0% found this document useful (0 votes)
165 views

Introduction To Ict Information and Communication World Wide Web

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
165 views

Introduction To Ict Information and Communication World Wide Web

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

INTRODUCTION TO ICT World Wide Web

 is an information system on the


Information and Communication internet that allows documents to be
 deals with the use of different connected to other documents by
communication technologies such as hypertext links, enabling the user to
mobile phones, telephone, Internet to search for information by moving from
locate, save, send, and edit one document to another.
information.  Is an information space where
 study of computers as data processing documents and other web resources
tools. It introduces students to the are identified by URLs, interlinked by
fundamental of using computer hypertext links, and can be accessed
systems in an internet environment. via the Internet.
 is invented by Tim-Berners Lee.
ICT In the Philippines
 Philippines is dub as the ‘’ICT Hub of Web Pages
Asia” because of huge growth of ICT-  Hypertext document connected to the
related jobs, one of which is BPO, World Wide Web. It is a document that
Business Process Outsourcing, or call is suitable for the World Wide Web.
centers.
 ICT Department in the Philippines is ONLINE PLATFORMS OF
responsible for the planning, WORLD WIDE WEB
development and promotion of the Web 1.0
country’s information and  refers to the first stage in the World
communications technology (ICT) Wide Web, which was entirely made
agenda in support of national up of the Web pages connected by
development. hyperlinks.
Web 2.0
DEFINITION OF TERMS  is the evolution of Web 1.0 by adding
dynamic pages. The user is able to
Computer see a website differently than others.
 an electronic device for storing and  Allows users to interact with the page;
processing data, typically in binary instead of just reading the page, the
form, according to instructions given to user may be able to comment or
it in a variable program. create user account.
Web 3.0
Internet  this platform is all about semantic web.
 is the global system of interconnected  Aims to have machines (or servers)
computer networks that use the understand the user’s preferences to
internet protocol suite (TCIP/IP) to link be able to deliver web content.
billions of devices worldwide. Static Web Page
 Means of connecting a computer to  is known as a flat page or stationary
any other computer anywhere in the age in the sense that the page is ‘’as
world via dedicated routers and is’’ and cannot be manipulated by the
servers. user. The content is also the same for
 Sometimes called simply ‘’the Net’’, is all users that is referred to as Web 1.0.
a worldwide system of computer Dynamic Web Pages
networks - a network of networks in  Web 2.0 is the evolution of web 1.0 by
which the users at any one computer adding dynamic web pages. The user
can get information from any other is able to see website differently than
computer. others e.g., social networking sites,
wikis, video sharing sites.
FEATURES OF WEB 2.0
Folksonomy same interests or background. Once
 allows user to categorize and classify the user creates his/her account,
information using freely chosen he/she can set up a profile, add
keywords e.g., tagging by FB, Twitter, people, share content, etc.
use tags that start with the sign #,  Example: Facebook and Google+
referred to as hashtag. Bookmarking Sites
Rich User Experience  Sites that allow you to store and
 content is dynamic and is responsive manage links to various website and
to user’s input. resources. Most of the sites allow you
User Participation to create a tag to others.
 The owner of the website is not the  Ex. tumble Upon, Pinterest
only one who is able to put content. Social News
Others can place a content of their  Sites that allow users to post their own
own by means of comments, reviews news items or links to other news
and evaluation e.g., Lazada, Amazon. sources. The users can also comment
Long Tail on the post and comments may also
 services that are offered on demand be rank.
rather than on a one-time purchase.  Ex. Reddit and Digg
This is synonymous to subscribing to a Media Sharing
data plan that charges you for the  sites that allow you to upload and
amount of time you spent on the share media content like images,
internet. music and video.
Software as a service  Ex. Flickr, YouTube, and Instagram
 users will be subscribe to a software Microblogging
only when needed rather than  focus on short updates from the user.
purchasing them e.g., Google docs Those that subscribed to the user will
used to create and edit word be able to receive these updates.
processing and spread sheet.  Ex. Twitter and Plurk
Mass Participation Blogs and Forums
 diverse information sharing through  allow user to post their content. Other
universal web access. Web 2.0’s users are able to comment on the said
content is based on people from topic.
various cultures.  Ex. Blogger, WordPress, and Tumblr

TRENDS IN ICT MOBILE TECHNOLOGIES


Convergence The popularity of smartphones and
 is the synergy of technological tablets has taken a major rise over the years.
advancements to work on a similar This is largely because of the devices
goal or task. For example, besides capability to do the tasks that were originally
using your personal computer to found in PCs. Several of these devices are
create word documents, you can now capable of using a high-speed internet. Today
use your smartphone. the latest model devices use 4G Networking
Social Media (LTE), which is currently the fastest.
 is a website, application, or online
channel that enables web users web Mobile OS
users to create, co-create, discuss
modify, and exchange user generated  iOS – use in apple devices such as
content. iPhone and iPad
 Android – an open source OS
Six Types of Social Media developed by Google. Being open
source means mobile phone
Social Networks companies use this OS for free.
 These are sites that allows you to  Blackberry OS – use in blackberry
connect with other people with the devices
 Windows phone OS – A closed source organization. It offers increased security
and proprietary operating system because of its private nature.
developed by Microsoft.
 Symbian – the original smartphone COMMUNITY CLOUD allows systems and
OS. Used by Nokia devices services to be accessible by group of
 WebOS- originally used in organizations.
smartphone; now in smart TVs.
 Windows Mobile – developed by HYBRID CLOUD is a mixture of public and
Microsoft for smartphones and pocket private cloud. However, the critical activities
PCs are performed using private cloud while the
non-critical activities are performed using
ASSISTIVE MEDIA public cloud.
It is a non- profit service designed to
help people who have visual and
reading impairments. A database of audio
recordings is used to read to the user.

ELECTRONIC MAILS
 Yahoo!; Gmail; Hotmail Cloud
Computing
 distributed computing on internet or
delivery of computing service over
the internet.
 Instead of running an e-mail program
on your computer, you log in to a Web
e-mail account remotely. The software
and storage for your account doesn’t
exist on your computer
 It’s on the service’s computer cloud.

Components

1. Client computers   –   clients are the


device that the end user interact with
cloud.
2. Distributed Servers – Often servers
are in geographically different places,
but server acts as if they are working
next to each other.
3. Datacenters – It is collection of
servers where application is placed
and is accessed via Internet.

Types of Cloud

PUBLIC CLOUD allows systems and


services to be easily accessible to the
general public. Public cloud may be less
secured because of its openness, e.g. e-mail

PRIVATE CLOUD allows systems and


services to be accessible within an
ONLINE SAFETY, SECURITY,
AND RULES OF NETIQUETTE  Be polite and pleasant to everyone.
 Always check your spelling and
Internet Safety grammar before posting.
 it refers to the online security or safety  Know what you are talking about and
of people about their information when make sense saying it.
using the internet
Netiquette Share expert knowledge
 DO’s and DON’Ts of online  Ask questions online
communication, network etiquette.  Share what you know online.
 Post the answers to your questions
TEN RULES OF NETIQUETTE online because someone may have
the same question you do.
Remember the human
 You need to remember that you are Help keep flame wars under control
talking to a real person when you are  Netiquette does not forgive flaming.
online.  Netiquette does however forbid people
 The internet brings people together who are flaming to hurt discussion
who would otherwise never meet. groups by putting the group down.
 Remember this saying when sending
an email: Would I say this to the Respect other people’s privacy.
person’s face.  Do not read other people’s mail
without their permission.
Adhere to the same standards online that  Going through other people’s things
you follow in real life. could cost you, your job or you could
 You need to behave the same way even go to jail.
online that you do in real life.  Not respecting other people’s privacy
 You need to remember that you can is a bad netiquette.
get caught doing things you should not
be doing online just like you can in real Don’t abuse your power.
life.  Do not take advantage of other people
 You are still talking to a real person just because you have more
with feelings even though you can’t knowledge or power than them.
see them.  Treat others as you would want them
to treat you if the roles were reversed.
Know where you are in cyberspace.
 Always take a look around when you Be forgiving of other people’s mistake.
enter a new domain when surfing the  Do not point out mistakes to people
web. online.
 Get a sense of what the discussion  Remember that you were once the
group is about before you join it. new kid on the block.
 You still need to have a good manners
Respect other people’s time & bandwidth. even though you are online and cannot
 Remember people have other things to see the person face to face.
do besides read your email. You are
not the center of their world. INTERNET SECURITY
 Keep your post and emails to minimum
by saying what you want to say. Type of System Intruders
 Remember everyone won’t answer  Masquerader
your questions.  Hackers
 Clandestine System
The CIA Triad
Make yourself look good online.
characteristics or byproducts of
communications.
Intrusion
 an unauthorized entity gains access to
sensitive data by circumventing a
system’s security protections.
Incapacitation
 prevents or interrupts system
operation by disabling a system
component.
Corruption
 Confidentiality  Undesirably alters system operation by
o Data confidientiality adversely modifying system functions
o Privacy or data.
 Integrity Obstruction
o Data integrity  A threat action that interrupts delivery
o System integrity of system services by hindering
 Availability system operation.
Masquerade
Threat Consequence  An unauthorized entity gains access to
a system or performs a malicious act
Unauthorized Disclosure by posing as an authorized entity.
 A circumstance or event whereby an Falsification
entity gains access to data for which  False data deceive an authorized
the entity is not authorized. entity.
Disruption Repudiation
 A circumstances or even that  An entity deceives another by falsely
interrupts or prevents the correct denying responsibility for an act.
operation of system services and
functions. Misuse
Deception  Causes a system component to
 A circumstance or event that may perform a function or service that is
result in an authorized entity receiving detrimental to system security.
false data and believing it to be true.
Usurpation Virus Stages
 A circumstances or event that results
in control of system services or 1) Dormant phase - Virus is idle.
functions by an unauthorized entity. 2) Propagation phase - Virus places an
identical copy of itself into other
Threat Action (Attack) programs or into certain system areas
on the disk.
Exposure 3) Triggering phase - Virus is activated to
 Sensitive data are directly released to perform the function for which it was
intended; Caused by a variety of
an unauthorized entity.
system events.
Interception
4) Execution phase - Function is
 An unauthorized entity directly
performed.
accesses sensitive data traveling
between authorized sources and
Parts of a Virus
destinations.
 Infection mechanism
Inference
 Trigger
 A threat action whereby an
 PayloaD
unauthorized entity indirectly accesses
sensitive data by reasoning from DEFINITION OF TERMS
 used to record the keystrokes done by
Cyber crime user. This is done to steal passwords
 a crime committed or assisted through or any other sensitive information.
the use of the Internet. Rogue security softwares
Privacy Policy/Terms of Services (ToS)  is a form of malicious software and
 tells the user how the website will internet fraud that misleads users into
handle its data. believing there is a virus on their
Malware computer, and manipulates them into
 stands for malicious software. paying money for a fake malware
Virus removal tool.
 a malicious program designed to
transfer from one computer to another FOUR SEARCH STRATEGIES
in any means possible.
Worms Keywoard Searching
 a malicious program designed to  Enter terms to search
replicate itself and transfer from one  Use quotation marks to search as a
file folder to another and also transfer phrase and keep the words linked
to other computers. together
Trojan  Common words are ignored (That, to,
 a malicious program designed that is which, a, the …)
disguised as a useful program but  + and – can be used to include or
once downloaded or installed, leaves exclude a word.
your PC unprotected and allows
hacker to get your information. Boolean
Spyware  AND – enter words connect with AND-
 a program that runs in the background it will include sites where both words
without you knowing it. It has the ability and found
to monitor what you are currently doing o Uses: joining different topics
and typing through key logging. (i.e. global warming AND
Adware California)
 a program designed to send you  OR   –  requires at least one of the
advertisement, mostly pop-ups. terms is found.
Spam o Uses: join similar or
 unwanted email mostly from bots or synonymous topics (i.e. global
advertisers. warming OR greenhouse effect)
Phishing  NOT – searches for the first term and
 acquires sensitive personal information excludes sites that have the second
like passwords and credits card term.
details. o (i.e. Washington NOT school)
Pharming
 a more complicated way of phishing Question
where it exploits the DNS system.  a question may be entered in the
Copyright search field of search engine    
 a part of law, wherein you have the
rights to work, anyone who uses it w/o Advanced
your consent is punishable by law.  Features are offered on many engines
Fair Use by going to an “Advanced search”
page and  making selections. Effective
 means that an intellectual property
in narrowing search returns to a
may be used w/o consent as long as it
specific topic or phrase.
is used in commentaries, criticism,
parodies, research and etc.
Keyloggers

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy