MOTIVE QUESTION: HOW THE INTERNET HAS MADE THE WORLD GO ROUND FOR DECADES? INFORMATION AND COMMUNICATION TECHNOLOGIES • Information and Communication Technologies(ICT) deals with the use of diferrent communication technologies such as mobile phones, telephone, Internet, etc. to locate, save, send, and edit information. • ICT in the Philippines - “ICT Hub of Asia” because of the huge growth of ICtrelated jobs around the country, one of which is the call center or BPO (Business Process Outsourcing) centers. Time Magazine's- according to this magazine, two Philippine cities are part of the top 10 in their research about “The Selfiest Cities around the World” Top 1: Cebu City Top 2: Makati City -the study was conducted using the Instagram, a popular photo sharing application. WEB 1.0: STATIC WEB PAGES also known as flat page or stationary page in the sense that the page is “as is” and cannot be manipulated by the user. The content is also the same for all users. WEB 2.0: DYNAMIC WEB PAGES the user is able to see a website differently than others. Examples of Web 2.0 include social networking sites, blogs, wikis, video sharing sites, hosted services, and web applications. allows users to interact with the page instead of just reading the page. allows users to use web browsers instead of just using their operating system. is a term coined by Darcy DiNucci on January 1999. FEATURES OF WEB 2.0 1. FOLKSONOMY allows users to categorize and classify/arrange information using freely chosen keywords (e.g., tagging). Popular social networking sites such as Twitter, Instagram, Facebook, etc. use tags that start with the pound sign (#). This is also referred to as hashtags. 2. RICH USER EXPERIENCE content is dynamic and is responsive to user's input. An example would be a website that shows local content. 3. USER PARTICIPATION the owner of the website is not the only one who is able to put content. Others are able to place their own by means of comments, reviews, and evaluation. 4. LONG TAIL services that are offered on demand rather than on a onetime purchase. 5. SOFTWARE AS A SERVICE users will subscribe to a software only when needed rather than purchasing them. it allows you to “rent” a software for a minimal fee. 6. MASS PARTICIPATION diverse information sharing through universal web access. Since most users can use the Internet, Web 2.0's content is based on people from various cultures. WEB 3.0 AND THE SEMANTIC WEB SEMANTIC WEB is a movement led by the World Wide Web Consortium (W3C). The term was coined by the inventor of the World Wide web, Tim Berners-Lee. He also noted that the Semantic Web is a component for Web 3.0. according to the W3C, “The Semantic Web provides a common framework that allows data to be shared and reused acrossapplication, enterprise, and community boundaries”. The aim of Web 3.0 is to have machines (or servers) understand the user's preferences to be able to deliver web content specifically targetting the user. SEVERAL PROBLEMS OF WEB 3.0 1. Compatability 2. Security 3. Vastness 4. Vagueness 5. Logic TRENDS IN ICT 1. CONVERGENCE Technological Convergence is the synergy of technological advancements to work on a similar goal or task. For example, besides using your personal computer to create word documents, you can now use your smartphone. 2. SOCIAL MEDIA a website, application, or online channel that enables web users to create, co-create, discuss, modify, and exchange user-generated content. SIX TYPES OF SOCIAL MEDIA 1. SOCIAL NETWORKS sites that allows you to connect with other people with the same interests or background. examples: Facebook and Google+ 2. BOOKMARKING SITES sites that allows you to store and manage links to various websites and resources. Most of these sitesallow you to create a tag that allows you and others to easily search or share them. examples: StumbleUpon and Pinterest 3. SOCIAL NEWS sites that allow users to post their own news items or links to other news sources. users can also comment on the post and comments may also be ranked. examples: reddit and Digg 4. MEDIA SHARING sites that allow you to upload and share media content like images, music, and video. Most of these sites have additional social features like liking, commenting, and having user profiles. examples: Flicker, Youtube, and Instagram 5. MICROBLOGGING sites that focus on short updates from the user. Those subscribed to the user will be able to receive these updates. examples: Twitter, and Plurk 6. BLOGS and FORUMS these websites allow users to post their content. Other users are able to comment on the said topic. There are several free blogging platforms like Blogger, WordPress, and Tumblr. On the other hand, forums are typically part of a certain website or web services. 3. MOBILE TECHNOLOGIES Mobile Devices use different Operating Systems: 1.iOS- used in Apple devices such as the iPhone and iPad 2. Android- an open source operating system developed by Google. Being open source means several mobile phone companies use this OS for free. 3. Blackberry OS- used in Blackberry devices 4. Windows Phone OS- a closed source and proprietary operating system developed by Microsoft. 5. Symbian- the original smartphone OS; used by Nokia devices. 6. WEbOS- originally used for smartphones; now used for smart TVs. 7. Windows Mobile- developed by Microsoft for smartphones and pocket PCs. 4. ASSISTIVE MEDIA a nonprofit service designed to help people who have visual and reading impairments. A database of audio recordings is used to read to the user. INTERNET defined as the information superhighway. this means that anyone has access to this highway, can place information, and can grab that information. TIPS TO STAY SAFE ONLINE 1. Be mindful of what you share online and what site you share it to. 2. Do not just accept terms and conditions; read it. 3. Check out the privacy policy page of a website to learn how the website handles the information you share. 4. Know the security features of the social networking site you use. 5. Do not share your password with anyone. 6. Avoid logging in to public networks/WiFi. 7. Do not talk to strangers whether online or face-to-face. 8. Never post anything about a future vacation. 9. Add friends you know in real life. 10. Avoid visiting untrusted websites. 11. Install and update an antivirus software on your computer. 12. If you have a Wi-Fi at home, make it private network by adding a password. 13. Avoid downloading anything from untrusted websites. 14. Buy software; do not use pirated ones. 15. Do not reply or click links from suspicious emails. INTERNET THREATS 1. MALWARE- stands for malicious software a. Virus- a malicious program designed to replicate itself and transfer from one computer to another either through the Internet and local networks or data storage like flashdrives and CDs. b. Worm- a malicious program that transfers from one computer to another by any type of means. c. Trojan- a malicious program that is disguised asa useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information. *Rouge Security Software tricks the user into posing that is a security software. It asks the user to pay to improve his/her security but in reality, they are not protected at all. d. Spyware- a program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing and typing through keylogging. *Keyloggers- used to record the keystroke done by the users. This is done to steal their password or any other sensitive information. It can record email, messages or any information you type using your keyboard. e. Adware- a program designed to send your advertisements, mostly as pop -ups. 2. Spam- unwanted email mostly from bots or advertisers. It can be used to send malware. 3. Phishing- its goal is to acquire sensitive personal information like passwords and you an email that will direct the user to visit a website and be asked to update his/her username, password, credit card, or personal information. *Pharming- a more complicated wayof phishing where it exploits the DNS (Domain name Service) system. THINK BEFORE YOU CLICK 1. Before you post something on the web, ask these questions to yourself: Would you want to your parents or grandparents to see it? Would you want your future boss to see it? Once you post something on the web, you have no control of who sees your posts. 2. Your friends depend on you to protect their reputation online: Talk to your friends about this serious responsibility. 3. Set your post to “private”. In this way, search engines will not be able to scan that post. 4. Avoid using names. Names are easy for search engines to scan. 5. If you feel that post can affect you or other's reputation, ask the one who posted it to pull it down or report it as inappropriate. COPYRIGHT INFRINGEMENT COPYRIGHT a part of the law, wherein you have the rights to your work, and anyone who uses it without your consent is punishable by law. TIPS IN AVOIDING COPYRIGHT INFRINGEMENT Understand Be responsible Be creative Know the law c) Amado V. Hernandez-was dubbed “Poet of the Laborers”, his masterpiece is “ANG PANDAY” d) Valeriano Hernandez Pena- known as Tandang Anong, he considers “NENE AT NENENG” his master piece. e) Inigo Ed Regalado- a popular story teller, novelist and newspaper man. He reach the peak of his success by the “sumpong” of his pen. PHILIPPINE LITERATURE IN ENGLISH In a way , we can say that we can trace the beginnings of Philippine literature in English with the coming of the Americans. For this purpose, we can divide this period into three time frames, namely: The Period of Re-Orientation The Period of Imitation Period of Self- Discovery and Growth ASSESSMENT Create a simple poster to illustrate the development and influences of American government in the development of Philippine literature. Explain your work in a piece of paper. (20pts) ASSIGNMENT Read “Dead Stars” by Paz Marquez and answer why was entitled “ Dead Stars”. Research the background of Paz Marquez Benitez.