0% found this document useful (0 votes)
35 views69 pages

1 Q1 Emp Technology

Uploaded by

SarahMangampo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views69 pages

1 Q1 Emp Technology

Uploaded by

SarahMangampo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 69

Empowerment Technologies

Quarter 1
Introduction to Information and
Communication Technologies and
Rules of Netiquette
Multiple Choice: Write the letter of your answer on a
separate sheet of paper.

1.Which of the following web pages allows interaction


from the user?
A.Comment B. Social C. Dynamic D. Static

2. Which of the following features where users can


categorize and locate information through tagging?
A. Folksonomy . C. Rich user experience
B. Hashtags D. Taxonomy

3. The following are features of a dynamic website. Which


of them allows users to put their own content?
B. Long tail C. Rich user experience
B. Mass participation D. User participation
4.Which provides a common framework to allow data to be
shared and reused across platform, enterprise, and community
boundaries?
A. Semantic Web C. Web 1.0
B. W3C D. Web 2.0

5.What magazine declares that two Philippine cities are part


ofthetop10intheirresearchabout “TheSelfiest Citiesaround
theWorld”?
A.Candy C.Reader’sDigest
B.People D.Time
6.Whichofthefollowingreplicatesandcantransferfromonecomputer
toanother?
A.Adware C.Rogue
B.Keylogger D.Virus
7.Whichofthefollowingtrickstheuserintoposingthatit
isa securitysoftware?
A.AdwareC.Rogue
B.PrivateD. Spam
8.Whichofthefollowingused torecord
thekeystrokesdonebytheuser?
A.KeyloggerC.Phishing
B.MalwareD.Spam
9.Whathas beendesignedtosend
youadvertisements?
A.AdwareC.Spyware
B.MalwareD.Trojan
10.Whatdo youcallanunwanted
emailmostlyfrombots?
A.AdwareC.Spam
B.RogueD. Trojan
Introduction to Information
and Communication
Technologies
How many of the items or icons in the image
above are you familiar with? Which ones are
you unfamiliar with? Whatever your answers,
take a closer look at the discussion below. The
list contains some key phrases that
characterize the ICT tools that, when used
properly, can empower users to make positive
Information and
Communication
Technologies (ICT)
deals with the use of different
communication technologies such
as mobile phones, telephone, and
internet to locate, save, send, and
edit information.
Web 3.0 and the
Semantic Web
Semantic Web -is a movement
led by the World Wide Web Consortium
(W3C). The term was coined by the inventor
of the World Wide Web, Tim Berners-Lee. It
provides a common framework that allows
data to be shared and reused across
application, enterprise, and community
Several Problems in
using Web 3.0
1. Compatibility -HTML files and current web
browsers could not support Web 3.0.

2. Security -the user’s security is also in


question since the machine is saving his or her
preferences.

3. Vastness -the World Wide Web already


contains billions of web pages.

4. Vagueness -certain words are imprecise.


5. Logic -since machines use logic, there are
certain limitations for a computer to be able to
predict what the user is referring to at a given time.
Trends in ICT As the world of ICT continues to grow,
the industry has focused on several innovations
which cater to the needs of the people who benefit
most out of it. The following trends are the current
front runners in the innovation of ICT.

1. Convergence. Technological
convergence is the synergy of technological
advancements to work on a similar goal or task. It is
the use of several technologies to accomplish a task
conveniently.

2. Social Media. Social media is a


website, application, or online channel that enables
web users to create, co-create, discuss, modify, and
exchange user-generated content.
3. Mobile
Technologies. The popularity
of smartphones and tablets has taken a
major rise over the years because of the
devices’ capability to do tasks that were
originally found in personal computers.
Today, the latest mobile devices use 5G
Networking (LTE), which is currently the
fastest mobile network.
Rules of Netiquette
This lesson discusses the appropriate and
inappropriate online behavior that you as
users need to know and appreciate. It
helps you understand the social nature of
digital media and later you discover the
status of your own digital life. Moreover,
this lesson gives emphasis on the
importance to act properly and
responsibly to possible consequences on
engaging these digital tools.
Cite situations where Information and
Communication Technologies have improved the
lives of people.
Teenagers like you are exposed to
many things powered by the internet
because they are mostly into
socializing, playing games, reading
sports news, shopping, etc. The
internet has given you the most
powerful tools that your parents did
not enjoy during their early days. For
this reason, you must observe proper
internet usage.
Online Safety and
Security Internet is a powerful
tool used to promote business, gain new
friends, and stay in touch with the old ones. It
is also a source of entertainment through
games, online communities, and everything in
between. But there is always the “other side of
the coin”. Internet is one of the most
dangerous places especially if you are
unaware of what you are doing with it.
Internet is defined as the information
superhighway means that anyone has
access to this highway, can place
information, and can grab that
information. Therefore, everyone is a
prospect to cybercrime threats. We may
not experience it now but whatever
information we share today could affect
our future. With this reason, social
networking sites like Facebook continue
to improve their security features.
Internet
Threats
Here are some
of the threats
you should be
aware of when
using the
internet.
2. Spam – unwanted email
mostly from bots or advertisers. It can
be used to send malware.
3. Phishing – its goal is to
acquire sensitive personal information
like passwords and credit card details.
Pharming – a more complicated way of
phishing where it exploits the DNS
(Domain Name Service) system.
Protecting
Reputations Online
Embarrassing moments nowadays
can be captured using any device
you could imagine. Unlike the old
days, doing something
embarrassing was not much a big
deal. Worst is that anyone can easily
upload it over the internet and
cannot be undone. This puts you in
a traumatic situation and risk the
lives of your family. So, before
posting something over the internet,
think first before you click.
Think Before You Click Things you
might want to consider before internet posting.
1. Once you post something on the web, you have
no control of who sees your posts.
2. Your friends depend on you to protect their
reputation online.
3. Set your post to “private”.
4. Avoid using names. Names are easy for search
engines to scan. 5. If you feel that a post can
affect you or other’s reputation, ask the one who
posted it to pull it down or report it as
inappropriate.
Copyright Infringement
If you create something like an idea,
an invention, a form of literary work,
or a research, you have the right as
to how it should be used by others.
This is called “intellectual property.
The copyright law includes your
rights over your work, and anyone
who uses it without your consent is
punishable by law.
Tips to avoid copyright
infringement 1. Understand. Copyright protects
literary works, photographs, paintings, drawings, films, music
(and lyrics), choreography, and sculptures, but it does not
protect underlying ideas and facts.
2. Be responsible enough to know if something has a copyright.
3. Be creative. Ask yourself whether what you are making is
something that came from you, or something made from
somebody else’s creativity. It is important to add your own
creative genius in everything that will be credited to you.
4. Know the law. There are limitations to copyright laws. For
instance, in the Philippines, copyrights only last a lifetime (of
the author) plus 50 years. There are also provisions for “fair
use” which mean that an intellectual property may be used
without a consent as long as it is used in commentaries,
criticisms, search engines, parodies, news reports, research,
1.Do you agree or disagree with the
provisions of the copyright law? Defend
your answer.
2. How would you feel if someone posted
something embarrassing about you?
What would you do?
3. Make your own three (3) Do’s and
Don’ts in a table form when using social
networking site like Facebook.
I have learned that:
1.To stay safe online, I must
_________________________________________.
2. There are several internet threats which
include ____________________.
3. Malwares could be in the form of a
_________________________________.
4. It is our responsibility to protect other’s
reputation online so we should be ___________.
5. It is important for everyone to understand
the laws particularly on Copyright
Infringement in order to _________________.

You might also like