E-Tech and ICT in the Philippines

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following best describes the role of ICT departments in the Philippines?

  • Regulating internet service providers.
  • Managing business process outsourcing (BPO) operations.
  • Planning, developing, and promoting the country's ICT agenda. (correct)
  • Overseeing the manufacturing of computer hardware.

In the context of web development, what is the key distinction between Web 1.0 and Web 2.0?

  • Web 1.0 consists of static pages with hyperlinks, while Web 2.0 enables user interaction and dynamic content. (correct)
  • Web 1.0 supports folksonomy, but Web 2.0 does not.
  • Web 1.0 uses dynamic pages, while Web 2.0 uses static pages.
  • Web 1.0 allows user interaction, whereas Web 2.0 is primarily for reading content.

Which of the following is NOT a typical characteristic of Web 2.0?

  • Rich user experience with dynamic and responsive content.
  • User participation through comments, reviews, and content creation.
  • Static web pages that cannot be manipulated. (correct)
  • Folksonomy, allowing users to categorize information.

Which of the following online activities is considered cyber stalking?

<p>Using the internet or other electronics to stalk individuals. (C)</p> Signup and view all the answers

Which action is MOST aligned with practicing online safety measures?

<p>Regularly reviewing privacy settings and avoiding sharing sensitive information on non-secure sites. (A)</p> Signup and view all the answers

What is the primary purpose of CAPTCHA technology?

<p>To prevent internet bots from performing malicious activities. (C)</p> Signup and view all the answers

What is the term for a type of malware that disguises itself as a normal file or program to trick users into downloading and installing it?

<p>Trojan Horse (A)</p> Signup and view all the answers

What is the main idea behind the principle of 'proximity' in graphic design?

<p>Grouping related elements together to reduce clutter and improve organization. (A)</p> Signup and view all the answers

In the context of color theory, which term refers to the pure spectrum of colors?

<p>Hue (A)</p> Signup and view all the answers

Which file format is known for using lossy compression?

<p>JPEG (B)</p> Signup and view all the answers

Flashcards

E-Tech

Use of technologies like phones and computers to locate, save, communicate, and inform.

Technology

The use of scientific knowledge, experience, and resources to create beneficial processes and products.

Internet

Global system of interconnected computer networks using the Internet Protocol Suite (TCP/IP).

World Wide Web

An information system on the internet with hypertext links.

Signup and view all the flashcards

Web 2.0

Evolution of Web 1.0, adding dynamic pages and user interaction.

Signup and view all the flashcards

Social Media

Website, application, or online channel enabling users to create, discuss, and exchange content.

Signup and view all the flashcards

Online Safety

Practices and safeguards to ensure user safety and privacy while using the internet.

Signup and view all the flashcards

Phishing

An email disguised as a legitimate source to trick users into revealing sensitive information.

Signup and view all the flashcards

Malware

Malicious software disguised as real software, installed secretly to gather private info.

Signup and view all the flashcards

Netiquette

Rules and norms for acceptable online conduct.

Signup and view all the flashcards

Study Notes

  • E-Tech involves using technologies like phones/computers for locating, saving, communicating, and informing, it's innovative and sufficient for daily needs.

ICT (Information and Communications Technology)

  • ICT includes information for decision-making and predicting the future.
  • Communication now relies more on the internet, e-mail, and video conferencing for knowledge acquisition.
  • Technology uses scientific knowledge, experience, and resources to create products.
  • The Philippines is known as the "ICT Hub of Asia" due to the growth of ICT-related jobs like BPO or call centers.
  • ICT departments in the Philippines plan, develop, and promote the country's ICT agenda.
  • A computer is an electronic device that stores and processes data in binary form.
  • The internet is a global system of interconnected computer networks using the TCP/IP protocol suite; "The Net" is another name for it.
  • The World Wide Web is an information system on the internet with documents connected via hypertext links, created by Tim Burners-Lee.
  • Web pages are hypertext documents connected to the World Wide Web.

Web Platforms

  • Web 1.0 is the first version that have static web pages with hyperlinks.
  • Web 2.0 evolved from Web 1.0 by adding dynamic pages for user interaction.
  • Folksonomy in Web 2.0 lets users categorize info with keywords, like tagging with hashtags.
  • Web 2.0 has a rich user experience with dynamic and responsive content.
  • Web 2.0 encourages user participation through comments, reviews, and content creation.
  • Web 2.0 has long tail services are offered on demand.
  • Web 2.0 provides software as a service on a subscription basis.
  • Web 2.0 promotes mass participation through diverse info sharing.
  • Web 3.0 is the semantic web, where machines understand user preferences for content delivery.
  • Web 3.0 aims to provide a framework for data sharing and reuse to target users specifically.
  • Compatibility issues between HTML files, current web browsers, and Web 3.0 remain.
  • Security concerns about saving user preferences in Web 3.0.
  • The vastness of the World Wide Web with billions of pages poses a challenge for Web 3.0.
  • Vagueness of certain words affects Web 3.0 as "old" and "small" are subjective.
  • The reliance on logic in machines presents limitations for predicting user wants in Web 3.0.
  • Convergence is the synergy of tech advancements.
  • Social Media are platforms for creating, discussing, modifying, and exchanging user-generated content.
  • Social Networks connect people with similar interests or backgrounds.
  • Bookmarking Sites let you store and manage links to websites and resources.
  • Social News sites allow users to post news items or links.
  • Media Sharing sites enable uploading and sharing of images, music, and videos.
  • Microblogging is focuses on short updates to subscribers.
  • Blogs and Forums allow users to post their content.

Online Safety

  • Online safety involves practices and precautions.
  • Online safety ensures the safety of users, computers, and personal info from internet crimes.
  • Stalking, identity theft, privacy violations, and harassment are online delinquencies.

Online Safety Measures

  • Never give out personal information over the internet.
  • Do not provide banking/sensitive information unless you know it is a reputable business with secure service and 'https' url.
  • Never access links from emails and type it in manually.
  • Never open messages or attachments from unknown individuals.
  • Review privacy settings to avoid sharing important information.
  • Clear browsing data after using public computers.
  • Keep software updated to avoid security holes.
  • Avoid downloading unknown software.

Online Threats

  • Online threats are from knowledgeable computer users who steal information.

Types of Threats

  • Phishing is disguised as an email from a legitimate source.
  • Pharming is a malicious website that collects usernames and passwords.
  • Internet Scam can be misleading and tries to take private information
  • Internet Bots are networks of computers hijacked by robots.
  • Malware is malicious software disguised as real software.
  • Adware is a type of malware that delivers ads automatically.
  • Spyware spies on user activity.
  • Virus/Worm can replicate by attacking other programs, files, or the boot sector.
  • Worms can enter a network via USB or email.
  • Trojan Horse disguises itself to trick users into downloading and installing malware
  • The "Iloveyou" Virus, also called the "love bug" has infected 10 million computers.
  • The "Iloveyou" Virus caused shutdowns and deletion of files in 2000 and was created by Onel De Guzman and Reonel Ramores.
  • Computer Bug is the malfunction in a computer through its runtime.
  • Cyber Stalking uses the internet to stalk individuals.
  • Cyber Bullying is tormenting, threatening, or harassing someone online.
  • Spam is an unsolicited email/message.
  • Spoofing disguises email addresses, sender names, phone numbers, or website URLs.

Online Ethics and Netiquette

  • Netiquette combines "Network" and "Etiquette" for acceptable conduct.
  • Netiquette includes "Ten Core Rules".
  • One rule of netiquette is to remember the human.
  • One rule of netiquette is to adhere to real-world behavior online.
  • Know where you are in the cyberspace
  • Respect other people's time and bandwidth
  • Make yourself look good
  • Share expert knowledge
  • Help keep flame wars under control
  • Respect other people's privacy
  • Don't abuse your power
  • Be forgiving of other people's mistakes
  • Computer ethics is about privacy and the right to deny or restrict the use of personal information.
  • Authentication verifies user identity.
  • Example of Authentication can be a possessed object (beep/credit cards), biometric, or a callback system.

Contextualized Online Search and Research Skills

  • Includes media and information sources.
  • Indigenous Knowledge is knowledge unique to a culture, contrasting international knowledge.
  • Indigenous Knowledge uses oral traditions for communication and local knowledge.
  • Types of Libraries are physical or digital in form.
  • Libraries can be school, academic, public, or special.
  • Libraries of published books are considered reliable, accurate and valuable.
  • Books reviewed from good sources considered relevant
  • ISSN/ISBN registration ensures standards for materials were followed.
  • When searching the Internet or Online the info can be varied and hard to validate.
  • The Internet is known as Internet Research.

Evaluating Information

  • Consider the Author, Domain Types, Currency, and Fairness.
  • Currency means the information is current.
  • Fairness means the content is presented showing all points of view.
  • Use Several Search Engines to find documents based on specified keywords
  • Google and Yahoo are search engines
  • Relevance and Search Skills are important

Search Skills

  • Use Search Tools
  • Safe Search helps block explicit search results on Google.
  • Restricted Move helps block NSFW content
  • Google Scholar searches for scholarly literature.
  • Reverse Image Search uses an image for searching related content.
  • Search Operators use punctuation to optimize search.
  • Plagiarism is imitating the language of another author.
  • To Avoid Plagiarism, cite sources.
  • Includes Search Tools Skills and Engines for searches
  • Also includes Information Evaluation and Plagiarism

Microsoft Office Stuff

  • With Word you can use Mail Merge to create letters, labels, nametags, or catalogue documents to groups of people.

Imaging and Design

  • Graphics are visual images/designs to inform or illustrate
  • Layout involves planning and arranging graphic elements.
  • Layout uses good balance and make up and alignment of elements.
  • Balance is an equal distribution of weight
  • Symmetrical Balance has evenly allocated elements on both sides
  • Asymmetrical Balance shows different elements on each side of the page.
  • Proximity puts related elements closer to lessen clutter.
  • White Space is the "art of nothing".
  • Alignment means "Nothing should be placed on the page arbitrarily".
  • Repetition means repeating elements for a unified look.
  • Infographics represent info or statistical data.

Principles of effective infographics

  • Be Unique
  • Keep Simple
  • Be Creative and Bold
  • Less is More
  • Importance of Getting it Across
  • Infographic Video/Infomercial visually represents data and knowledge.
  • Color is determined by hue, intensity, and value.
  • Shade darkens the color.
  • Contrast means divergence of opposing elements
  • Hierarchy means arrangement of stuff.
  • Visual Information should gain attention, create meaning and facilitate retention.
  • File Formats encode data for computer files
  • Lossy file formats remove information and lower quality in order to reduce file size
  • Lossless file formats don't remove information.
  • You can adjust the Cropping, Color Balance, Brightness and Contrast in images
  • You can also adjust Filters, Cloning, Changing the background, Removing the colors, and Combining Graphics and Text.
  • You can use visual message design using infographics.
  • You can determine Online file formats for images and text.
  • You can use basic techniques of image manipulation.
  • You can do basic image manipulation using offline or open source software.
  • You can also do Combining text, graphics, and images
  • Uploading, Sharing, and image hosting platforms exist
  • Images are representations of the external form of a person or thing.
  • Images can be 2D or 3D.
  • Images are Captured with optical devices
  • Online Platforms support ICT content development.
  • Online Platforms provide interactive online services.
  • Presentation/Visualization allow people to present, share presentations and videos.
  • Cloud Computing ("The Cloud") is accessible anytime, anywhere.
  • Social Media is are computer-mediated tools to create, share, and exchange content.
  • File Management involves storing, naming, sorting, and handling files.
  • Mapping transforms points from one space to another.
  • Web Page Creation encompasses important elements like color and layout.
  • Web Templates and WYSIWYG Platforms are available.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser