INTRODUCTION TO ICT World Wide Web
is an information system on the
Information and Communication internet that allows documents to be
deals with the use of different connected to other documents by
communication technologies such as hypertext links, enabling the user to
mobile phones, telephone, Internet to search for information by moving from
locate, save, send, and edit one document to another.
information. Is an information space where
study of computers as data processing documents and other web resources
tools. It introduces students to the are identified by URLs, interlinked by
fundamental of using computer hypertext links, and can be accessed
systems in an internet environment. via the Internet.
is invented by Tim-Berners Lee.
ICT In the Philippines
Philippines is dub as the ‘’ICT Hub of Web Pages
Asia” because of huge growth of ICT- Hypertext document connected to the
related jobs, one of which is BPO, World Wide Web. It is a document that
Business Process Outsourcing, or call is suitable for the World Wide Web.
centers.
ICT Department in the Philippines is ONLINE PLATFORMS OF
responsible for the planning, WORLD WIDE WEB
development and promotion of the Web 1.0
country’s information and refers to the first stage in the World
communications technology (ICT) Wide Web, which was entirely made
agenda in support of national up of the Web pages connected by
development. hyperlinks.
Web 2.0
DEFINITION OF TERMS is the evolution of Web 1.0 by adding
dynamic pages. The user is able to
Computer see a website differently than others.
an electronic device for storing and Allows users to interact with the page;
processing data, typically in binary instead of just reading the page, the
form, according to instructions given to user may be able to comment or
it in a variable program. create user account.
Web 3.0
Internet this platform is all about semantic web.
is the global system of interconnected Aims to have machines (or servers)
computer networks that use the understand the user’s preferences to
internet protocol suite (TCIP/IP) to link be able to deliver web content.
billions of devices worldwide. Static Web Page
Means of connecting a computer to is known as a flat page or stationary
any other computer anywhere in the age in the sense that the page is ‘’as
world via dedicated routers and is’’ and cannot be manipulated by the
servers. user. The content is also the same for
Sometimes called simply ‘’the Net’’, is all users that is referred to as Web 1.0.
a worldwide system of computer Dynamic Web Pages
networks - a network of networks in Web 2.0 is the evolution of web 1.0 by
which the users at any one computer adding dynamic web pages. The user
can get information from any other is able to see website differently than
computer. others e.g., social networking sites,
wikis, video sharing sites.
FEATURES OF WEB 2.0
Folksonomy same interests or background. Once
allows user to categorize and classify the user creates his/her account,
information using freely chosen he/she can set up a profile, add
keywords e.g., tagging by FB, Twitter, people, share content, etc.
use tags that start with the sign #, Example: Facebook and Google+
referred to as hashtag. Bookmarking Sites
Rich User Experience Sites that allow you to store and
content is dynamic and is responsive manage links to various website and
to user’s input. resources. Most of the sites allow you
User Participation to create a tag to others.
The owner of the website is not the Ex. tumble Upon, Pinterest
only one who is able to put content. Social News
Others can place a content of their Sites that allow users to post their own
own by means of comments, reviews news items or links to other news
and evaluation e.g., Lazada, Amazon. sources. The users can also comment
Long Tail on the post and comments may also
services that are offered on demand be rank.
rather than on a one-time purchase. Ex. Reddit and Digg
This is synonymous to subscribing to a Media Sharing
data plan that charges you for the sites that allow you to upload and
amount of time you spent on the share media content like images,
internet. music and video.
Software as a service Ex. Flickr, YouTube, and Instagram
users will be subscribe to a software Microblogging
only when needed rather than focus on short updates from the user.
purchasing them e.g., Google docs Those that subscribed to the user will
used to create and edit word be able to receive these updates.
processing and spread sheet. Ex. Twitter and Plurk
Mass Participation Blogs and Forums
diverse information sharing through allow user to post their content. Other
universal web access. Web 2.0’s users are able to comment on the said
content is based on people from topic.
various cultures. Ex. Blogger, WordPress, and Tumblr
TRENDS IN ICT MOBILE TECHNOLOGIES
Convergence The popularity of smartphones and
is the synergy of technological tablets has taken a major rise over the years.
advancements to work on a similar This is largely because of the devices
goal or task. For example, besides capability to do the tasks that were originally
using your personal computer to found in PCs. Several of these devices are
create word documents, you can now capable of using a high-speed internet. Today
use your smartphone. the latest model devices use 4G Networking
Social Media (LTE), which is currently the fastest.
is a website, application, or online
channel that enables web users web Mobile OS
users to create, co-create, discuss
modify, and exchange user generated iOS – use in apple devices such as
content. iPhone and iPad
Android – an open source OS
Six Types of Social Media developed by Google. Being open
source means mobile phone
Social Networks companies use this OS for free.
These are sites that allows you to Blackberry OS – use in blackberry
connect with other people with the devices
Windows phone OS – A closed source organization. It offers increased security
and proprietary operating system because of its private nature.
developed by Microsoft.
Symbian – the original smartphone COMMUNITY CLOUD allows systems and
OS. Used by Nokia devices services to be accessible by group of
WebOS- originally used in organizations.
smartphone; now in smart TVs.
Windows Mobile – developed by HYBRID CLOUD is a mixture of public and
Microsoft for smartphones and pocket private cloud. However, the critical activities
PCs are performed using private cloud while the
non-critical activities are performed using
ASSISTIVE MEDIA public cloud.
It is a non- profit service designed to
help people who have visual and
reading impairments. A database of audio
recordings is used to read to the user.
ELECTRONIC MAILS
Yahoo!; Gmail; Hotmail Cloud
Computing
distributed computing on internet or
delivery of computing service over
the internet.
Instead of running an e-mail program
on your computer, you log in to a Web
e-mail account remotely. The software
and storage for your account doesn’t
exist on your computer
It’s on the service’s computer cloud.
Components
1. Client computers – clients are the
device that the end user interact with
cloud.
2. Distributed Servers – Often servers
are in geographically different places,
but server acts as if they are working
next to each other.
3. Datacenters – It is collection of
servers where application is placed
and is accessed via Internet.
Types of Cloud
PUBLIC CLOUD allows systems and
services to be easily accessible to the
general public. Public cloud may be less
secured because of its openness, e.g. e-mail
PRIVATE CLOUD allows systems and
services to be accessible within an
ONLINE SAFETY, SECURITY,
AND RULES OF NETIQUETTE Be polite and pleasant to everyone.
Always check your spelling and
Internet Safety grammar before posting.
it refers to the online security or safety Know what you are talking about and
of people about their information when make sense saying it.
using the internet
Netiquette Share expert knowledge
DO’s and DON’Ts of online Ask questions online
communication, network etiquette. Share what you know online.
Post the answers to your questions
TEN RULES OF NETIQUETTE online because someone may have
the same question you do.
Remember the human
You need to remember that you are Help keep flame wars under control
talking to a real person when you are Netiquette does not forgive flaming.
online. Netiquette does however forbid people
The internet brings people together who are flaming to hurt discussion
who would otherwise never meet. groups by putting the group down.
Remember this saying when sending
an email: Would I say this to the Respect other people’s privacy.
person’s face. Do not read other people’s mail
without their permission.
Adhere to the same standards online that Going through other people’s things
you follow in real life. could cost you, your job or you could
You need to behave the same way even go to jail.
online that you do in real life. Not respecting other people’s privacy
You need to remember that you can is a bad netiquette.
get caught doing things you should not
be doing online just like you can in real Don’t abuse your power.
life. Do not take advantage of other people
You are still talking to a real person just because you have more
with feelings even though you can’t knowledge or power than them.
see them. Treat others as you would want them
to treat you if the roles were reversed.
Know where you are in cyberspace.
Always take a look around when you Be forgiving of other people’s mistake.
enter a new domain when surfing the Do not point out mistakes to people
web. online.
Get a sense of what the discussion Remember that you were once the
group is about before you join it. new kid on the block.
You still need to have a good manners
Respect other people’s time & bandwidth. even though you are online and cannot
Remember people have other things to see the person face to face.
do besides read your email. You are
not the center of their world. INTERNET SECURITY
Keep your post and emails to minimum
by saying what you want to say. Type of System Intruders
Remember everyone won’t answer Masquerader
your questions. Hackers
Clandestine System
The CIA Triad
Make yourself look good online.
characteristics or byproducts of
communications.
Intrusion
an unauthorized entity gains access to
sensitive data by circumventing a
system’s security protections.
Incapacitation
prevents or interrupts system
operation by disabling a system
component.
Corruption
Confidentiality Undesirably alters system operation by
o Data confidientiality adversely modifying system functions
o Privacy or data.
Integrity Obstruction
o Data integrity A threat action that interrupts delivery
o System integrity of system services by hindering
Availability system operation.
Masquerade
Threat Consequence An unauthorized entity gains access to
a system or performs a malicious act
Unauthorized Disclosure by posing as an authorized entity.
A circumstance or event whereby an Falsification
entity gains access to data for which False data deceive an authorized
the entity is not authorized. entity.
Disruption Repudiation
A circumstances or even that An entity deceives another by falsely
interrupts or prevents the correct denying responsibility for an act.
operation of system services and
functions. Misuse
Deception Causes a system component to
A circumstance or event that may perform a function or service that is
result in an authorized entity receiving detrimental to system security.
false data and believing it to be true.
Usurpation Virus Stages
A circumstances or event that results
in control of system services or 1) Dormant phase - Virus is idle.
functions by an unauthorized entity. 2) Propagation phase - Virus places an
identical copy of itself into other
Threat Action (Attack) programs or into certain system areas
on the disk.
Exposure 3) Triggering phase - Virus is activated to
Sensitive data are directly released to perform the function for which it was
intended; Caused by a variety of
an unauthorized entity.
system events.
Interception
4) Execution phase - Function is
An unauthorized entity directly
performed.
accesses sensitive data traveling
between authorized sources and
Parts of a Virus
destinations.
Infection mechanism
Inference
Trigger
A threat action whereby an
PayloaD
unauthorized entity indirectly accesses
sensitive data by reasoning from DEFINITION OF TERMS
used to record the keystrokes done by
Cyber crime user. This is done to steal passwords
a crime committed or assisted through or any other sensitive information.
the use of the Internet. Rogue security softwares
Privacy Policy/Terms of Services (ToS) is a form of malicious software and
tells the user how the website will internet fraud that misleads users into
handle its data. believing there is a virus on their
Malware computer, and manipulates them into
stands for malicious software. paying money for a fake malware
Virus removal tool.
a malicious program designed to
transfer from one computer to another FOUR SEARCH STRATEGIES
in any means possible.
Worms Keywoard Searching
a malicious program designed to Enter terms to search
replicate itself and transfer from one Use quotation marks to search as a
file folder to another and also transfer phrase and keep the words linked
to other computers. together
Trojan Common words are ignored (That, to,
a malicious program designed that is which, a, the …)
disguised as a useful program but + and – can be used to include or
once downloaded or installed, leaves exclude a word.
your PC unprotected and allows
hacker to get your information. Boolean
Spyware AND – enter words connect with AND-
a program that runs in the background it will include sites where both words
without you knowing it. It has the ability and found
to monitor what you are currently doing o Uses: joining different topics
and typing through key logging. (i.e. global warming AND
Adware California)
a program designed to send you OR – requires at least one of the
advertisement, mostly pop-ups. terms is found.
Spam o Uses: join similar or
unwanted email mostly from bots or synonymous topics (i.e. global
advertisers. warming OR greenhouse effect)
Phishing NOT – searches for the first term and
acquires sensitive personal information excludes sites that have the second
like passwords and credits card term.
details. o (i.e. Washington NOT school)
Pharming
a more complicated way of phishing Question
where it exploits the DNS system. a question may be entered in the
Copyright search field of search engine
a part of law, wherein you have the
rights to work, anyone who uses it w/o Advanced
your consent is punishable by law. Features are offered on many engines
Fair Use by going to an “Advanced search”
page and making selections. Effective
means that an intellectual property
in narrowing search returns to a
may be used w/o consent as long as it
specific topic or phrase.
is used in commentaries, criticism,
parodies, research and etc.
Keyloggers