Uploaded by Kristelsa Printing Services

E-TECH- HANDOUTS

advertisement
EMPOWERMENT TECHNOLOGY
Core Rules of Netiquette
Netiquette, or network etiquette, is concerned with the
"proper" manner of communication in the online environment.
Whenever you communicate in the virtual world, consider the
following "rules," adapted from Virginia Shea's Core Rules of
Netiquette.
Rule 1: Remember the Human
When communicating electronically, whether through
email, instant message, discussion post, text, or another
method, practice the Golden Rule: Do unto others as you would
have others do unto you. Remember, your written words are
read by real people, all deserving of respectful communication.
Before you press "send" or "submit," ask yourself, "Would I be
okay with this if someone else had written it?"
Rule 2: Adhere to the same standards of behavior online
that you follow in real life
While it can be argued that standards of behavior may
be different in the virtual world, they certainly should not be
lower. You should do your best to act within the laws and ethical
manners of society whenever you inhabit "cyberspace." Would
you behave rudely to someone face-to-face? On most
occasions, no. Neither should you behave this way in the virtual
world.
Rule 3: Know where you are in cyberspace
"Netiquette varies from domain to domain." (Shea,
1994) Depending on where you are in the virtual world, the same
written communication can be acceptable in one area, where it
might be considered inappropriate in another. What you text to
a friend may not be appropriate in an email to a classmate or
colleague. Can you think of another example?
Rule 4: Respect other people's time and bandwidth
Electronic communication takes time: time to read and
time in which to respond. Most people today lead busy lives, just
like you do, and don't have time to read or respond to frivolous
emails or discussion posts. As a virtual world communicator, it
is your responsibility to make sure that the time spent reading
your words isn't wasted. Make your written communication
meaningful and to the point, without extraneous text or
superfluous graphics or attachments that may take forever to
download.
Rule 5: Make yourself look good online
One of the virtual world's best things is the lack of
judgment associated with your physical appearance, the sound
of your voice, or the clothes you wear (unless you post a video
of yourself singing Karaoke in a clown outfit.) The quality of your
writing will judge you, so keep the following tips in mind:
1. Always check for spelling and grammar errors.
2. Know what you're talking about and state it clearly.
3. Be pleasant and polite
Rule 6: Share expert knowledge
The Internet offers its users many benefits; one is the
ease in which information can be shared or accessed, and in
fact, this "information sharing" capability is one of the reasons
the Internet was founded. So in the spirit of the Internet's
"founding fathers," share what you know! When you post a
question and receive intelligent answers, share the results with
others. Are you an expert at something? Post resources and
references for your subject matter. You have recently expanded
your knowledge about a subject that might be of interest to
others? Share that as well.
Rule 7: Help keep flame wars under control
What is meant by "flaming" and "flame wars?" "Flaming
is what people do when they express a strongly held opinion
without holding back any emotion." (Shea, 1994). As an
example, think of the kinds of passionate comments you might
read on a sports blog. While "flaming" is not necessarily
forbidden in virtual communication, "flame wars," when two or
three people exchange angry posts between one another, must
be controlled, or the camaraderie of the group could be
compromised. Don't feed the flames; extinguish them by guiding
the discussion back to a more productive direction.
Rule 8: Respect other people's privacy
Depending on what you are reading in the virtual world,
be it an online class discussion forum, Facebook page, or an
email, you may be exposed to some private or personal
information that needs to be handled with care. Perhaps
someone is sharing some medical news about a loved one or
discussing a situation at work. What do you think would happen
if this information "got into the wrong hands?" Embarrassment?
Hurt feelings? Loss of a job? Just as you expect others to
respect your privacy, so should you respect the privacy of
others. Be sure to err on the side of caution when deciding to
discuss or not to discuss virtual communication.
Rule 9: Don't abuse your power
Like in face-to-face situations, there are people in
cyberspace who have more "power" than others. They have
more expertise in technology or have years of experience in a
particular skill or subject matter. Maybe it is you who possesses
all of this knowledge and power! Just remember: knowing more
than others do or having more power than others may have does
not give you the right to take advantage of anyone. Think of Rule
1: Remember the human.
Rule 10: Be forgiving of other people's mistakes
Not everyone has the same amount of experience
working in the virtual world. And not everyone knows the rules
of Netiquette. At some point, you will see a stupid question, read
an unnecessarily long response, or encounter misspelled
words; when this happens, practice kindness and forgiveness
as you would hope someone would do if you had committed the
same offense. If it's a minor "offense," you might want to let it
slide. If you feel compelled to respond to a mistake, do so in a
private email rather than a public forum.
Understanding Graphic Design and Layout
What makes a good and effective website? How do
users interact with the websites they visit? A good website must
know its target audience, determine its needs, and
communicate effectively using the basic principles of graphics
and layout. Users or visitors may have different interests and
needs like browsing, researching, streaming, online shopping,
dating, and many others. They even behave differently
depending on what they perceive on the website. Web design
matters in every user, whether they can decide to stay or just
leave. Usability is important for the users as it satisfies their
experience on the website, but a good design will drag the
audience’s attention to stay on the page. Always remember that
first impressions last and web design has an impact on the users
on how they perceive the brand or message. Graphic design is
an artistic way of communicating ideas and messages through
visual expressions using texts, images, and symbols. Graphic
designers work on the quality of the output they serve for the
audience or clients like websites, advertisements, posters,
flyers, logos, videos, and any other multimedia form. A practical
graphic layout and design can easily catch the attention of the
viewers and allow them to understand the message
conveniently.
Graphic Design vs. Layout
Design is a plan of creating an idea through a
combination of texts, images, and other elements that are
placed together artistically, whereas, the layout is a term used
as the process of organizing and arranging these elements in a
design as you plot it in a paper.
Basic Principles of Design and Layout
1. Balance
It refers to the proper arrangement of the elements,
which gives a visual weight for the design. There are two types
of balance, Symmetrical or Asymmetrical. Symmetrical balance
is where the elements are equally distributed on both sides of
your design, technically a mirror-based design. In contrast,
Asymmetrical balance is a free layout where the elements can
be placed in any order or the opposite of symmetrical.
2. Emphasis
It refers to something that needs to stand-out or
emphasize. When working on emphasis, you can change the
color, size, or even the element itself to lead the eye to the focal
interest.
3. Pattern, Repetition and Rhythm
4. Alignment
It refers to the proper placement of an element
to your design, just like invisibly placing or aligning your
texts or images diagonally, vertically, and horizontally.
The standard texts or paragraph alignment we apply are
center, right, left, and justified.
5.
Changing its character size, thickness, spaces, or
even font type to stand out is its most critical features.
By applying this principle, it can help the viewer to
recognize and navigate the highlight of the event
smoothly.
6. Contrast
It refers to the use of different or opposite
elements such as sizes (large or small), shapes
(geometric or organic), spaces (negative or positive),
form (real or abstract), colors (monochromatic,
complementary, triadic, tetradic), texture (smooth or
rough), and values (light or dark). The contrast gives
visual weight to an object or design. You must consider
and limit the use of different elements, color, style, and
typography to avoid cluttered design. When creating
contrast in color and text, it is advised to choose a color
from the background to create consistency of your
design. Always remember that the details must be
readable by having a dark-light value of either text and
background or vice-versa.
7. Unity and Harmony
It refers to the relationship of the elements or
the contents when you place them together. The
elements of the design must work together and agree to
its meaning, theme, feeling, or mood.
WORLD WIDE WEB
It is also known as WWW or W3 introduce by Tim
Berners-Lee. It consists of different pages that are formatted in
a markup language called HTML (Hypertext Markup Language)
and linked to each other that contain text, graphics, multimedia
files, hyperlinks and etc.
Web 1.0
The first development of World Wide Web where web pages are
static. It also known as flat or stationary page and it cannot be
manipulated by users.
Web 2.0
It is a dynamic web page where user can interact with page like
creating a user account, posting comments, uploading files and
images, and others.
Example: Blog sites, Facebook, Twitter, Instagram, YouTube
Features of Web 2.0
1. Folksonomy – users can classify and arrange information by
adding tag or label. Pound sign (#) is used in Facebook, Twitter,
Instagram and other social networking sites.
Example in tagging on Facebook: #TeamKawayan, #Single
2. Rich User Experience – user can have high interaction with
the content of the page and can achieve level of expertise.
3. User Participation – user can put content on their own in
web page like comment, evaluation, and etc.
4. Long Tail – A site that offers services and brings individual
and businesses into selling different goods and commodities
such as shopping site like OLX, Lazada, Shopee, Zalora and
others.
5. Software as a service – users can subscribe to a software
when they need it instead of purchasing them.
6. Mass Participation – sharing of diverse information through
universal web access.
Web 3.0 The Semantic Web
A new paradigm in web interaction extension of led by World
Wide Web Consortium (W3C) where it provides framework that
allows data to be shared and reuse.
TRENDS IN ICT
1. Convergence – it refers to fusing of technological
advancement to work on a similar task.
Example. Using smartphone as camera in taking pictures
instead of DSLR camera.
2. Social Media – an application and website where user can
communicate, create and share content, and participate in
online communities.
Type of Social Media
A. Social Network – A website where people with the same
come together to share information.
Examples: Twitter, Instagram, Facebook
B. Social News – A website where user can post stories and are
ranked based on the popularity through voting.
Examples: Digg, Reddit, Propeller, Slashdot, Fark
C. Bookmarking Sites – A website that allows you to share and
store internet bookmarks, articles, posts, blogs, images and
others.
Examples: Pinterest, StumbleUpon, Dribble
D. Media Sharing – A website that allows you to share and store
multimedia files such as video, photos and music.
Examples: Instagram, YouTube, Flickr
E. Microblogging – a website that allows you to broadcast short
message. Examples: Twitter, Tumblr, Meetme
F. Blogs and Forums – a discussion website that allows user to
ask questions and comments on a journal posted by an
individual or group. Examples: Wordpress, Blogger
3. Mobile Technologies – a technology used in cellular and other
devices such
netbook, laptop, tablet, smartphones and etc.
4. Assistive Media - A platform that assist people with disability.
It will guide the
individual like a blind person by using an audio recording.
Online Safety
The importance of internet plays a crucial part in
human development. Life becomes easy and comfortable
because of this technology. Most of us are connected to the
internet via laptop, mobile phone, tablet, personal computer and
other electronic gadgets. Behind this technology there is a risk
that everyone should be aware of. You could be at risk on scam,
bullying, and illegal activities if you will not take precautions in
using internet. We need to keep ourselves safe and secure
whenever we use the internet. That is why it is very important to
know and learn the ways on how to be safe and secured online.
Tips on how to be safe online
 Do not share your password with anyone.
 Add friends you know in real life.
 Do not visit untrusted websites.
 Add password to your WIFI at home to make it private.
 Install and update antivirus in your computer.
 Do not give your personal information to anyone
 Think before you click.
 Never post about your future vacation.
INTERNET RISK
1. Cyberbullying
It happens when someone intentionally abused, harass, and
mistreated by other person using electronic communication.
2. Identity Theft
It is a crime of stealing personal information for the purpose
of assuming that person’s name or identity to make any form
of transactions.
3. Cyber Stalking
A criminal practice where electronic communication is used
to stalk or harass individual or group.
4. Sexting
The act of sending sexually explicit text messages, images,
and videos.
INTERNET THREATS
A. Malware – also known as Malicious Software.
Types of Malware
1. Virus – a malicious program that replicate itself by
copying itself to another program.
2. Trojan Horse – a malicious program that disguised as
legitimate program that user will accept
and use but take control of your computer.
3. Worm – malicious program that copy’s itself and spreads
to other computers.
4. Spyware – A malicious program that gathers information
from victim’s computer and send it back to the hacker.
5. Adware – An unwanted advertisement that will pop-up
several times on victim’s computer then
behave abnormally and tedious to close them.
6. Keylogger – A program that runs in the background and
steals user credentials and confidential information
and send back to hack by recording every keystroke
that a user makes on their computer or device.
7. Botnet – A collection of infected internet–connected
devices such as PC and mobile phone that
are controlled by a common type of malware.
8. Rootkit – A software tools used by hackers to gain
control over a computer on a network
without being exposed.
9. Ransomware – A ransom virus that block the user from
accessing the programs or files and
demands to pay the ransom through
online method for the removal of the virus.
B. Spam – also known as junk email or unwanted email send
by advertiser or bot. It can be used to send malware.
C. Phishing – a cyberattack method using deceptive emails and
websites to acquiring sensitive personal information.
D. Cybercrime – a crime in which computer is used as object
and tool in committing a crime such hacking,
phishing, spamming, child pornography, libel,
hate crimes, identity thief and others.
E. Cybercrime Law – a law that deals with all forms of
cybercrime
Internet Research is a research method in collecting and
gathering information via internet by
using search engine such as google.
Search Engine is a program that allows users to search for
content on internet.
Examples of Search Engine
Google
Web Crawler
Bing
Ask
Aol Search
Yahoo! Search
Info
Infospace
Wow
Baidu
MyWebSearch Wolframalpha
Dogpile
DuckDuckGo
Contenko
Internet Archive
Searching the Web
Getting the correct and reliable information is our goal
in internet research. We may rely on the capability of search
engine but sometimes it may not give us the correct information
because of the keywords we entered into a search engine.
There are techniques in searching information that can be
applied in search engine in order to get a better result. Some
search engines allow combination of words and logic
connectors of AND, OR, and NOT.
Tips for Effective Internet Research by George Mathews
1. Know what kind of research you want to do.
2. Make a list of keywords you will use in your search.
3. Enclose keywords in quotation marks.
4. Use the minus sign (-).
5. Try specialized search engines.
6. Skim through search results web pages.
7. Bookmark
8. Review your bookmarks.
Online Research Skills by Hannah Trierweiler Hudson
1. Check Your Sources
2. Ask Good Questions
3. Go Beyond the Surface
4. Be Patient
5. Respect Ownership
6. Use Your Networks
Copyright Issues - There are millions of information that we
can et from the internet. Some of this information are free
but others are not. They are protected by a copyright law.
What is Copyright? - Copyright is a protection given to the
owner of the rights in an original work such as books,
musical works, films, paintings, and other works, and
computer programs. This original work is called
intellectual property which is protected under Republic
Act 8293 known as the “Intellectual Property Code of the
Philippines”.
Copyright Infringement - This happens when the copyrighted
work is use by other person without permission of the
author or copyright holder. Any person who is infringing
the right protected work would be liable under the law.
Fair Use - Research is important to the students and other
people. Most of them rely on the information that they can
get online. Although this information is protected by a
copyright law but we can still use this information without
permission in a limited way under certain condition and
purpose.
Fair use is the use of copyrighted material for comment,
teaching, criticism, news reporting, research, scholarship, and
other similar purpose is not an infringement of copyright.
Example of this is when you post a quote from a person in
your Facebook wall. Include the name of person who owns
the quote in your post. Another example is when you copy
image from internet, give credit to the creator of image.
The copied image should be use for educational purpose
not for commercial use. In fair use, 5% of the content of
reference can only be copied. If 20% or less of reference
copied, there must be a secondary use agreement and
fee. And if 20% or more of reference copied, it requires
purchasing of creative work.
Guidelines for Fair Use
1. Majority of the contents created must be yours.
2. Give credit to the owner.
3. Don’t make profit of the copyrighted work.
Download