles, primarily used as personal,
interactive, Internet-enabled and user-controlled portable platforms that allow interconnected users to exchange personal
and nonpersonal information (Wei, 2013).
ASSISTIVE MEDIA
● It is a nonprofit organization founded in 1996 in Michigan, USA. It was founded by David H. Harvey.
● The organization was the first internet-based reading service for persons with visual and reading impairments.
● The produce and publish voice-recorded written materials on cassettes, cds, and in the internet.
CONCEPT NOTE 3
CONTENT: Online Safety and Online Threats
1. Online safety or Internet Safety
- refers to the practice and precaution that should be observe when using the internet to ensure that the users as well as their
computer and personal information are safe from crimes associated with using the internet.
- There are worries concerning safety on the internet such as malicious user, websites and software and numerous types of
offensive content
- Numerous delinquencies can be committed on the internet like stalking, identifying, theft, privacy violation even harassment and
more.
2. Online Threats
- Everyone should be wary enough when using the internet since there are various online threats that you might encounter along the
wants
TYPE OF ONLINE THREATS
1. Phishing - is a type of scam where the scammer disguise as a reliable source in trying to attain the private information like
password and credits card information through internet.
2. Internet Scam – is a type of scam that mislead the user in the many ways attempting to take lead of them. the purpose of
this scam is to cheat the target of their personal property directly rather than private information through fabricated
promises confidence tricks and many more
3. Malware – is a generic term for spyware and adware. It is malicious software disguised as real software often secretly
installed intended to transfer and gather private information like password without the user permission.
4. Key loggers- these are software designed to record the user’s key strokes key logging allow the criminal to look for
significant information that can be used for identifying or intellectual property theft
5. Viruses and Worm- is a program designed to replicate by attaching itself into other computer program, data files, or boot
sector of the hard drive while, Worm can be injected into the network by any type of means, like a USB stick or an email
attachment.
6. Cyber stalking. - is a practice of the Internet or other electronic resource to follow or bother an individual or association. It
may consist making fabricated allegation or detail report, monitoring, bullying, identifying theft, damage to the files or
paraphernalia collecting facts that may be used to bully and solicitation of minor for sex
7. Cyberbullying- is frequently an extension of harassment outside the internet, and may yield in various dissimilar behavior.
Never give any personal information out about yourself over the internet.
1. Do not give any banking or sensitive information unless you are sure that it is a reputable business having a secure
service.
2. Never open messages or attachments from someone you do not know.
3. Be careful on what you say or post online to protect your reputation.
4. Protect your computer or other personal electronic gadgets with strong password or PIN to lock or use security app. Use
different password for each account.
5. Do not leave your computer or other personal electronic gadgets unattended while log ed in.
6. Regularly review your privacy settings in your online accounts to make sure you are not sharing important personal
information.
7. When using a public computer terminal, be sure to delete your browsing data before leaving.
8. Keep your software updated to avoid security holes.
9. Do not download or install software or anything on your computer or cell phone that is unknown to you.
Netiquette comes from the word network and etiquette, the etiquette of cyberspace. It is a set of rules and norms for acceptable
conduct or behavior online.
Online Etiquette focuses on the acceptable use of online resources in an online social environment.
CONCEPT NOTE 4
CONTENT: Searching the Web and Search Skills and Research Skill
SEARCHING THE WEB - There are billions of information on the web and it is a challenge for us to truly
find which information is reliable and relevant. Here are some tips you may use to be able to look for
relevant and reliable sources:
Search Engines – are websites used for retrieval of data, files, or documents from data bases. Some
search engines we use today are
Anatomy of URL – a URL is one type of Uniform Resource Identifier (URI). It is a generic term for all types
of names and addresses that refer to objects on the world wide web. Knowing the URL endings will give
you clues to who is sponsoring the website and help evaluate the sources.
POPULAR DOMAINS
TOP – LEVEL DOMAINS COUNTRY CODE TOP LEVEL DOMAINS
.edu – educational institution .ph – Philippines
.org – non-profit organization .eu – European Union
.gov – government site .uk – United Kingdom
.com – commercial site .au - Australia
.net - network
When searching online, narrow your topic. Identify the key concepts or important ideas.
Put the word AND between each keyword to create a search string.
Identify synonyms of the keywords.
Review the first pages returned.
Use the plus (+) sign for a more specific search.
Use the minus (-) sign for a more specific search.
Use wildcards for a broader search.
Use quotation marks to find phrases or names.
Use several search engines.
CONCEPT NOTE 5
CONTENT: Evaluating Websites
Evaluating websites is also as critical as effective searching. To help you evaluate the website’s
credibility, here are the questions that you need to answer: