Introduction to Information and Communication Technology PDF
Document Details
Uploaded by Deleted User
Tags
Summary
This document provides an introduction to Information and Communication Technology (ICT). It covers the current state of ICT, including Web Generations, Convergent Technologies, Social Use, and Assistive Technology. It also discusses the dynamic between technology and human society.
Full Transcript
ITSH2301 INTRODUCTION TO INFORMATION AND COMMUNICATION Convergent Technologies TECHNOLOGY...
ITSH2301 INTRODUCTION TO INFORMATION AND COMMUNICATION Convergent Technologies TECHNOLOGY This refers to where two or more independent technologies combine The Current State of ICT to form a new device. A smartphone is a great example where several independent technologies such as a telephone, camera, multimedia Major technology and industry trends and societal and economic from player, and navigation tool are integrated into a single device. today form a complex puzzle. And as society enters the digital world, the dynamic between technology and human society changes in a way Convergent technologies have three key characteristics. First, they that we are now only starting to fully understand. can perform multiple features to serve a blended purpose. Second, they can collect and use data in various formats and let machine Information and Communication Technology (ICT) is a range of learning techniques provide an enhanced user experience. And third, technologies that advance communications. It enables they are interconnected with other devices to offer universal access to communications processes such as broadcast media, networking users. components, and audiovisual processing and transmission systems allowing people and organizations to interact in the digital world. Social Use The current state of ICT is as follows: The developments in ICT have made it possible to connect with people around the world instantly through social media. These are online Web Generations services and tools used for publishing, sharing, and discussing information. This includes social networking sites (Facebook, Twitter, This technology comes from the innovations made from Web 1.0 to Instagram), forums (Reddit), community blogs (WordPress), and Web 2.0. Web 1.0 is the first generation of the Internet that Tim video-hosting sites (YouTube, Twitch) all aiming to provide faster and Berners-Lee pioneered in 1990 by writing fundamental technologies more interactive communication online. that became the foundation of the world wide web and the first webpage browser. Web 2.0 is the shift that happened in how the Assistive Technology internet is used in the past 15-20 years. Making it possible for user- generated content to be viewed by people around the world in an It is any device, application, or equipment that supports people with instant. disabilities to learn, communicate, and function with ease and comfort according to their condition. Applications such as ChromeVox which Furthermore, Web 2.0 has been driven by innovations such as internet is a screen reader extension on Google Chrome and Capti which is access and social networks that enable the dominance of applications used to easily listen to books online, listen to the news, and convert that expanded online interactivity and utility. DOC and PDF files to speech are examples of this technology. Web 3.0 represents the next phase of this evolution of the Internet and Other examples include speech-to-text, transcription, and subtitles could be as disruptive as Web 2.0 as it is built on the concepts of features to help people with hearing problems and magnifier decentralization which aim for data to be stored in multiple locations applications for people with eyesight problems. simultaneously and not on a single server like how the Web 2.0 does, openness as being open-source software, and greater user utility The current state of ICT further brings society in understanding its using machine learning to enable computers to produce faster and benefits and how it can empower in achieving various social changes. more relevant results. 01 Handout 1 *Property of STI [email protected] Page 1 of 4 ITSH2301 Online Systems and Platforms Search: The search engine translates inputted words into terms that relate to its index using natural language Online systems and platforms are a variety of services available on processing (NLP) which uses machine learning to understand the Internet. It includes online marketplaces, search engines, creative a query. The search engine then accesses its index to find content outlets, and communication platforms that users interact with according to their needs. web pages that match the query. Rank: Search engines have algorithms used to present a list Marketplaces of results organized by what it thinks is the best answer to the query based on matching the keywords used, prioritizing high- The two important features of an online marketplace are the sellers quality page content, and using personal information to tailor and buyers that trade products and services on an e-commerce results to the user. website. Lazada, Foodpanda, and Facebook Marketplace are a few of the leading online stores in the Philippines that offers a wide range of Creative Content Outlets products to their buyers, from clothes, food, and other essential needs. These are websites that utilize different types of media to In recent times, there has been an increase in interest in pursuing communicate products, services, and the person or brand itself. businesses online as it offers more benefits compared to traditional selling as it allows the business to function 24/7, it serves as an Creative content can refer to any of the following: additional source of income, and it lessens marketing costs. Buyers also see this opportunity to shop in the comfort of their homes, Blog – it is written content run by a team or an individual, compare prices across the platform, and have a wide range of options. referred to as a blogger, that shares their opinion and knowledge on several topics for a target audience. Search Engines WordPress, Tumblr, and LinkedIn are some of the common platforms for blog content. A search engine is a web-based tool designed to retrieve information Video –creative video ranges from brand videos, animation, online specific to what the users need. Familiar examples include and educational videos to vlogs. This is a popular way to get Google, Yahoo!, and Microsoft Bing. a message across as video combines movement, sound, and text. YouTube, streaming sites, and learning management Every search engine uses different ways to generate results by systems are the common platforms for this. crawling and indexing all the data on the web and ranking them by relevance. Infographics – it is a collection of visual representations of information and data such as charts and graphs with minimal Crawl – web crawlers, also known as spiders, constantly text compared to a traditional presentation or reports. It is search the internet, find new sites, and identify new links to be commonly used for email marketing, educational purposes, used. and social media ads. Index: The gathered data by the crawlers is then analyzed, Online creative content also covers art, literature, sound, and writings organized, and stored in an index for engines to find the posted and published on the Internet. information quickly when searched. 01 Handout 1 *Property of STI [email protected] Page 2 of 4 ITSH2301 Communication Platforms 2. Do not disclose too much information: People find comfort and joy in sharing everything online through images, videos, and These are best used in achieving better collaboration and connection posts. It is advisable to limit posting personal information to not with anyone across different distances. A communication platform is jeopardize the safety and mental health of the user. commonly used by businesses, organizations, and even individuals 3. Cross-check a website: Phishing, which is an illegal way of for a faster exchange of information. pretending to be a legitimate website, is rampant these days. Make sure the correct link and spelling are observed before doing Examples include the following: any communication and transaction online. Microsoft 365 – it is a productivity tool that includes MS 4. Click links accordingly – As the Internet becomes more widely Teams, OneDrive could storage, and Office apps best for accessible to everyone, the risks become more subtle and smart. browsing, editing, and storing documents from Microsoft Links can be shortened to hide the full address for convenience Office. but can also be used to contain malware that activates in a single Google Workspace – it is a web-based tool that assures click. It is best advised to never click shortened links unless it secured collaboration and productivity apps for businesses. comes from a reputable source. Examples include Gmail, Google Drive, and Google Sheets. Online Security safeguards confidential information against Dropbox – it is a user-friendly cloud-sharing solution for dangerous attacks and cybercrimes. Here are some major security managing shared files, reducing email needs, and improving measures to consider online: collaboration between employees. 1. Password Security: Websites require a strong password that Online Safety, Security, and Etiquette meets the usual standard of more than eight (8) alphanumeric characters, additional symbols, and proper caps lock. Aside from Aside from extensive efforts to abide by the enacted cyber laws, it is not using any personal information such as birthdays, full names, still the main responsibility of the user to explore and use cyberspace or addresses for passwords, it is advisable to use a password that with heightened safety precautions, security measures, and proper is easy to remember to avoid constant account locks. Do not use online etiquette. the same password on multiple websites as well to avoid a bigger data breach. Online Safety is the means wherein users can defend themselves against possible dangers online. Here are some major safety 2. Multi-factor Authentication: Aside from having strong precautions to consider online: passwords, authentication using biometrics and PINs are considered more secure now. Apply multi-factor authentication 1. Never trust anyone: In this social media world, it is easier to that requires OTP (One-time Password), fingerprints, and facial make connections with different people. Emotions are often put recognition that sends a notification each time a failed attempt is first instead of critical thinking when it comes to disclosing made. information online. Never trust anyone online unless extremely necessary. Look for safer alternatives that can avoid recording and saving information that might be used as leverage in the future. 01 Handout 1 *Property of STI [email protected] Page 3 of 4 ITSH2301 3. Installing Anti-virus: For each time a suspicious link is clicked, 4. Be prepared and minimize distractions: Online meetings, an installed anti-virus can provide early detection of possible seminars, and lectures are starting to become a norm. It is viruses it may bring. Installing anti-virus programs help clean and advisable to be prepared each time before entering any online maintain the device to avoid data breach as well as system activity by checking if the camera and mic work and by making corruption. sure that distractions are limited such as a busy background and noisy environment. 4. Backup Storage: Files from a computer must be stored in a backup that is either cloud storage or a hard drive. This is a 5. Avoid misinformation: With the influx of available information, it healthy way of securing files and information in case a breach or is advisable to validate any form of information such as news, manipulation happens as it prepares additional copies to replace articles, infographics, and blogs before sharing them with others. whichever was lost. Checking the source and looking for a reputable source that shared the same information is one way to verify information Online Etiquette is the idea of behaving with kindness and respect to online. others who utilize the benefits and advantages of the Internet. Here are some major proper online etiquettes. 1. Proper use of tone: No matter whether in written or audio, using the proper tone to get the message across is crucial in a conversation. All caps and excessive exclamation points in a sentence can either mean excitement or anger. It can be difficult for the receiver to respond and can create conflicts. Observe proper use of tone by considering the situation and the setting of the conversation. 2. Proofreading the message: The instantaneous benefit of online References: communication is a double-edged sword that can cause major Investopedia (2022). Web 3.0 explained, plus the history of web 1.0 and 2.0 problems. Rushing a report leading to missing vital information [Web Article]. Retrieved on January 18, 2023, from causes a bad reputation and sending a message without https://www.investopedia.com/web-20-web-30-5208698 Kotrotsios, G. (2021). Data, new technologies, and global imbalances: proofreading that escalates a situation are just some adverse Beyond the obvious. Cambridge Scholars Publishing. effects if proofreading is neglected. Read the text and information Neeva (2021). What is a search engine? [Web Article]. Retrieved on January as necessary as possible and correct any grammatical and 18, 2023, from https://neeva.com/learn/what-is-a-search-engine spelling errors. Rauv S. (2021). 15 essential collaboration and communication platforms and software to use. [Web Article]. Retrieved on January 18, 2023, from 3. Respect for privacy: Technical skills can be learned online, https://www.elcom.com.au/resources/blog/15-essential- especially ways how to hack or snoop on confidential information. communication-platforms-and-software-to-use Never attempt a forced entry to someone’s account or system Webretailer (2023). The world’s top online marketplaces. [Web Article]. without their permission. Personal privacy should be respected Retrieved on January 18, 2023, from https://www.webretailer.com/marketplaces-worldwide/online- and should not be used in performing cybercrime. marketplaces/ 01 Handout 1 *Property of STI [email protected] Page 4 of 4