ETECH - Ntroduction To ICT
ETECH - Ntroduction To ICT
ETECH - Ntroduction To ICT
EMPOWERMENT
TECHNOLOGIES
(Applied Subject)
Module 1
“Introduction to Information and
Communication Technologies and
Rules of Netiquette”
I. GENERAL OVERVIEW
1. Improve your knowledge on how ICT affects our everyday lives and the state of
our nation.
2. Compare and contrast the differences between online platforms, sites, and
content;
3. Understand the features of web 2.0, 3.0 and learn the different trends in ICT and
use them to their advantage.
Rules of Netiquette:
1. Consider one’s and others’ safety when sharing information using the internet;
2. Determine and avoid the danger of the internet;
3. Be responsible in the use of social networking sites and use it effectively and
properly through proper referencing.
Instructions: Analyze the questions and write your answer on a separate document, or
piece of paper.
1. How do you understand a webpage and a website?
2. How would you differentiate static web to dynamic web to semantic web?
3. Why do we need to use social media online platforms?
4. How safe are you in using social media sites?
5. What is the importance of web security?
TRIVIA/GLOSSARY OF TERMS
1. Assistive Media - a component under Assistive technology (AT), which is a
generic term used to refer to a group of software or hardware devices by which
people with disabilities can access computers.
2. Collaborative platforms - “is a category of business software that adds broad
social networking capabilities to work processes.”
3. Convergent Technologies - an extension of the term convergence which means a
“coming together of two or more disparate disciplines or technologies.
1 | Page
4. Information and Communications Technology (ICT) - ICT (information and
communications technology - or technologies) is an umbrella term that includes
any communication device or application, encompassing: radio, television,
cellular phones, computer and network hardware and software, satellite systems
and so on, as well as the various services and applications associated with them,
such as videoconferencing and distance learning.
5. Mobile Media - This refers to “media devices such as mobile phones and PDA’s
were the primary source of portable media from which we could obtain
information and communicate with one another.
6. Online systems - Are online versions of information systems which is “the
process of and tools for storing, managing, using and gathering of data and
communications in an organization.
7. Social Media - “are computer-mediated tools that allow people or companies to
create, share, or exchange information, career interests, ideas, and
pictures/videos in virtual communities and networks.”
8. Web 2.0 - “describes World Wide Web sites that emphasize user-generated
content, usability, and interoperability.
9. Web 3.0 - “a phrase coined by John Mark off of the New York Times in 2006,
refers to a supposed third generation of Internet-based services that collectively
comprise what might be called ‘the intelligent Web”.
The World Wide Web (WWW) is a combination of all resources and users on the
Internet that are using the Hypertext Transfer Protocol (HTTP). A broader definition
comes from the World Wide Web Consortium (W3C): "The World Wide Web is the
universe of network-accessible information, an embodiment of human knowledge.
2 | Page
The World Wide Web Consortium (W3C) is an international community where Member
organizations, a full-time staff, and the public work together to develop Web standards
When the World Wide Web was invented, most web pages were static. Static (also known
as flat page or stationary page) in the sense that the page is “as is” and cannot be
manipulated by the user. The content is also the same for all users. This is referred to as
Web 1.0.
Web 2.0 is the evolution of Web 1.0 by adding dynamic web pages—the user is able to
see a website differently than others. Examples of Web 2.0 include social networking
sites, blogs, wikis, video sharing sites, hosted services, and web applications.
Web 2.0 allows users to interact with the page: instead of just reading a page, the user
may be able to comment or create a user account. Web 2.0 also allows users to use web
browsers instead of just using their operating system. Browsers can now be used for their
user interface, application software (or web applications), and even for file storage.
3 | Page
FEATURES OF DYNAMIC WEBSITES
According to the W3C, “The Semantic Web provides a common framework that allows
data to be shared and reused across application, enterprise, and community boundaries.”
The aim of Web 3.0 is to have machines (or servers) understand the user’s preferences
to be able to deliver web content specifically targeting the user.
The Semantic Web is a movement led and proposed by the World Wide Web Consortium
(W3C).
The W3C standard encourages web developers to include semantic content in their web
pages.
4 | Page
Several problems of Web 3.0
1. Compatibility - HTML files and current web browsers could not support Web 3.0.
2. Security - The user’s security is also in question since the machine is saving his or her
preferences.
3. Vastness - The World Wide Web already contains billions of web pages.
4. Vagueness - Certain words are imprecise. The words “old” and “small” would depend
on the user.
5. Logic - Since machines use logic, there are certain limitations for a computer to be able
to predict what the user is referring to at a given time.
2. Social Media
Social media is a website, application, or online channel that enables web users to create,
co-create, discuss, modify, and exchange user-generated content.
1. Social Networks. These are sites that allow you to connect with other people with
the same interests or background. Ex. Facebook
2. Bookmarking Sites. These are sites that allow you to store and manage links to
various websites and resources. Ex. Pinterest, StumbleUpon
3. Social News. These are sites that allow users to post their own news items or
links to other news sources. Ex. Reddit and Digg
5 | Page
4. Media Sharing. These are sites that allow you to upload and share media content
like images, music, and video. Ex. Youtube, Instagram, and Flicker
5. Microblogging. These are sites that focus on short updates from the user. Ex.
Twitter and Plurk
6. Blogs and Forums. These websites allow users to post their content. Ex.
Blogger, Wordpress, and Tumblr.
3. Mobile Technologies
The popularity of smartphones and tablets has taken a major rise over the years. This is
largely because of the devices’ capability to do tasks that were originally found in personal
computers.
- SYMBIAN
4. Assistive Media
Assistive media is a nonprofit service designed to help people who have visual and
reading impairments. A database of audio recordings is used to read to the user.
http://www.assistivemedia.org/
6 | Page
NETIQUETTE
Came from two words “Network” and “Etiquette” that refers to a set of ideals and rules
and good conduct that a netizen should observe in communicating and or publishing
information and materials over the world wide web.
Netizen – Member or part of the online community who uses the internet in different ways.
The Internet, truly, is a powerful tool. It can be used to promote your business, gain new
friends, and stay in touch with the old ones. It is also a source of entertainment. But like
most things in this world, there is always “another side of the coin.” The Internet is one of
the most dangerous places, especially if you do not know what you are doing.
• Let us identify what are the most basic information that could be the source of other
people that might lead you to be riskier and unsafe when you are sharing those
kinds of information.
Internet Threats:
a. Virus – Malicious program designed to replicate itself and transfer from one
computer to another through storage device, internet, or local networks.
b. Worm – a malicious program transfers from one computer to another by any type
of means. Often used computer networks to spread itself. Ex. ILOVEYOU worm,
Love bug worm. Normally corrupt files automatically.
7 | Page
d. Spyware – a program that runs in the background without you knowing it (spy). It
has the ability to monitor what you are doing and typing through keylogging.
e. Keyloggers – used to record the keystroke done by the users. This is done to
steal their password, or any sensitive information.it can record email, messages,
or any information you type using a keyboard.
2. Spam – unwanted email mostly from bots or advertisers. It can be used to send
malware.
3. Phishing – Its goal is to acquire sensitive personal information like passwords and
credit card details. FISHING-ROD, BAIT-FISH / PHISHING-EMAIL-PERSONAL
INFORMATION, MONEY
1. Before you post something on the web, ask these questions to yourself: Would you
want your parents or grandparents to see it? Would you want your future boss to see it?
Once you post something on the web, you have no control of who sees your posts.
2. Your friends depend on you to protect their reputation online. Talk to your friends
about this serious responsibility.
3. Set your post to “private.” In this way, search engines will not be able to scan that
post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other’s reputation, ask the one who posted it
to pull it down or report it as inappropriate.
Copyright Infringement
• Infringement - the action of breaking the terms of a law, agreement, etc.; violation.
• Plagiarism - to steal and pass off ideas or words of another as one’s own”. Simply
put, plagiarism is the process of taking other people’s words and/or ideas and
pretending that they are your own.
8 | Page
CI- Without permission
c-p
p-c
Fair use policy – parody, commentaries, criticism, reporting, search engine , teaching ,
library archiving, research
a. Republic Act No. 8293 - Copyright law of the Philippines in the intellectual
property code of the Philippines, officially known as Republic Act No. 8293. The
law states the principles of convention for the protection of literary and artistic
works, patents, trademarks and other forms of intellectual property.
• The law signed by Former Pres. Fidel V. Ramos on June 6, 1997 and took effect
on January 1, 1998
b. Republic Act 10175 - Also known as Cybercrime Prevention Act of 2012 – This
law protects an individual from various unwanted online and cyber act that may
harm or evade one’s privacy and integrity like: Illegal access of computers through
remote means without permission, interception of one’s information from private
9 | Page
conversation, acquisition of passwords and other vital information, computer
forgery, and libel.
c. Republic Act 10627 - Also known as Anti-Bullying Act of 2013
Defined as severe or repeated use by one or more students of a written, verbal,
electronic or physical gesture or any combination thereof directed to another
student that has the effect of actually causing or placing physical or emotional harm
or damage to property.
V. MODULE SUMMARY
Information and Communication Technology or ICT plays an integral part in the
development of the Philippine economy. The Philippines is dubbed as the “ICT Hub of Asia”.
When Tim Berners-Lee created the internet, most of the pages were static, which cannot be
manipulated and referred to as Web 1.0 (Static Webpage). On the other hand, a dynamic
webpage, introduced in web 2.0, is a page where its contents depend on the user or the website
visitor.
Also identified the several features of dynamic webpage, however, the realization of web
3.0 is hampered by several problems. The trends in ICT really shows how technological
advancement helps in the development of our modern world.
Most teenagers spend their time online. It is vital to consider what information you share
because the internet is a public place. There are several internet threats or malware that could
be in the form of virus, worms, etc. We should be responsible for what we post online.
VI. ACTIVITY
a. Website Evaluation – Individual Activity (FOR ONLINE LEARNERS)
Instructions: Based on the sample website given, kindly evaluate those sites following
the instruments of evaluation.
1. https://psa.gov.ph/content/public-advisory-29
2. https://en.wikipedia.org/wiki/Main_Page
3. https://www.youtube.com/
4. https://www.gmanetwork.com/news/
5. https://www.nasa.gov/
10 | Page
Detailed information: https://guides.library.sc.edu/evaluate
Example:
Overall impression:
Google website is definitely a reliable website and can be a source of information as it gives
current and up to date information and with variety of option where you can get valid and accurate
information for an type of research. I highly recommend of using this type of website for future
researchers and of any type of individual for research activity.
using social media and other online platforms in delivering information and as a communication
11 | Page
VII. POST EVALUATION
I. Instructions: Write YES if you agree with the statement and NO if you disagree on the
blank before each number.
____ 1. My computer has an antivirus so it’s okay to open most email attachments like e-
cards and video files.
____ 2. Keyloggers are software that allow pop-up ads even if you are not using your
browser.
____ 3. A virus is a malware that multiplies and infects other computers through flash drives.
____ 4. You received an email stating that your mother’s bank account is going to be
forfeited if you do not respond to the email. Is it safe to reply?
____ 5. There is a danger in posting information about a future vacation.
VIII. REFERENCES
WEBSITES / FILES:
http://cyber.law.harvard.edu/readinessguide/intro.html
http://www.gov.ph/2012/09/12/republic-act-no-10175/
http://www.philstar.com/headlines/2014/02/19/1292003/internet-libel-cyber-crime-law-
constitutional
https://www.commonsensemedia.org/video/modal/2078096
https://goo.gl/aLuTFZ
https://guides.library.sc.edu/evaluate
IMAGES
https://tinyurl.com/y4sx88ss
12 | Page
https://tinyurl.com/yxhslojr
https://tinyurl.com/y364mbh9
https://tinyurl.com/yxn45voh
13 | Page