0% found this document useful (0 votes)
2 views7 pages

Etech Reviewer

The document provides an overview of Information and Communication Technology (ICT), its growth in the Philippines, and its various applications including Web 1.0, Web 2.0, and Web 3.0. It discusses trends in ICT, mobile media, assistive media, online platforms, and the dangers associated with the internet such as phishing and malware. Additionally, it highlights the importance of social media, communication services, and payment systems in the digital landscape.

Uploaded by

johncarloacuna01
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views7 pages

Etech Reviewer

The document provides an overview of Information and Communication Technology (ICT), its growth in the Philippines, and its various applications including Web 1.0, Web 2.0, and Web 3.0. It discusses trends in ICT, mobile media, assistive media, online platforms, and the dangers associated with the internet such as phishing and malware. Additionally, it highlights the importance of social media, communication services, and payment systems in the digital landscape.

Uploaded by

johncarloacuna01
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

EMPOWERMENT TECHNOLOGY REVIEWER

ICT (INFORMATION & COMMUNICATION Union, there are 106.8 cellphones per
TECHNOLOGY) 100 Filipinos in the year 2012.
- deals with the use of different - E-commerce transaction generated
communication technologies such as the highest sales in the large
mobile phones, telephone, Internet, etc. establishment category in the formal
to locate, save, send, and edit sector last 2021, which amounted to
information. Php156.15 billion.
- it is an extended term of Information - In TIME’s Definitive ranking of the
Technology (IT). Selfiest Cities around the World, Makati
- it stresses the role of unified City was declared as the Selfie Capital
communications and the integration of the World, while Cebu City ranked 9.
of telecommunications, computers, as
well as necessary enterprise software, TECHNOLOGY
middleware, storage, and audio-visual - the application of scientific
systems, which enable users to access, knowledge for practical purposes,
store, transmit, and manipulate especially in industry. A machinery and
information. equipment developed from the
application of scientific knowledge.
ICT IN THE PHILIPPINES
- Philippines is dubbed as the “ICT Hub WEB 1.0
of Asia”. - it is a term coined to differentiate the
- Huge growth of ICT related jobs first stage of the World Wide Web
around the country, one of which is call (WWW) in comparison with the present
center or BPO (Business Process stage of the internet technology.
Outsourcing) centers. - at the beginning, there were few web
- In a data gathered by the Annual content creators.
Survey of Philippines Business and - webpages were static and were
Industries in 2010, the ICT industry called read only web.
shares 19.3% of the total employment - the only available feedback
population. mechanism was through private
- According to 2013 edition of emails.
Measuring the Information Society by
the International Telecommunication
EMPOWERMENT TECHNOLOGY REVIEWER

WEB 2.0 - it is referred to as the semantic web


- Folksonomy: allows users to or data driven web content and
categorize and classify/arrange response.
information using freely chosen - the context of the search of the user
keywords. is processed by a programming
- Rich User Experience: content is language to help the user by
dynamic and is responsive to user’s presenting options of what the person
input. is interested in.
- User Participation: the owner of the
website is not the only one who is able
to put content.
- Long Tail: services that are offered on
demand rather than on a one-time
purchase.
- Software as a Service: users will
subscribe to a software only when
needed rather than purchasing them.
- Mass Participation: diverse
information sharing through universal
web access.

TRENDS IN ICT
- Technology Convergence: It is an
evolution of technological

WEB 3.0 developments that merge into a new

- it is described by Tim Berners-Lee system bringing together different

(Father of the WWW) as the types of applications and media.

read-write-execute web.
EMPOWERMENT TECHNOLOGY REVIEWER

MOBILE MEDIA - it makes it easier for users to


- A range of handheld devices, from interact, to collect, and use the data
mobile phones, tablets, and e-readers from the user’s interactions for their
to game consoles, primarily used as own particular needs.
personal, interactive, Internet-enabled
and user-controlled portable PLATFORMS:
platforms that allow interconnected 1. SOCIAL MEDIA
users to exchange personal and - it is a collection of internet-based
nonpersonal information. communication tools and computer
assisted channels dedicated to allow
ASSISTIVE MEDIA users to interact, communicate, and
- it is a nonprofit organization share information in a virtual
founded in 1996 in Michigan, USA. It was community and network.
founded by David H. Harvey.
TYPES OF SOCIAL MEDIA:
- the organization was the first SOCIAL NETWORKS
internet-based reading service for - these are sites that allows you to
persons with visual and reading connect with other people with the
impairments. same interests or background. Once
- a database of audio recordings is the user creates his/her account,
used to read to the user. he/she can set up a profile, add
- assistive technology can include people, share content, etc.
mobility devices such as walkers and - one example is Facebook
wheelchairs, as well as hardware,
software, and peripherals that assist BOOKMARKING SITES
people with disabilities in accessing - these are sites that allow you to store
computers or other information and manage links to various website
technologies. and resources. Most of these sites
allow you to create a tag allows you
ONLINE PLATFORMS IN ICT and others to easily share them.
- if you can program it, then it’s a - one example is Pinterest
platform. If you can’t, then it’s not.” by
Marc Andreessen SOCIAL NEWS
EMPOWERMENT TECHNOLOGY REVIEWER

- these are sites that allow users to Top 10 Search Engines (2024)
post their own news items or links to 1. Google
other news sources. The users can 2. Bing (Microsoft)
also comment on the post and 3. Yahoo!
comments may also be rank. 4. Yandex
- one example is Reddit 5. uckDuckGo
6. Baidu
MEDIA SHARING 7. Ask.com
- these are sites that allow you to 8. Naver
upload and share media content like 9. Ecosia
images, music and video. 10. AOL
- one example is Instagram
3. COMMUNICATION SERVICES
MICROBLOGGING - these are outsourced enterprise
- these are sites that focus on short communications solutions that can
updates from the user. Those that be leased from a single vendor or
subscribe to the user will be able to provider.
receive these updates. - a Communications Service Provider
- one example is Twitter (CSP) is a provider that transports
information electronically and can
BLOGS AND FORUMS encompass public and private
- these websites allow user to post companies in telecom, internet, cable,
their content. Other users are able to satellite, and managed services
comment on the said topic. business.
- Smart, PLDT, Globe, Sun Cellular, Sky
2. WEB SEARCH ENGINES Cable.
- it is a software system that is
designed to search for information on 4. PAYMENT SYSTEM
the World Wide Web (WWW). - it is any system used to settle
- the search results are generally financial transactions through
presented in a line of results referred to transfer of monetary value, and
as Search Engine Results Page includes the institutions, instruments,
(SERPs). people, rules, procedures, standards,
and technologies.
EMPOWERMENT TECHNOLOGY REVIEWER

5. ADVERTISING PLATFORMS Production – Sony Vegas Pro,


- it allows users to create and manage Audacity, Virtual DJ
advertising campaigns, generate Survey and Forms – Google Forms
reports, and retrieve information about ICT Projects and Content Publishing
the ads, campaigns, and organizations and Uploading Platforms – WordPress,
that are associated with an account. MS Office Project Server, File Manager
- Shopee, Lazada, Amazon Web Design Platforms – Wix, Weebly,
Adobe Dreamweaver
6. CREATIVE CONTENT OUTLET Web Management Platforms – Drupal,
- it is content that needs to be WordPress, Joomla
translated creatively.
- topic/concept 🡪 creative DANGERS ON THE INTERNET
presentation
EMAIL SPAM (JUNK MAIL)
ONLINE PLATFORMS - usually unsolicited commercial
Presentation Tools – Prezi, Zoho Shows, email sent from an unknown source
MS PowerPoint. with identical message sent to multiple
Newsletter, ICT Content Platforms – recipients.
Dropbox, Tumblr, Wix - usually not dangerous but can be
Photo Editing Tools – Picasa, Adobe time and space consuming.
Photoshop, GIMP - dangerous ones can carry viruses
Video Editing Tools – Sony Vegas Pro, and other malicious software
Windows Movie Maker, Adobe Premier (Malware)
Pro
Photo uploading and hosting Tools – EMAIL SPOOFING
Dropbox, Flickr - it is a deceitful email practice in
Online Collaborative Tools – Google which the sender address is changed,
Drive, Viber, Facebook so that it would appear to have come
Cloud Computing – Dropbox, Google from a different source which is usually
Drive, Microsoft One Drive someone you know.
Blog Tools – Blogger, WordPress, - is usually used by spammers to hide
LiveJournal Mapping Tools – Google the origin of the spam.
Maps, Waze, Wikimapia Music
EMPOWERMENT TECHNOLOGY REVIEWER

PHISHING - it can also affect the performance


- it is a deceitful practice of trying to and setting of the computer.
get confidential information such as
passwords and usernames, and credit COMPUTER WORM
card details by making it appear as if - it is a dangerous computer program
it comes from a trustworthy source. that replicates itself through a
- it is usually done through emails or network.
using popular entity such as Microsoft, - some worms delete files, others
Yahoo, Google, Amazon, and financial disrupt the network function.
institutions. - it is usually spread through email
and running of attachments from
PHARMING suspicious sources.
- is a dangerous hacker attack on a - it spreads by exploiting weaknesses
website which directs all traffic to that in operating systems.
website to another fictitious website.
- the main objective is to obtain TROJAN HORSE
username and passwords, as well as - a malware fronting to perform a
credit cards ad financial information, good task, but covertly performs
and use these to steal their money undesirable function with the intention
electronically or use the credit cards of of entering the computer without the
the victims. user’s consent.
- used to exploit the Domain Name - it can disable the computer’s
Service (DNS) system. defenses, opening it to unauthorized
entry.
SPYWARE - it can erase data, can corrupt files,
- a computer program that is installed and can allow access to computer.
covertly on a personal computer to
collect information or even take COMPUTER VIRUS
control over the computer without the - it is a program that duplicates itself
knowledge of the user. and then infects the computer.
- it can monitor and collect - it spreads like a biological virus.
information about the user’s internet - it can be transferred by the use of
habits and practices. removable storage media devices.
- damages may be mild to severe.
EMPOWERMENT TECHNOLOGY REVIEWER

HACKER
- this is a person who is able to enter
and control other people’s computer
without authorization.
- usually vandalizes the victims’
website, steals personal information,
obtains intellectual property, and
performs credit card fraud.
- firewalls are able to prevent entry by
hackers.

You might also like