Empowerment Technology & Online Safety - ETECH Q1 Reviewer - PDF

Summary

This document discusses empowerment technology, focusing on online platforms, social media, and virtual conferences. It also details online safety, including measures to protect personal information and prevent malware and phishing attacks.

Full Transcript

Empowerment Technology Assistive Media Quarter 1 Reviewer an online audio reading accessibility service for people with visual or perceptual impai...

Empowerment Technology Assistive Media Quarter 1 Reviewer an online audio reading accessibility service for people with visual or perceptual impairments. Online Platforms are specially developed platforms using Internet Online Safety technology for the design and development of refers to the measures and precautions taken to teaching and learning purposes. protect individuals and their personal information are digital spaces or websites where individuals while using the internet. and businesses can interact, exchange information, products, or services, typically Best Practice: facilitated through the internet. They often serve o Use strong, unique passwords for as intermediaries connecting users with various different accounts. forms of content, communication, or commerce. o Keep your personal information private to avoid identity theft. Social Networking Sites (SNS) o Do NOT connect to public Wi-Fi. These are online platforms primarily designed to o Do NOT trust everyone. facilitate connections and interactions between individuals or groups. Users create Online Security profiles, establish connections with other users encompasses the protective measures and (often called "friends" or "followers"), and share technologies implemented to safeguard digital personal information or updates with their systems, networks, and data from unauthorized network. SNS focus on building and maintaining access, breaches, or cyberattacks. relationships within a digital network. Examples: LinkedIn, Facebook, Twitter, Best Practice: Instagram, Tiktok, YouTube, etc. o Use firewalls and antivirus software defend against malicious software. Social Media o Use multi-factor authentication. is a broader term that encompasses various o Always update your software and online platforms and technologies that enable the operating system. creation, sharing, and exchange of content o Be careful of suspicious links. with a wide audience. While SNS are a subset of social media, social media also includes video- MALWARES (Malicious Software sharing platforms like Metacafe, Vimeo any malicious program or code with an intention Twitter, Instagram, YouTube, and TikTok, to steal data, and damage computer systems. where the emphasis is often on content creation, discovery, and engagement with a broader Types of Malware: audience beyond personal connections. Worm Virus Virtual Conferences Trojan are events that take place online, where Spyware participants from different locations can engage Adware in presentations, discussions, and networking Ransomware activities via the internet, without the need for physical presence. Other Online Threats: Examples: Zoom, Google Meet, Skype, SPAM - unwanted email mostly from bots or Microsoft Teams, TeamViewer advertisements. It can be used to send malware. PHISHING – involves getting a user to enter Movie/Film Streaming Service personal information via a fake website. Its goal A streaming application is a software program or is to acquire sensitive personal information like mobile app that enables users to access and view passwords and credit card details. This is done by digital content, such as videos, music, or live sending you an email that will direct the user to broadcasts, in real-time over the internet without visit a website and be asked to update his/her the need to download the entire file before username, password, credit card, or personal playback. information. Examples: Netflix, Viu, WeTV, iQiy, Loklok CYBERSTALKING - is a form of online harassment and intimidation in which an Online Learning Platform individual uses digital communication tools and Examples: Coursera, edX, moodle, udemy, platforms to target another person repeatedly and KhanAcademy obsessively, causing fear, distress, or harm. CYBERBULLYING - refers to the deliberate use Mobile Technology of digital communication tools, such as social technology that goes where the user goes. It media, text messages, or emails, to harass, consists of portable two-way communications threaten, or humiliate someone, often repeatedly devices, computing devices and the networking and with the intention of causing emotional technology that connects them. distress or harm. Examples: Smartphones, Tablet PCs INTERNET SCAM / SCAMMING - is a fraudulent scheme conducted online with the aim of deceiving individuals or organizations to gain unauthorized access to their personal EXCEL FUNCTIONS/FORMULAS information, money, or valuable assets. SUM CYBEREXTORTION - is a criminal act in which AVERAGE individuals or groups use threats or coercion MIN through digital means to extract money, MAX information, or other valuables from their victims, COUNT often in exchange for not disclosing damaging or IF sensitive information or preventing the release of malware that could harm the victim's digital Google Sheets – an alternative application for Microsoft assets. Excel. Computer Ethics - refers to the moral principles and Microsoft PowerPoint - uses slides to convey guidelines that govern the behavior of individuals and information rich in multimedia. The term "slide" refers to organizations in the realm of computing and technology. the slide projector, which this software effectively replaces. Netiquette (Network Etiquette) - is a set of rules for behaving properly online that a netizen should observe in Google Slides – an alternative application for Microsoft communicating and/or publishing information and PowerPoint. materials over the World Wide Web and in ICT in general. Microsoft Word - is a graphical word processing program Online Research - It is a method in which researchers that users can type with. Its purpose is to allow users to can collect data via the Internet. - It is also referred to as type and save documents. Internet Research, Internet Science or iScience, or Web- based methods. Google Docs – an alternative application for Microsoft Word. Online Search - It is the process of interactively searching and retrieving requested information via a Infographics - also known as data visualization, computer from online databases. information design, and communication design are graphic visual representations of information, data, or Web Browser - an example of application software knowledge intended to present information quickly and containing address bar that is developed to retrieve and clearly. view the information from web pages or HTML files present on the web servers. Examples: Google Chrome, Image - An image is a representation of the external form Mozilla Firefox, Microsoft Edge, Opera, Safari. of a person or thing in art. Images may be 2-dimensional, such as a photograph or screen display, or 3-dimensional, Search Engine - a kind of website through which users such as a statue or hologram. can search (through a search bar) the content available on the Internet. For this purpose, users enter the desired Image Manipulation - Also known as image retouching, keywords into the search field. Examples: Google, which involves changing or altering an image in the way Yahoo, Bing, Ecosia you want it to be. Different software/apps are used in manipulating images to make the image more appealing Issues with Online Research: and enticing to the eye of the viewer. Examples of Image Manipulation Software: Adobe 1. Copyright Infringement - occurs when a Photoshop, GIMP, Adobe Lightroom, Fotor, and copyrighted work is reproduced, distributed, Photoscape performed, publicly displayed, or made into a derivative work without the permission of the Batch Editing – the process of editing multiple pictures copyright owner. at once using one setting. 2. Plagiarism – is taking someone else’s work as Common Image Manipulation Techniques: your own by: 1. Cropping – It is a process of removing unwanted a) cutting and pasting from other sources, parts of the image, focusing only on the subject. b) quoting or paraphrasing without a citation, 2. Color Balance – this tool will allow you to make c) re-using own previously marked work. changes in the mixture of colors in an image. 3. Brightness or Contrast – It makes the image Productivity Tools: darker or lighter. 4. Compression or Resizing – A process applied Microsoft Excel - Is an electronic spreadsheet used to to a graphics file to minimize its size. manipulate numerical data with formulas & built-in 5. Filters – This gives your image a twist from its functions. It enables users to format, organize, analyze, original look. and calculate data easily in a spreadsheet. 6. Cloning or Double Exposure – an image retouching tool that allows you to copy an area of Excel Workbook is a spreadsheet program file that you the image and paint it in a new place. create in Excel. A workbook contains one or more 7. Combining Text & Image – Compositions must worksheets. be planned and conceptualized first so that you will be able to render the best image and Excel worksheet (also known as a spreadsheet) message possible. consists of cells in which you can enter text, numbers, and calculation lined up in columns and rows. Image File Formats:.JPEG.GIF.PNG.TIFF.PSD Online Creation Tools Refer to web-based software and digital environments that enable individuals and organizations to generate, design, edit, or produce a wide range of digital content, such as graphics, videos, music, websites, and more. 1. Graphic Design and Image Editing 2. Website Design 3. Music Production 4. Animation and Cartoon Creation 5. Broadcast Production Cloud Programming Language - a computer language that are used to create software applications and operating systems. Markup Language - a computer language used to structure and format text and other content on a webpage. It can also enhance a document and add hypertext. HTML – Hypertext Markup Language HTML Element and Tags: - a tag that declares the content as an HTML document. - a tag that is placed at the beginning of the other HTML tags. - a tag that displays a text in the title bar. - a tag that modifies the body of a web page. to - a tag that defines headings. - a tag that defines a paragraph. - a tag that changes the text to boldface. - a tag that changes the text to italic. - a tag that underlines a text. - a tag that is used to place a text to the next line and has no closing tag. - a tag that is used to put text in the center. - a tag used to move text in a web page either left to right or vice versa, or top to bottom or vice versa. Slash ( / ) – used in HTML to indicate closing or end tag. WYSIWYG (pronounced as "wiz-ee-wig") - It is an acronym for "what you see is what you get". A type of editing software that allows users to see and edit content in a form that appears as it would when displayed on a web page. Text Editor – for learning HTML, a simple text editor like Notepad (PC) or TextEdit (Mac) are recommended. Advantages of HTML editors: Quick time development Little knowledge of HTML needed for basic pages Works much like any popular word processor Controls file structure within the program

Use Quizgecko on...
Browser
Browser