Module: E-Tech Week 1 & 2 PDF
Document Details
Uploaded by PleasingViolin
Marcelo H. del Pilar National High School
2023
E-TECH TEACHERS
Tags
Summary
This document is a learning activity sheet in empowerment technologies (E-Tech) for the second semester of the 2023-2024 academic year. It covers various aspects of information and communication technologies (ICT), including basic concepts such as the internet, different types of web pages, and different social media platforms.
Full Transcript
DEPARTMENT OF EDUCATION CITY SCHOOLS DIVISION OF MALOLOS MARCELO H. DEL PILAR NATIONAL HIGH SCHOOL CITY OF MALOLOS, BULACAN SECOND SEMESTER A.Y. 2023-2024 LEARNI...
DEPARTMENT OF EDUCATION CITY SCHOOLS DIVISION OF MALOLOS MARCELO H. DEL PILAR NATIONAL HIGH SCHOOL CITY OF MALOLOS, BULACAN SECOND SEMESTER A.Y. 2023-2024 LEARNING ACTIVITY SHEET IN EMPOWERMENT TECHNOLOGIES (E-TECH) QUARTER 3 WEEK 1 INTRODUCTION TO ICT Information and Communication- deals with the use of different communication technologies such as mobile phones, telephone, Internet to locate, save, send, and edit information. It is a study of computers as data processing tools. It introduces students to the fundamental of using computer systems in an internet environment. ICT in the Philippines Philippines is dub as the ‘’ICT Hub of Asia” because of huge growth of ICT-related jobs, one of which is BPO, Business Process Outsourcing, or call centers. ICT Department in the Philippines is responsible for the planning, development and promotion of the country’s information and communications technology (ICT) agenda in support of national development. Computer– an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program. Internet– is the global system of interconnected computer networks that use the internet protocol suite (TCIP/IP) to link billions of devices worldwide. Means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers. Sometimes called simply ‘’the Net’’, is a worldwide system of computer networks- a network of networks in which the users at any one computer can get information from any other computer. World Wide Web -is an information system on the internet that allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another. 1 -is an information space where documents and other web resources are identified by URLs, interlinked by hypertext links, and can be accessed via the Internet. -is invented by Tim-Berners Lee Web Pages Web page is a hypertext document connected to the World Wide Web. It is a document that is suitable for the World Wide Web. The different online platforms of World Wide Web: Web 1.0 – refers to the first stage in the World Wide Web, which was entirely made up of the Web pages connected by hyperlinks. Web 2.0 – is the evolution of Web 1.0 by adding dynamic pages. The user is able to see a website differently than others. – Allows users to interact with the page; instead of just reading the page, the user may be able to comment or create user account. Web 3.0 – this platform is all about semantic web. – Aims to have machines (or servers) understand the user’s preferences to be able to deliver web content. Static Web Page- is known as a flat page or stationary age in the sense that the page is ‘’as is’’ and cannot be manipulated by the user. The content is also the same for all users that is referred to as Web 1.0. Dynamic Web Pages– web 2.0 is the evolution of web 1.0 by adding dynamic web pages. The user is able to see website differently than others e.g., social networking sites, wikis, video sharing sites. FEATURES OF WEB 2.0 Folksonomy- allows user to categorize and classify information using freely chosen keywords e.g., tagging by FB, Twitter, use tags that start with the sign #, referred to as hashtag. Rich User Experience – content is dynamic and is responsive to user’s input. User Participation- The owner of the website is not the only one who is able to put content. Others can place a content of their own by means of comments, reviews and evaluation e.g., Lazada, Amazon. Long Tail– services that are offered on demand rather than on a one-time purchase. This is synonymous to subscribing to a data plan that charges you for the amount of time you spent on the internet. 2 Software as a service- users will be subscribe to a software only when needed rather than purchasing them e.g., Google docs used to create and edit word processing and spread sheet. Mass Participation– diverse information sharing through universal web access. Web 2.0’s content is based on people from various cultures. TRENDS IN ICT Convergence– is the synergy of technological advancements to work on a similar goal or task. For example, besides using your personal computer to create word documents, you can now use your smartphone. 2. Social Media– is a website, application, or online channel that enables web users web users to create, co-create, discuss modify, and exchange user generated content. Six types of Social Media: a) Social Networks – These are sites that allows you to connect with other people with the same interests or background. Once the user creates his/her account, he/she can set up a profile, add people, share content, etc. Example: Facebook and Google+ b) Bookmarking Sites – Sites that allow you to store and manage links to various website and resources. Most of the sites allow you to create a tag to others. Ex. tumble Upon, Pinterest c) Social News – Sites that allow users to post their own news items or links to other news sources. The users can also comment on the post and comments may also be rank. Ex. Reddit and Digg d) Media Sharing – sites that allow you to upload and share media content like images, music and video. Ex. Flickr, YouTube, and Instagram e) Microblogging – focus on short updates from the user. Those that subscribed to the user will be able to receive these updates. Ex. Twitter and Plurk f) Blogs and Forums – allow user to post their content. Other users are able to comment on the said topic. Ex. Blogger, WordPress, and Tumblr Mobile Technologies – The popularity of smartphones and tablets has taken a major rise over the years. This is largely because of the devices capability to do the tasks that were originally found in PCs. Several of these devices are capable of using a high- 3 speed internet. Today the latest model devices use 4G Networking (LTE), which is currently the fastest. QUARTER 3 WEEK 2 ONLINE SAFETY, SECURITY AND RULES OF NETIQUETTE Internet Safety- it refers to the online security or safety of people about their information when using the internet Netiquette- DO’s and DON’Ts of online communication, network etiquette. TEN RULES OF NETIQUETTE Rule No. 1: Remember the human ✓ Always remember that you are talking to a real person when you are online. ✓ The internet brings people together who may or may not meet. ✓ Tip when sending an email: Would I say this to the person’s face? Rule No. 2: Adhere to the same rules/standards online that you follow in real life. ✓ It is necessary to behave the same way online that you do in real life. ✓ You can also get caught doing things you should not be doing online just like you can in real life. ✓ You talking to a real person with feelings even though you can only hear or see them. Rule no. 3: Know where you are in cyberspace. ✓ Be cautious when you enter a new domain when surfing the web. ✓ Do a background check of what the discussion group is about before you join it. Rule no. 4: Respect other people’s time and bandwidth. ✓ Consider that people have other things to do besides read your email/messages. ✓ Keep your post and emails to direct by saying what you want to say. ✓ Be open to the reality that everyone won’t answer your questions. Rule no. 5: Make yourself look good online. ✓ Be polite and pleasant to everyone. ✓ Always check your spelling and grammar before posting. ✓ Know what you are talking about and make it sensible. 4 Rule no. 6: Share expert knowledge. ✓ Ask questions online in a good manner. ✓ Share what you know online without being rude or boastful. ✓ Post the answers to your questions online because others might have similar questions. Rule no. 7: Help keep flame wars under control. ✓ Netiquette does not forgive flaming. ✓ Netiquette does however forbid people who are flaming to hurt discussion groups by putting the group down. Rule no. 8: Respect other people’s privacy. ✓ Never read other people’s mail without their permission. ✓ Going through other people’s things/information could cost you, your job or you could even go to jail. ✓ Not respecting other people’s privacy is a bad netiquette. Rule no. 9: Don’t abuse your power. ✓ Do not take advantage of other people just because you have more knowledge or power than them. ✓ Treat others as you would want them to treat you if the roles were reversed. Rule no. 10: Be forgiving of other people’s mistake. ✓ Avoid pointing out mistakes to people online. ✓ Remember that you were once the new kid on the block. INTERNET SECURITY Security Requirement Triad Types of System Intruders Masquerader Hackers Clandestine user 5 Virus stages 1) Dormant phase - Virus is idle. 2) Propagation phase - Virus places an identical copy of itself into other programs or into certain system areas on the disk. 3) Triggering phase - Virus is activated to perform the function for which it was intended; Caused by a variety of system events. 4) Execution phase - Function is performed. Key Terms Cybercrime- a crime committed or assisted through the use of the Internet. Privacy Policy/Terms of Services (ToS) – tells the user how the website will handle its data. Malware- stands for malicious software. Virus- a malicious program designed to transfer from one computer to another in any means possible. Worms– a malicious program designed to replicate itself and transfer from one file folder to another and transfer to other computers. Trojan-a malicious program designed that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hacker to get your information. Spyware– a program that runs in the background without you knowing it. It can monitor what you are currently doing and typing through key logging. Adware- a program designed to send you advertisement, mostly pop-ups. Spam– unwanted email mostly from bots or advertisers. Phishing- acquires sensitive personal information like passwords and credits card details. Pharming- a more complicated way of phishing where it exploits the DNS system. Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your consent is punishable by law. Fair Use- means that an intellectual property may be used w/o consent if it is used in commentaries, criticism, parodies, research etc. Keyloggers- used to record the keystrokes done by user. This is done to steal passwords or any other sensitive information. Rogue security software– is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and manipulates them into paying money for a fake malware removal tool. 6 Prepared by: E-TECH TEACHERS 10