Empowerment Technology Reviewer PDF
Document Details
![EncouragingSugilite8466](https://quizgecko.com/images/avatars/avatar-8.webp)
Uploaded by EncouragingSugilite8466
Gateways Institute of Science and Technology Cogeo
XORFFEJH P FORMENTO
Tags
Summary
This document is a review of information and communication technology (ICT), internet safety, and different types of malware. It covers topics like convergent technologies, social media, mobile technologies, types of web pages and online safety rules. The document is aimed at 11th grade high school students.
Full Transcript
EMPOWERMENT TECHNOLOGY REVIEWER BY : XORFFEJH P FORMENTO 🐟 11 HUMSS MID B PRESIDENT WEEK 1 ICT (INFORMATION AND COMMUNICATION TECHNOLOGY) - Process of data, Using different hardware and software 1. Education 2. Commerce 3. Telecommunication 4. Media and Visual Arts...
EMPOWERMENT TECHNOLOGY REVIEWER BY : XORFFEJH P FORMENTO 🐟 11 HUMSS MID B PRESIDENT WEEK 1 ICT (INFORMATION AND COMMUNICATION TECHNOLOGY) - Process of data, Using different hardware and software 1. Education 2. Commerce 3. Telecommunication 4. Media and Visual Arts 5. Design and music 6. Health services Philippines is dub as the “ICT HUB OF ASIA” CURRENT STATE OF ICT Convergent Technologies - ( due to advance technology, different device are combined into one device. ) Social Media - (software applications or platform) Mobile Technologies - (devices that are easy to transport, technology have made t2m smaller and more compact ) WORLD WIDE WEB - allows documents to be connected to other documents by hyperlinks Introduce by Tim Berners-Lee in 1989 INTERNET - connection between computers and other network WEBSITE - webpages that contains is text, images , videos , etc. WEB BROWSER - software that is used to view website URL (Uniform Resource Locator) - resources from different terminal and webpage. TYPES/VERSION OF WEB PAGES WEB 1.0 ( Read only ) -statistic and did not provide interactive content WEB 2.0 ( comment, sharing, collab) - allowed interactivity WEB 3.0 ( Executive ) -improved version, semantic web pages, data and information are being used and reused across the web. TYPES OF SOCIAL MEDIA 1. Microblogging ( twitter ) - short updates and limited character count 2. Photo and Video Sharing Apps ( Snapchat, Instagram ) 3. Professional Networking Sites ( Link IN ) 4. Discussion Forums ( Quora ) - engage in conversation specific topics of interest 5. Blogging Platform ( Blogger and WordPress ) - publishing longer - form content 6. Video Sharing Platforms ( YouTube ) 7. Live streaming Platform ( twitch ) 8. Social Booking App ( Flipboard ) 9. Location - Based Social Networks ONLINE PLATFORM - digital framework or infrastructure that provides a variety of services, tools, or resources to user over the internet WEEK - 2 ONLINE SAFETY AND SECURITY INTERNET SAFETY - safety of people and their information when using internet NETIQUETTE - network etiquette, do's and don'ts CORE RULES OF NETIQUETTE 1. Remember the human 2. Adhere to the same standards of behavior online that follow in real life. 3. Know where you are in cyberspace. 4. Respect other people's time and bandwidth. 5. Make yourself look good online. 6. Share expert knowledge 7. Help keep flame war under control 8. Respect other people's privacy 9. Don't abuse your power. 10. Be forgiving to other people's mistakes. INTERNET - ( Information superhighway ) TIPS TO STAY SAFE ONLINE Mind what you share online and site you share it to. Read the terms and conditions Check out the privacy policy page of a website know the security features of the social networking site. Do not share password Avoid logging in public network/wifi Do not talk to strangers Never post anything about a future vacation Add friend you know real life Avoid visiting untrusted websites Install and update an antivirus software Make wifi private Avoid downloading from untrusted website. WEEK - 3 INTERNET MALWARE ( Malicious software ) - intentionally design to cause disruption KINDS OF MALWARE 1. VIRUS - design to replicate itself 2. WORM - Transfers on computer to another Ex : ily 3. TROJAN - disguise as a useful program, leave you PC unprotected 4. SPYWARE - ability to monitor what you are doing and typing through keylogging 5. ADWARE - Send advertisement, pop ups 6. RONSOMWARE - threatens to publish the victim's data and perpetual 7. SPAM - Unwanted mail mostly bots or advertisers. 8. PHISHING - acquire sensitive personal, password and credit card details. 9. PHARMING - Exploit the DNS ( Domain name service ) system or scam. THINK BEFORE YOU CLICK T - True? H - Helpful? I - Inspiring N - Necessary K - Kind?