Empowerment Technology

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

EMPOWERMENT TECHNOLOGY

 Information and Communication Technology (ICt) deals with the use of different communication technologies
such as mobile phones, telephone, Internet, etc. to locate, save, send, and edit information.
 Philippines as the ICT hub ofASIA.
huge growth of ICT related jobs around the country, one of which is call center or BPO (Business Process Outsourcing)
centers.
 According to 2013 edition of Measuring the Information Society by the International Telecommunication Union, there are
106.8 cellphones per 100 Filipinos in the year 2012.
 Time magazines declared Makati City, Philippines-Rank 1 as the “Selfiest Cities around the world and Rank 9 is Cebu City.
 When WWW was invented, most web pages were static. Static (also known as flat page or stationary page) in the same that
the page “as is” and cannot be manipulated by the user. This referred to as Web 1.0.

Example of Web 2.0


1. Social Networking sites
2. Blogs
3. Wikis
4. Video sharing sites

 Web 2.0 allows the user to interact with the page known as DYNAMIC PAGE; instead of just reading a page, the user may be
able to comment or create a user account. Dynamic page refers to the web pages that are affected by user input or
preference.

Key Features of Web 2.0:


1. Folksonomy – allows users to categorize and classify/arrange information using freely chosen keywords (e.g. tagging). Popular
social networking sites such as Twitter, Instagram, Facebook, etc. use tags that start with a pound sign (#) or hashtag.
2. Rich User Interface – content is dynamic and is responsive to user’s input. An example would be a website that shows local
content. In the case of social networking sites, when logged on, your account is used to modify what you see in their website.
3. User Participation– the owner of website is not the only one who is able to put content. Others are able to place a content on
their own by means of comments, reviews, and evaluation.
4. User Participation– the owner of website is not the only one who is able to put content. Others are able to place a content on
their own by means of comments, reviews, and evaluation.
5. Long Tail – services are offered on demand rather than on a one-time purchase. This is synonymous to subscribing to a data
plan that charges you for the amount of time you spent on Internet or a data plan that charges you for the amount of
bandwidth you used.

Web 3.0 and the Semantic Web


 Semantic Web– is a movement led by the World Wide Web Consortium(W3C). The semantic web provides a framework that
allows data to be shared and reuse to deliver web content specifically targeting the user.

Web 3.0 is yet to be fully realized because of several problems:


1. Compatibility-HTML files and current web browsers could not support Web 3.0.
2. Security – The user’s security is also question since the machine is saving his or her preferences.
3. Vastness-The World Wide Web already contains billions of web pages.
4. Vagueness – Certain words are imprecise. The words “old” and “small” would depend to the user.
5. Logic- since machines use logic, there are certain limitations for a computer to be able to predict what the user is referring to
at a given time.

Trends in ICT
1. Convergence– is the synergy of technological advancements to work on a similar goal or task. For example, besides using your
personal computer to create word documents, you can now use your smartphone.
2. Social Media– is a website, application, or online channel that enables web users to create, co-create, discuss, modify, and
exchange user generated content.
Six types of Social Media:
a) Social Networks – These are sites that allows you to connect with other people with the same interests or background. Once
the user creates his/her account, he/she can set up a profile, add people, share content, etc.
Example : Facebook and Google+
b) Bookmarking Sites– These are sites that allow you to store and manage links to various website and resources. Most of these
sites allow you to create a tag allows you to and others easily share them.
Ex. : StumbleUpon/Pinterest
c) Social News– These are sites that allow users to post their own news items or links to other news sources. The users can also
comment on the post and comments may also be rank.
Example: reddit and Digg
d) Media Sharing – These are sites that allow you to upload and share media content like images, music and video.
Example: Flickr, Youtube and Instagram.
e) Microblogging– These are sites that focus on short updates from the user. Those that subscribed to the user will be able to
receive these updates.
Example: Twitter and Plurk
f) Blogs and Forums– These websites allow user to post their content. Other users are able to comment on the said topic.
Example: Blogger, WordPress and Tumblr
3. Mobile Technologies – The popularities of smartphones and tablets has taken a major rise over the years. This is largely
because of the devices capability to do the tasks that were originally found in PCs.
Mobile OS
a. iOS– use in apple devices such as iPhone and iPad.
b. Android – an open source OS developed by Google. Being open source means mobile phone companies use this OS for free.
c. Blackberry OS– use in Blackberry devices.
d. Windows Phone OS – a closed source and proprietary operating system developed by Microsoft.
e. Symbian– the original smartphone OS; used by Nokia devices.
f. WebOS– originally used in smartphones; now used in smartTVs.
g. Windows Mobile – developed by Microsoft for smartphones and pocket PCs.
4. Assistive Media – is a non-profit service designed to help people who have visual and reading impairments. A database of
audio recordings is used to read to the user.

RULES OF NETIQUETTE

Tips to Stay Safe Online


1) Be mindful of what you share online and what site you share it too.
2) Do not accept terms and conditions; read it.
3) Do not share your password to anyone.
4) Avoid logging in to public networks/wifi.
5) Do not talk to strangers whether online or face to face.
6) Never post anything about a future vacation.
7) Avoid visiting untrusted websites.
8) Install and update an antivirus software on your computer.
9) If you have a Wi-Fi at home, make it a private network by adding a password.
10) Avoid downloading anything from untrusted websites.
11) Buy the software; do not use pirated ones.
12) Do not reply or click links from suspicious emails.

Internet Threats
1. Malware – stands for malicious software.
a. Virus- a malicious program designed to replicate itself and transfer from one computer to another either through Internet or Local
networks or Data storage like flash drives and CDs.
b. worm- a malicious program that transfers from one computer to another by any type of means. For example, the ILOVEYOU worm
(Love Bug Worm) created by a Filipino.
c. Trojan – a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected
and allows hackers to get your information.
d. Spyware- a program that runs in the background without you knowing it (thus called “spy”). It has the ability to monitor what you
are currently doing and typing through key logging.
*key loggers- used to record the keystroke done by the users.
e. Adware- a program designed to send you advertisements, mostly as pop-ups.
2. Spam- unwanted email mostly from bots or advertisers. It can be used to send malware.
3. Phishing- its goal is to acquire sensitive personal information like passwords and credit card details. This is done by sending you an
email that will direct the user to visit a website and be asked to update his/her username, password, credit card, or personal
information.
*Pharming- a more complicated way of phishing where it exploits the DNS (Domain Name Service) system.

Think Before You Click


1) Before you post something on the web, ask these questions to yourself: would you want your parents or grandparents to see
it? Would you want your future boss to see it? Once you’ve post something on the net, you have no control of who sees your
posts.
2) Your friends depend on you to protect their reputation online. Talk to your friends about this serious responsibility.
3) Set your post to “private”. In this way, search engines will not be able to scan that post.
4) Avoid using names. Names are easy for search engines to scan.

Copyright Infringement
 If you create something, an idea, an invention, a form of literary work or a research, you have the right as to how it should
be used by others. This is called intellectual property.
 As a responsible user of the Internet, you have to consider that not everything out there is free for you to use.

Tips to avoid copyright infringement:


1. Understand. Copyright protects literary works, photographs, paintings, films, music (lyrics), choreography and etc, but it generally
does NOT protect underlying ideas and facts. This means that you can express something using your own words, but you should give
credit to the source.
2. Be responsible. Even if a material does not say that it is copyrighted, it is not a valid defense against copyright. Be responsible
enough to know if something has a copyright.
3. Be creative. Ask yourself whether what you are making is something that came from you or something made from somebody else’s
creativity.
4. Know the Law. There are limitations to copyright laws. For instance, in the Philippines, copyrights only last a lifetime (of the authors)
plus 50 years.

You might also like