EMPTECH_1STSEM_MIDTERMS_REVIEWER.pdf

Full Transcript

EMPOWERMENT TECHNOLOGIES MIDTERMS | 1ST SEMESTER REVIEWER ………….…...WORLD WIDE WEB……….……….. …………...INTRODUCTION TO I.C.T.…..………. WORLD WIDE WEB INFORMATION AND COMMUNICATION ✩ It is also known as WWW or W3 or TECHNOLO...

EMPOWERMENT TECHNOLOGIES MIDTERMS | 1ST SEMESTER REVIEWER ………….…...WORLD WIDE WEB……….……….. …………...INTRODUCTION TO I.C.T.…..………. WORLD WIDE WEB INFORMATION AND COMMUNICATION ✩ It is also known as WWW or W3 or TECHNOLOGIES the Web. ✩ A broad range of technologies that ✩ It is introduced by Tim Berners-Lee. are used to manage and ✩ It is an interconnected system of communicate information. public web pages accessible ✩ The use of communication through the Internet. technology such as laptops, ✩ It consists of different pages that smartphones, the internet, etc., to are formatted in a markup send, save, and edit information. language called HTML (Hypertext KEY COMPONENTS OF ICT Markup Language). 1. COMPUTERS AND HARDWARE HTML (HYPERTEXT MARKUP LANGUAGE) ✩ Personal computers, servers, ✩ The standard language used to networking equipment, and create Web pages. other electronic devices. HTTP (HYPER-TEXT TRANSFER PROTOCOL) 2. SOFTWARE ✩ The language used by Web clients ✩ Operating systems, and the Web Server. productivity software, communication software, WEB 1.0 and specialized applications. ✩ The Static Web 3. NETWORKS ✩ The first development of the World ✩ Routers, switches, and Wide Web where web pages are protocols such as TCP/IP. static. 4. INTERNET AND WWW ✩ It is also known as a flat or ✩ A global network that stationary page and it cannot be connects millions of manipulated by users. computers, allowing them to WEB 2.0 share information and ✩ The Dynamic Web/The Social Web communicate. ✩ Users can interact with pages by creating a user account, posting comments, uploading files and images, and others. JAMES BARRIENTOS & SOFIA RAGUERO 11 - BL. JOZEF CEBULA FEATURES OF WEB 2.0 …………………...TRENDS IN I.C.T.…………………….. 1. FOLKSONOMY MOBILE TECHNOLOGIES ✩ Users can classify and ✩ A technology used in cellular and arrange information other devices such as laptops, by adding tags or tablets, smartphones, etc. labels. (#) ASSISTIVE MEDIA 2. RICH USER EXPERIENCE ✩ A platform, device, software, or ✩ Users can have high equipment that helps people with interaction with the disabilities work around challenges content of the page so they can learn, communicate, and can achieve a and simply function better. level of expertise. CONVERGENCE 3. USER PARTICIPATION ✩ It refers to the fusing of ✩ Users can put content technological advancement to on their own on a web work on a similar task. page like comments, SOCIAL MEDIA evaluations, etc. ✩ An application and website where 4. LONG TAIL users can communicate, create ✩ A site that offers and share content, and participate services and brings in online communities. individuals and TYPES OF SOCIAL MEDIA businesses into selling 1. SOCIAL NETWORK different goods and ✩ People with the same commodities. interests and content 5. SOFTWARE AS A SERVICE can come together to ✩ Users can subscribe share information. to software when they 2. SOCIAL NEWS need it instead of ✩ Users can post stories purchasing them. and are ranked based 6. MASS PARTICIPATION on their popularity ✩ The sharing of diverse through voting. information through 3. BOOKMARKING SITES universal web access. ✩ Allows users to share WEB 3.0 and store internet ✩ The Semantic Web bookmarks, articles, ✩ It is meant to be decentralized, posts, blogs, images, open to everyone, and built on top and others. of blockchain technologies and developments. ✩ It describes the web as a network of meaningfully linked data. JAMES BARRIENTOS & SOFIA RAGUERO 11 - BL. JOZEF CEBULA 4. MEDIA SHARING INTERNET RISKS ✩ Allows users to share CYBERBULLYING and store multimedia ✩ Happens when someone is files such as videos, intentionally abused, photos, and music. harassed, and mistreated 5. MICROBLOGGING by another person using ✩ Allows you to electronic communication. broadcast short IDENTITY THEFT messages. ✩ A crime of stealing 6. BLOGS & FORUMS someone’s personal ✩ Allows users to ask information to assume that questions and person’s identity. comments on a CYBERSTALKING journal posted by an ✩ Criminal practice where individual or group. electronic communication is used to stalk or harass ….ONLINE SAFETY AND SECURITY….. others. TIPS ON HOW TO BE SAFE ONLINE SEXTING 1. Do not share your password with ✩ The act of sending sexually anyone. explicit text messages, 2. Add friends you know in real life. images, and videos. 3. Do not visit untrusted websites. 4. Add a password to your WIFI at INTERNET THREATS home to make it private. SPAM 5. Install and update an antivirus on ✩ Junk mail or unwanted your computer. email sent by advertiser or 6. Do not give your personal bot. information to anyone. ✩ Can be used to send 7. Never post about your future malware. vacation. PHISHING 8. Think before you click. ✩ A method that uses deceptive emails and CYBERCRIME websites to acquire sensitive ✩ A crime in which a computer is personal information. used as an object and tool MALWARE committing a crime. ✩ Specifically designed to CYBERCRIME LAW disrupt, damage, or gain ✩ A law that deals with all forms of unauthorized access to a cybercrime. computer system. JAMES BARRIENTOS & SOFIA RAGUERO 11 - BL. JOZEF CEBULA TYPES OF MALWARE RANSOMWARE VIRUS ✩ Blocks users from accessing ✩ A malicious program that program or files and replicates itself to another demands to pay ransom program. through online method for ✩ Needs permission the removal of the virus. TROJAN HORSE ✩ Disguises as a legitimate ……………………...NETIQUETTE……………………….. program to take control of NETIQUETTE your computer. ✩ Netizen Etiquette/Net Etiquette WORM ✩ It is an etiquette applied online that ✩ A malicious program that shows proper manners and replicates itself to spread to behavior. other computers. ✩ In interacting with other netizens ✩ Does not need permission online, we need to maintain good SPYWARE behavior that is acceptable to ✩ Gathers information from others in the online community. the victim’s computer and NETIZEN sends it back to the hacker. ✩ A member of an online society KEYLOGGER through social media. ✩ Steals confidential information by recording CORE RULES OF NETIQUETTE - SETH T. ROSS every keystroke that a user 1. Remember the human. makes on their device. 2. Adhere to the same standards of ADWARE behavior online that you follow in ✩ Unwanted advertisement real life. that pop up several times 3. Know where you are in cyberspace. then behaves abnormally 4. Respect other people's time and and tedious to close them. bandwidth. BOTNET 5. Make yourself look good online. ✩ Collection of infected 6. Share expert knowledge. interconnected devices that 7. Help keep flame wars under control. are controlled by a common 8. Respect other people's privacy. type of malware. 9. Don't abuse your power. ROOTKIT 10. Be forgiving of other people's ✩ A software tool used by mistakes. hackers to gain control over a computer without being exposed. JAMES BARRIENTOS & SOFIA RAGUERO 11 - BL. JOZEF CEBULA ………………...CONTEXTUALIZED………………… PARTS OF A URL..ONLINE SEARCH AND RESEARCH... ……………………..………SKILLS …………………………….. SEARCH ENGINE ✩ A program that allows users to search for content on the internet. INTERNET RESEARCH ✩ A research method in collecting and gathering information via internet by using search engine such as Google, etc. COPYRIGHT ✩ A protection given to the owner of TIPS FOR EFFECTIVE INTERNET RESEARCH - the rights in an original work such GEORGE MATHEWS as books, musical works, films, 1. Know what kind of research you paintings, and other works, and want to do. computer programs. 2. Make a list of keywords you will use INTELLECTUAL PROPERTY CODE OF THE in your search. PHILIPPINES 3. Enclose keywords in quotation ✩ This original work is called marks. intellectual property which is 4. Use the minus sign (-). protected under Republic Act 8293. 5. Try specialized search engines. COPYRIGHT INFRINGEMENT 6. Skim through search results web ✩ This happens when the copyrighted pages. work is used by another person 7. Bookmark without permission of the author or 8. Review your bookmarks. copyright holder. ✩ Any person who infringes the ONLINE RESEARCH SKILLS - HANNAH right-protected work would be TRIEWEILER HUDSON liable under the law. 1. Check your sources. FAIR USE 2. Ask good questions. ✩ The use of copyrighted material for 3. Go beyond the surface. comment, teaching, criticism, news 4. Be patient. reporting, research, or scholarship, 5. Respect ownership. is not an infringement of copyright. 6. Use your networks. ✧ 5% of the content of references can only be copied. UNIFORM RESOURCE LOCATOR (URL) ✧ Less than 20% there must be ✩ A unique identifier is used to locate a secondary use agreement a resource on the internet. and fee. ✩ It is also referred to as a web ✧ More than 20% of it requires address. purchasing of creative work. JAMES BARRIENTOS & SOFIA RAGUERO 11 - BL. JOZEF CEBULA GUIDELINES FOR FAIR USE 6 TIPS FOR CREATING AN EFFECTIVE 1. Majority of the content must PRESENTATION be yours. 1. VISUAL 2. Give credit to the owner. ✩ The use of graphics helps in 3. Don’t make a profit out of your presentation but not too copyrighted work. many to distract the audience. …………….PRODUCTIVITY TOOLS……………. 2. SIMPLICITY PRODUCTIVITY TOOLS ✩ Use bullets or short ✩ Software that people use to create sentences. and produce documents, ✩ Limit the content to six lines presentations, databases, charts, and seven words per line. and graphs. This is known as the 6x7 rule. ✩ It helps you create 3. MINIMIZE professional-quality documents, ✩ Keep slide counts to a presentations, graphics, and more. minimum to maintain a ✧ Numerical clear message and to keep ✧ Textual the audience attentive. ✧ Presentation 4. CLARITY GOOGLE SLIDES ✩ Avoid being too fancy by ✩ A presentation program that allows using a font style that is you to create and display visual easy to read. slides to accompany a ✩ Make sure that it is also big presentation of your work. enough to be read by the MAIN FEATURES audience, a rule of thumb. 1. Adding SmartArt 5. CONTRAST 2. Inserting Shapes ✩ Use a light font on a dark 3. Inserting Images/videos background or vice versa. 4. Slide Transitions ✩ This is done so that it is 5. Adding Animations easier to read. IMAGE FILE TYPE 6. CONSISTENCY.JPEG ✩ Make your design uniform. ✩ Joint Photographic Experts ✩ Avoid having different font Group styles and backgrounds..PNG ✩ Portable Network Graphics.GIF ✩ Graphics Interchange Format.BMI ✩ Bitmap Image File JAMES BARRIENTOS & SOFIA RAGUERO 11 - BL. JOZEF CEBULA

Use Quizgecko on...
Browser
Browser