🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Document Details

Tags

ICT web development digital communication technology

Full Transcript

Emp-tech paragraphs, images, hyperlinks, tables, lists, etc. ICT  Defines a large heading.  ( information and communication...

Emp-tech paragraphs, images, hyperlinks, tables, lists, etc. ICT  Defines a large heading.  ( information and communication technology) refers to the use of  Element defines a paragraph communication technology to send, save and edit information. HTML ELEMENT  Element is defined by a start tag, Web 1.0 ( The Static Web) some content, and on end tag. Characteristics 1. Static web pages DYNAMIC WEB PAGES  Are simple HTML documents that Web 2.0 ( the social web) are delivered to the users Characteristics browser exactly as stored on the 1. User-generated content browser.  Enables users to create, share and 2. Content delivery manage content. This shift  One-way communication democratized content creation, 3. Design and user experience allowing anyone with internet access to contribute. 2. Rich user experiences  Enhanced interactivity and user engagement through responsive page title dynamic interfaces. 3. Social networking and collaboration main heading  Platforms designed to faciliate paragraph social interactions, connections, and collaboration. 4. Tagging and folksonomy  A system of categorization where HTML users can label or “tag” content  Tells the browser how to display with keywords. This creates a the content. flexible and user-driven way of organizing information, known as  Defines that this document is an folksonomy. HTML5 document 5. Participation and collaboration  Encouragement of user participation and contribution to  Elements contain meta the development and information about the HTML page. improvement of content and services.  Element specifies a title for the 6. Long tail HTML page.  Refrs to the niche market that web 2.0 platforms cater to,  Defines the documents body, and allowing for a wide variety of is a container for all the visible specialized content to exist and be contents, such as headings, accessed. Web 3.0 ( rypto currency, more on driven threat detection, multi-factor ownership) (the semantic and authentication, and zero-trust decentralized web) security models. Core principles 6. Augmented reality (AR) and virtual 1. Decentralization reality (VR) 2. Semantic web 7. Convergence 3. Artificial intelligence and machine - refers to the integration of multiple technologies and platforms into a Often referred as the “ semantic web” unified system, enhancing or the “ decentralized web”. it aims to functionality and user experience. create a more intelligent, connected , 8. Social media and open web by leveraging decentralized protocols, artificial Types of Social Media intelligence, and enhance user privacy 1. Social networks and security.  Purpose: connecting and networking with others Trends in information and Ex: facebook, linkedin communication technology 2. Microblogging 1. Artificial Intelligence and Machine  Purpose: sharing short concise, learning. updates, or posts  AI integration machine learning Ex: X(twitter), Tumblr. algorithms are improving the 3. Media sharing accuracy and efficiency of these  Purpose: sharing multimedia systems. content such as photos and videos 2. 5g and advanced connectivity Ex: instragram, snap chat, tiktok, and  5G Rollout global development of YouTube. 5g network is accelerating, 4. Assistive media offering higher speeds, lower  Purpose: facilitating discussion latency and greater connectivity and knowledge sharing on various for devices. topics. 3. Cloud computing and edge Ex: reddit, qoura, stack exchange computing 5. Bookmarking site Cloud computing  Purpose: discovering, saving and - hospital stare, patient records and sharing content. medical data in the cloud, enabling Ex: Pinterest, Pocket easy access and collaboration among 6. Review and rating sites healthcare providers.  Purpose: providing for reviews Edge computing and ratings for products, services, - wearable health monitors process and places. data locally to provide immediate Ex: Yelp, TripAdvisor, Goodreads health alerts and feedback to users, 7. Messaging Apps reducing the need for constant cloud  Purpose: facilitating real- time connectivity. communication through text, 4. Blackchain and Distributed ledger voice, and video. technologies Ex: WhatsApp, Messenger, Telegram 5. Cybersecurity 8. Collaborative Platforms - advanced security measures  Purpose: facilitating team organizations are adopting advanced collaboration and project security measures, including AI- management. Ex: slack, microsoft teams, trello.  Use of security software- anti- virus and anti- malware tools ONLINE SECURITY AND SAFETY  Two factor authentication (2FA)- 1. Internet Threats adding extra layer of security to Types of Internet Threats accounts.  Malware- malicious software designed to harm, exploit, or 3. Philippine Laws regarding online otherwise compromise digital activities devices, networks, or services  Cyberbullying Prevention Act of 2012 (ra 10175) Types of Malware Offense: 1. Viruses- code that attaches to clean 1. Illegal Access- unauthorized access files and spread to other files. to a computer system without right, (opening an infected file) often referred to as “hacking” 2. Worms- stand alone software that 2. Illegal Interception- interception of replicates itself to spread across non-public transmissions of computer networks. data to , form, or within a computer 3. Trojans- malicious code disguised system. as legitimate software. ( abi nimog 3. Data Interference- unauthorized love letter pero di diay ouch) alteration, damaging, deletion, or 4. Ransomware- demands payment deterioration of computer data. for decryption. 4. System Interference- unauthorized 5. Spyware- software that secretly hindering or disruption of the monitors and collects user data. functioning of a computer system or 6. Adware- forces unwanted network ( Jam the networks) advertisements on the user. 5. Misuse of Devices- possessiong, production, sale, or distribution of  Phishing- fraudulent attempts to devices or software designed for obtain sensitive information. committing cybercrimes  Identity Theft- unauthorized use 6. Cybersquatting- acquisition of a of personal information. domain name over the internet in bad  Cyberbullying and Harassment- faith to profit, mislead, or destroy the online abuse and harassment. reputation of a person or business.  Scams and Frauds- financial 7. Computer-related Forgery- input, frauds and online scams. (pag alteration, or deletion of computer bayad nimo block naka) data, resulting in inauthentic data with the intent that it be considered 2. Tips to stay safe online or acted upon as if it were authentic  Safe Browsing- avoiding (e- signatures) suspicious websites and 8. Computer- related Fraud- downloads unauthorized input, alteration, or  Secure Passwords- strong, unique deletion of computer data or passwords programs, or interference in the  Email & communication safety- functioning of a computer system, recognizing phishing attempts. causing damage or loss.  Protecting Personal Information- 9. Computer-related Identity Theft- limiting the sharing of personal unauthorized acquisition, use, misuse, details online. or deletion of the identification information of another person whether natural or juridical (stealing 8. Unauthorized Disclosure info) 9. Combination or Series of acts 10. Cybersex- the willful engagement, 10. Processing Personal Information maintenance, control or operation of Involving Harmful Intent. any lascivious exhibition of sexual organs or sexual activity, through a  E- commerce Act of 2000 (RA no. computer system, for favor or 8792) consideration.  Also known as the electronic 11. Child Pornography- the unlawful commerce Act of 2000, provides prohibited acts defined and legal recognition and frameworks punishable by RA no. 9775 ( Anti- for electronic transactions, child pornography act of 2009), when documents, and signature. It also committed through a computer addresses certain offenses related system. to electronic commerce and the 12. Libel- the unlawful or prohibited use of information and act of libel as defined in article 855 of communication technology. the revised penal code, committed Offenses: through a computer system or any 1. Hacking other similar means that may be 2. Piracy devised in the future. (do not bash 3. Identity Theft other people anteh) 4. Electronic fraud 13. Aiding or Abetting in the 5. Unauthorized use of credit card commission of Cybercrime- assisting information in or facilitating the commission of 6. Electronic trespassing any of the offenses outlined in the act. 7. Electronic libel and slander 14. Attempting to commit 8. Violation of privacy rights Cybercrime- assisting in or 9. Cybersex (with related content or facilitating the commission of any of fraudulent online transactions) the offenses outlined in the act. 10. Circumvention of technology measure  Data Privacy Act of 2012 ( RA no. 11. Electronic evidence tampering. 10173)  Aims to protect the privacy of  Intellectual Property Code of the individuals while ensuring the Philippines (RA no. 8293) free flow of information to  Provides for the protection of promote innovation and growth. intellectual property rights (IPR) Offenses: in the security. 1. Unauthorized Processing Offenses: 2. Accessing Personal Information 1. Copyright Infringement Due to Negligence I. Unauthorized Reproduction or 3. Improper Disposal Distribution 4. Processing of Unauthorized II. Public Performance or Display Purpose without Permission 5. Unauthorized Access of Intentional III. Derivation of Works Breach IV. Plagiarism 6. Concealing Security Breaches V. Circumventing Technological Involving Sensitive Personal Protection Measure Information 2. Trademark Infringement 7. Malicious Disclosure I. Use of confusingly similar mark II. Counterfeiting 2. Avoid Plagiarism- do not copy and III. Unfair competition paste information without giving 3. Patent Infringement credit. Summarize the information I. Unauthorized use of patented and cite the original source. invention fair competition 3. Use Licensed Materials- when using, II. Offering for sale a patented images, videos, or other media ensure product without authorization. they are either in public domain, licensed for free use, or property Cyberbullying and Online Harassment attributed. 1. Cyberbullying- involves using  Verify Information electronics to harass, threaten, or 1. Author credentials harm someone. This can include 2. Publication date sending abusive messages, spreading 3. Citations and references rumors, or sharing harmful content 4. Bias and objectivity about someone online.  Use of advance search techniques 2. Online Libel- the act of publishing 1. Boolean operators- use of “ AND, false and defamatory statements OR, and NOT” to combine or exclude about someone online, which causes keywords. harm to their reputation. 2. Quotation Marks- use of quotation 3. Cyberstalking- the repeated use of marks to search for exact phrases. electronic communication to stalk,  Critically Analyze Information harass, or threaten someone, causing 1. Cross- check Facts- verify facts and fear or significant emotional distress. data comparing information from 4. Unjust Vaxation- acts that causes multiple sources. annoyance or irritation to another 2. Consider the source’s perspective- person, which may include online understand the context and harassment or cyberbullying. perspective of the source , and be 5. Anti- bullying Act of 2013 (RA no. aware of potential biases the could 10627)- addresses bullying in influenced the information presented. education institution, including cyberbullying. Steps for Letter in Libre Office 6. Anti- photo and video voyeurism 1. Tools act of 2009 (RA no. 9995)- prohibits 2. Mail merge wizard unauthorized recording, reproduction, 3. Use current document or distribution of videos and photos of 4. Select document type (letter) a person’s parts or sexual activities. 5. Insert address block 7. Child Abuse (RA no. 7610)- the 6. Select different address list special protection of children against 7. Add abuse, exploitation, and 8. Open discrimination act protects children 9. Create from abuse, including online abuse 10. Customize and exploitation 11. Ok 12. New 4. Online Research 13. Click ok  Respects copyright and 14. Data d (element- hilbert) Intellectual Property 15. Pr3 1. Proper Citations- always give credit 16. Save to the original authors, researchers, or 17. Ok creators, when using their work 18. View tab (data source) 19. Click plus sign 20. Pr3 21. Tables Excel (+)- addition (-)- subtraction (*)- multiplication (/)- division To add or solve, mag una dapat ang equal sign (=A1+B1) Cell Address = (A1,B1…..) Use >=,=75, ‘PASSED”,”FAILED”) then drag. Above 100 iya ibutang sa B2 Excellent 50-99 Good =100, “EXCELLENT”, IF(AND(A2=50), “G”, IF(A2

Use Quizgecko on...
Browser
Browser