Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

EMPOWERMENT TECHNOLOGIESMODULE 2: Productivity Tools will help you on , Study notes of Computer science

asdasdddddddddddddddddddddddddddddddddddddddddadasdadasd

Typology: Study notes

2019/2020

Uploaded on 11/29/2020

leean12
leean12 🇵🇭

4 documents

1 / 41

Toggle sidebar

Related documents


Partial preview of the text

Download EMPOWERMENT TECHNOLOGIESMODULE 2: Productivity Tools will help you on and more Study notes Computer science in PDF only on Docsity! EMPOWERMENT TECHNOLOGIES OVERVIEW Module Content MODULE 1: ICT in the Context of Global Communication will give you an introduction into ICT and the different online platforms that may be used for its specific purpose. It will also tackle on online safety, security, and online etiquette. You will be able to get tips on how maximize the power of the internet to assist you in your research work through discussing research tools and evaluating relevant and reliable websites. LESSON 1: What is Information and Communication Technology? Information and Communications Technology (ICT) often deals with the use of different technologies such as mobile phones, telephones, computer, Internet, and other devices, as well as software and applications to locate, save, send, and manipulate information. Empowering ICT is important for its innovative uses impacts our daily lives. It has affected our ways of communicating, made our lives more convenient, assisted countries towards their modernization plans. Thus, there is a need to create a foundation of understanding in the world of ICT. What are my goals? By the end of this lesson, you are expected to: 1. Identify varied online platforms and sites. 2. Compare and contrast the nuances of varied online platforms, sites, and content to best achieve specific class objectives or address situational challenges. 3. Evaluate existing online creation tools, platforms and applications in developing ICT content. What are my goals? By the end of this lesson, you are expected to: 1. Identify varied online platforms and sites. 2. Compare and contrast the nuances of varied online platforms, sites, and content to best achieve specific class objectives or address situational challenges. 3. Evaluate existing online creation tools, platforms and applications in developing ICT content. ICT in the Philippines Philippines is dubbed as the “ICT Hub of Asia” because of huge growth of ICT-related jobs, one of which is BPO, Business Process Outsourcing, or call centers. In a data gathered by the Annual Survey of Philippines Business and Industries in 2010, the ICT industry shares 19.3% of the total employment population. When the internet was fully commercialized in 1995, it has tremendously impacted culture and commerce, including the rise of near instant communication by email, instant messaging, telephony ( Voice over Internet Protocol or VoIP), two-way interactive video calls, and the World Wide Web with its discussion forums, blogs, social networking, and online shopping sites, Internet is the global system of interconnected computers networks that uses the Internet Protocol suite (TCP/IP) to communicate between networks and devices. The World Wide Web The World Wide Web is an information system on the Internet that allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another. It was invented by Tim-Berners Lee. The World Wide Web browser software, such as Microsoft’s Internet Explorer/Edge, Mozilla Firefox, Opera, Apple’s Safari, and Google Chrome, let users navigate from one web page to another via the hyperlinks embedded in the documents. These documents may also contain any combination of computer data, including graphics, sound, text, video, multimedia and interactive content that runs while the user is interacting with the page. The Web enabled individuals and organizations to publish ideas and information to a potentially large audience online at greatly reduced expense and time delay. Types of Web Pages • Web 1.0 or The Web. It is the first stage of the World Wide Web evolution. It is a flat or stationary page since it cannot be manipulated by the user. • Web 2.0 or The Social Web. Allows users to interact with the page, the user may be able to comment or create a user account. Most website that we visit today are Web 2.0 • Web 3.0 or Semantic Web. The semantic web provides a framework that allows data to be shared and reuse to deliver web content specifically targeting the user. Search Engine will learn about you and your habits from each search you perform and will gather details about you from your previous activities like likes and social postings and present the answers as per your preferences. LESSON 1.1: ONLINE PLATFORMS AND SITES Because of the wide capacity of Web 2.0, it has helped in creating dynamic online platform sites. Online platform is a specially developed platform using Internet technology. Online platforms have revolutionized access to any information. Online platforms currently include, but are not limited to: • Presentation or Visualization • Cloud Computing • File Management • Mapping • Social Media Let us go through them one by one! 1. Presentation or Visualization Platforms allows you to present and share presentations, infographics and videos with other people. It is used to communicate information clearly and efficiently. 2. Cloud Computing Platform is also called as “The cloud”. It is the practice of using a network of remote servers hosted on the internet. Instead of using your computer’s hard drive, you store and access your data and programs over the internet. 3. File Management Platform is used for the storing, naming, sorting, and handling of computer files. Allows you to convert and manage files without download in the software tool. 4. Mapping Platform is a tranformation taking the points of one speace into the points of the same or another space. Uses GPS to detect lcation and used for navigation. 5. Social Media Platforms is a computer-mediated tool that allow large group of people to create, share or exchange information, interest and the information shared can be in the form of ideas, pictures, videos or anything that you want to create and share to virtual communities. It can be in the following platforms: • Social Networks. These sites allow you to connect with other people with the same interests or background. • Bookmarking Sites. These are sites that allow you to store and manage links to various websites and resources. • Social News. These are sites that allows users to post their own news items or links to other news sources. LESSON 2.1: ONLINE SAFETY, SECURITY AND NETIQUETTE Online safety refers to the practices and precautions that should be observed when using the internet to ensure that the users as well as their computers and personal information are safe from crimes associated with using the internet. Types of Information Risks 1. First Name – There is still a risk in sharing your first name. Chances are, a hacker already knows plenty of stuff about you even if you only give your first name. you cannot just walk in a room and start introducing yourself to everyone. You do not know whom you can come across with. 2. Last Name – If sharing your first name is a small risk, having both your first and last is a more risky. You will be vulnerable to being searched for using search engines, which include image search. Matching a name with a face can lead to several cybercrimes like identity theft. 3. Middle Name – Sharing just your middle name is probably not the most risky of these shared information, but sharing your entire full name would be. 4. Current and previous school(s) – Most people who steal identities study their subject. They can use this information for verification purposes. 5. Your Cellphone Number – Your cellphone number should never be posted over the internet. The internet is a public place. It is the same as posting your number on a billboard. 6. Who your Mother and Father are – Risky, yet not as risky as posting their full names, especially your mother’s maiden name. In fact, if you have already encountered many websites that require your mother’s maiden name as an answer to a secret question whenever you lose your password. 7. Who your siblings are – This is a huge risk, especially if you have younger siblings. Strangers may pretend or use their identity to dope you. 8. Your address – Hopefully you answered no to this one. Giving the internet your number is one thing, giving them your address is a whole other level. It would be much easier for criminals to find you. • Regularly review your privacy settings in your online accounts to make sure you are not sharing important personal information. • When using a public computer terminal, be sure to delete your browsing data before leaving. • Keep your software updated to avoid security holes. • Do not download or install software or anything on your computer or cell phone that is unknown to you. Netiquette is a combination of the words network and etiquette. It is a set of rules for behaving properly online There are 10 Rules of Netiquette Rule 1: Remember the Human. When communicating electronically, whether through email, instant message, discussion post, text, or some other method, practice the Golden Rule: Do unto others as you would have others do unto you. Remember, your written words are read by real people, all deserving of respectful communication. Before you press “send” or “submit”, ask yourself, “Would I be okay with this if someone else had written it?” You need to remember that you are talking to a real person when you are online. The internet brings people together who whould otherwise never meet. Rule 2: Adhere to the same standards of behavior online that you follow in real life. You need to behave the same way online that you do in real life. You need to remember that you can get caught doing things you should not be doing online just like you can in real life. You are still talking to a real person with feelings even though you can’t see them. Rule 5: Make yourself look good online. Remember to always check your spelling and grammar before posting. Always know what you are talking about and make saying it. Be polite and pleasant to everyone. Rule 6: Share expert knowledge. Ask questions online. Share what you know online. Post the answerss to your questions online because someone may have the same questions you do. Rule 7: Help keep flame wars under control. Netiquette does not forbid flaming. Netiquette does however forbid people who are flaming to hurt discussion groups by putting the group down. Rule 10: Be forgiving of other people’s mistakes. Do not point out mistakes to people online. Remember that you were once the new kid on the block. You still need to have good manners even though you are online and can not see the person face to face. LESSON 2.2 KINDS OF ONLINE THREATS There is no doubt that you need to be vigilant online. As the World Wide Web evolved over the years, many internet predators have been playing on vulnerabilities to attack computers and retrieve sensitive data from individuals. Half the time, we aren’t even aware it is happening until it is too late. Online threat is deemed any malicious act that attempts to gain access to a computer network without authorization or permission from the owners. These are usually done by computer hackers who use the World Wide Web to facilitate cybercrime. Web threats use multiple types of malware and fraud, all of which utilize HTTP or HTTPS protocols, but may also employ other protocols and components, such as links in email or Instant Messaging apps, or any malware attachments on servers that access the Web. They benefit cybercriminals by stealing information for subsequent sale and help absorb infected PCs into botnets. Web threats pose a broad range of risks, including financial damages, identify theft, loss of confidential information/data, theft of network resources, damaged brand/personal reputation, and erosion of consumer confidence in e-commerce and online banking. The following are the top kinds of online threats that you should be aware of: Phishing happens when an email is sent from an internet criminal disguised lure you into revealing sensitive or confidential information. Pharming happens when a hacker (or “pharmer”) directs an internet user to a fake website instead of a legitimate one. These “spoofed” sites can capture a victim’s confidential information, including usernames, passwords, and credit card data, or install malware on their computer. Pharmers usually focus on websites in the financial sector, including banks, online payment platforms, or other e-commerce destinations. • Trojan, or Trojan horse, is one of the most dangerous malware types. It usually represents itself as something useful in order to trick you. Once it’s on your system, the attackers behind the Trojan gain unauthorized access to the affected computer. From there, Trojans can be used to steal financial information or install threats like viruses and ransomware. • Ransomware is a form of malware that locks you out of your device and/or encrypts your files, then forces you to pay a ransom to get them back. Spams are unsolicited emails, instant messages coming from recipients that are not granted verifiable permission for the message to be sent. Spam messages can be damaging if you open or respond to it. Cyber stalking refers to the use of the internet or other electronic device to harass or stalk individuals or organizations. Cyber bullying refers to the act of tormenting, harassing, or embarrassing another person using the internet. Spoofing happens when someone or something pretends to be something else to gain our confidence, get access to our systems, steal data, steal money, or spread malware.
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved