Etech Notes
Etech Notes
1. Convergence
Information and Communication -combination of two or more different entities of
Technology or ICT - use of different technologies to create a new single device.
communication technologies such as mobile 2. Social Media - It is a website, application, or
phones. To locate, save, send, and edit online channel that enables web users to
information. create, co-create, modify, and exchange user-
generated content.
World Wide Web(WWW, W3)
-an interconnected system of public webpages Types of Social media
accessible through the Internet. It was invented 1. Social Networks- sites that allow you to
connect with other people with same interests.
Sir Tim Berners-Lee in 1989. It can be static 2. Bookmarking Sites- allow users to store and
or dynamic. manage links to various websites and
resources.
Web 1.0 3. Social News- sites that allow users to post
-Web pages are static and not interactive. You their own news items ог links to other news
can't post comments or create an account. sources.
4. Media Sharing- sites that allow you to
Web 2.0 upload and share media content like images.
- used to describe concentrates on its 5.Microblogging -sites that focus on short
capability of providing people the means to updates from the user.
collaborate and share information online. 6. Blogs and Forums- sites that allow users to
- popularized by Tim O'Reilly and Dale post their content.
Dougherty at the O'Reilly Media Web 2.0
Conference in 2004 Mobile Technologies
-The popularity of smartphones and tablets has
Features of Web 2.0 taken a major rise over the years because of
● Folksonomy- It allows users to the devices' capability to do tasks.
categorize information using freely
chosen keywords. Uses hashtags (#) Different types of mobile operating
● Rich User Experience- Content is systems:
dynamic and is responsive to user's
input. An example would be a website 1.iOS- used in Apple devices such as Iphone
that shows local content 2. Android- an open source operating system
● User Participation- The owner of the developed by Google.
website is not the only one who is able 3. Blackberry OS- used in blackberry devices
to put content. 4. Windows Phone OS - a closed source and
● Software as a Service- Users will proprietary operating system developed by
subscribe to a software only when Microsoft
needed rather than purchasing them. 5. Symbian- original smartphone OS used by
● Mass Participation- It is a diverse Nokia devices
information sharing through universal 6. WebOS-originally used for smartphones;
web access. now used for smartTV's
7. Windows Mobile-developed by Microsoft for
Web 3.0 smartphones and pocket PCs.
-called as Semantic Web
● ability of Web technologies to Assistive Media It is a nonprofit service
understand and interpret human- designed to help people who have visual and
generated content reading impairments.
-To have machines understand the user's
preferences to be able to deliver web content
specifically targeting the user.
ETECH M2 3.) Know the security features of the social
networking site you use. By keeping your
ONLINE SAFETY AND SECURITY - one of profile private, search engines will not be able
the most dangerous places to scan your profile.
4.) Do not share your password with anyone.
TYPE OF INFORMATION
5.) Avoid logging in to public networks/Wi-Fi.
1.) First Name- a hacker already knows plenty Browsing in "incognito (or private) mode will
of stuff about you even if you only give NOT protect you from hackers.
out your first name 6.) Do not talk to strangers whether online or
face-to-face/
2.) Last Name- You will be vulnerable to being 7.) Never post anything about a future
searched for using search engines, vacation. It is similar to posting. "Rob my house
which include image search. at this date."
-can lead to several cybercrimes like 8.) Add friends you know in real life. 9. Avoid
identity theft. visiting untrusted websites. 10. Install and
update an antivirus software on your computer.
3.) Middle Name- not the most risky of these
Use only one anti- virus software to avoid
shared information
conflicts.
4.) Current and previous school(s)- They can 11.) If you have Wi-Fi at home, make it private
use this information for verification network by adding a password.
purposes. 12.) Avoid downloading anything from
untrusted websites.
5.) Your Cellphone Number- Your cellphone 13. ) But the software, do not use pirated ones.
number should never be posted over the 14.) Do not reply or click links from suspicious
Internet. emails.
15.) Make Online Purchases from Secure Sites
6.) Who your Mother and Father are- Risky, yet
not as risky as posting their full names,
INTERNET THREATS
especially your mother's maiden name
7.) Who your siblings are- This is a huge risk, 1. Malware- or malicious software, in any
-Strangers may pretend or use their program or file that is harmful to computer
identity to dupe you. user.
e. Adware- a program designed to send 1. When searching online, narrow your topic.
you advertisements, mostly as pop-ups. Identify the key concepts or important ideas.
f. Ransomware or ransom software is a 2. Put the word "AND" between each keyword
type of malicious software from to create a search string.
cryptovirology that threatens to publish 3. Identify synonyms of the key words. Not all
the victim's data or perpetually block databases or articles use the same words to
access to it unless a ransom is paid. describe a topic. Group similar words together
by using the word "OR" for a quick and
2. Spam - an unwanted email mostly from bots relevant search.
or advertisers.
4. Review the first pages returned. If these are
3. Phishing - acquire sensitive personal not helpful, change your keywords for a better
information like passwords and credit card description.
details. This is done by sending you an e-mail
that will direct the user to visit a fake website 5. Use the plus (+) sign for more specific
and be asked to update his/her username, search.
password, credit card or personal information.
6. Use the minus (-) sign for a more specific
COPYRIGHT INFRINGEMENT- protected by search.
copyright law without permission for a usage
where such permission is required 7. Use wildcards for a broader search.
Wildcard characters () let you find variations of
Tips that could help you avoid copyright a word
infringement:
8. Use quotation marks to find phrases or
1. Always assume that the work is copyrighted. names.
2. Do not copy, share or alter without seeking
permission. 9. Use several search engines. Search engines
3. Review and retain licensing agreements. are programs that look for documents based
4. Consider buying content. from specified keywords and return these
5. Give credit to the original author of the page documents where the keywords were found.
or information.
EVALUATING WEBSITES
Domain Types
.com - Commercial
.edu - Educational
.org - Organizational
.gov -Government
.net - Network
.mil – Military
ETECH M4 document to enhance its appearance or to
allow you to have some tools to use for
ADVANCED TECHNIQUES USING composing and representing ideas or
MICROSOFT WORD messages.
KINDS OF MATERIALS