KEMBAR78
E Tech | PDF | World Wide Web | Internet & Web
0% found this document useful (0 votes)
19 views4 pages

E Tech

REVIEWER E—TECH
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views4 pages

E Tech

REVIEWER E—TECH
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Empowerment Technology CORE

1st Semester | 2024-2025 | Chillian Germaine Ancheta

EMPOWERMENT TECHNOLOGY WORLD WIDE WEB

It often deals with the use of different technologies such as An information system on the internet that allows documents
mobile phones, telephone, computer and other devices to to be connected to other documents by hypertext links,
locate, save, communicate and to inform. enabling the user to search for information by moving from one
document to another. It is an information space where
documents and other web resources are identified by URLs,
INFORMATION AND COMMUNICATION TECHNOLOGY
interlinked by hypertext links, and can be accessed via the
internet. It was invented by Tim-Berners Lee.
It deals with the use of different communication technologies
such as mobile phones, telephone, internet to locate, save, Web Pages — is a hypertext document connected to the
send, and edit information. It is a study of computers as data World Wide Web. It is a document that is suitable for the World
processing tools. It introduces students to other fundamentals Wide Web.
of using computer systems in an internet environment.

DIFFERENT ONLINE PLATFORMS OF WORLD WIDE WEB


➔ The Philippines is dubbed as the "ICT Hub of Asia"
because of the huge growth of ICT-related jobs, one
of which is BPO (Business Process Outsourcing), ● Web 1.0 (Static) — refers to the first stage in the
or call centers. World Wide Web, which was entirely made up of the
➔ The ICT Department in the Philippines is responsible Web pages connected by hyperlinks.
for the planning, development and promotion of the
country's information and communications technology Static Web Page - is known as a flat page or stationary age in
(ICT) agenda in support of national development. the sense that the page is "as is" and cannot be manipulated
by the user. The content is also the same for all users that is
referred to as Web 1.0. (example: Shopping Carts and Mp3)

● Web 2.0 — is the evolution of Web 1.0 by adding


dynamic pages. The user is able to see a website
differently than others. It also allows users to interact
with the page; instead of just reading the page, the
user may be able to comment or create a user
account.

FEATURES OF WEB 2.0

Folksonomy — allows user to categorize and classify


information using freely chosen keywords e.g. tagging by FB,
Twitter, use tags that start with the sign #, referred to as a
hashtag.

Computer — an electronic device for storing and processing Rich User Experience — content is dynamic and is
data, typically in binary form, according to instructions given to responsive to user's input. An example would be a website
it in a variable program. that shows local content. In the case of social networking sites,
when logged on, your account is used to modify what you see
Internet — is the global system of interconnected computer on their website.
networks that use the internet protocol suite (TIP/IP) to link
billions of devices worldwide. User Participation — the owner of the website is not the only
one who is able to put content. Others are able to place a
➔ Sometimes called simply "the Net", is a worldwide content of their own by means of comments, reviews and
system of computer networks — a network of evaluation e.g. Lazada, Amazon.
networks in which the users at any one computer can
get information from any other computer. Long Tail — services that are offered on demand rather than
on a one-time purchase. This is synonymous to subscribing to
a data plan that charges you for the amount of time you spend
on the internet.
Empowerment Technology CORE
1st Semester | 2024-2025 | Chillian Germaine Ancheta

Software as Services — users will subscribe to a software Assistive Media — is a non-profit service designed to help
only when needed rather than purchasing them (e.g. Google people who have visual and reading impairments. A database
docs used to create and edit word processing and spread of audio recordings is used to read to the user.
sheet.)
Cloud Computing — distributed computing on the internet or
Mass Participation — diverse information sharing through delivery of computing service over the internet. Instead of
universal web access. Web 2.0's content is based on people running an email program on your computer, you log in to a
from various cultures. Web email account remotely. The software and storage for
your account doesn't exist on your computer, it's on the
● Web 3.0 — aims to have machines (or servers) service's computer cloud.
understand the user's preferences to be able to
deliver web content. The semantic web provides a ● Client’s Computer — clients are the device that the
framework that allows data to be shared and reuse to end user interacts with cloud.
deliver web content specifically targeting the user. ● Distributed Server — often servers are in
geographically different places, but servers acts as if
WEB 3.0 IS YET TO BE FULLY REALIZED BECAUSE OF they are working next to each other.
THE SEVERAL PROBLEMS: ● Data Centers — it is collection of servers where
application is placed and is accessed via Internet.
Compatibility — HTML files and current web browsers could
not support Web 3.0. SIX TYPES OF SOCIAL MEDIA

Security — the user's security is also questioned since the 1. Social Networks — these are sites that allows you to
machine is saving his or her preferences. connect with other people with the same interests or
background. Once the user creates his/her account,
Vastness — the World Wide Web already contains billions of he/she can set up a profile, add people, share
web pages. content, etc.
2. Bookmarking Sites — sites that allow you to store
Vagueness — certain words are imprecise. The words "old" and manage links to various websites and resources.
and "small" would depend on the user. Most of the sites allow you to create a tag to others.
3. Social News — sites that allow users to post their
Logic — since machines use logic, there are certain own news items or links to other news sources. The
limitations for a computer to be able to predict what the user is users can also comment on the post and comments
referring to at a given time. may also be rank.
4. Media Sharing — sites that allow you to upload and
TRENDS IN ICT share media content like images, music and video.
5. Microblogging — focus on short updates from the
user. Those that subscribed to the user will be able to
Convergence — is the synergy of technological
receive these updates.
advancements to work on similar goal or task. For example,
6. Blogs and Forums — allow user to post their
besides using your personal computer to create word
content. Other users are able to comment on the said
documents, you can now use your smartphone.
topic.
Mobile Technologies — the popularity of smartphones and
tablets has taken a major rise over the years. This is largely MOBILE OS
because of the device capability to do the tasks that were
originally found in PCs. Several of these devices are capable iOS — use in apple devices such as iPhone and iPad.
of using a high-speed internet. Today the latest model devices
use 4G Networking (LTE), which is currently the fastest. Android — an open source OS developed by Google. Being
open source means mobile phone companies use this OS for
Social Media — is a website, application, or online channel free.
that enables web users to create, co-create, discuss, modify,
and exchange user generated content. Blackberry OS — use in blackberry devices.

Windows Phone OS — a closed source and proprietary


operating system developed by Microsoft.

Symbians — the original smartphone OS. Used by Nokia


devices.
Empowerment Technology CORE
1st Semester | 2024-2025 | Chillian Germaine Ancheta

Web OS — originally used in smartphones; now in smart TVs. 6. Share expert knowledge. Ask questions online.
Share what you know online. Post the answers to
Windows Mobile — developed by Microsoft for smartphones your questions online because someone may have
and pocket PCs. the same question you do.
7. Help keep flame wars under control. Netiquette
TYPES OF CLOUD does however forbid people who are flaming to hurt
discussion groups by putting the group down.
8. Respect other people’s privacy. Do not read other
Public Cloud — allows systems and services to be easily
people’s mail without their permission.
accessible to the general public. Public cloud may be less
9. Don’t abuse your power. Do not take advantage of
secured because of its openness, e.g. email.
other people just because you have more knowledge
or power than them.
Private Cloud — allows systems and services to be
10. Be forgiving of other people’s mistake. You still
accessible within an organization. It offers increased security
need to have good manners even though you are
because of its private nature.
online and cannot see the person face to face.
Community Cloud — allows systems and services to be
accessible by a group of organizations. DANGERS ON THE INTERNET

Hybrid Cloud — is a mixture of public and private cloud. 1. Malware — stands for malicious software.
However, the critical activities are performed using private
cloud while the non-critical activities are performed using ● Virus — a malicious program designed to replicate
public cloud. itself and transfer from one computer to another
either through the Internet and local networks or data
INTERNET SAFETY storage like flash drives and CDs.
● Worm — a malicious program that transfers from one
computer to another by any type of means. Often, it
The Internet is a powerful tool for learning and communicating
uses a computer network to spread itself. For
with people. However, there are many dangers that you must
example, the ILOVEYOU worm (Love Bug Worm)
watch out for.
created by a Filipino.
● Trojan — a malicious program that is disguised as a
Netiquette — is a network etiquette, the do’s and don’t of
useful program but once downloaded or installed, it
online communication.
leaves your PC unprotected and allows hackers to
get your information.
TEN RULES OF NETIQUETTE ● Spyware — a program that runs in the background
without you knowing it (thus called “spy”). It has the
1. Remember the human. You need to remember that ability to monitor what you are currently doing and
you are talking to a real person when you are online. typing through keylogging.
The internet brings people together who would
otherwise never meet. A. Keyloggers — used to record the keystroke done by the
2. Adhere to the same standards online that you users. This is done to steal their password or any other
follow in real life. You need to behave the same way sensitive information.
online that you do in real life. You need to remember
that you can get caught doing things you should not ● Adware — a program designed to send you
be doing online just like you can in real life. advertisements, mostly as pop-ups.
3. Know where you are In Cyberspace. Always take a
look around when you enter a new domain when 2. Spam — unwanted email mostly from bots or advertisers. It
surfing the web. can be used to send malware.
4. Respect other people’s time and bandwidth.
Remember people have other things to do besides 3. Phishing — it’s goal is to acquire sensitive personal
read your email. You are not the center of their world. information like passwords and credit card details.
5. Make yourself look good online. Be polite and
pleasant to everyone. Always check your spelling and ● Pharming — a more complicated way of phishing
grammar before posting. where it exploits the Domain Name Service system or
DNS.

4. Hacker — this is a person who is able to enter and control


other people’s computers without authorization.
Empowerment Technology CORE
1st Semester | 2024-2025 | Chillian Germaine Ancheta

SECURITY CENTER

The Security Center of Windows is the place where you can


set additional protection from treat to your computer, especially
when using the Internet. There are three important security
setting available.

1. Firewall — it helps in protecting your computer from


unauthorized entries, viruses, or worms from the Internet or
network.

2. Automatic Updates — it is another feature of Windows


which then turned on will automatically download updates from
Microsoft Windows website.

3. Virus Protection — it is the current antivirus software


installed in your computer; this software is meant to locate,
find, and remove virus threats that are already in your
computer.

THINK BEFORE YOU CLICK

Tip #1 — Before you post something on the web, ask yourself


some questions.

Tip #2 — Your friends depend on you to protect their


reputation online.

Tip #3 — Set your post “private”. In this way, search engines


will not be able to scan that post.

Tip #4 — Avoid using names. Names are easy for search


engines to scan.

Tip #5 — If you feel that a post can affect you or another's


reputation, ask the one who posted it to pull it down or report it
as inappropriate.

ESSAY

Question: How can you protect yourself from viruses?


Discuss how you can prevent phishing or scam.

You might also like