E-TECH

Cards (18)

  • Web 2.0
    • Dynamic Web Pages
  • Darcy DiNucci: '“The Web we know now, which loads into a browser window in essentially static screenfuls, is only an embryo of the Web to come. The first glimmerings of Web 2.0 are beginning to appear, and we are just starting to see how that embryo might develop.”'
  • Information and Communication Technologies (ICT)

    Deals with the use of different communication technologies such as mobile phones, telephone, internet, etc. to locate, save, send and edit information
  • Web 3.0 is yet fully realized due to problems like compatibility, security, vastness, vagueness, and logic
  • Six Types of Social Media
    • Social Networks
    • Bookmarking Sites
    • Social News
    • Media Sharing
    • Microblogging
    • Blogs and Forums
  • Mobile Devices Operating Systems
    • iOS – used in Apple devices such as iPhone and iPad
    • Android - an open source operating system developed by Google
    • Blackberry OS – used in Blackberry devices
    • Windows Phone OS - a closed source and proprietary operating system developed by Microsoft
    • Symbian – the original smartphone OS; used by Nokia devices
    • WebOS – originally used for smartphones; now used for SmartTVs
    • Windows Mobile – developed by Microsoft for Smartphones and pocket PCs
  • Web 2.0 is the evolution of Web 1.0 by adding dynamic web pages
  • Web 2.0
    • Folksonomy – allows user to categorized and classify/ arrange information using freely chosen keywords (e.g., tagging)
    • Rich User Experience – content is dynamic and is responsive to user’s input
    • User Participation - the owner of the website is not the only one who is able to put content
    • Long Tail – services that are offered on demand rather than on a one-time purchase
    • Software as a Service – users will subscribe to a software only when needed rather than purchasing them
    • Mass Participation – diverse information sharing through universal web access
  • Semantic Web
    Movement led by the World Wide Web Consortium (W3C) to include semantic content in web pages
  • Technological Convergence
    Is the synergy of technological advancements to work on a similar goal or task
  • The popularity of smartphones and tablets has taken a major rise over the years
  • Assistive Media is a non-profit service designed to help people who have visual and reading impairments
  • Internet Threats
    • Malware - stands for malicious software
    • Virus - a malicious software program designed to replicate itself and transfer from one computer to another either through Internet and local networks or data storage like flash drives or CDs
    • Worm - a malicious program that transfers from one computer to another by any type of means. Often, it uses a computer network to spread itself. For example, the ILOVEYOU worm (Love Bug Worm) created by Filipino
    • Trojan - a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information
    • Rogue Security Software - tricks the user into posing that it is a security software. It asks the user to pay to improve security but in reality they are not protected at all
    • Spyware - a program that runs in the background without you knowing it (thus called “spy”). It has the ability to monitor what you are currently doing and typing through keylogging
    • Keyloggers - used to record the keystrokes done by the user. This is done to steal their password or any other sensitive information
    • Adware - a program designed to send you advertisement, mostly as pop-ups
    • Spam - unwanted email, mostly from bots or advertisers. It can be used to send malware
    • Phishing - Its goal is to acquire sensitive personal information like passwords and credit card details. This is done by sending you an email that will direct the user to visit a website and be asked to update his/her username, password, credit card or personal information
    • Pharming - a more complicated way of phishing where it exploits the DNS (Domain Name Service) System
  • Tips to avoid Copyright Infringement
    • Understand
    • Be Responsible
    • Be Creative
    • Know the Law
  • Tips to Stay Safe Online
    • Be mindful of what you share online and what site you share it to
    • Do not just accept terms and conditions; read it
    • Check out the privacy policy page of a website to learn how the website handles the information you share
    • Know the security features of the social networking site you use. By keeping your profile private, search engines will not be able to scan your profile
    • Do not share your password with anyone
    • Avoid logging in to public networks/Wi-Fi. Browsing in “incognito mode” a feature of a browser, will not protect you from hackers
    • Do not talk to strangers whether online or face to face
    • Never post anything about a future vacation. It is similar to posting, “Rob my house at this date”
    • Add friends you know in real life
    • Avoid visiting untrusted websites
    • Install and update an antivirus software on your computer. Use only one anti-virus to avoid conflicts
    • If you have a Wi-Fi at home, make it a private network by adding a password
    • Avoid downloading anything from untrusted websites. You are most vulnerable in peer-to-peer downloads (torrents) as the download is most likely not monitored by the site owner
    • Buy software; do not use pirated ones
    • Do not reply or click links from suspicious emails
  • Online Safety and Security: 'The internet is one of the most dangerous places, especially if you do not know what you are doing with it. The internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with the old ones. It is also a source of entertainment through games, online communities and everything in between. But most like things in this world, there is always the “other side of the coin”'
  • Types of information shared and not shared
    • First name
    • Last name
    • Middle name
    • Current and previous school(s)
    • Your cellphone number
    • The name of your mother and father
    • The name of your siblings
    • Your address
    • Your home phone number
    • 10. Your birthday
  • Think Before You Click: 'Before you post something on the web, ask these questions to yourself: Would you want your parents or grandparents to see it? Would you want your future boss to see it? Once you post something on the web, you have no control of who sees your posts. Your friends depend on you to protect their reputation online. Talk to your friends about this serious responsibility'