EMP TECH.pdf
Document Details
Uploaded by CharitableDallas2001
Matatalaib High School
Tags
Full Transcript
LESSON 1 Information and Communication Technology Agenda KEY TOPICS TO BE DISCUSSED IN THIS LESSON DEFINITION OF ICT TRENDS IN ICT ANSWER THE FOLLOWING QUESTIONS: 1. How many times have you checked your phone this morning? 2. How many status updates have you posted in Facebook or Twit...
LESSON 1 Information and Communication Technology Agenda KEY TOPICS TO BE DISCUSSED IN THIS LESSON DEFINITION OF ICT TRENDS IN ICT ANSWER THE FOLLOWING QUESTIONS: 1. How many times have you checked your phone this morning? 2. How many status updates have you posted in Facebook or Twitter today? 3. Did you use the Internet for an hour after you woke up this morning? 4. Do you follow a celebrity via his/her social media account? DIGITAL NATIVE is a person born or brought up during the age of digital technology and therefore, familiar with computers and the Internet from an early age. What is Information and Communication Technology or ICT? It deals with the use of different communication technologies such as mobile phones, telephone, Internet to locate, save, send and edit information Having a unified way to communicate is one of the goals of ICT. We spend less because of ICT ICT in the Philippines Philippines is dub as the ‘’ICT Hub of Asia” because of huge growth of ICT-related jobs, one of which is BPO, Business Process Outsourcing, or call centers. ICT Department in the Philippines is responsible for the planning, development and promotion of the country’s information and communications technology (ICT) agenda in support of national development. Computer– an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program. INTERNET is the global system of interconnected computer networks that use the internet protocol suite (TCIP/IP) to link billions of devices worldwide. Do you know him TIM BERNERS-LEE He invented the World Wide Web (WWW, W3, or simply Web) in 1989. WIDE WORLD is an interconnected system of public WEB webpages accessible through the Internet. WEB 1.0 Web pages are static and not interactive. You can’t post comments or create an account. WEB 2.0 concentrates on its capability of providing people the means to collaborate and share information online. WEB 2.0 -The second stage in World Wide Web -Dynamic Website -The content of the website changes -Interactive -The user may be able to comment or create user account WEB 2.0 The term was popularized by Tim O’Reilly and Dale Dougherty at the O’Reilly Media Web 2.0 Conference in late 2004, though it was coined by Darcy DiNucci in 1999 in her article "Fragmented Future" Features of Web 2.0 FOLKSONOMY It allows users to categorize and classify/arrange information using freely chosen keywords (e.g., tagging). RICH USER EXPERIENCE - Content is dynamic and is responsive to user’s input. The term “user experience” refers to anything and everything that a user or customer interacts with, from packaging to shipping, functions to features, sales to support, and everything in between. RICH USER EXPERIENCE It arouses emotions in people by initially impressing them, then turning them into addicts, loyalists, and contagious. USER PARTICIPATION The owner of the website is not the only one who is able to put content. Others are able to place a content of their own by means of comment, reviews, and evaluation. SOFTWARE AS SERVICE Users will subscribe to a software only when needed rather than purchasing them. MASS PARTICIPATION It is a diverse information sharing through universal web access. Since most users can use the Internet, Web 2.0’s content is based on people from various cultures. WEB 3.0 Semantic Web Semantics – ability of Web technologies to understand and interpret human?generated content The Internet is able to predict the best possible answers to your question by “learning from your previous choices WEB 3.0 PHONE CASE WEB 3.0 TRENDS IN ICT As the world of ICT continues to grow, the industry has focused on several innovations. These innovations cater to the needs of the people that benefit most out of ICT. Whether it is for business or personal use, these trends are current front runners in the innovation of ICT. 1. Convergence Technological convergence is the combination of two or more different entities of technologies to create a new single device. E X A M P L E : U S I N G O F S M A R T P H O N E TO C R E AT E W O R D D O C U M E N TS T H AT WA S P R E V I O U S LY C A N O N LY B E C R E AT E D U S I N G D E S KTO P C O M P U T E R. 2. Social Media It is a website, application, or online channel that enables web users to create, co-create, modify, and exchange user- generated content. TYPES OF SOCIAL MEDIA SOCIAL NETWORKS BOOKMARKING SITES sites that allow users you to store and manage links to various websites and resources, and to tag SOCIAL NEWS sites that allow users to post their own news items or links to other news sources. MEDIA SHARING sites that allow you to upload and share media content like images, music, and video. NE EATING! HAIXST MICROBLOGGING DO FTW ! sites that focus on short updates from the user. Those who are subscribed will receive updates. 3. MOBILE TECHNOLOGIES The popularity of smartphones and tablets has taken a major rise over the years. This is largely because of the devices’ capability to do tasks that were originally found in personal computers TYPES OF MOBILE OS 1. iOS – used in Apple devices such as the iPhone and iPad 2. Android – an open source operating system developed by Google. Being open source means several mobile phone companies use this OS for free. 3. Blackberry OS – used in blackberry devices 4. Windows Phone OS – a closed source and proprietary operating system developed by Microsoft 5. Symbian – the original smartphone OS used by Nokia devices 6. WebOS – originally used for smartphones; now used for smartTVs 4. ASSISTIVE MEDIA It is a nonprofit service designed to help people who have visual and reading impairments. A database of audio recordings is used to read to the user. Do you have any questions? PERFORMANCE TASK NO. 1 -LIGHTS -SCAMERA -HACK-TION! ONLINE SAFETY, SECURITY, ETHICS AND ETIQUETTE RULES OF NETIQUETTE -ONLINE SECURITY -INTERNET THREATS -PROTECTING REPUTATIONS ONLINE -COPYRIGHT -CONTEXTUALIZED ONLINE SEARCH AND RESEARCH SKILLS ON THE NEXT SLIDE IS A QUESTIONNAIRE ABOUT HOW MUCH INFORMATION YOU HAVE SHARED SO FAR. PUT A CHECK UNDER SHARED OR NOT SHARED. ARE YOU SAFE? ARE YOU SAFE? How many checks did you have for shared? THE INTERNET, TRULY IS A POWERFUL TOOL. IT CAN BE USED TO PROMOTE BUSINESS, GAIN NEW FRIENDS, AND STAY IN TOUCH WITH THE OLD ONES. LET'S GO BACK TO... How many checks did you have for shared? ONLINE SAFETY AND SECURITY THE INTERNET IS DEFINED AS THE INFORMATION SUPERHIGHWAY TO STAY SAFE ONLINE 1. BE MINDFUL OF WHAT YOU SHARE AND WHAT SITE YOU SHARE IT TO. 2. DO NOT JUST ACCEPT TERMS AND CONDITIONS; READ IT. 3. CHECK OUT THE PRIVACY POLICY PAGE OF A WEBSITE 4. KNOW THE SECURITY FEATURES OF THE SOCIAL NETWORKING SITE YOU USE. 5. DO NOT SHARE PASSWORD WITH ANYONE. 6. AVOID LOGGING IN TO PUBLIC NETWORKS/WI-FI. 7. DO NOT TALK TO STRANGERS WHETHER ONLINE OR FACE?TO-FACE 8. NEVER POST ANYTHING ABOUT FUTURE VACATION. 9. ADD FRIENDS YOU KNOW IN REAL LIFE. 10. AVOID VISITING UNTRUSTED WEBSITES. 11. Install and update an antivirus software on your computer. 12. If you have a WIFI AT HOME. MAKE IT A private network by adding password. 13.AVOID DOWNLOADING ANYTHING FROM UNTRUSTED WEBSITES. 14. BUY THE SOFTWARE; DO NOT USE PIRATED ONES. 15.DO NOT REPLY OR CLICK LINKS FROM SUSPICIOUS EMAILS INTERNET THREATS 1. MALWARE – STANDS FOR MALICIOUS SOFTWARE. A FILE OR CODE, TYPICALLY DELIVERED OVER A NETWORK, THAT INFECTS, EXPLORES, STEALS OR CONDUCTS VIRTUALLY ANY BEHAVIOR AN ATTACKER WANTS. 2. SPAM – UNWANTED EMAIL MOSTLY FROM BOTS OR ADVERTISERS. 3. PHISHING – ITS GOAL IS TO ACQUIRE SENSITIVE PERSONAL INFORMATION LIKE PASSWORDS AND CREDIT CARD DETAILS. Internet Threats: 1. Malware – stands for malicious software Types: Virus, Worm, Trojan, Spyware, Adware, Ransomware 2. Spam – unwanted email mostly from bots or advertisers. It can be used to send malware. 3. Phishing – Its goal is to acquire sensitive personal information like passwords and credit card details. VARIANTS OF MALWARE A. VIRUS – A MALICIOUS PROGRAM DESIGNED TO REPLICATE ITSELF AND TRANSFER FROM ONE COMPUTER TO ANOTHER. B. WORM – A MALICIOUS PROGRAM THAT TRANSFERS FROM ONE COMPUTER TO ANOTHER BY ANY TYPE OF MEANS VARIANTS OF MALWARE C. TROJAN - A MALICIOUS PROGRAM THAT IS DISGUISED AS A USEFUL PROGRAM BUT ONCE DOWNLOADED OR INSTALLED, LEAVES YOUR PC UNPROTECTED AND ALLOWS HACKER TO GET YOU INFORMATION VARIANTS OF MALWARE D. SPYWARE - A PROGRAM THAT RUNS IN THE BACKGROUND WITHOUT YOU KNOWING IT. * KEYLOGGERS – USED TO RECORD THE KEYSTROKE DONE BY THE USER VARIANTS OF MALWARE E. ADWARE - A PROGRAM DESIGNED TO SEND YOU ADVERTISEMENTS, MOSTLY AS POP-UPS. VARIANTS OF MALWARE F. RANSOMWARE- Or ransom software is a type of malicious software from crypto virology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid. PROTECTING REPUTATIONS ONLINE THINK BEFORE YOU CLICK THINK BEFORE YOU CLICK 1. BEFORE YOU POST SOMETHING ON THE WEB, ASK THESE QUESTIONS TO YOURSELF: WOULD YOU WANT YOUR PARENTS OR GRANDPARENTS TO SEE IT? WOULD YOU WANT YOUR FUTURE BOSS TO SEE IT THINK BEFORE YOU CLICK 2. YOUR FRIENDS DEPEND ON YOU TO PROTECT THEIR REPUTATION ONLINE. 3. SET YOUR POST TO “PRIVATE”. 4. AVOID USING NAMES. 5. IF YOU FEEL THAT A POST CAN AFFECT YOU OR OTHER’S REPUTATION, ASK THE ONE WHO POSTED IT TO PULL IT DOWN OR REPORT IT AS INAPPROPRIATE. If you create something—an idea, an invention, a form of literary work, or a research, you have the right of how it should be used by others. This is called intellectual property. 1. Always assume that the work is copyrighted. 2. Do not copy, share or alter without seeking permission. 3. Review and retain licensing agreements. 4. Consider buying content. 5. Give credit to the original author of the page or information. Answer the following questions. 1. How does a virus infect a computer? 2. How do computer worms spread? 3. How do fraudsters use social media to steal information? 4. What do fraudsters who practice phishing usually steal? 5. When does copyright infringement occur? PERFORMANCE TASK NO 2 FORM GROUPS WITH THREE MEMBERS EACH. SEARCH FOR SEVERAL NEWS AND EVENTS RELATED TO CYBERCRIME. TOGETHER WITH YOUR GROUP, CREATE A CAMPAIGN MATERIALS PROMOTING “THINK BEFORE YOU CLICK.” IT COULD BE IN A FORM OF SMALL POSTERS POSTED ALONG THE HALLWAY OR BULLETIN BOARDS AS APPROVED BY THE SCHOOL. PERFORMANCE TASK NO 2 The output should be approved first by the subject teacher before posting it on Facebook, in the hallway, and in some certain areas within the school. PERFORMANCE TASK NO 2 Your post on Facebook must have the following caption: Main: Your own statement about your poster Your names Subject #ThinkBeforeYouClick PERFORMANCE TASK NO 2 CRITERIA RELEVANCE TO THE THEME-----------------50% CREATIVITY AND ATTRACTIVENESS------30% ORIGINALITY----------------------------------------20% t u a l i z e d C o n t e x h e S e a r c On l i n c h R e s e a r and l s Sk i l Assignment: When do you say that an information contained in web pages is credible or not? Online search and research are more than just ‘googling’ – typing a word in Google and then clicking the search button. It is a skill that every Internet user should know to do smart searching and this starts with improving search and research skills to get better results. Here are the things that you need to know to improve your online search and research skills. 1. When searching online, narrow your topic -Identify the key concepts or important ideas. -Do not type the whole question in the search box. “What precautionary measures should you observe when you are loggedin in a public computer?” KEYWORD : precautionary measures, observed, logged-in, public computer. 2. Put the word “AND” between each keyword to create a search string. You may type the following in the search box: Precautionary measures AND observe AND logged-in AND public computer 3. Identify synonyms of the key words. Not all databases or articles use the same words to describe a topic. Group similar words together by using the word “OR” for a quick and relevant search. In the case of our example: the synonyms of some of the keywords are: Precautionary measures – preventive measures Observe – pay attention to Logged-in – signed-in 4. Review the first pages returned. If these are not helpful, change your keywords for a better description. In this case you may remove the phrase “pay attention to” and then type the following in the search box: Precautionary measures OR preventive measures AND observe AND logged-in or signed-in AND public computer. This gives you another set of search results. If you think you have found what you are searching for, then you may stop here. Otherwise, you may proceed with these other techniques. 5. Use the plus (+) sign for a more specific search. Just type + before a keyword to indicate that the word after the sign is a required word that must be found in the search. Example: +preventive measures 6. Use the minus (-) sign for a more specific search. If you want to exclude a word from your search, place a minus sign just before (without any space) the word you want to exclude. Example: public computers -personal 7. Use wildcards for a broader search. Wildcard characters (*) let you find variations of a word. Example: measur* 8. Use quotation marks to find phrases or names. Enclose the phrase or names that you want to search in quotation marks. Example: “precautionary measures" 9. Use several search engines. Search engines are programs that look for documents based from specified keywords and return these documents where the keywords were found. Major search engines include Google, Yahoo (which uses Google), AltaVista, Bing, and Lycos. Evaluating Websites To help you evaluate the website’s credibility, here are the questions that you need to answer: 1. What is the domain type of the website? 2. Who wrote the article? Check if the author’s credentials or affiliations are listed so you can tell whether or not the author is qualified to write the topic. Check also the publisher of the article if it is a reliable publisher. Make sure that the author provides e-mail or a contact address/phone number. 3. What is the purpose of the document and why was it produced? It is also important to check the document’s purpose and why it was produced. The document should provide accurate information and must be objective in presenting it. Some websites produce documents for the purpose of motivating users to buy products. If this is the case, information might be biased. However, bias is not necessarily bad but you need to investigate the author or connections. 4. When was the document published and updated? The document should be regularly updated. As to the freshness of the date, it depends on the information needed. For some topics you want current information. For others, you want information near the time it became known. The links should also be up-to-date. There should be no dead links. 4. When was the document published and updated? The document should be regularly updated. As to the freshness of the date, it depends on the information needed. For some topics you want current information. For others, you want information near the time it became known. The links should also be up-to-date. There should be no dead links. APPLIED PRODUCTIVITY TOOLS WITH Advanced Application Techniques AT THE END OF THIS MODULE, YOU SHOULD BE ABLE TO: 1. Understand the different uses of productivity tools. 2. Perform the following: Encoding, Apply Mail Merge, add custom animation, hyperlink, insert images in work processor and use of advance formulas in Microsoft excel. 3. Appreciate the usage of productivity tools. AT THE END OF THIS MODULE, YOU SHOULD BE ABLE TO: 1. Understand the different uses of productivity tools. 2. Perform the following: Encoding, Apply Mail Merge, add custom animation, hyperlink, insert images in work processor and use of advance formulas in Microsoft excel. 3. Appreciate the usage of productivity tools. ORAL PRESENTATION Are You Ready? Your class will be divided into 5 groups Each group will be given assigned topics and you have to present your part INDIVIDUALLY. You will be receiving an ORAL PRESENTATION RUBRIC, and if it is your time to present, you must give your classmates a copy of the rubric because they will also be grading you during your presentation. COMPUTATION OF SCORES 12+9+12+12+3+12+9+6+12+12= 108 108/10= 10.8 In case of absences when you are the assigned presenter on that day, Your groupmate will be presenting on your behalf, BUT, you will be graded ZERO in the ORAL PRESENTATION RUBRIC. INSTRUCTIONAL VIDEO PRESENTATION In connection with your Oral Presentation... you have to make an educational video about your assigned topics using any platform that you want/like. your screen must be shown since it is an instructional video, and your face MUST be in ther presentation as well. like this https://i.ytimg.com/vi/ObaJRyo3ybM/maxresdefault.jpg https://i.ytimg.com/vi/uKgfVZ4aCE0/maxresdefault.jpg THANK YOU!