EMTECH

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

EMTECH

EMTECH
ICT and its CURRENT STATE​ 2. Rich User Interface
content is dynamic and is responsive to user’s input.
SOFTWARES AND APPLICATONS
An example would be a website that shows local
ICT (Info. & Comm. Tech.)
content. In the case of social networking sites, when
ICT deals with the use of different communication
logged on, your account is used to modify what you
technologies such as mobile phones, telephone,
see in their website.​
Internet, etc. to locate, save, send, and edit
3. User Participation
information.​
the owner of website is not the only one who is able
Example: when we make a video call, we use internet.
to put content. Others are able to place a content on
their own by means of comments, reviews, and
ICT in the Philippines
evaluation.​
Philippines as the “ICT Hub of Asia”.​
4. Long Tail
huge growth of ICT related jobs around the country,
services are offered on demand rather than on a one-
one of which is call center or BPO (Business Process
time purchase. This is synonymous to subscribing to a
Outsourcing) centers.​
data plan that charges you for the amount of time
According to 2013 edition of Measuring the
you spent on Internet or a data plan that charges you
Information Society by the International
for the amount of bandwidth you used.​
Telecommunication Union, there are 106.8 cellphones
per 100 Filipinos in the year 2012.​
Web 3.0
In a data gathered by the Annual Survey of
Semantic Web - is a movement led by the World Wide
Philippines Business and Industries in 2010, the ICT
Web Consortium(W3C). The semantic web provides a
industry shares 19.3% of the total employment
framework that allows data to be shared and reuse to
population.
deliver web content specifically targeting the user.​
Time magazines declared Makati City, Philippines-
Web 3.0 is yet to be fully realized because of several
Rank 1 as the “Selfiest Cities around the world, and
problems:
Rank 9 is Cebu City.​
Security – The user’s security is also question since

papasa
the machine is saving his or her preferences.
WWW(World Wide Web)​
Vastness - The World Wide Web already contains
When WWW was invented, most web pages were
billions of web pages.​
static.
Vagueness – Certain words are imprecise. The words
Static (also known as flat page or stationary page) in
“old” and “small” would depend to the user.​
the same that the page “as is” and cannot be
Logic - since machines use logic, there are certain
manipulated by the user.
limitations for a computer to be able to predict what
This referred to as Web 1.0.
the user is referring to at a given time. ​
Compatibility - HTML files and current web browsers
WEB 2.0
could not support Web 3.0.
Web 2.0 allows the user to interact with the page
known as DYNAMIC PAGE; instead of just reading a
TRENDS IN ICT
page, the user may be able to comment or create a
1. Convergence– is the synergy of technological
user account.
advancements to work on a similar goal or task. For
Dynamic page refers to the web pages that are
example, besides using your personal computer to
affected by user input or preference.​
create word documents, you can now use your
Example of Web 2.0
smartphone.​
Social Networking sites​
2. Social Media– is a website, application, or online
Blogs​
channel that enables web users to create, co-create,
Wikis​
discuss, modify, and exchange user generated
Video sharing sites​
content.​
3. Mobile Technologies – The popularities of
KEY FEATURES OF WEB 2.0
smartphones and tablets has taken a major rise over
1. Folksonomy
the years. This is largely because of the devices
allows users to categorize and classify/arrange
capability to do the tasks that were originally found
information using freely chosen keywords (e.g.
in PCs.​
tagging). ​
4. Assistive Media – is a non-profit service designed to
Popular social networking sites such as Twitter,
help people who have visual and reading
Instagram, Facebook, etc. use tags that start with a
impairments. A database of audio recordings is used
pound sign (#) or hashtag.​
to read to the user.​
EMTECH
EMTECH
SIX TYPES OF SOCIAL MEDIA NETIQUTTE
a. Social Networks – These are sites that allows you to INTERNET SAFETY
connect with other people with the same interests or Refers to the online security or safety of people and their
background. Once the user creates his/her account, information when using internet.​
he/she can set up a profile, add people, share content, NETIQUETTE ​
etc.​ Combination of the words network and etiquette and is
defined as a set of rules for acceptable online behavior.​
Example : Facebook and Google+
TEN RULES OF NETIQUETTE​
b. Bookmarking Sites– These are sites that allow you to 1. Remember the Human
store and manage links to various website and resources. 2. Adhere to the same standards online that you follow in
Most of these sites allow you to create a tag, and allows real life.​
you and other users to easily share them.​ 3. Know where you are in cyberspace.​
Ex. : StumbleUpon/Pinterest​ 4. Respect other people’s time and bandwidth.​
5. Make yourself look good online.​
c. Social News– These are sites that allow users to post 6. Share expert knowledge.​
7. Help keep flame wars under control.​
their own news items or links to other news sources. The
8. Respect other people’s privacy.​
users can also comment on the post and comments may
9. Don’t abuse your power.​
also be rank.​ 10. Be forgiving of other people’s mistake.​
Example: reddit and Digg​

d. Media Sharing – These are sites that allow you to INTERNET THREATS
1. Malware - Stands for Malicious Software, any program or
upload and share media content like images, music and
file that is harmful to a computer user.​
video.​
2. Spam - Unwanted email mostly from advertisers.​
Example: Flickr, Youtube and Instagram. 3. Phishing - Its goal is to acquire sensitive personal
information like passwords and credit card details.​
e. Microblogging– These are sites that focus on short

papasa
updates from the user. Those that subscribed to the user KINDS OF MALWARE
will be able to receive these updates.​ 1. Virus - Program designed to replicate itself and transfer
Example: Twitter and Plurk​ from one computer to another.​
2. Worm - A malicious program that transfers from one
computer to another by any types of means.​
f. Blogs and Forums– These websites allow user to post
3. Trojan - A malicious program that is disguised as a useful
their content. Other users are able to comment on the
program but once downloaded or installed , leaves your PC
said topic.​ unprotected and allows hacker to get you information.​
Example: Blogger, WordPress and Tumblr​ 4. Spyware - Software that ruins in the background without
you knowing it.​
​Mobile Technologies 5. Keyloggers - Used to record the keystroke done by the user.​
Several of these devices are capable of using high- 6. Adware - A program designed to send you advertisements,
speed internet. mostly a pop-ups.​
Today the latest model devices use 4G
INTELLECTUAL PROPERTY - Intellectual property is a category
Networking(LTE), which is currently the fastest
of property that includes intangible creations of the human
mobile network.​
intellect. Intellectual property encompasses two types of
rights: industrial property rights and copyright.​
Mobile OS​
iOS– use in apple devices such as iPhone and iPad.​ COPYRIGHT LAW - It is the legal protection extended to the
Android – an open source OS developed by Google. owner of the rights in an original work. ​
Being open source means mobile phone companies
use this OS for free.​ COPYRIGHT PAGE - The copyright page is where the publisher
Blackberry OS– use in Blackberry devices.​ places all the legal notices and information related to a book. ​
Windows Phone OS – a closed source and proprietary
operating system developed by Microsoft.​ TO AVOID COPYRIGHT INFRINGEMENT​
Symbian– the original smartphone OS; used by 1. Understand
Nokia devices.​ 2. Be responsible
WebOS– originally used in smartphones; now used in 3. Be creative
smartTVs.​ 4. Know the law
Windows Mobile – developed by Microsoft for
smartphones and pocket PCs.​

You might also like