1_Q1-Emp-Technology.pptxThe document discusses the use of multimedia in different fields such as education, entertainment, business, medicine, mathematics and scientific research

LieLanieNavarro 65 views 68 slides Sep 14, 2024
Slide 1
Slide 1 of 68
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68

About This Presentation

The document discusses the use of multimedia in different fields such as education, entertainment, business, medicine, mathematics and scientific research


Slide Content

Empowerment Technologies Quarter 1 Introduction to Information and Communication Technologies and Rules of Netiquette

Multiple Choice: Write the letter of your answer on a separate sheet of paper. Which of the following web pages allows interaction from the user? Comment B. Social C. Dynamic D. Static 2. Which of the following features where users can categorize and locate information through tagging? Folksonomy . C. Rich user experience B. Hashtags D. Taxonomy 3. The following are features of a dynamic website. Which of them allows users to put their own content? Long tail C. Rich user experience B. Mass participation D. User participation

4.Whichprovidesacommonframework toallowdatatobesharedand reused acrossplatform,enterprise,and communityboundaries ? A.SemanticWeb C.Web 1.0 B.W3C D.Web2.0 5.WhatmagazinedeclaresthattwoPhilippinecitiesarepart ofthetop10intheirresearchabout “ TheSelfiest Citiesaround theWorld ”? A.Candy C.Reader’sDigest B.People D.Time 6.Whichofthefollowingreplicatesandcantransferfromonecomputertoanother? A.Adware C.Rogue B.Keylogger D.Virus

7.Whichofthefollowingtrickstheuserintoposingthatitisa securitysoftware ? A.AdwareC.Rogue B.PrivateD . Spam 8.Whichofthefollowingused torecord thekeystrokesdonebytheuser ? A.KeyloggerC.Phishing B.MalwareD.Spam 9.Whathas beendesignedtosend youadvertisements ? A.AdwareC.Spyware B.MalwareD.Trojan 10.Whatdo youcallanunwanted emailmostlyfrombots ? A.AdwareC.Spam B.RogueD . Trojan

Introduction to Information and Communication Technologies

How many of the items or icons in the image above are you familiar with? Which ones are you unfamiliar with? Whatever your answers, take a closer look at the discussion below. The list contains some key phrases that characterize the ICT tools that, when used properly, can empower users to make positive social change.

Information and Communication Technologies (ICT) deals with the use of different communication technologies such as mobile phones, telephone, and internet to locate, save, send, and edit information.

Web 3.0 and the Semantic Web Semantic Web -is a movement led by the World Wide Web Consortium (W3C). The term was coined by the inventor of the World Wide Web, Tim Berners-Lee. It provides a common framework that allows data to be shared and reused across application, enterprise, and community boundaries.

Several Problems in using Web 3.0 1. Compatibility -HTML files and current web browsers could not support Web 3.0. 2. Security -the user’s security is also in question since the machine is saving his or her preferences. 3. Vastness -the World Wide Web already contains billions of web pages. 4. Vagueness -certain words are imprecise. 5. Logic -since machines use logic, there are certain limitations for a computer to be able to predict what the user is referring to at a given time.

Trends in ICT As the world of ICT continues to grow, the industry has focused on several innovations which cater to the needs of the people who benefit most out of it. The following trends are the current front runners in the innovation of ICT. 1. Convergence. Technological convergence is the synergy of technological advancements to work on a similar goal or task. It is the use of several technologies to accomplish a task conveniently. 2. Social Media. Social media is a website, application, or online channel that enables web users to create, co-create, discuss, modify, and exchange user-generated content.

3. Mobile Technologies. The popularity of smartphones and tablets has taken a major rise over the years because of the devices’ capability to do tasks that were originally found in personal computers. Today, the latest mobile devices use 5G Networking (LTE), which is currently the fastest mobile network.

Rules of Netiquette

This lesson discusses the appropriate and inappropriate online behavior that you as users need to know and appreciate. It helps you understand the social nature of digital media and later you discover the status of your own digital life. Moreover, this lesson gives emphasis on the importance to act properly and responsibly to possible consequences on engaging these digital tools.

Cite situations where Information and Communication Technologies have improved the lives of people.

Teenagers like you are exposed to many things powered by the internet because they are mostly into socializing, playing games, reading sports news, shopping, etc. The internet has given you the most powerful tools that your parents did not enjoy during their early days. For this reason, you must observe proper internet usage.

Online Safety and Security Internet is a powerful tool used to promote business, gain new friends, and stay in touch with the old ones. It is also a source of entertainment through games, online communities, and everything in between. But there is always the “other side of the coin”. Internet is one of the most dangerous places especially if you are unaware of what you are doing with it.

Internet is defined as the information superhighway means that anyone has access to this highway, can place information, and can grab that information. Therefore, everyone is a prospect to cybercrime threats. We may not experience it now but whatever information we share today could affect our future. With this reason, social networking sites like Facebook continue to improve their security features.

Internet Threats Here are some of the threats you should be aware of when using the internet.

2. Spam – unwanted email mostly from bots or advertisers. It can be used to send malware.

3. Phishing – its goal is to acquire sensitive personal information like passwords and credit card details. Pharming – a more complicated way of phishing where it exploits the DNS (Domain Name Service) system.

Protecting Reputations Online Embarrassing moments nowadays can be captured using any device you could imagine. Unlike the old days, doing something embarrassing was not much a big deal. Worst is that anyone can easily upload it over the internet and cannot be undone. This puts you in a traumatic situation and risk the lives of your family. So, before posting something over the internet, think first before you click.

Think Before You Click Things you might want to consider before internet posting. 1. Once you post something on the web, you have no control of who sees your posts. 2. Your friends depend on you to protect their reputation online. 3. Set your post to “private”. 4. Avoid using names. Names are easy for search engines to scan. 5. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it down or report it as inappropriate.

Copyright Infringement If you create something like an idea, an invention, a form of literary work, or a research, you have the right as to how it should be used by others. This is called “intellectual property. The copyright law includes your rights over your work, and anyone who uses it without your consent is punishable by law.

Tips to avoid copyright infringement 1. Understand. Copyright protects literary works, photographs, paintings, drawings, films, music (and lyrics), choreography, and sculptures, but it does not protect underlying ideas and facts. 2. Be responsible enough to know if something has a copyright. 3. Be creative. Ask yourself whether what you are making is something that came from you, or something made from somebody else’s creativity. It is important to add your own creative genius in everything that will be credited to you. 4. Know the law. There are limitations to copyright laws. For instance, in the Philippines, copyrights only last a lifetime (of the author) plus 50 years. There are also provisions for “fair use” which mean that an intellectual property may be used without a consent as long as it is used in commentaries, criticisms, search engines, parodies, news reports, research, library archiving, teaching, and education.

Do you agree or disagree with the provisions of the copyright law? Defend your answer. 2. How would you feel if someone posted something embarrassing about you? What would you do? 3. Make your own three (3) Do’s and Don’ts in a table form when using social networking site like Facebook.

I have learned that: To stay safe online, I must _________________________________________. 2. There are several internet threats which include ____________________. 3. Malwares could be in the form of a _________________________________. 4. It is our responsibility to protect other’s reputation online so we should be ___________. 5. It is important for everyone to understand the laws particularly on Copyright Infringement in order to _________________.
Tags