Empowerment Technologies

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 24

EMPOWERMEN

T
TECHNOLOGY
GRADE 11 – STEM/HUMSS
7/30/24 – 8/1/24
LESSON 1: The
Current State of
ICT Technologies
Information and Communication Technology
o It refers to the use of communication technology such as
laptop, smart phones, tablet, telephone, internet and etc. to
send, save, and edit information.

ICT in the Philippines


o The use of communication technology spread in the entire
country now a day even in rural areas. According to Rappler
blog site there are 119 million mobile phone subscriptions
from a total population of 101 million and 47 million active
Facebook accounts. The Philippines is the fastest growing
app market in Southeast Asia and the highest digital
population in the world. The top online activities are social
media, videos, online mobile games, location-based search
and online shopping. Staying connected with loved ones,
friends, and relatives is a fundamental need for Filipinos.
World Wide Web
o It is also known as WWW or W3 introduced by Tim Berners-Lee.
It consists of different pages that are formatted in a markup
language called HTML (Hypertext Markup Language) and linked
to each other that contain text, graphics, multimedia files,
hyperlinks and etc.
Web 1.0
o The first development of World Wide Web where web pages are
static. It is also known as a flat or stationary page and it cannot
be manipulated by users.

Web 2.0
o It is a dynamic web page where user can interact with page like
creating a user account, posting comments, uploading files and
images, and others.
Example: Blog sites, Facebook, Twitter, Instagram, YouTube

Web 3.0 The Semantic Web


o A new paradigm in web interaction extension of led by World
Wide Web Consortium (W3C) where it provides framework that
allows data to be shared and reuse.
Features of Web 2.0
1. Folksonomy – users can classify and arrange information by
adding tag or label. Pound sign (#) is used in Facebook, Twitter,
Instagram and other social networking sites. Example in tagging
on Facebook: #TeamKawayan, #Single
2. Rich User Experience – user can have high interaction with the
content of the page and can achieve level of expertise.
3. User Participation – user can put content on their own in web
page like comment, evaluation, and etc.
4. Long Tail – A site that offers services and brings individual and
businesses into selling different goods and commodities such as
shopping site like OLX, Lazada, Shopee, Zalora and others.
5. Software as a service – users can subscribe to a software
when they need it instead of purchasing them.
6. Mass Participation – sharing of diverse information through
universal web access.
Trends in ICT
1. Convergence - It refers to fusing of technological
advancement to work on a similar task.
Example. Using smartphone as camera in taking pictures
instead of DSLR camera.
2. Social Media - An application and website where user can
communicate, create and share content, and participate in online
communities.
Types of Social Media

A. Social Network
o A website where people with the same come together to
share information.
Examples: Twitter, Instagram, Facebook
B. Social News
o A website where user can post stories and are ranked
based on the popularity through voting.

Examples: Digg, Reddit, Propeller, Slashdot, Fark


C. Bookmarking Sites
o A website that allows you to share and store internet
bookmarks, articles, posts, blogs, images and others.
Examples: Pinterest, StumbleUpon, Dribble
D. Media Sharing
o A website that allows you to share and store
multimedia files such as video, photos and music.
Examples: Instagram, YouTube, Flickr
E. Microblogging
o A website that allows you to broadcast short message.

Examples: Twitter, Tumblr, Meetme


F. Blogs and Forums
o A discussion website that allows user to ask questions
and comments on a journal posted by an individual or
group.

Examples: Wordpress, Blogger


3. Mobile Technologies – a technology used in cellular and
other devices such netbook, laptop, tablet, smartphones and
etc.
4. Assistive Media - A platform that assists people with
disability. It will guide the individual like a blind person by using
an audio recording.
LESSON 2: ONLINE
SAFETY, SECURITY,
ETHICS AND ETIQUETTE
Online Safety
o Refers to the practices and precautions that should
be observed.
o We need to keep ourselves safe and secure
whenever we use the internet. That is why it is very
important to know and learn the ways on how to be
safe and secured online.
Tips on how to be safe online
o Do not share your password with anyone.
o Add friends you know in real life.
o Do not visit untrusted websites.
o Add password to your WIFI at home to make it private.
o Install and update antivirus in your computer.
o Do not give your personal information to anyone.
o Think before you click.
o Never post about your future vacation.
Internet Risks

1. Cyberbullying - It happens when someone intentionally abused,


harass, and mistreated by other person using electronic
communication.
2. Identity Theft - It is a crime of stealing personal information for the
purpose of assuming that person’s name or identity to make any
form of transactions.
3. Cyber Stalking - A criminal practice where electronic
communication is used to stalk or harass individual or group.
4. Sexting - The act of sending sexually explicit text messages,
images, and videos.
Internet Threats

1. Malware – also known as Malicious Software, refers to any


intrusive software developed by cybercriminals (often called
hackers) to steal data and damage or destroy computers and
computer systems.
2. Spam - Also known as junk email or unwanted email send by
advertiser or bot. It can be used to send malware.
3. Phishing - A cyberattack method using deceptive emails and
websites to acquiring sensitive personal information.
4. Cybercrime - A crime in which computer is used as object and
tool in committing a crime such hacking, phishing, spamming,
child pornography, libel, hate crimes, identity thief and others.
Cybercrime Law - A law that deals with all forms of cybercrime
Types of Malware

a. Virus – a malicious program that replicate itself by copying itself to


another program.
b. Trojan Horse – a malicious program that disguised as legitimate
program that user will accept and use but take control of your
computer.
c. Worm – malicious program that copy’s itself and spreads to other
computers.
d. Spyware – A malicious program that gathers information from
victim’s computer and send it back to the hacker.
e. Adware – An unwanted advertisement that will pop-up several
times on victim’s computer then behave abnormally and tedious to
close them.
f. Keylogger – A program that runs in the background and steals
user credentials and confidential information and send back to
hack by recording every keystroke that a user makes on their
computer or device.
g. Botnet – A collection of infected internet–connected devices
such as PC and mobile phone that are controlled by a common
type of malware.
h. Rootkit – A software tools used by hackers to gain control over a
computer on a network without being exposed.
i. Ransomware – A ransom virus that block the user from
accessing the programs or files and demands to pay the ransom
through online method for the removal of the virus.
Netiquette
o It is a word that came from the two words “net” and
“etiquette”. It is an etiquette applied online that
shows proper manner and behavior. If you are a
member of an online society through social media
you are called netizen. And in interacting with other
netizen online, we need to maintain good behavior
which is acceptable to others in online community.
The Core Rules of Netiquette by Seth T. Ross
1. Remember the human.
2. Adhere to the same standards of behavior online that
you follow in real life.
3. Know where you are in cyberspace.
4. Respect other people's time and bandwidth.
5. Make yourself look good online.
6. Share expert knowledge.
7. Help keep flame wars under control.
8. Respect other people's privacy.
9. Don't abuse your power.
10.Be forgiving of other people's mistakes.
Get ready for quiz 
8/2/24

You might also like