ETECH - Ntroduction To ICT

Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

Philippine Christian University

Senior High School


K-12 Basic Education

EMPOWERMENT
TECHNOLOGIES
(Applied Subject)

Module 1
“Introduction to Information and
Communication Technologies and
Rules of Netiquette”
I. GENERAL OVERVIEW

Information and communication technology is referred to the modern digital


technology communication tools and / or networks to access, manage, integrate, evaluate
and create information in order to function in a knowledge society (O’Connor B et al,
2002:2)

II. LEARNING OBJECTIVES

1. Improve your knowledge on how ICT affects our everyday lives and the state of
our nation.
2. Compare and contrast the differences between online platforms, sites, and
content;
3. Understand the features of web 2.0, 3.0 and learn the different trends in ICT and
use them to their advantage.
Rules of Netiquette:
1. Consider one’s and others’ safety when sharing information using the internet;
2. Determine and avoid the danger of the internet;
3. Be responsible in the use of social networking sites and use it effectively and
properly through proper referencing.

III. PRE-TEST (Essay)

Instructions: Analyze the questions and write your answer on a separate document, or
piece of paper.
1. How do you understand a webpage and a website?
2. How would you differentiate static web to dynamic web to semantic web?
3. Why do we need to use social media online platforms?
4. How safe are you in using social media sites?
5. What is the importance of web security?

IV. STUDY TIME

TRIVIA/GLOSSARY OF TERMS
1. Assistive Media - a component under Assistive technology (AT), which is a
generic term used to refer to a group of software or hardware devices by which
people with disabilities can access computers.
2. Collaborative platforms - “is a category of business software that adds broad
social networking capabilities to work processes.”
3. Convergent Technologies - an extension of the term convergence which means a
“coming together of two or more disparate disciplines or technologies.

1 | Page
4. Information and Communications Technology (ICT) - ICT (information and
communications technology - or technologies) is an umbrella term that includes
any communication device or application, encompassing: radio, television,
cellular phones, computer and network hardware and software, satellite systems
and so on, as well as the various services and applications associated with them,
such as videoconferencing and distance learning.
5. Mobile Media - This refers to “media devices such as mobile phones and PDA’s
were the primary source of portable media from which we could obtain
information and communicate with one another.
6. Online systems - Are online versions of information systems which is “the
process of and tools for storing, managing, using and gathering of data and
communications in an organization.
7. Social Media - “are computer-mediated tools that allow people or companies to
create, share, or exchange information, career interests, ideas, and
pictures/videos in virtual communities and networks.”
8. Web 2.0 - “describes World Wide Web sites that emphasize user-generated
content, usability, and interoperability.
9. Web 3.0 - “a phrase coined by John Mark off of the New York Times in 2006,
refers to a supposed third generation of Internet-based services that collectively
comprise what might be called ‘the intelligent Web”.

THE WORLD WIDE WEB (www.)

The World Wide Web (WWW) is a combination of all resources and users on the
Internet that are using the Hypertext Transfer Protocol (HTTP). A broader definition
comes from the World Wide Web Consortium (W3C): "The World Wide Web is the
universe of network-accessible information, an embodiment of human knowledge.

2 | Page
The World Wide Web Consortium (W3C) is an international community where Member
organizations, a full-time staff, and the public work together to develop Web standards

Who Invented the World Wide Web?

- Sir Timothy John Berners Lee (TimBL)


- An English Engineer and Computer Scientist best known as the inventor of World
Wide Web in 1989

WEB 1.0 (Static Webpage)

When the World Wide Web was invented, most web pages were static. Static (also known
as flat page or stationary page) in the sense that the page is “as is” and cannot be
manipulated by the user. The content is also the same for all users. This is referred to as
Web 1.0.

Ex. Government sites, educational sites, news websites, etc.

WEB 2.0 (Dynamic Webpage)

Web 2.0 is the evolution of Web 1.0 by adding dynamic web pages—the user is able to
see a website differently than others. Examples of Web 2.0 include social networking
sites, blogs, wikis, video sharing sites, hosted services, and web applications.

Web 2.0 allows users to interact with the page: instead of just reading a page, the user
may be able to comment or create a user account. Web 2.0 also allows users to use web
browsers instead of just using their operating system. Browsers can now be used for their
user interface, application software (or web applications), and even for file storage.

3 | Page
FEATURES OF DYNAMIC WEBSITES

1. Folksonomy. It allows users to categorize and classify/arrange information using


freely chosen keywords (e.g., tagging). Popular social networking sites such as
Twitter, Instagram, Facebook, etc. use tags that start with the pound sign (#). This
is also referred to as a hashtag.
2. Rich User Experience. Content is dynamic and is responsive to user’s input. An
example would be a website that shows local content. In the case of social
networking sites, when logged on, your account is used to modify what you see on
their website.
3. Long Tail. Services are offered on demand rather than on a one-time purchase. In
certain cases, time-based pricing is better than file-size-based pricing or vice
versa. This is synonymous to subscribing to a data plan that charges you for the
amount of time you spend on the Internet, or a data plan that charges you for the
amount of bandwidth you use. Cloud Services – ISP managed
4. User Participation. The owner of the website is not the only one who is able to put
content. Others are able to place a content of their own by means of comment,
reviews, and evaluation. Some websites allow readers to comment on an article,
participate in a poll, or review a specific product (e.g., Amazon.com, online stores).
5. Software as a Service. Users will subscribe to a software only when needed rather
than purchasing them. This is a cheaper option if you do not always need to use
software. For instance, Google Docs is a free web-based application that allows
the user to create and edit word processing and spreadsheet documents online.
When you need a software, like a Word Processor, you can purchase it for a one-
time huge amount and install it in your computer and it is yours forever. Software
as a service allows you to “rent” a software for a minimal fee.
6. Mass Participation. It is a diverse information sharing through universal web
access. Since most users can use the Internet, Web 2.0’s content is based on
people from various cultures.

WEB 3.0 (Semantic Web Page)

According to the W3C, “The Semantic Web provides a common framework that allows
data to be shared and reused across application, enterprise, and community boundaries.”

The aim of Web 3.0 is to have machines (or servers) understand the user’s preferences
to be able to deliver web content specifically targeting the user.

The Semantic Web is a movement led and proposed by the World Wide Web Consortium
(W3C).

The W3C standard encourages web developers to include semantic content in their web
pages.

4 | Page
Several problems of Web 3.0

1. Compatibility - HTML files and current web browsers could not support Web 3.0.

2. Security - The user’s security is also in question since the machine is saving his or her
preferences.

3. Vastness - The World Wide Web already contains billions of web pages.

4. Vagueness - Certain words are imprecise. The words “old” and “small” would depend
on the user.

5. Logic - Since machines use logic, there are certain limitations for a computer to be able
to predict what the user is referring to at a given time.

1. Convergence (Multifunctional capabilities)

Technological convergence is the synergy of technological advancements to work on a


similar goal or task. Using Technology in a convenient way. – Ex. Phones with office apps
– Access anywhere

2. Social Media

Social media is a website, application, or online channel that enables web users to create,
co-create, discuss, modify, and exchange user-generated content.

Types of SOCIAL MEDIA

1. Social Networks. These are sites that allow you to connect with other people with
the same interests or background. Ex. Facebook
2. Bookmarking Sites. These are sites that allow you to store and manage links to
various websites and resources. Ex. Pinterest, StumbleUpon
3. Social News. These are sites that allow users to post their own news items or
links to other news sources. Ex. Reddit and Digg
5 | Page
4. Media Sharing. These are sites that allow you to upload and share media content
like images, music, and video. Ex. Youtube, Instagram, and Flicker
5. Microblogging. These are sites that focus on short updates from the user. Ex.
Twitter and Plurk
6. Blogs and Forums. These websites allow users to post their content. Ex.
Blogger, Wordpress, and Tumblr.

3. Mobile Technologies

The popularity of smartphones and tablets has taken a major rise over the years. This is
largely because of the devices’ capability to do tasks that were originally found in personal
computers.

- A smartphone is a mobile phone with highly advanced features. A


typical smartphone has a high-resolution touch screen display, WiFi connectivity,
Web browsing capabilities, and the ability to accept sophisticated applications.

- SYMBIAN

4. Assistive Media

Assistive media is a nonprofit service designed to help people who have visual and
reading impairments. A database of audio recordings is used to read to the user.
http://www.assistivemedia.org/

ONLINE SAFETY, SECURITY, ETHICS, AND


ETIQUETTE

6 | Page
NETIQUETTE

Came from two words “Network” and “Etiquette” that refers to a set of ideals and rules
and good conduct that a netizen should observe in communicating and or publishing
information and materials over the world wide web.

Netizen – Member or part of the online community who uses the internet in different ways.

Online Safety and Security

The Internet, truly, is a powerful tool. It can be used to promote your business, gain new
friends, and stay in touch with the old ones. It is also a source of entertainment. But like
most things in this world, there is always “another side of the coin.” The Internet is one of
the most dangerous places, especially if you do not know what you are doing.

• Let us identify what are the most basic information that could be the source of other
people that might lead you to be riskier and unsafe when you are sharing those
kinds of information.

Internet Threats:

1. Malware – stands for malicious software

Types: Virus, Worm, Trojan, Spyware, Adware

a. Virus – Malicious program designed to replicate itself and transfer from one
computer to another through storage device, internet, or local networks.

b. Worm – a malicious program transfers from one computer to another by any type
of means. Often used computer networks to spread itself. Ex. ILOVEYOU worm,
Love bug worm. Normally corrupt files automatically.

c. Trojan – a malicious program that is disguised as a useful program, but once


installed it will leave your PC unprotected and allows hacker to get your
information.

7 | Page
d. Spyware – a program that runs in the background without you knowing it (spy). It
has the ability to monitor what you are doing and typing through keylogging.

e. Keyloggers – used to record the keystroke done by the users. This is done to
steal their password, or any sensitive information.it can record email, messages,
or any information you type using a keyboard.

f. Adware – a program designed to send you advertisements, mostly as pop-ups.

2. Spam – unwanted email mostly from bots or advertisers. It can be used to send
malware.

3. Phishing – Its goal is to acquire sensitive personal information like passwords and
credit card details. FISHING-ROD, BAIT-FISH / PHISHING-EMAIL-PERSONAL
INFORMATION, MONEY

Think Before You Click

1. Before you post something on the web, ask these questions to yourself: Would you
want your parents or grandparents to see it? Would you want your future boss to see it?
Once you post something on the web, you have no control of who sees your posts.

2. Your friends depend on you to protect their reputation online. Talk to your friends
about this serious responsibility.

3. Set your post to “private.” In this way, search engines will not be able to scan that
post.

4. Avoid using names. Names are easy for search engines to scan.

5. If you feel that a post can affect you or other’s reputation, ask the one who posted it
to pull it down or report it as inappropriate.

Copyright Infringement

A copyright infringement is a violation of an individual or organization's copyright. It


describes the unauthorized use of copyrighted material, such as text, photos, videos,
music, software, and other original content. Violating intellectual property.

• Infringement - the action of breaking the terms of a law, agreement, etc.; violation.

• Intellectual Property - a work or invention that is the result of creativity, such as


a manuscript or a design, to which one has rights and for which one may apply for
a patent, copyright, trademark, etc.

• Plagiarism - to steal and pass off ideas or words of another as one’s own”. Simply
put, plagiarism is the process of taking other people’s words and/or ideas and
pretending that they are your own.

8 | Page
CI- Without permission

P-Without citation or credit

c-p

p-c

Tips to avoid copyright infringement

1. Understand – copyright protects literary works, photographs, paintings, drawings,


films, music and lyrics, choreography, and sculptures, but generally it does not
protect underlying ideas and facts. Meaning you can express something using your
own words but you have to give credits to the source.
2. Be responsible – even if the materials do not say it is copyrighted, it is not a valid
defense against copyright. Be responsible enough to know if something has a
copyright.
3. Be creative – ask yourself whether what you are making is something that came
from you or something made from someone's else's creativity. It is important to
add your own creative thinking in everything that will be credited to you.
4. Know the law – there are some limitations to copyright laws. There are some
copyright laws that last for a lifetime of the author. There are also provisions for
“fair use” meaning intellectual property maybe used without the consent of the
owner. Like, commentaries, research, library, teaching, search engines, criticisms,
news report, etc.

Fair use policy – parody, commentaries, criticism, reporting, search engine , teaching ,
library archiving, research

a. Republic Act No. 8293 - Copyright law of the Philippines in the intellectual
property code of the Philippines, officially known as Republic Act No. 8293. The
law states the principles of convention for the protection of literary and artistic
works, patents, trademarks and other forms of intellectual property.

• The law signed by Former Pres. Fidel V. Ramos on June 6, 1997 and took effect
on January 1, 1998

Source: Copyright law of the Philippines https://ipfs.io

b. Republic Act 10175 - Also known as Cybercrime Prevention Act of 2012 – This
law protects an individual from various unwanted online and cyber act that may
harm or evade one’s privacy and integrity like: Illegal access of computers through
remote means without permission, interception of one’s information from private

9 | Page
conversation, acquisition of passwords and other vital information, computer
forgery, and libel.
c. Republic Act 10627 - Also known as Anti-Bullying Act of 2013
Defined as severe or repeated use by one or more students of a written, verbal,
electronic or physical gesture or any combination thereof directed to another
student that has the effect of actually causing or placing physical or emotional harm
or damage to property.

V. MODULE SUMMARY
Information and Communication Technology or ICT plays an integral part in the
development of the Philippine economy. The Philippines is dubbed as the “ICT Hub of Asia”.
When Tim Berners-Lee created the internet, most of the pages were static, which cannot be
manipulated and referred to as Web 1.0 (Static Webpage). On the other hand, a dynamic
webpage, introduced in web 2.0, is a page where its contents depend on the user or the website
visitor.
Also identified the several features of dynamic webpage, however, the realization of web
3.0 is hampered by several problems. The trends in ICT really shows how technological
advancement helps in the development of our modern world.
Most teenagers spend their time online. It is vital to consider what information you share
because the internet is a public place. There are several internet threats or malware that could
be in the form of virus, worms, etc. We should be responsible for what we post online.

VI. ACTIVITY
a. Website Evaluation – Individual Activity (FOR ONLINE LEARNERS)

Instructions: Based on the sample website given, kindly evaluate those sites following
the instruments of evaluation.

1. https://psa.gov.ph/content/public-advisory-29
2. https://en.wikipedia.org/wiki/Main_Page
3. https://www.youtube.com/
4. https://www.gmanetwork.com/news/
5. https://www.nasa.gov/

Here is the evaluation checklist:


a. Authority
b. Accuracy
c. Objectivity
d. Currency
e. Coverage

10 | Page
Detailed information: https://guides.library.sc.edu/evaluate

WEBSITE EVALUATION CHECKLIST


Website Classification Authority Accuracy Objectivity Currency Coverage
Ex. Google Dynamic 1. Yes 1. Yes 1. yes 1. yes 1. yes
2. yes 2. Yes 2. yes 2. yes 2. yes
3. yes 3. yes
4.
1.Psa
2. Wikipedia
3. Youtube
4. Gma
News
5. Nasa

Example:
Overall impression:
Google website is definitely a reliable website and can be a source of information as it gives
current and up to date information and with variety of option where you can get valid and accurate
information for an type of research. I highly recommend of using this type of website for future
researchers and of any type of individual for research activity.

b. Self-Realization (Short Analysis) - FOR MODULAR LEARNERS


Instructions:
Based on your observation on the digital world, how would you tell the effectiveness of

using social media and other online platforms in delivering information and as a communication

facility without sacrificing the validity and importance of information?

Write your answer in 1page document. (Word file, Paper, or WPS)


RUBRIC

11 | Page
VII. POST EVALUATION
I. Instructions: Write YES if you agree with the statement and NO if you disagree on the
blank before each number.
____ 1. My computer has an antivirus so it’s okay to open most email attachments like e-
cards and video files.
____ 2. Keyloggers are software that allow pop-up ads even if you are not using your
browser.
____ 3. A virus is a malware that multiplies and infects other computers through flash drives.
____ 4. You received an email stating that your mother’s bank account is going to be
forfeited if you do not respond to the email. Is it safe to reply?
____ 5. There is a danger in posting information about a future vacation.

VIII. REFERENCES
WEBSITES / FILES:
http://cyber.law.harvard.edu/readinessguide/intro.html
http://www.gov.ph/2012/09/12/republic-act-no-10175/
http://www.philstar.com/headlines/2014/02/19/1292003/internet-libel-cyber-crime-law-
constitutional
https://www.commonsensemedia.org/video/modal/2078096
https://goo.gl/aLuTFZ
https://guides.library.sc.edu/evaluate
IMAGES
https://tinyurl.com/y4sx88ss

12 | Page
https://tinyurl.com/yxhslojr

https://tinyurl.com/y364mbh9

https://tinyurl.com/yxn45voh

BOOKS: Empowerment Technologies (Innovative Training Works, Inc) – 1st Edition


(Rex Bookstore)

13 | Page

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy