Full Transcript

LESSON 4 - WEB WEB (World Wide Web) consists of information organized into Web pages containing text and graphic images larger collection of interconnected documents or content. It contains hypertext links, or highlighted keywords and images that lead to related information. WEB SITE...

LESSON 4 - WEB WEB (World Wide Web) consists of information organized into Web pages containing text and graphic images larger collection of interconnected documents or content. It contains hypertext links, or highlighted keywords and images that lead to related information. WEB SITE A collection of linked Web pages that has a common theme or focus HOME PAGE The main page that all of the pages on a particular Web site are organized around and link back to Timothy John Berners- Lee also known as TimBL is an English engineer and computer scientist best known as the inventor of the World Wide Web He is a Professorial Fellow of Computer Science at the University of Oxford and a professor at the Massachusetts Institute of Technology. Web 1.0 (Read Only Static Web) It is an old internet (1991-2004) only allows people to read from the internet First stage worldwide linking web pages and hyperlink. Web is use as "information portal". It uses table to positions and align elements on page. EX. Yahoo, ethernet Most read only web. If focused on company's home pages. Dividing the world wide web into usable directories It means web is use as "Information Portal" It started with the simple idea "put content together" ○ Web 1.0 sites are static They contain information that might be useful, but there's no reason for a visitor to return to the site later An example might be a personal webpage that gives information about the site's owner, but never changes ○ Web 1.0 sites aren't interactive Visitors can only visit these sites; they can't impact or contribute to the sites. ○ Web 1.0 applications are proprietary Under the Web 1.0 philosophy, companies develop software applications that users can download, but they can't see how the application works or change it. DISADVANTAGE ○ The number of content creators was limited and the consumers of the were huge in number content ○ Lack of standards Web 2.0 (Read-Write Interactive Web) A term used to describe a new generation of Web services and applications with an increasing emphasis on human collaboration. It is a platform that gives users the possibility (liberty) to control their data. This is about user-generated content and the read-write web People are consuming as well as contributing information blogs or sites. through Allows the user to interact with the page known as DYNAMIC PAGE instead of just reading a page, the user may be able to comment or create a user account. Dynamic page refers to the web pages that are affected by user input or preference. Is focused on the ability for people to collaborate and share information online via social media, blogging and Web-based communities. Examples of Web 2.0 sites ○ Social Networking is the use of Internet-based social media sites to stay connected with friends, family, colleagues, customers, or clients. Social networking can have a social purpose, a business purpose, or both, through sites such as: Facebook, Twitter, Instagram, LinkedIn, etc. ○ Blog a discussion informational or website published on the world wide web consisting of discrete, often informal diary-style text entries (posts). Posts are typically displayed in reverse chronological order, so that the most recent post appears first, at the top of the web page. Ex. Word Press ○ Wikis is a hypertext publication collaboratively edited and managed by its own audience directly using a web browser. A typical wiki contains multiple pages for the subjects or scope of the project and may be either open to the public or limited to use within an organization for maintaining its internal knowledge base. ○ Video Sharing Sites a website that lets people upload and share their video clips with the public at large or to invited guests. Key Features of Web 2.0 ○ Folksonomy allows users to categorize and classify/arrange information using freely chosen keywords (e.g. tagging). ○ Rich User Interface content is dynamic and is responsive to user's input. An example would be a website that shows local content ○ User Participation the owner of website is not the only one who is able to put content. Others are able to place a content on their own by means of comments, reviews, and evaluation. ○ Long Tail services are offered on demand rather than on a one-time purchase. This is synonymous to subscribing to a data plan that charges you for the amount of time you spent on Internet or a data plan that charges you for the amount of bandwidth you used. Web 3.0 (Read-Write Intelligent Web) Suggested name by John Markoff of the New York Times for the third generation of the web. In this generation, all the application on web or mobile will be upgraded with more features, It applies same principles as Web 2.0. two-way interaction. Web 3.0 is more connected, open, and intelligent with semantic web technologies, distributed databases, natural language processing, machine learning, machine reasoning and autonomous agents. Semantic Web ○ provides a framework that allows data to be shared and reuse to deliver web content specifically targeting the user; it is a web of data; changing the web into a language that can be read and categorized by the system rather than humans. MAIN FEATURES OF WEB 3.0 DECENTRALIZATION ○ This is the major principle of web 3.0. since web 2.0 depended on HTTP (a unique web address) to locate the information, which is placed at a fixed location, mostly on a single server. ○ However in web 3.0, users will be able to exercise greater control. Now, the data, rather than being stored in massive databases of companies like Google, Meta etc., will be centralized. Owing to the fact, that information will be searched based on the content and can be stored in multiple locations. PERMISSIONLESSNESS ○ Will be prevalent in web 3.0 as people will need to seek no permission from any trusted intermediary or a government body. Rather, the incorporation of blockchain and decentralized peer to peer networks will allow anyone to interact and participate without anyone’s permission. MACHINE LEARNING ○ in web 3.0, machine learning will allow computers to produce faster and more relevant search results. ○ The development of the idea of Semantic web is likely to equip computers with the ability to process natural language such that computers will be able to understand language just like humans. TYPES OF WEBSITES E-commerce Website – is a website where people can directly buy products from. Any website that includes a shopping cart and a way for you to provide credit card information to make a purchase falls into this category. (Ex. Amazon) Business Website – is any website that is devoted to representing a specific business (the same logo and positioning) and communicate the types of products and/or services the business offers. (Ex. Bloomberg) Entertainment Website – is a platform for sharing and enjoying various forms of entertainment, such as movies, music, games, and celebrity news online. Portfolio Website – are sites devoted to showing examples of past work. Service providers who want to show potential clients the quality of work they provide can use a portfolio website to collect some of the best samples of past work they’ve done. This type of website is simpler to build than a business website and more focused on a particular task collecting work samples. Media Website – collect news stories or other reporting. There is some overlap here with entertainment websites, but media websites are more likely to include reported pieces in addition to contents meant purely for entertainment. Brochure Website – are a simplified form of business websites. For businesses that know they need an online presence but don’t want to invest a lot into it, a simple brochure site that includes just a few pages that lay out the basics of what you do and provide contact information may be enough for you. Nonprofit Website – in the same way that businesses need websites to be their online presence, nonprofits do as well. A nonprofit website is the easiest way for many potential donors to make donations and will be the first place many people look to learn more about a nonprofit and determine if they want to support it. Educational Website – the websites of educational institutions and those offering online courses fall into the category educational websites. These websites have the primary goal of either providing educational materials to visitors or providing information on an educational institution to them. Infopreneur Website – websites overlap a bit with business and eCommerce websites, but they represent a unique type of online business. Inforpreneurs create and sell information products. That could be in the form of courses, tutorials, videos or eBooks. Personal Website – not all websites exist to make money in some way or another. Many people find value in creating personal websites to put their own thoughts out into the world. This category includes personal blogs, vlogs, and photo diaries people share with the world. LESSON 5 - INTERNET THE INTERNET The Internet or 'net' (network of network) is the largest computer network in the world that connects billions of computer users. The word internet comes from the combination between 'interconnection' and 'network'. Network is a collection of computers and devices connected via communication channels and transmission media that allow sharing resources (hardware, software, data, information). BRIEF HISTORY The Internet started in the 1960s as a way for government researchers to share information. Another catalyst in the formation of the Internet was the heating up of the Cold War. The Soviet Union's launch of the Sputnik satellite spurred the U.S. Defense Department to consider ways information could still be disseminated even after a nuclear attack, This eventually led to the formation of the ARPANET (Advanced Research Projects Agency Network), the network that ultimately evolved into what we now know as the Internet. ARPANET was a great success but membership was limited to certain academic and research organizations who had contracts with the Defense Department. During the 1970s, a new communications protocol was established called Transfer Control Protocol/Internetwork Protocol (TCP/IP). This allowed different kinds of computers on different networks to "talk" to each other. It was later adopted as the protocol standard for ARPANET on January 1, 1983, hence the birth of the Internet. All networks could now be connected by a universal language. The most popular network protocol in the world, TCP/IP protocol suite, was designed by 2 DARPA scientists-Vinton Gray Cerf and Bob Kahn, persons most often called the fathers of the Internet. Vinton Gray Cerf and Bob Kahn - Fathers of the Internet The general public gained access to the Internet in 1986. And between 1987-1988, the number of hosts increased from 10,000 to 60,000. ○ The World Wide Web (WWW) developed in 1991 and the Internet was growing fast. ○ In 1993, the most important development was released and it was the first graphical web browser software. ○ In 1994, the first shopping mall, Internet radio station, and the first cyber bank appeared on the Internet. ○ In 1998, the Internet continued to grow and now in the present, we are using the most advanced and developed Internet services. MAJOR COMPONENTS OF THE INTERNET 1. Server is a computer program that provides service to another computer program and its user. TYPES OF SERVERS ○ Application Server a program in computer that provides the business logic for an application program. ○ Web Server a computer program that serves requested HTML pages or files. ○ Proxy Server is a software that acts as an intermediary between an endpoint device, such as a computer and another server from which a user is requesting. ○ Mail Server is an application that receives incoming e-mail from local users and remote senders and forward outgoing e-mail for delivery ○ File Server is a computer responsible for central storage and management of data files SO that other computer on the same network can access them. ○ Policy Server - is a security component of a policy based network that provides authorization services and facilities tracking and control of files. 2. IP Address (Internet Protocol) is a numerical label assigned to each device. This provides identity to a network device. 3. Browser is an application program that provides a way to look information on the web. Example of browsers: Google Chrome, Safari, Internet Explorer, etc. 4.Domain Name System (DNS) is the phonebook of the internet. We access information through online domain names. Examples: www.facebook.com 5.Internet Service Provider (ISP) is an organization that provides services for accessing, using or participating in the internet TWO TYPES OF ISP National ISP - provided internet to a specific geographic access area. Regional ISP - business that provides internet access in cities and towns nationwide. Example of ISP: Sky Broadband, PLDT,Converge USES OF INTERNET Look for information School works, jobs, and home purposes Send and receive electronic mail Video teleconferencing (video call, video chat) Buy and sell product Social networking Watch & post videos Games Take college courses Monitor home while away Financial transactions Download music and movies IMPORTANT TERMS & DEFINITION Internet - A global network of thousands of computer networks linked by data lines and wireless systems. Web a collection of billions of webpages that you can view with a web browser. Email - the most common method of sending and receiving messages online Online gaming - games that allow people to play with and against each other over the Internet. Software Updates operating system and application updates typically downloaded from the internet. URL or Uniform Resource Locator is a web address used to connect to a remote resource on the world wide web. HTML - Hypertext Markup Language is a coding language used to tell a browser how to place pictures, text, multimedia and links to create a web page. Bit is a single digit in the binary numbering system For example: 1 is a bit or O is a bit. Byte generally consists of eight bits. Upload To upload is to transfer data from your computer to another computer. Download - To download is to transfer data from another computer to your computer. HTTP is the acronym for Hypertext Transfer Protocol, the data communication standard of web pages. Router or router-modem is the hardware device that acts as the traffic cop for network signals arriving at your home or business from your ISP. A router can be wired or wireless or both. Encryption is the mathematical scrambling of data so that it is hidden from eavesdroppers, Encryption uses complex math formulas to turn private data into meaningless gobbledygook that only trusted readers can unscramble, Web Bot A term that applies to - programs/applets (macros and intelligent agents) used on the Internet. Such bots perform a repetitive function, such as posting messages to multiple newsgroups or doing searches for information. Search Engine specialized software, such as Google and Yahoo, that lets www browser users search for information on the web by using keywords, phrases. LESSON 6 - COMPUTER PARTS Computer - A computer is an electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data. Spacewar - First Computer game Alan Turing - Father of Modern Computer Science Elements of a Computer 1. Hardware the physical part of the computer system, the machinery and equipment. This includes the central processing unit (CPU), keyboard, monitor, mouse, printer and speaker. 2. Software - is a single/collection of programs that performs a particular task. Also called a Program. - Different softwares are used to solve different problems. TYPES OF SOFTWARE SYSTEM SOFTWARE APPLICATION SOFTWARE Gives path to software application to Is designed and built for specific task run Is a general purpose software Is a specific software TYPES OF SOFTWARE SYSTEM SOFTWARE APPLICATION SOFTWARE Gives path to software application to Is designed and built for specific task run Low language is used High language is used Programming is complex when Programming is simple when compared to application software compared to system software Interacts with the hardware directly Does not take the hardware into consideration, as it does not interact directly Installed by the manufacturers Installed by the users as needed Works in the background Works in the forefront Is a packaged program Can be said to be resources sharing client server Example: Operating System, Example: Word Doc, Spreadsheet, Programming Language, Database, Internet Explorer Communication Software, etc Shortcuts Uses of Shortcut keys Shortcuts Uses of Shortcut keys Alt + E It Edits options in the current Ctrl + Y This redo the last action. program. Alt+Tab this is used to switch between Ctrl + K It insert hyperlink for the the open windows selected text. Alt + F Shows file menu options in the Windows key + L This lock the computer, current program. requiring password entry to access again. Alt + F4 This closes the current window Windows key + X Access the Power User Tasks Menu in Windows 8 and Windows 10. Alt + Page Up It scrolls up the Entire Screen. Windows key + It Minimize the active program Down arrow window. Alt + Page Down It scrolls down the Entire Windows key + Up It Maximize the active program Screen arrow window. Alt + Left Arrow shows the previous history if it Ctrl + Left arrow This key used to move one is present in Bowser. word to the left at a time. Alt + Right Arrow Go forward in the browser Ctrl + Right arrow This is used for move one window. word to the right at a time. Alt + Enter It shows the property of the Ctrl + Esc It activates the start menu. selected item. Ctrl + A It is used to select all text. Alt + Enter It is used to open the properties window for the selected icon or program. Ctrl + X It cuts the selected item Windows key + X Access the Power User Tasks Menu in Windows 8 and Windows 10. Ctrl + Del It deletes selected items Windows key + ↓ Minimize the active program window. (That format Should be used) Ctrl+C/Ctrl+Ins Used to copy the selected item. Windows key + L Lock the computer, requiring password entry to access again. Ctrl+V/Shift + Ins Used to paste the selected Windows key + ↑ Maximize the active program item. window. Ctrl + Home It is used to go to the beginning Ctrl + ← Move one word to the left at a of the document. time. Ctrl + End Go to the end of a document Ctrl+ → Move one word to the right at a time. Components of Computer Ctrl + S 1.Open the save Input - anyasdata a dialogue Ctrlentered or instructions + Home into memoryGo oftoa the beginning of the computer; box. document. any hardware component which allows user to enter data instruction into Ctrl + Z a computer. Undo the last action. Ctrl + End Go to the end of the document. Keyboard the most basic input device to enter data on the Ctrl + Alt + Del Opens Windows task manager. Ctrl + Shift + Esc Open Windows Task Manager. system or any other device with the help of the keys Ctrl+J Open the download (numbers, tab/bar.letters, Shift characters + Home and function); establish Highlight froma the current connection with the computer via Bluetooth, position WiFi to or the by abeginning of the USB system line. ○ Computer Shortcut Keys significantly enhance Ctrl+F It starts the find utility. Shift + End Highlight from the current productivity and efficiency. These handyposition combinations to the end of the line. of keys provide quick access to various functions and commands, allowing us to navigate in Computers. Ctrl+P Open the print dialogue Microphone box. - it isF2a built-in voice input device Used to rename that take the selected sound signals and convert them into digital icon. form. Ctrl+Esc Webcam Open the Windows - captureF3used to pictures/videos start menu. Thiswhile using Find the from our anything computer. desktop. Mouse - used for pointing and clicking items on computer Ctrl + "+" Increases the zoom level. screen. F4 This is used in Windows 95 to XP to open the locate window. ○ Ball Mouse - an input device operated by rolling its Ctrl + "-" Decreases the zoom level. ball across F5a flat surface. It is usedItto is control used totherefresh the on-screen pointer by pointing the clicking, contentsdouble of your Windows system. clicking, or dragging objects on the screen. ○ Optical Mouse - hand-supported input device that Ctrl + W/Ctrl + F4 Closes the current tab. Alt + F4 Used to close the ongoing allows users to move the cursor onprogram.the screen. It works on a flat surface with a wheel between the left Ctrl+T Open a new tab. Ctrl + F4 and right buttons. It was invented byThis shortcut Douglas C.is used to swiftly Engelbart. close a document. Home Takes the user to the start of Ctrl + Plus Key This adjusts the widths of all 2.theOutput it supplies information and results of computation current line. of the columns outside automatically, in Windows Explorer. world. It may be in image, graphic, textual or audio form. Monitor important the most output device responsible for End This is used to go to the end of Alt + Print Screen / It is used to take a screenshot the current line showing the visualWin+PrtScn made of pixels to the users. The pixels of the current page. decide the image sharpness. Shift + Delete files will be deleted Printer device an Ctrl + Alt output that+ produces Del Used toinformation. tangible Reboot/Windows task permanently. Information is in printed form. manager. TYPES OF PRINTER 1. Impact Printers - they have a ribbon on the front which prints characters on the paper by pressing it. They can be noisy yet are very popular. Good for bulk print and consumable cost is less. Character Printers - prints only one character at a time. Types of Character Printer Dot Matrix Printer each character print has dots pattern of the size creating a complete symbol Daisy Wheel - it prints nice quality characters and are mostly present at word processing offices that need a few letters only. DOT MATRIX PRINTER DAISY WHEEL Dot Matrix Printers produces low- Daisy Wheel Printers has high- quality outputs. quality outputs. They are noisy printers. Noise is They are silent or quieter. created when pins strike the paper. Dot matrix printers are faster in Daisy wheel printers are slower producing outputs. compared to dot matrix printers. Dot Matrix Printer support multiple Daisy Wheel Printers are Limited fonts and styles. to the characters. Offers a wider range of character Supports the English language sets and languages. only. The price is affordable. r sets and They are expensive. languages. Support various styles and sizes. Support limited styles and sizes. Line Printers - prints only one line at a time. Types of Line Printer Drum Printer - a drum-like shape with track division equal to paper size. Chain Printer uses a character chain to print like 48, 64 or 96 characters. 2. Non-Impact Printers it does not use a ribbon to print but instead print an entire page in one go. Laser Printers it is used for producing dots to form characters on a page; it has a great quality output but it can't print multiple copies at a time. Inkjet Printers - The new generation printers that use the spray to print the papers. It produces high-quality. characters with a focus on details. Plotter Printers specialist type a of printer which is able to draw high quality images on very large. pieces of paper, for example 3 foot wide by 10 foot long. Flatbed plotters - These hold the paper still while the pens move Drum plotters - These roll the paper over a cylinder Pinch-roller plotters - These are a mixture of the two types above 3. RANDOM ACCESS MEMORY (RAM) It provides temporary storage for the operating system (OS) and application software in current use so that they can be quickly reached by the computer's processor. READ-ONLY MEMORY (ROM) Also known as firmware; an integrated circuit programmed with specific data when it is manufactured; used as a permanent storage RAM ROM RAM stands for Random Access Memory ROM stands for Read only Memory It is volatile in nature. Its contents are It is non-volatile in nature. Its contents are erased when power is turned off. non erased when power is turned off. We can read as well as write through this We can only read this memory and memory cannot write through it VIDEO GRAPHICS ARRAY PORT (VGA) an analog interface standard for computer video output. It defines both a display hardware specification and a 15-pin connector type used to connect video sources (like computers) to display devices (like monitors) COOLING FAN Cooling fans are there to decrease overheating. Many computers have more than one cooling fan to help users who run their computer heavily, such as video streaming or gaming. 4. CENTRAL PROCESSING UNIT (CPU) the primary component of a computer that acts as its "control center." The CPU, also referred to as the "central" or "main" processor, is a complex set of electronic circuitry that runs the machine's operating system and apps. In the past, the CPU used to be the primary processor in a computer. Today, the CPU still performs some calculations, but its main job is to manage the way data flows and coordinate task completion. CORE COMPONENTS Arithmetic logic unit (ALU): Performs arithmetic operations (addition, subtraction, multiplication, division) and logical operations (comparisons, bitwise operations) on data. Control unit (CU): Fetches instructions from memory, decodes them, and then signals the ALU and other components to execute the instructions. Registers: Small, high-speed storage locations within the CPU that hold the data and instructions that are currently being processed. LESSON 7 - Etiquette in the Internet Netiquette describes the rules of conduct for respectful and appropriate communication on the internet. Netiquette is often referred to as etiquette on the internet. Your online behavior can be used to empower or disempower others and yourself. Consider these expectations when engaging with others online. Think of the person who your post is about and how they might feel or react to it. Be careful in chatrooms and only meet up with people your family knows personally. stop and think before posting. Make sure you are not emotionally reacting. Respect the privacy of yourself and others online. Understand your digital footprint and cyber trail. Carefully consider future implications this might have for you. Interact positively online and empower others and yourself. If you wouldn't say it to someone's face, you shouldn't be saying it online. Remember that anything you post online is viewable by the whole world, regardless of privacy restrictions in place. Use respectful and empowering language. Only post images of others if you have their consent. Avoid posting images of identifiable uniforms and logos on clothing. Be courteous and respond promptly. Consider the use of sarcasm and the way that it can be interpreted by others. Understand the law and consequences for cyber abuse. Cyberbullying Laws in the Philippines Cybercrime Prevention Act of 2012 (Republic Act No. 10175) Anti-Photo and Video Voyeurism Act of 2009 (Republic Act No. 9995) Cybercrime Prevention Act of 2012 The Cybercrime Prevention Act includes provisions that penalize cyberbullying. defined broadly as acts of using information and communications technology to intimidate, harass, or cause emotional distress. The law covers a wide range of online behaviors, from posting defamatory statements to uploading unauthorized photos or videos. However, the boundary between cyberbullying and lawful expression can sometimes blur. especially when it comes to posting content aimed at public awareness or social justice. While the intent may be noble, such actions can sometimes inadvertently lead to defamation, libel, or even invasion of privacy. In Philippine jurisprudence, online libel is considered an offense if an individual posts false accusations that harm the reputation of another person. Additionally, under Republic Act No. 7610, also known as the Special Protection of Children Against Abuse, Exploitation, and Discrimination Act, falsely accusing someone of being a pedophile can be considered defamation and can expose the accuser to criminal and civil liabilities, including imprisonment and monetary damages. That said, public interest and the truth are generally considered valid defenses against defamation. If the accusation is proven true and is of legitimate concern to the public, the individual making the post could potentially be absolved of legal liabilities. However, such defenses need to be robustly substantiated, often requiring strong evidence and legal argument. Given the serious legal implications, it's crucial to exercise caution when posting sensitive or potentially defamatory material online. If you believe that a person is engaged in illegal activities such as pedophilia, the appropriate course of action is generally to report it to the authorities for proper investigation, rather than taking matters into your own hands on social media. Anti-Photo and Video Voyeurism Act of 2009 This law is geared towards the prohibition of taking photo or video coverage of a person or group of persons performing sexual act or any similar activity or to capture an image of the private area of a person/s such as the naked or undergarment clad genitals, public area, buttocks or female breast without the consent of the person/s involved and under circumstances in which the person/s has/have a reasonable expectation of privacy. Copying or reproduction of such photo or video or recording of sexual act with or without consideration: Selling and distribution of such photo or video or recording of sexual act, whether it be the original copy or reproduction thereof, or publishing and broadcasting whether in print or broadcast media, or show or exhibit the photo or video coverage or recordings of such sexual act or any similar activity through VCD/DVD, Internet, cellular phones and other similar means or device. Good luck everyone - studddy well po kayoo - rep na gwapa

Use Quizgecko on...
Browser
Browser