SlideShare a Scribd company logo
1 of 100
EMPOWERMENT
TECHNOLOGIES
LESSON 1
2
ICT (INFORMATION AND COMMUNICATION
TECHNOLOGY)
3
•ICT deals with the use of different
communication technologies such as mobile
phones, telephone, Internet, etc. to locate,
save, send, and edit information.
•Example: when we make a video call, we use
internet.
4
ICT IN THE PHILIPPINES
•Philippines as the “ICT Hub of Asia”.
•huge growth of ICT related jobs around the
country, one of which is call center or BPO
(Business Process Outsourcing) centers.
•According to 2013 edition of Measuring
the Information Society by the
International
5
ICT IN THE PHILIPPINES
Telecommunication Union, there are 106.8
cellphones per 100 Filipinos in the year
2012.
In a data gathered by the Annual Survey
of Philippines Business and Industries
in 2010, the ICT industry shares 19.3%
of the total employment population.
ICT IN THE PHILIPPINES
•Time magazines declared Makati City,
Philippines-Rank 1 as the “Selfiest Cities
around the world, and Rank 9 is Cebu City.
WWW-WORLD WIDE WEB
•When WWW was invented, most web pages were
static. Static (also known as flat page or
stationary page) in the same that the page “as
is” and cannot be manipulated by the user.
This referred to as Web 1.0.
7
EXAMPLE OF WEB 2.0
• Social Networking sites
• Blogs
• Wikis
• Video sharing sites
8
WEB 2.0
•Web 2.0 allows the user to interact with
the page known as DYNAMIC PAGE; instead of
just reading a page, the user may be able
to comment or create a user account.
Dynamic page refers to the web pages that
are affected by user input or preference.
9
KEY FEATURES OF WEB 2.0
Folksonomy - allows users to categorize and
classify/arrange information using freely
chosen keywords
(e.g. tagging). Popular social networking sites
such as Twitter, Instagram, Facebook, etc.
use tags that start with a pound sign (#) or
hashtag.
10
KEY FEATURES OF WEB 2.0
Rich User Interface - content is dynamic and
is responsive to user's input. An example
would be a website
that shows local content. In the case of
social networking sites, when logged on, your
account is used
to modify what you see in their website.
11
KEY FEATURES OF WEB 2.0
•User Participation– the owner of website is
not the only one who is able to put content.
Others are able to place a content on their
own by means of comments, reviews, and
evaluation.
12
•Long Tail – services are offered on demand
rather than on a one-time purchase. This is
synonymous to subscribing to a data plan that
charges you for the amount of time you spent
on Internet or a data plan that charges you
for the amount of bandwidth you used.
KEY FEATURES OF WEB 2.0
13
WEB 3.0 AND THE SEMANTIC WEB
•Semantic Web– is a movement led by the
World Wide Web Consortium(W3C). The semantic
web provides a framework that allows data to
be shared and reuse to deliver web content
specifically targeting the user.
14
WEB 3.0 IS YET TO BE FULLY REALIZED
BECAUSE OF SEVERAL PROBLEMS:
•Compatibility-HTML files and current web
browsers could not support Web 3.0.
•Security – The user’s security is also
question since the machine is saving his or
her preferences.
•Vastness-The World Wide Web already
contains billions of web pages.
15
Vagueness – Certain words are imprecise. The words “old”
and “small” would depend to the user.
Logic - since machine use logic, there are certain limitations
for a computer to be able to predict what the user is referring
to at a given time.
WEB 3.0 IS YET TO BE FULLY REALIZED
BECAUSE OF SEVERAL PROBLEMS:
16
TRENDS IN ICT
1. Convergence – is the synergy of
technological advancements to work on a
similar goal or task. For example, besides
using your personal computer to create
word documents, you can now use your
smartphone.
2. Social Media - is a website, application, or
online channel that enables web users to
create, co-create, discuss, modify, and
exchange user generated content.
17
SIX TYPES OF SOCIAL MEDIA
1.) Social Networks – These are sites
that allows you to connect with other
people with the same interests or
background. Once the user creates
his/her account, he/she can set up a
profile, add people, share content,
etc.
Example : Facebook and Google+
18
19
2.) Bookmarking Sites– These are
sites that allow you to store and
manage links to various website
and resources. Most of these
sites allow you to create a tag
allows you to and others easily
share them.
Ex. : StumbleUpon/Pinterest
SIX TYPES OF SOCIAL MEDIA
20
21
SIX TYPES OF SOCIAL MEDIA
3.) Social News - These are sites that
allow users to post their own news intems
or links to other new sources. The users
can also comment on the post and comments
may also be rank.
Example: reddit and Digg
22
23
SIX TYPES OF SOCIAL MEDIA
4.)Media Sharing – These are sites that
allow you to upload and share media
content like images, music and video.
Example: Flickr, YouTube and Instagram.
24
25
SIX TYPES OF SOCIAL MEDIA
5.) Microblogging– These are sites that
focus on short updates from the user.
Those that subscribed to the user will
be able to receive these updates.
Example: Twitter
26
27
SIX TYPES OF SOCIAL MEDIA
6.) Blogs and Forums– These websites allow
user to post their content. Other users
are able to comment on the said topic.
Example: Blogger, WordPress and Tumblr
28
TRENDS IN ICT
3. Mobile Technologies – The popularities of
smartphones and tablets has taken a
major rise over the years. This is
largely because of the devices
capability to do the tasks that were
originally found in PCs.
Several of these devices are Caple of
using high-speed internet. Today the
latest model devices use 4G
Networking(LTE), which is currently the
fastest mobile network.
29
MOBILE OS
IOS – use in apple devices such as iPhone and
iPad.
Android - an open source OS developed by google.
Being open source means mobile phone companies
use this OS for free.
Blackberry OS – use in Blackberry devices.
Windows Phone OS – a closed source and
proprietary operating system developed by
Microsoft.
30
Symbian – the original smartphone OS; used by
Nokia devices.
WebOS – originally used in smartphones; now
smart TV’s. used in
Windows Mobile – developed by Microsoft for
smartphones and pocket PCs.
MOBILE OS
31
TRENDS IN ICT
4. Assistive Media - is a non-profit
service designed to help people who
have visual and reading impairments. a
database of audio recordings is
used to read to the user.
32
KEY TERMS
•Web 1.0 – static websites without
interactivity.
•Web 2.0 – websites that contain dynamic
content.
•Web 3.0 – a concept of the World Wide Web
that is designed to cater to the individual
user.
•Static – refers to the web that are the same
regardless of the user.
33
KEY TERMS
•Dynamic – refers to the that are affected by
user input or preference.
•Folksonomy – allows user to categorize and
classify/arrange information.
•Hashtag # – used to “categorize” posts in a
website.
•Convergence – the synergy of technological
advancements to work a similar goal or task.
34
•Social Media – websites, applications or
online channels that enable users to co-
create, discuss, modify, and exchange user-
generated content.
KEY TERMS
35
QUIZ
36
INSTRUCTION: WRITE (T) IF THE STATEMENT IS TRUE, WRITE
(F) IF THE STATEMENT IS FALSE
1.) Web 2.0 is classified as dynamic webpage.
2.) People Magazine conducted the research on “The
Selfiest Cities in the World”.
3.) Web 2.0 introduced static web pages that allow users
to interact with the web page.
4.) Folksonomy allows user to categorize and locate
information.
5.) Technological convergence is the synergy of
technological advancement to work on a similar goal or task.
6.) According to Nielsen, users who use the Internet spend
more time in social media sites than in any other type of
site.
37
7.) Blogging sites are sites that focus on short
updates from the user.
8.) Android is a mobile operating system for Apple
devices.
9.) Assistive media is a nonprofit service designed
to help people who have visual and reading
impairments.
10.) ICT deals with the use of diff. comm. Tech. to
locate, send, save & edit info.
11.) Semantic web means that the page is stationary
or flat page.
INSTRUCTION: WRITE (T) IF THE STATEMENT IS TRUE, WRITE
(F) IF THE STATEMENT IS FALSE
38
Write SO if the item is for Social Networks, BS for bookmarking, MS
for Media sharing, SN for Social News, MB for Micro-Blogging and BF
for Blogs and Forums.
1. Facebook 6. Google+ 11. WordPress
2. Plurk 7. Instagram 12. Digg
3. Twitter 8. Pinterest 13. YouTube
4. Tumblr 9. Blogger 14. Flicker
5. Reddit 10.StumbleUpon
39
ANSWER KEY
4
1. T
2. F
3. F
4. T
5. T
6. T
7. F
8. F
9. T
10. T
11. F
PART I
41
1. SO 8. BS
2. MI 9. BF
3. MB 1O. BS
4. BF 11. BF
5. SN 12. SN
6. SO 13. MS
7. SO 14. MS
PART II
42
LESSON 2
43
Online Safety, Security, Ethics,
and Etiquette
44
45
This picture shows the speed at
which The Internet is changing
the world.
The sites we visit are so
overwhelmingly popular to both
adults and children.
46
The online world is
increasingly integrated
into our daily lives.
The internet like the
physical world, maybe safe
or unsafe depending on our
habits.
47
Sometimes, we do not
pay much attention
about the information
that we share.
48
SAFETY FIRST
49
Being safe and secured online depends
on how we protect ourselves.
Analyze the following statements
Guess the correct answer by giving a
thumbs-up if You agree and thumbs
–down if not.
50
1. Without
worries,
download
anything from
untrusted
websites.
51
2. It is fine
to log-in to a
public
networks/Wi-Fi
52
3. Install and
update an
antivirus
software on
your computer.
53
4. Reply or
click links
from suspicious
e-mail
54
5. Be mindful
of what you
share in the
internet and
what site you
share it to.
55
6. Visit website
that are in your
most interest
without checking
its privacy
polices.
56
7. Buy the
software; do
not use pirated
ones
57
8. Do not talk
to strangers
whether online
or face-to-face
58
Let’s
Check your
groups
scores!
59
The internet is define as the
information superhighway. This
means that anyone has access to
this highway, can place
information and can grab that
Information.
60
The more information you
share online the higher
the risks such as:
61
INTERNET
THREATS
62
INTERNET THREATS
Identity Theft
Phishing
Malware Infection
63
software that is
specifically
designed to disrupt,
damage, or gain
unauthorized access
to a computer
system.
MALWARE
64
It is a malicious
program that usually
transfer from one device
to another with the aid
of the local networks ,
but commonly through
data storage such as
flash drives and hard
drive.
VIRUS
65
This Malware
replicates itself
and can transfer by
any type of
means,but more often
through computer
network.
WORM
66
This malicious program
disguise as a useful
program, however left
your device unprotected
and became vulnerable to
other malwares once you
accessed or download.
TROJAN
67
A malicious program
that monitors the
device, and the
actions of the users
without its
knowledge.
68
Used to record the
keystroke done by
the users. This is
done to steal their
password or any
information.
KEYLOGGERS
69
A program designed
to send you
advertisements
mostly popups
ADWARE
70
TYPES OF MALWARE
VIRUS
WORM
TROJAN
SPYWARE
ADWARE
71
HERE ARE SOME TIPS TO
STAY SAFE AND SECURE IN
USING
ONLINE PLATFORMS
72
73
What are the different
internet threats?
74
• Identity Theft
• Phishing
• Malware Infections
75
What are the 5 types of
malwares?
76
• Virus
• Worm
• Trojan
• Spyware
• Adware
77
This Malware replicates itself
and can transfer by any type
of means, but more often
through computer network.
78
WORM
79
Can you give one example of
malware and its harmful effects
on your computer.
80
1.Why do we have to be
aware on the different
MALWARES or threats in
the internet?
81
Is uploading and
downloading of software in
the internet are safe?
Why?
82
As a student, fun of
online games, what will be
your steps before
uploading a game app to
avoid malwares in your
computer/cellphone?
83
Name at least five malwares you see in the
picture
84
VIRUS
WORM
TROJAN
SPYWARE
ADWARE
85
TEST II. TRUE OR FALSE
Direction: Write True if you agree or False if you
do not agree with the statements below.
______ 1. Read the terms and conditions before accepting it.
______ 2. Only download music or video from a trusted website.
______ 3. You can use a pirated software for personal use only.
______ 4. There is a danger for posting future vacation.
______ 5. Avoid logging in to free WIFI.
86
TEST II. TRUE OR FALSE
Direction: Write True if you agree or False if you
do not agree with the statements below.
TRUE 1. Read the terms and conditions before accepting it.
TRUE 2. Only download music or video from a trusted website.
FALSE 3. You can use a pirated software for personal use only.
TRUE 4. There is a danger for posting future vacation.
TRUE 5. Avoid logging in to free WIFI.
TEST II. Match Column A with Column B.
DIRECTION: Read Column A and Identify the correct answer by choosing
answers in Column B. Write the LETTER of the correct answer at the
space provided before the number.
Answers A B
________1. It is a malicious program that
usually transfer from one device to
another with the aid of the local
networks , but commonly through
data storage such as flash drives
and hard drive.
a. Worm
b. Virus
c. Trojan
d. Hacking
e. Spyware
f. Adware
g. Spam
________2. This malicious program disguise as
a useful program, however left
your device unprotected and
became vulnerable to other
malwares once you accessed or
download.
________3. A program designed to send you
advertisements mostly popups
________4. A malicious program that monitors
the device, and the actions of the
users without its knowledge.
________5. This Malware replicates itself and
can transfer by any type of means,
but more often through computer
network.
88
1.VIRUS
2. TROJAN
3.ADWARE
4.SPYWARE
5.WORM
89
90
91
92
93
94
95
96
97
98
99
100

More Related Content

Similar to EMPOWERMENT LESSON 1-2.pptx

Information and Communication Technology (ICT) - Empowerment Technologies
Information and Communication Technology (ICT) - Empowerment TechnologiesInformation and Communication Technology (ICT) - Empowerment Technologies
Information and Communication Technology (ICT) - Empowerment TechnologiesMark Jhon Oxillo
 
Lesson 1 2 Edited
Lesson 1 2 EditedLesson 1 2 Edited
Lesson 1 2 EditedJuvywen
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SJuvywen
 
ICT-EMPOWERMENT.pptx
ICT-EMPOWERMENT.pptxICT-EMPOWERMENT.pptx
ICT-EMPOWERMENT.pptxJoyceNolos
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Jesus Rances
 
Information and Communications Technology.pptx
Information and Communications Technology.pptxInformation and Communications Technology.pptx
Information and Communications Technology.pptxRupertGarryTorres1
 
Empowerment Module 1.pptx
Empowerment Module 1.pptxEmpowerment Module 1.pptx
Empowerment Module 1.pptxCristineAuditor
 
empowermenttechnologies-module1-.pptx
empowermenttechnologies-module1-.pptxempowermenttechnologies-module1-.pptx
empowermenttechnologies-module1-.pptxrazielyurag
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxsittiepalao
 
Introduction to Empowerment Technology.pptx
Introduction to Empowerment Technology.pptxIntroduction to Empowerment Technology.pptx
Introduction to Empowerment Technology.pptxJerome Bigael
 
empowerment technology 123.pptx
empowerment technology 123.pptxempowerment technology 123.pptx
empowerment technology 123.pptxJasonPDelosSantos
 
empowerment technology 123.pptx
empowerment technology 123.pptxempowerment technology 123.pptx
empowerment technology 123.pptxJasonPDelosSantos
 
LESSON 1 Em Tech.pptx
LESSON 1 Em Tech.pptxLESSON 1 Em Tech.pptx
LESSON 1 Em Tech.pptxDixsonCaluag2
 
LESSON 3 Em Tech.pptx
LESSON 3 Em Tech.pptxLESSON 3 Em Tech.pptx
LESSON 3 Em Tech.pptxDixsonCaluag2
 

Similar to EMPOWERMENT LESSON 1-2.pptx (20)

MODULE 1- WEEK 2.pptx
MODULE 1- WEEK 2.pptxMODULE 1- WEEK 2.pptx
MODULE 1- WEEK 2.pptx
 
Information and Communication Technology (ICT) - Empowerment Technologies
Information and Communication Technology (ICT) - Empowerment TechnologiesInformation and Communication Technology (ICT) - Empowerment Technologies
Information and Communication Technology (ICT) - Empowerment Technologies
 
EMTECH_Module-1.pptx
EMTECH_Module-1.pptxEMTECH_Module-1.pptx
EMTECH_Module-1.pptx
 
Lesson 1 2 Edited
Lesson 1 2 EditedLesson 1 2 Edited
Lesson 1 2 Edited
 
etech.pptx
etech.pptxetech.pptx
etech.pptx
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1S
 
ICT-EMPOWERMENT.pptx
ICT-EMPOWERMENT.pptxICT-EMPOWERMENT.pptx
ICT-EMPOWERMENT.pptx
 
unit1-181110135541.pptx
unit1-181110135541.pptxunit1-181110135541.pptx
unit1-181110135541.pptx
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Information and Communications Technology.pptx
Information and Communications Technology.pptxInformation and Communications Technology.pptx
Information and Communications Technology.pptx
 
Empowerment Module 1.pptx
Empowerment Module 1.pptxEmpowerment Module 1.pptx
Empowerment Module 1.pptx
 
empowermenttechnologies-module1-.pptx
empowermenttechnologies-module1-.pptxempowermenttechnologies-module1-.pptx
empowermenttechnologies-module1-.pptx
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptx
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Introduction to Empowerment Technology.pptx
Introduction to Empowerment Technology.pptxIntroduction to Empowerment Technology.pptx
Introduction to Empowerment Technology.pptx
 
empowerment technology 123.pptx
empowerment technology 123.pptxempowerment technology 123.pptx
empowerment technology 123.pptx
 
empowerment technology 123.pptx
empowerment technology 123.pptxempowerment technology 123.pptx
empowerment technology 123.pptx
 
LESSON 1 Em Tech.pptx
LESSON 1 Em Tech.pptxLESSON 1 Em Tech.pptx
LESSON 1 Em Tech.pptx
 
LESSON 3 Em Tech.pptx
LESSON 3 Em Tech.pptxLESSON 3 Em Tech.pptx
LESSON 3 Em Tech.pptx
 

More from Andrew_Braza

Module-5-Language-and-Literacy-Development-of-Children-and-Adolescents.pptx
Module-5-Language-and-Literacy-Development-of-Children-and-Adolescents.pptxModule-5-Language-and-Literacy-Development-of-Children-and-Adolescents.pptx
Module-5-Language-and-Literacy-Development-of-Children-and-Adolescents.pptxAndrew_Braza
 
Module-1-Nature-and-Principles-of-Develpment.pptx
Module-1-Nature-and-Principles-of-Develpment.pptxModule-1-Nature-and-Principles-of-Develpment.pptx
Module-1-Nature-and-Principles-of-Develpment.pptxAndrew_Braza
 
G-11 ICT TITLE DEFENSE.pptx
G-11 ICT TITLE DEFENSE.pptxG-11 ICT TITLE DEFENSE.pptx
G-11 ICT TITLE DEFENSE.pptxAndrew_Braza
 
EXISTENTIALISM.pptx
EXISTENTIALISM.pptxEXISTENTIALISM.pptx
EXISTENTIALISM.pptxAndrew_Braza
 
Approach-Method-Strategy-Technique.pptx
Approach-Method-Strategy-Technique.pptxApproach-Method-Strategy-Technique.pptx
Approach-Method-Strategy-Technique.pptxAndrew_Braza
 
Introduction-to-technology-for-teaching-and-learning-kissie.pptx
Introduction-to-technology-for-teaching-and-learning-kissie.pptxIntroduction-to-technology-for-teaching-and-learning-kissie.pptx
Introduction-to-technology-for-teaching-and-learning-kissie.pptxAndrew_Braza
 
Class Prophecy.pptx
Class Prophecy.pptxClass Prophecy.pptx
Class Prophecy.pptxAndrew_Braza
 
CMS PRESENTATION.pptx
CMS PRESENTATION.pptxCMS PRESENTATION.pptx
CMS PRESENTATION.pptxAndrew_Braza
 
PRESENTATION SHINE TLC.pptx
PRESENTATION SHINE TLC.pptxPRESENTATION SHINE TLC.pptx
PRESENTATION SHINE TLC.pptxAndrew_Braza
 
Computer Assembly.pptx
Computer Assembly.pptxComputer Assembly.pptx
Computer Assembly.pptxAndrew_Braza
 
web3-architecture-thesis.pptx
web3-architecture-thesis.pptxweb3-architecture-thesis.pptx
web3-architecture-thesis.pptxAndrew_Braza
 
Gurney · SlidesCarnival.pptx
Gurney · SlidesCarnival.pptxGurney · SlidesCarnival.pptx
Gurney · SlidesCarnival.pptxAndrew_Braza
 
ARAL PAN 7 CURRICULUM MAP.pdf
ARAL PAN 7 CURRICULUM MAP.pdfARAL PAN 7 CURRICULUM MAP.pdf
ARAL PAN 7 CURRICULUM MAP.pdfAndrew_Braza
 
GRAMMAR TRANSLATION METHHOD.pptx
GRAMMAR TRANSLATION METHHOD.pptxGRAMMAR TRANSLATION METHHOD.pptx
GRAMMAR TRANSLATION METHHOD.pptxAndrew_Braza
 
Media Information Literacy (MIL)Lesson 1
Media Information Literacy (MIL)Lesson 1Media Information Literacy (MIL)Lesson 1
Media Information Literacy (MIL)Lesson 1Andrew_Braza
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.pptAndrew_Braza
 

More from Andrew_Braza (20)

Module-5-Language-and-Literacy-Development-of-Children-and-Adolescents.pptx
Module-5-Language-and-Literacy-Development-of-Children-and-Adolescents.pptxModule-5-Language-and-Literacy-Development-of-Children-and-Adolescents.pptx
Module-5-Language-and-Literacy-Development-of-Children-and-Adolescents.pptx
 
Module-1-Nature-and-Principles-of-Develpment.pptx
Module-1-Nature-and-Principles-of-Develpment.pptxModule-1-Nature-and-Principles-of-Develpment.pptx
Module-1-Nature-and-Principles-of-Develpment.pptx
 
G-11 ICT TITLE DEFENSE.pptx
G-11 ICT TITLE DEFENSE.pptxG-11 ICT TITLE DEFENSE.pptx
G-11 ICT TITLE DEFENSE.pptx
 
EXISTENTIALISM.pptx
EXISTENTIALISM.pptxEXISTENTIALISM.pptx
EXISTENTIALISM.pptx
 
Approach-Method-Strategy-Technique.pptx
Approach-Method-Strategy-Technique.pptxApproach-Method-Strategy-Technique.pptx
Approach-Method-Strategy-Technique.pptx
 
Introduction-to-technology-for-teaching-and-learning-kissie.pptx
Introduction-to-technology-for-teaching-and-learning-kissie.pptxIntroduction-to-technology-for-teaching-and-learning-kissie.pptx
Introduction-to-technology-for-teaching-and-learning-kissie.pptx
 
Class Prophecy.pptx
Class Prophecy.pptxClass Prophecy.pptx
Class Prophecy.pptx
 
CMS PRESENTATION.pptx
CMS PRESENTATION.pptxCMS PRESENTATION.pptx
CMS PRESENTATION.pptx
 
PRESENTATION SHINE TLC.pptx
PRESENTATION SHINE TLC.pptxPRESENTATION SHINE TLC.pptx
PRESENTATION SHINE TLC.pptx
 
Computer Assembly.pptx
Computer Assembly.pptxComputer Assembly.pptx
Computer Assembly.pptx
 
web3-architecture-thesis.pptx
web3-architecture-thesis.pptxweb3-architecture-thesis.pptx
web3-architecture-thesis.pptx
 
smart
smartsmart
smart
 
Gurney · SlidesCarnival.pptx
Gurney · SlidesCarnival.pptxGurney · SlidesCarnival.pptx
Gurney · SlidesCarnival.pptx
 
ARAL PAN 7 CURRICULUM MAP.pdf
ARAL PAN 7 CURRICULUM MAP.pdfARAL PAN 7 CURRICULUM MAP.pdf
ARAL PAN 7 CURRICULUM MAP.pdf
 
Play.pptx
Play.pptxPlay.pptx
Play.pptx
 
GRAMMAR TRANSLATION METHHOD.pptx
GRAMMAR TRANSLATION METHHOD.pptxGRAMMAR TRANSLATION METHHOD.pptx
GRAMMAR TRANSLATION METHHOD.pptx
 
MIL Lesson 3.pptx
MIL Lesson 3.pptxMIL Lesson 3.pptx
MIL Lesson 3.pptx
 
MIL Lesson 2.pptx
MIL Lesson 2.pptxMIL Lesson 2.pptx
MIL Lesson 2.pptx
 
Media Information Literacy (MIL)Lesson 1
Media Information Literacy (MIL)Lesson 1Media Information Literacy (MIL)Lesson 1
Media Information Literacy (MIL)Lesson 1
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.ppt
 

Recently uploaded

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

EMPOWERMENT LESSON 1-2.pptx

  • 3. ICT (INFORMATION AND COMMUNICATION TECHNOLOGY) 3 •ICT deals with the use of different communication technologies such as mobile phones, telephone, Internet, etc. to locate, save, send, and edit information. •Example: when we make a video call, we use internet.
  • 4. 4 ICT IN THE PHILIPPINES •Philippines as the “ICT Hub of Asia”. •huge growth of ICT related jobs around the country, one of which is call center or BPO (Business Process Outsourcing) centers. •According to 2013 edition of Measuring the Information Society by the International
  • 5. 5 ICT IN THE PHILIPPINES Telecommunication Union, there are 106.8 cellphones per 100 Filipinos in the year 2012. In a data gathered by the Annual Survey of Philippines Business and Industries in 2010, the ICT industry shares 19.3% of the total employment population.
  • 6. ICT IN THE PHILIPPINES •Time magazines declared Makati City, Philippines-Rank 1 as the “Selfiest Cities around the world, and Rank 9 is Cebu City. WWW-WORLD WIDE WEB •When WWW was invented, most web pages were static. Static (also known as flat page or stationary page) in the same that the page “as is” and cannot be manipulated by the user. This referred to as Web 1.0.
  • 7. 7 EXAMPLE OF WEB 2.0 • Social Networking sites • Blogs • Wikis • Video sharing sites
  • 8. 8 WEB 2.0 •Web 2.0 allows the user to interact with the page known as DYNAMIC PAGE; instead of just reading a page, the user may be able to comment or create a user account. Dynamic page refers to the web pages that are affected by user input or preference.
  • 9. 9 KEY FEATURES OF WEB 2.0 Folksonomy - allows users to categorize and classify/arrange information using freely chosen keywords (e.g. tagging). Popular social networking sites such as Twitter, Instagram, Facebook, etc. use tags that start with a pound sign (#) or hashtag.
  • 10. 10 KEY FEATURES OF WEB 2.0 Rich User Interface - content is dynamic and is responsive to user's input. An example would be a website that shows local content. In the case of social networking sites, when logged on, your account is used to modify what you see in their website.
  • 11. 11 KEY FEATURES OF WEB 2.0 •User Participation– the owner of website is not the only one who is able to put content. Others are able to place a content on their own by means of comments, reviews, and evaluation.
  • 12. 12 •Long Tail – services are offered on demand rather than on a one-time purchase. This is synonymous to subscribing to a data plan that charges you for the amount of time you spent on Internet or a data plan that charges you for the amount of bandwidth you used. KEY FEATURES OF WEB 2.0
  • 13. 13 WEB 3.0 AND THE SEMANTIC WEB •Semantic Web– is a movement led by the World Wide Web Consortium(W3C). The semantic web provides a framework that allows data to be shared and reuse to deliver web content specifically targeting the user.
  • 14. 14 WEB 3.0 IS YET TO BE FULLY REALIZED BECAUSE OF SEVERAL PROBLEMS: •Compatibility-HTML files and current web browsers could not support Web 3.0. •Security – The user’s security is also question since the machine is saving his or her preferences. •Vastness-The World Wide Web already contains billions of web pages.
  • 15. 15 Vagueness – Certain words are imprecise. The words “old” and “small” would depend to the user. Logic - since machine use logic, there are certain limitations for a computer to be able to predict what the user is referring to at a given time. WEB 3.0 IS YET TO BE FULLY REALIZED BECAUSE OF SEVERAL PROBLEMS:
  • 16. 16 TRENDS IN ICT 1. Convergence – is the synergy of technological advancements to work on a similar goal or task. For example, besides using your personal computer to create word documents, you can now use your smartphone. 2. Social Media - is a website, application, or online channel that enables web users to create, co-create, discuss, modify, and exchange user generated content.
  • 17. 17 SIX TYPES OF SOCIAL MEDIA 1.) Social Networks – These are sites that allows you to connect with other people with the same interests or background. Once the user creates his/her account, he/she can set up a profile, add people, share content, etc. Example : Facebook and Google+
  • 18. 18
  • 19. 19 2.) Bookmarking Sites– These are sites that allow you to store and manage links to various website and resources. Most of these sites allow you to create a tag allows you to and others easily share them. Ex. : StumbleUpon/Pinterest SIX TYPES OF SOCIAL MEDIA
  • 20. 20
  • 21. 21 SIX TYPES OF SOCIAL MEDIA 3.) Social News - These are sites that allow users to post their own news intems or links to other new sources. The users can also comment on the post and comments may also be rank. Example: reddit and Digg
  • 22. 22
  • 23. 23 SIX TYPES OF SOCIAL MEDIA 4.)Media Sharing – These are sites that allow you to upload and share media content like images, music and video. Example: Flickr, YouTube and Instagram.
  • 24. 24
  • 25. 25 SIX TYPES OF SOCIAL MEDIA 5.) Microblogging– These are sites that focus on short updates from the user. Those that subscribed to the user will be able to receive these updates. Example: Twitter
  • 26. 26
  • 27. 27 SIX TYPES OF SOCIAL MEDIA 6.) Blogs and Forums– These websites allow user to post their content. Other users are able to comment on the said topic. Example: Blogger, WordPress and Tumblr
  • 28. 28 TRENDS IN ICT 3. Mobile Technologies – The popularities of smartphones and tablets has taken a major rise over the years. This is largely because of the devices capability to do the tasks that were originally found in PCs. Several of these devices are Caple of using high-speed internet. Today the latest model devices use 4G Networking(LTE), which is currently the fastest mobile network.
  • 29. 29 MOBILE OS IOS – use in apple devices such as iPhone and iPad. Android - an open source OS developed by google. Being open source means mobile phone companies use this OS for free. Blackberry OS – use in Blackberry devices. Windows Phone OS – a closed source and proprietary operating system developed by Microsoft.
  • 30. 30 Symbian – the original smartphone OS; used by Nokia devices. WebOS – originally used in smartphones; now smart TV’s. used in Windows Mobile – developed by Microsoft for smartphones and pocket PCs. MOBILE OS
  • 31. 31 TRENDS IN ICT 4. Assistive Media - is a non-profit service designed to help people who have visual and reading impairments. a database of audio recordings is used to read to the user.
  • 32. 32 KEY TERMS •Web 1.0 – static websites without interactivity. •Web 2.0 – websites that contain dynamic content. •Web 3.0 – a concept of the World Wide Web that is designed to cater to the individual user. •Static – refers to the web that are the same regardless of the user.
  • 33. 33 KEY TERMS •Dynamic – refers to the that are affected by user input or preference. •Folksonomy – allows user to categorize and classify/arrange information. •Hashtag # – used to “categorize” posts in a website. •Convergence – the synergy of technological advancements to work a similar goal or task.
  • 34. 34 •Social Media – websites, applications or online channels that enable users to co- create, discuss, modify, and exchange user- generated content. KEY TERMS
  • 36. 36 INSTRUCTION: WRITE (T) IF THE STATEMENT IS TRUE, WRITE (F) IF THE STATEMENT IS FALSE 1.) Web 2.0 is classified as dynamic webpage. 2.) People Magazine conducted the research on “The Selfiest Cities in the World”. 3.) Web 2.0 introduced static web pages that allow users to interact with the web page. 4.) Folksonomy allows user to categorize and locate information. 5.) Technological convergence is the synergy of technological advancement to work on a similar goal or task. 6.) According to Nielsen, users who use the Internet spend more time in social media sites than in any other type of site.
  • 37. 37 7.) Blogging sites are sites that focus on short updates from the user. 8.) Android is a mobile operating system for Apple devices. 9.) Assistive media is a nonprofit service designed to help people who have visual and reading impairments. 10.) ICT deals with the use of diff. comm. Tech. to locate, send, save & edit info. 11.) Semantic web means that the page is stationary or flat page. INSTRUCTION: WRITE (T) IF THE STATEMENT IS TRUE, WRITE (F) IF THE STATEMENT IS FALSE
  • 38. 38 Write SO if the item is for Social Networks, BS for bookmarking, MS for Media sharing, SN for Social News, MB for Micro-Blogging and BF for Blogs and Forums. 1. Facebook 6. Google+ 11. WordPress 2. Plurk 7. Instagram 12. Digg 3. Twitter 8. Pinterest 13. YouTube 4. Tumblr 9. Blogger 14. Flicker 5. Reddit 10.StumbleUpon
  • 40. 4 1. T 2. F 3. F 4. T 5. T 6. T 7. F 8. F 9. T 10. T 11. F PART I
  • 41. 41 1. SO 8. BS 2. MI 9. BF 3. MB 1O. BS 4. BF 11. BF 5. SN 12. SN 6. SO 13. MS 7. SO 14. MS PART II
  • 43. 43 Online Safety, Security, Ethics, and Etiquette
  • 44. 44
  • 45. 45 This picture shows the speed at which The Internet is changing the world. The sites we visit are so overwhelmingly popular to both adults and children.
  • 46. 46 The online world is increasingly integrated into our daily lives. The internet like the physical world, maybe safe or unsafe depending on our habits.
  • 47. 47 Sometimes, we do not pay much attention about the information that we share.
  • 49. 49 Being safe and secured online depends on how we protect ourselves. Analyze the following statements Guess the correct answer by giving a thumbs-up if You agree and thumbs –down if not.
  • 51. 51 2. It is fine to log-in to a public networks/Wi-Fi
  • 52. 52 3. Install and update an antivirus software on your computer.
  • 53. 53 4. Reply or click links from suspicious e-mail
  • 54. 54 5. Be mindful of what you share in the internet and what site you share it to.
  • 55. 55 6. Visit website that are in your most interest without checking its privacy polices.
  • 56. 56 7. Buy the software; do not use pirated ones
  • 57. 57 8. Do not talk to strangers whether online or face-to-face
  • 59. 59 The internet is define as the information superhighway. This means that anyone has access to this highway, can place information and can grab that Information.
  • 60. 60 The more information you share online the higher the risks such as:
  • 63. 63 software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. MALWARE
  • 64. 64 It is a malicious program that usually transfer from one device to another with the aid of the local networks , but commonly through data storage such as flash drives and hard drive. VIRUS
  • 65. 65 This Malware replicates itself and can transfer by any type of means,but more often through computer network. WORM
  • 66. 66 This malicious program disguise as a useful program, however left your device unprotected and became vulnerable to other malwares once you accessed or download. TROJAN
  • 67. 67 A malicious program that monitors the device, and the actions of the users without its knowledge.
  • 68. 68 Used to record the keystroke done by the users. This is done to steal their password or any information. KEYLOGGERS
  • 69. 69 A program designed to send you advertisements mostly popups ADWARE
  • 71. 71 HERE ARE SOME TIPS TO STAY SAFE AND SECURE IN USING ONLINE PLATFORMS
  • 72. 72
  • 73. 73 What are the different internet threats?
  • 74. 74 • Identity Theft • Phishing • Malware Infections
  • 75. 75 What are the 5 types of malwares?
  • 76. 76 • Virus • Worm • Trojan • Spyware • Adware
  • 77. 77 This Malware replicates itself and can transfer by any type of means, but more often through computer network.
  • 79. 79 Can you give one example of malware and its harmful effects on your computer.
  • 80. 80 1.Why do we have to be aware on the different MALWARES or threats in the internet?
  • 81. 81 Is uploading and downloading of software in the internet are safe? Why?
  • 82. 82 As a student, fun of online games, what will be your steps before uploading a game app to avoid malwares in your computer/cellphone?
  • 83. 83 Name at least five malwares you see in the picture
  • 85. 85 TEST II. TRUE OR FALSE Direction: Write True if you agree or False if you do not agree with the statements below. ______ 1. Read the terms and conditions before accepting it. ______ 2. Only download music or video from a trusted website. ______ 3. You can use a pirated software for personal use only. ______ 4. There is a danger for posting future vacation. ______ 5. Avoid logging in to free WIFI.
  • 86. 86 TEST II. TRUE OR FALSE Direction: Write True if you agree or False if you do not agree with the statements below. TRUE 1. Read the terms and conditions before accepting it. TRUE 2. Only download music or video from a trusted website. FALSE 3. You can use a pirated software for personal use only. TRUE 4. There is a danger for posting future vacation. TRUE 5. Avoid logging in to free WIFI.
  • 87. TEST II. Match Column A with Column B. DIRECTION: Read Column A and Identify the correct answer by choosing answers in Column B. Write the LETTER of the correct answer at the space provided before the number. Answers A B ________1. It is a malicious program that usually transfer from one device to another with the aid of the local networks , but commonly through data storage such as flash drives and hard drive. a. Worm b. Virus c. Trojan d. Hacking e. Spyware f. Adware g. Spam ________2. This malicious program disguise as a useful program, however left your device unprotected and became vulnerable to other malwares once you accessed or download. ________3. A program designed to send you advertisements mostly popups ________4. A malicious program that monitors the device, and the actions of the users without its knowledge. ________5. This Malware replicates itself and can transfer by any type of means, but more often through computer network.
  • 89. 89
  • 90. 90
  • 91. 91
  • 92. 92
  • 93. 93
  • 94. 94
  • 95. 95
  • 96. 96
  • 97. 97
  • 98. 98
  • 99. 99
  • 100. 100