ETECH

advertisement
MOTIVE QUESTION:
HOW THE INTERNET HAS MADE THE
WORLD GO ROUND FOR DECADES?
INFORMATION AND
COMMUNICATION TECHNOLOGIES
• Information and
Communication
Technologies(ICT) deals
with the use of diferrent
communication
technologies such as
mobile phones, telephone,
Internet, etc. to locate,
save, send, and edit
information.
• ICT in the Philippines
- “ICT Hub of Asia” because
of the huge growth of ICtrelated jobs around the
country, one of which is
the call center or BPO
(Business Process
Outsourcing) centers.
 Time Magazine's- according to this magazine, two
Philippine cities are part of the top 10 in their research
about “The Selfiest Cities around the World”
Top 1: Cebu City
Top 2: Makati City
-the study was conducted using the Instagram, a popular
photo sharing application.
WEB 1.0: STATIC WEB PAGES
also known as flat page or stationary
page in the sense that the page is “as
is” and cannot be manipulated by the
user. The content is also the same for
all users.
WEB 2.0: DYNAMIC WEB PAGES
 the user is able to see a website differently than others.
Examples of Web 2.0 include social networking sites,
blogs, wikis, video sharing sites, hosted services, and web
applications.
 allows users to interact with the page instead of just
reading the page.
 allows users to use web browsers instead of just using
their operating system.
 is a term coined by Darcy DiNucci on January 1999.
FEATURES OF WEB 2.0
1. FOLKSONOMY
allows users to categorize and classify/arrange information
using freely chosen keywords (e.g., tagging). Popular social
networking sites such as Twitter, Instagram, Facebook, etc.
use tags that start with the pound sign (#). This is also
referred to as hashtags.
2. RICH USER EXPERIENCE
content is dynamic and is responsive to user's input. An
example would be a website that shows local content.
3. USER PARTICIPATION
the owner of the website is not the only one who is able to
put content. Others are able to place their own by means of
comments, reviews, and evaluation.
4. LONG TAIL
services that are offered on demand rather than on a onetime purchase.
5. SOFTWARE AS A SERVICE
users will subscribe to a software only when needed rather
than purchasing them.
it allows you to “rent” a software for a minimal fee.
6. MASS PARTICIPATION
diverse information sharing through universal web access.
Since most users can use the Internet, Web 2.0's content is
based on people from various cultures.
WEB 3.0 AND THE SEMANTIC WEB
SEMANTIC WEB
is a movement led by the World Wide Web Consortium
(W3C). The term was coined by the inventor of the World
Wide web, Tim Berners-Lee. He also noted that the
Semantic Web is a component for Web 3.0.
according to the W3C, “The Semantic Web provides a
common framework that allows data to be shared and reused
acrossapplication, enterprise, and community boundaries”.
The aim of Web 3.0 is to have machines (or servers)
understand the user's preferences to be able to deliver web
content specifically targetting the user.
SEVERAL PROBLEMS OF WEB 3.0
1. Compatability
2. Security
3. Vastness
4. Vagueness
5. Logic
TRENDS IN ICT
1. CONVERGENCE
Technological Convergence is the synergy of
technological advancements to work on a similar goal or
task. For example, besides using your personal computer to
create word documents, you can now use your smartphone.
2. SOCIAL MEDIA
a website, application, or online channel that enables web
users to create, co-create, discuss, modify, and exchange
user-generated content.
SIX TYPES OF SOCIAL MEDIA
1. SOCIAL NETWORKS
sites that allows you to connect with other people with the
same interests or background.
examples: Facebook and Google+
2. BOOKMARKING SITES
sites that allows you to store and manage links to various
websites and resources. Most of these sitesallow you to
create a tag that allows you and others to easily search or
share them.
examples: StumbleUpon and Pinterest
3. SOCIAL NEWS
sites that allow users to post their own news items or links
to other news sources.
users can also comment on the post and comments may
also be ranked.
examples: reddit and Digg
4. MEDIA SHARING
sites that allow you to upload and share media content like
images, music, and video. Most of these sites have
additional social features like liking, commenting,
and having user profiles.
examples: Flicker, Youtube, and Instagram
5. MICROBLOGGING
sites that focus on short updates from the user. Those
subscribed to the user will be able to receive these updates.
examples: Twitter, and Plurk
6. BLOGS and FORUMS
these websites allow users to post their content. Other
users are able to comment on the said topic. There are
several free blogging platforms like Blogger, WordPress,
and Tumblr. On the other hand, forums are typically part of a
certain website or web services.
3. MOBILE TECHNOLOGIES
Mobile Devices use different Operating Systems:
1.iOS- used in Apple devices such as the iPhone and iPad
2. Android- an open source operating system developed by
Google. Being open source means several mobile phone
companies use this OS for free.
3. Blackberry OS- used in Blackberry devices
4. Windows Phone OS- a closed source and proprietary
operating system developed by Microsoft.
5. Symbian- the original smartphone OS; used by Nokia
devices.
6. WEbOS- originally used for smartphones; now used for
smart TVs.
7. Windows Mobile- developed by Microsoft for
smartphones and pocket PCs.
4. ASSISTIVE MEDIA
a nonprofit service designed to help people who have
visual and reading impairments. A database of audio
recordings is used to read to the user.
INTERNET
defined as the information superhighway.
this means that anyone has access to this
highway, can place information, and can
grab that information.
TIPS TO STAY SAFE ONLINE
1. Be mindful of what you share online and
what site you share it to.
2. Do not just accept terms and conditions;
read it.
3. Check out the privacy policy page of a
website to learn how the website handles
the information you share.
4. Know the security features of the social
networking site you use.
5. Do not share your password with
anyone.
6. Avoid logging in to public networks/WiFi.
7. Do not talk to strangers whether online or
face-to-face.
8. Never post anything about a future
vacation.
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software
on your computer.
12. If you have a Wi-Fi at home, make it
private network by adding a password.
13. Avoid downloading anything from
untrusted websites.
14. Buy software; do not use pirated ones.
15. Do not reply or click links from
suspicious emails.
INTERNET THREATS
1. MALWARE- stands for malicious
software
a. Virus- a malicious program designed to
replicate itself and transfer from one
computer to another either through the
Internet and local networks or data storage
like flashdrives and CDs.
b. Worm- a malicious program that transfers
from one computer to another by any type of
means.
c. Trojan- a malicious program that is
disguised asa useful program but once
downloaded or installed, leaves your PC
unprotected and allows hackers to get your
information.
*Rouge Security Software
tricks the user into posing that is a security
software. It asks the user to pay to improve
his/her security but in reality, they are not
protected at all.
d. Spyware- a program that runs in the
background without you knowing it. It has
the ability to monitor what you are currently
doing and typing through keylogging.
*Keyloggers- used to record the keystroke
done by the users. This is done to steal their
password or any other sensitive information.
It can record email, messages or any
information you type using your keyboard.
e. Adware- a program designed to send your
advertisements, mostly as pop -ups.
2. Spam- unwanted email mostly from bots
or advertisers. It can be used to send
malware.
3. Phishing- its goal is to acquire sensitive
personal information like passwords and
you an email that will direct the user to visit
a website and be asked to update his/her
username, password, credit card, or personal
information.
*Pharming- a more complicated wayof
phishing where it exploits the DNS (Domain
name Service) system.
THINK BEFORE YOU CLICK
1. Before you post something on the web, ask
these questions to yourself: Would you want
to your parents or grandparents to see it?
Would you want your future boss to see it?
Once you post something on the web, you
have no control of who sees your posts.
2. Your friends depend on you to protect
their reputation online: Talk to your friends
about this serious responsibility.
3. Set your post to “private”. In this way,
search engines will not be able to scan that
post.
4. Avoid using names. Names are easy for
search engines to scan.
5. If you feel that post can affect you or
other's reputation, ask the one who posted it
to pull it down or report it as inappropriate.
COPYRIGHT
INFRINGEMENT
COPYRIGHT
 a part of the law, wherein you have the
rights to your work, and anyone who
uses it without your consent is
punishable by law.
TIPS IN AVOIDING
COPYRIGHT
INFRINGEMENT
Understand
Be responsible
Be creative
Know the law
c) Amado V. Hernandez-was dubbed “Poet
of the Laborers”, his masterpiece is “ANG
PANDAY”
d) Valeriano Hernandez Pena- known as
Tandang Anong, he considers “NENE AT
NENENG” his master piece.
e) Inigo Ed Regalado- a popular story teller,
novelist and newspaper man. He reach the
peak of his success by the “sumpong” of his
pen.
PHILIPPINE LITERATURE
IN ENGLISH
 In a way , we can say that we can trace the
beginnings of Philippine literature in
English with the coming of the Americans.
For this purpose, we can divide this period
into three time frames, namely:
 The Period of Re-Orientation
 The Period of Imitation
 Period of Self- Discovery and Growth
ASSESSMENT
Create a simple poster to illustrate the
development and influences of American
government in the development of Philippine
literature. Explain your work in a piece of
paper. (20pts)
ASSIGNMENT
Read “Dead Stars” by Paz Marquez and
answer why was entitled “ Dead Stars”.
Research the background of Paz Marquez
Benitez.
Download