ICT (Information Communication Technology) PDF
Document Details
Uploaded by RegalPerception2461
Rizal High School
Tags
Summary
This document provides an overview of information and communication technology (ICT), focusing on the evolution of the web from Web 1.0 to Web 3.0. It discusses key features and trends in ICT, such as social media and mobile technologies.
Full Transcript
INFORMATION AND 2. Rich User Experience - This feature COMMUNICATION TECHNOLOGY deals with how a site uses user (ICT) information for personalized content. is an umbrella term which c...
INFORMATION AND 2. Rich User Experience - This feature COMMUNICATION TECHNOLOGY deals with how a site uses user (ICT) information for personalized content. is an umbrella term which covers any 3. User Participation - This means that communication devices, those who view the website can also applications, and systems that people put their own information. use to interact and connect with 4. Long Tail Services - These services others. offer services on demand as opposed to a one-time purchase. WEB 1.0 5. Software as a Service - It contains When the World Wide Web how users would subscribe to a (Internet) was invented by Tim software as opposed to purchasing Berners-Lee, most of the web pages them. were static web (also known as flat 6. Mass Participation - This feature page or stationary page) or the deals with diverse information content is “as is”. In this state, the sharing through universal web user cannot manipulate or edit the access. content of the page, as well as, the content is the same for all the users. WEB 3.0 In addition, static web can be Web 3.0 was coined by John referred to as Web 1.0. Markoff of the New York Times in 2006. It is supposed to be the third WEB 2.0 generation of Internet-based services, Web 1.0 was added by dynamic web which aims to produce machines that pages, and eventually evolved into can understand the user’s Web 2.0. preferences. This machine can serve Currently, digital natives, such as the better by “learning” from the Millenials and Gen Z, enjoy these previous choices of the user. websites and applications because PROBLEMS they can create, collaborate, modify 1. Compatibility and exchange content with the other 2. Security users. 3. Vastness 4. Vagueness 6 FEATURES OF WEB 2.0 5. Logic 1. Folksonomy - It is a term from the blended words “folks” and ICT TRENDS “taxonomy”. This feature allows 1. Social Media - These are the users to categorize and websites, application, or online classify/arrange information. channel that allows the netizens (Internet citizen/web users) to create, cocreate, discuss, modify, and news, and users can interact exchange user-generated content with the news stories by such as images, documents, et cetera voting, liking, commenting, with the other netizens. People sharing, et cetera. usually misuses the term “social d. Media Sharing - Media media” by referring to a specific Sharing applications enable application or website, however, this users to upload and share is an umbrella term. It means that media content like image, social media has six (6) types: video, and music to like, a. Social Networks - This type comment, and share by the enables the user to connect other users. with the other user that has e. Microblogging - This type of the same interest, social media focuses on short background, and/or updates from the user. information. It has rich user f. Blogs and Forums - Unlike experience as the user can the vlog, blog users post their personalize their profile own write ups or narratives accounts, connect with the such as review, diary, or other users regardless of the journal on their customized distance, and react and leave website. On the other hand, a comments on other users’ forum is part of a certain posts. website wherein users can b. Bookmarking Site - This site hold an online discussion allows the user to store and about a certain topic. manage links to various 2. Convergent Technology - websites and resources. Most Convergent technology, also known of these sites allow you to as technological convergence, is the create a tag that allows you process of combining multiple and others to easily search or technologies into a single device or share them. system. This can result in a new c. Social Media News - Simply outcome that saves time, space, and known as social news. It is power. far different from the 3. Mobile Technologies - It has become traditional news platform. popular because of its capability to This site promotes sharing do tasks that were originally found in between the news provider personal computers. and the user, becomes a 4. Assistive Media - Assistive Media, central hub for new stories Inc. is a non profit Internet-based from various other third-party reading service to serve people with sources to deliver instant visual and reading impairments. Assistive Media was founded in Ann spies on sensitive data. The Arbor, Michigan, in 1996 by David primary purpose of spyware Erdody as a 501 nonprofit is typically to collect credit organization. card numbers, banking information, and passwords. Malware 5. Adware is a sort of software This term came from the blended that displays ads on a user's words “malicious” and “software”. device. It frequently comes There are five (5) types of malware: packed with free software or 1. Virus is a malicious program programs and earns revenue that usually transfers from for developers by displaying one device to another with advertisements, which might the aid of the Internet and take the form of pop-ups, local networks, but banners, or even redirecting commonly through data users to specific websites. storage such as flash drives or hard drives. Phishing is a type of cyberattack in 2. Unlike the virus, the worm which scammers attempt to deceive replicates itself and can people into disclosing sensitive transfer by any type of information like passwords, credit means, but more often card numbers, or personal details. It through a computer network. frequently involves fake emails, 3. Tracing its name origin, it messages, or websites that look to be can be linked to the authentic, such as those from mythological story about how reputable institutions like banks or the Trojan fell because of the service providers. Greeks' wooden house Hacking is unauthorized access to (Hamilton 1942, 206). Like computer systems to exploit the Odysseus’ strategy, this weaknesses for theft, disruption, or malicious program disguised personal gain. While malicious as a useful program, however hacking is harmful, ethical hackers left your devices unprotected help organizations by identifying and and became vulnerable to fixing security vulnerabilities. other malwares once you Online sports betting refers to accessed or downloaded it. placing wagers on sports events 4. Spyware is among the most through websites or mobile apps, common threats to internet rather than traditional in-person users. Once installed, it sportsbooks or casinos. Bettors can monitors internet activity, choose from a wide range of sports tracks login credentials, and and bet types, such as moneylines, point spreads, and over/under totals, "etiquette." Virginia Shea, known as "Ms. all through digital platforms. Manners" of the Internet, outlined 10 core Non-Delivery of Merchandise - a Netiquette rules: deceiving act in which the culprit 1. Be mindful and kind; treat others posted a product or service on the online as you would want to be Internet. Once the victim places its treated. payment, the culprit does not give 2. Follow the same laws and values the item or service. online as in real life. Electronic Harassment - an 3. Understand your platform and anonymous criminal who harasses, audience before interacting. abuses, threatens, or annoys other 4. Respect others’ time and the shared people. One example of this is digital space. cyberbullying or the repeated 5. Think before posting; your online harassment that usually happens actions create a lasting digital among the youth, and from the past footprint. years, becomes the main cause of 6. Verify information before sharing to suicide cases. avoid spreading fake news. Child Pornography - Based on 7. Avoid flaming or engaging in mean Republic Act no 9775 or known as and insulting online behavior. Anti-Child Pornography Act of 8. Do not touch what is not yours. 2009, it is an act of real or simulated 9. No matter what strength or explicit sexual activities that information you have, do not misuse involves any child aged 18 and it like "them" white hat hacker. below and it is penalized depending 10.Let's forgive the error of another on the offender. If it is the parent or user. relative of the child, they’ll receive the maximum penalty. Republic Act No. 8293 or recognized as the Prostitution - it is an illegal act to Philippines Intellectual Property Code. engage in any sexual activities. Copyright infringement is one of the Criminal Copyright Infringement - it cybercrimes mentioned in the previous class. is an unauthorized use or stealing of This is usually done by students when they intellectual property, such as movies copy-paste a sentence or paragraph from a and music, for profitable benefit. website and place it in their procrastinated Sometimes, students violate it essay without proper attribution or reference through plagiarism. to the source, and make it like their own concept, in short, plagiarism. Digital citizenship refers to how we think, act, and behave online. It involves following 6 FORMS OF INTELLECTUAL a set of online behavior standards called PROPERTY netiquette, a term derived from "net" and 1. Copyright – It is the owner's legal 4. Know the Law. right to literary or creative work and has a logo C or © attached on it. Besides that, there are 4 fair use points 2. Patent – A creator's exclusive right which must be followed: on his invention. With that the owner 1. Small cropped parts of the work can can decide how the invention will be be used. used by others. 2. You must add your imagination to 3. Trademark – It is a sign used to make it original by giving it a new distinguish goods or services within sense. a company and it uses this ™ logo. 3. The job must be done in a totally 4. Industrial Design – This is a distinct different way. aesthetic (visual) feature of a 4. You are prohibited from using it for company, such as the curved bottle any profitable purpose. shape, the black check mark on the rubber shoes, etc. Search Engine - online software. 5. Geographical Indication – The manufacturer of the products used if Critical thinking they have distinct qualities and a one of the skills a person should reputation or identity characteristics, possess in research. such as yema cake made in Quezon our capacity to absorb, reflect and Province, footwear from Marikina, conclude from the searched etc. knowledge. 6. Trade Secret – This is an intellectual Accuracy – check if it is property right on any sensitive or grammatically correct, verifiable and confidential information which may cite. be available for sale. Author – check the credentials/expertise of the INTEGRATED CIRCUIT LAYOUT information provider. DESIGNS (TOPOGRAPHIES) - are an Currency – the data must be added type of intellectual property in updated. Republic Law No.8293. It also protects the Fairness – the content must show all placement of integrated circuits (or known the sides and different points of view. as chips) to produce digital devices that have Relevance – the content must be more and more advanced functions. related to the topic. TIPS THAT MIGHT HELP YOU AVOID Analytical skills - ability to gather, COPYRIGHT INFRINGEMENT organize, visualize and adapt information 1. Understand that is tailored to the subject’s context 2. Be Responsible 3. Be Creative Domain Types Search Tools- this gives you additional to your results. It ranges .com (commercial) from any time, any duration, any .org (organization) quality .edu (education) Creative Commons - to search for .gov (government) copyright tree images. Example. .net (network) http://creativecommons.org .mil (military) Google Scholar - allow users to .ph (country domain) search and find a wide variety of papers, of scholarly literature Top Search Engines (researcher theses, etc.) across a Google range of disciplines and topics. Bing Search Tools under Web - You can Yahoo adjust the Reading Level by using the All Results dropdown menu. Problem-solving skill - ability to present from basic, intermediate, to solutions or solve problems, by submitting a advanced level. decision based on the information provided, File Type - Limit search results to is necessary. specific a file format Example: Pasig City filetype: pdf Creativity and Imagination - Always look for alternative solutions, and not just think in the context, but always go beyond them and do the unusual approach. Computer Literacy - Look not only on the surface while you are searching; look further and deeper. It optimizes functionality and uses them for your own advantage. INDIGENOUS KNOWLEDGE - known as local knowledge that is unique to a specific culture or society LIBRARY - comes in 4 groups(academic, public, school, and special) that can be in form of physical or digital INTERNET - information here are difficult to verify, therefore go for credible sources