top of page

Q 1, Week 1:

Updated: Nov 11, 2021



Motivation Questions:

1. How many times have you checked your phone this morning?

2. How many status updates have you posted in Facebook or Twitter today?

3. Did you use the Internet after you woke up this morning?

4. Do you follow a celebrity via his/her social media account?


If you happen to be “guilty as charged” in most of these questions, chances are, you are a digital native. And chances are, from the moment you were born, you were surrounded by technology, you are surrounded by ICT.






WHAT THEN IS ICT?

It deals with the use of different communication technologies such as mobile phones, telephone, Internet, etc. to locate, save, and edit information.


When we make a video call, we use the Internet. When we send a text or make a call, we use cellular networks.





FAMOUS PERSONALITIES BEHIND THE ICT

a. BILL GATES – He introduced Microsoft

b. STEVE JOBS – He introduced Apple

c. MARK ZUCKERBERG – He pioneered Facebook and later bought Instagram

d. MARTHA LANE FOX – developed last-minute.com., an online booking site for airlines, hotels, restaurant and everything under the sun. Her website relied heavily on online systems which other websites soon followed suit.

e. TIM BERNERS-LEE – invented the World Wide Web, an Internet-based hypermedia initiative for global information sharing.



Click this link to learn more about Famous Personalities in the field of ICT:




ICT IN THE PHILIPPINES

• More ICT-related jobs and companies are established.

• Owning multiple phones/gadgets at the same time.

• Increase in text messages, chat messages and emails sent each day.

• Different services, news and new information are easily access through the internet.

• A lot of selfies are taken and posted in social media each day.



WHAT IS INTERNET?

• Is the global system of interconnected computer networks that use the Internet protocol suite to link billions of

devices worldwide;

• Means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers.



Top Internet Service Providers in the Philippines

1. Converge ICT Solutions

2. One SKY

3. PLDT

4. Globe Broadband

5. Rise




WHAT IS WORLD WIDE WEB (WWW)?

• Is an information space where documents and other web resources are identified by URLs, interlinked by

hypertext links, and can be accessed via the Internet.

• Invented by Tim-Berners Lee.


Examples of WWW

1. www.google.com

2. www.facebook.com



WHAT IS WEB PAGE?

• Web page is a hypertext document connected to the World Wide Web.

• It is a document that is suitable for the World Wide Web.




WHAT IS WEBSITE?

• A location connected to the Internet that maintains one or more pages on the World Wide Web.

• It is a related collection of World Wide Web (WWW) files that includes a beginning file located a home page.




WHAT IS WEB BROWSER?

• It displays a web page on a monitor or mobile device.

• It is a software application for retrieving, presenting, and traversing information resources on the World Wide Web.




Remember, ICT is one of the best ways to improve business sales and it is important for you to know how to use it your advantage. One advantage is for customers to share their thoughts with you online, directly on your web page. That way, the customers would feel that you are responsive and very open in listening to their thoughts. But in order to do that, you have to make your website dynamic.



NOW, LET US DIG DEEPER INTO THE HISTORY OF WORLD WIDE WEB.


WHAT IS WEB 1.0 STATIC?

When the World Wide Web was invented, most web pages were static.

➢ It is also known as flat page or stationary page because the page is “as is” and cannot be manipulated by the user.

➢ The content is also the same for all users.


WHAT IS WEB 2.0?

➢ It allows users to use web browsers instead of just using their operating system.

➢ Browsers can now be used for their user interface, application software (or web applications), and even for file

storage.

➢ Examples of Web 2.0 include social networking sites, blogs, wikis, video sharing sites, hosted services, and web

applications.



WHAT ARE THE FEATURES OF WEB 2.0?

1. Folksonomy – allows users to categorize and classify/arrange information using freely chosen keywords (e.g., tagging). Popular social networking sites such as Twitter, Instagram, Facebook, etc. use tags that start with the pound sign (#). This is also referred to as hashtag

2. Rich User Experience – content is dynamic and is responsive to user’s input. An example would be a website that shows local content. In the case of social networking sites, when logged on, your account is used to modify what you see in their website.

3. User Participation – the owner of the website is not the only one who is able to put content. Others are able to place a content of their own by means of comments, reviews, and evaluation. Some websites allow readers to comment on an article, participate in a poll, or review a specific product. (e.g., Amazon.com, online stores.)

4. Long Tail – services that are offered on demand rather than on a one-time purchase. In certain cases, time-based pricing is better than file-sized pricing or vice-versa. This is synonyms to subscribing to a data plan that charges you for the amount of time you spent in the Internet, or a data plan that charges you for the amount of bandwidth you used.

5. Software as a Service – users will subscribe to a software only when needed rather than purchasing them. This is a cheaper option if you do not always need to use a software. Software as a service allows you to “rent” a software for a minimal fee.



WHAT IS WEB 3.0 AND THE SEMANTIC WEB?

• SEMANTIC WEB is a movement led by the World Wide Web Consortium (W3C).

• The W3C standard encourages web developers to include semantic content in their web pages.

• Tim Berners Lee – inventor of World Wide Web, noted that the Semantic Web is a component of Web 3.0.



Web 3.0 is yet to be fully realized because of several problems:

1. Compatibility. HTML files and current web browsers could not support Web. 3.0.

2. Security. The user’s security is also in question since the machine is saving his or her preferences.

3. Vastness. The World Wide Web already contains billions of web

4. Vagueness. Certain words are imprecise. The words “old” and “small” would depend on the user.

5. Logic. Since machines use logic, there are certain limitations for a computer to be able to predict what the user is referring to at a given time.



GOING FURTHER, LET US DIG DEEPER ON THE TRENDS IN ICT


1) CONVERGENCE:

a) Technological convergence is the synergy of technological advancements to work on a similar goal or task.

b) Convergence is using several technologies to accomplish a task conveniently.


2) SOCIAL MEDIA:

a) is a website, application, or online channel that enables web users to create, co-create, discuss, modify, and exchange user-generated content.

b) There are six types of Social Media

i) Social Networks. These are sites that allow you to connect with other people with the same interests or background.

ii) Bookmarking Sites. These are sites that allow you to store and manage links to various websites and resources. Most of these sites allow you to create a tag that allows you and others to easily search or share them. Examples: Twitter and Pinterest

iii) Social News. These are sites that allow users to post their own news items or links to other news sources. The users can also comment on the post and comments may also be ranked. They are also capable of voting on these news articles of the website. Examples: Reddit and Digg

iv) Media Sharing. These are sites that allow you to upload and share media content like images, music, and video. Most of these sites have additional social features like liking, commenting, and having user profiles. Examples: Flicker, Youtube, and Instagram.

v) Microblogging. These are sites that focus on short updates from the user. Those subscribe to the user will be able to receive these updated. Examples: Twitter and Plurk

vi) Blogs and Forums. These websites allow users to post their content. Other users are able to comment on the said topic. There are several free blogging platforms like Blogger, WordPress, and Tumblr. On the other hand, forums are typically part of a certain website or web service.

3) MOBILE TECHNOLOGIES

a) The popularity of smartphones and tablets has taken a major rise over the years. Several of these devices are capable of using high-speed Internet. Today, the latest mobile devices use 4G Networking (LTE), which is currently the fastest mobile network

b) iOS – used in Apple devices such as the iPhone and iPad. Android – an open source operating system developed by Google. Being open source means several mobile phone companies use this OS for free.

c) Blackberry OS – used in Blackberry devices.

d) Windows Phone OS – a closed source and proprietary operating system developed by Microsoft®.

e) Symbian – the original smartphone OS; used by Nokia devices.

f) WebOS – originally used for smartphones; now used for smart TVs. e. Windows Mobile– developed by Microsoft for smartphones and pocket PCs.


4) ASSISTIVE MEDIA

a) is a nonprofit service designed to help people who have visual and reading impairments. A database audio recordings is used to read to the user


Click this link to a blog for additional information:



NOW LET US TALK ABOUT SAFETY




RULES OF NETIQUETTE

• Online security, safety and ethics

• Internet threats

• Protecting reputations online

• Copyright

• Contextualized online search and research skills






10 Best Rules of Netiquette

The Golden Rule

  • (treat others as you would like to be treated)

No Flaming

  • (Flame is a personal insult communicated through the internet

Don’t type in ALL CAPS

  • (people may misinterpret)

Don’t SPAM

  • (it is any unsolicited e-mail from unknown sources

Don’t talk with people you do not know.

  • (do not arrange to meet anyone you meet online)

Obey Copyright Laws

  • (Don’t steal someone else’s idea, property and rights)

Use proper Grammar and Spelling

  • (errors diminishes the credibility of the message)

Be honest/Be yourself

  • (tell the truth, do not pretend to be someone else)

Follow the TOS (TOS-Term of Service)

  • (Rules and policy of the sites)

Shop Secure Sites

  • (these are sites with transport layer security TLS or SLS Socket Layer Security




What is internet Safety?

It refers to the online security or safety of people and their information when using the internet.


As teenagers, you are all exposed to many things powered by the Internet. Whether it is socializing, playing games, reading sports news, shopping, etc., the Internet years, did not have.


The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with the old ones. It is also a source of entertainment. But like most things in this world, there is always “another side of the coin.” The Internet is one of the most dangerous places, especially if you do not know what you are doing.



Are you Safe and Secured online? How Safe and Secured are you online?




Types of Information with Risk:

Some Tips to Stay Safe Online:

• Be mindful on what you share online.

• Do not just accept terms and conditions, read it.

• Do not share your password with anyone.

• Do not talk to strangers whether online or face-to-face.

• Never post anything about a future vacation.

• Avoid visiting untrusted websites.

• If you have WiFi at home, make it private by adding a password.

• Install and update an antivirus software on your computer.

• Add friends you know in real life.

• Avoid downloading anything from untrusted websites.

• Buy the software, do not use pirated ones.

• Do not reply or click links from suspicious emails.



Antivirus:

➢ Windows Defender

➢ BitDefender

➢ ESET NOD32

➢ F-Secure

➢ Kaspersky

➢ Norton

➢ AVAST

➢ SMADAV




INTERNET THREATS

A. Malware – stands for malicious software; It is a set of instructions that run on your computer and make your system do something that an attacker wants it to do.

Virus - a malicious program designed to replicate itself and transfer from one computer to another (internet, local networks, FDs, CDs, etc.)

Spyware - a program that runs in the background without you knowing it (thus called “spy”). It has the ability to monitor what you are currently doing and typing through keylogging.

Adware - A program designed to send your advertisement, mostly as pop-ups; SPAM- Refers to the transmission of unsolicited messages from various origins using electric messaging systems







A. Spam – unwanted email mostly from bots or advertisers. It can be used to send malware.

B. Phishing – Its goal is to acquire sensitive personal information like passwords and credit card details.


Click this for related topics for reading: https://luminet.co.uk/top-10-common-internet-threats/



Dangers on the Internet

Email Spam - Also known as junk email, it is usually unsolicited commercial email sent from one source with identical message sent to multiple recipients. Although some of them are not harmful, deleting them one by one will eat up your time and can clog your email. Dangerous spams carry virus like Trojan horse and other malicious software (malware). Spamming is projected to continue because it is a cheap means of advertising. In addition, many countries do not have laws to punish spammers.


Phishing - This is a deceitful practice of trying to get confidential information such as passwords and usernames and credit card details by making it appear as if it comes from a trustworthy source. Phishing is usually done by email or other similar means using a popular entity such as Microsoft, Yahoo, Google, Amazon and financial institutions to lure you to their website. Internet users would think that they are accessing genuine website and through this way, a phisher would be able to gather sensitive information from internet account user.


Pharming - This is a dangerous hacker attack on a website which directs all traffic to that website to another fictitious website. The main object of pharming is to obtain username and passwords as well as credit card and financial information and use these to steal their money electronically or use the credit card of the victims. Pharming is a major concern of many online banking and electronic commerce transactions, which would comprise many of their client accounts as well as the business. Antivirus and anti-spyware software cannot prevent and protect one from pharming.


Spyware - It is known that spyware programs also affect the performance and settings of the computer. Major antivirus companies have incorporated in their products anti-spyware programs and many internet-based companies have offered anti-spyware programs for a fee and some are free. But you must be careful which one to use to ensure your protection.


Computer worm - This is a dangerous computer program that replicates itself through a network. Some worms delete files, others disrupt the network function and still, others send junk mail from infected computer.


Trojan Horse - it can erase data, can allow access of the victim’s computer, can corrupt files, and can be used in Phishing for bank accounts.


Hacker - This is a person who is able to enter and control other people’s computer without authorization. A hacker is able to enter another’s computer, usually vandalizes the victim’s website, steals personal information, obtains intellectual property, and performs credit card fraud. Firewalls are able to prevent entry by hackers.


Click this for further reading:





IN ORDER TO BE SAFE ALL THE TIME, TAKE THE NETIQUETTE “GOLDEN RULE”:





< END OF WEEK 1 >

Comments


© 2021 by EmTech Week. Proudly created with Wix.com

bottom of page