2. LESSON 1: What is Information and
Communications Technology (ICT)?
3. ICT (information and communications
technology - or technologies)
• is an umbrella term that includes any
communication device or application,
encompassing: radio, television, cellular
phones, computer and network hardware and
software, satellite systems and so on, as well
as the various services and applications
associated with them, such as
videoconferencing and distance learning.
4. Activity 1
Search anything about Information and
Communications Technology (ICT) or digital
tools that interest you. Find out the latest
about them or something similar to them that
you used so far.
Share it to the class for each group.
5. Networked World Readiness
• Measures the propensity for countries to
exploit the opportunities offered by
information and communications technology
(ICT). Conducted by Global Information Report
• Gathered from international agencies such as
UNESCO, Telecommunication Union, UN
agencies & the World Bank
• Philippines rank 77 at Global Information
Report 2016
8. 5 categories of Networked World
Readiness (NWR)
• Access
• Learning
• Society
• Economy
• Policy
9. How many of the items or icons in the
image above are you familiar with?
10. TRIVIA/GLOSSARY OF TERMS
• 1. Assistive Media - a component under Assistive
technology (AT), which is a generic term used to refer
to a group of software or hardware devices by which
people with disabilities can access computers. Assistive
Media is also a name of a company: “the Internet's first
audio solution for persons with print reading/access
barriers. The audio recordings of the literary works
produced by Assistive Media are now easily accessible,
on-demand, to the ever growing number of persons
with disabilities who now use the Internet.”
• 2. Collaborative platforms - “is a category of business
software that adds broad social networking capabilities
to work processes.”
11. TRIVIA/GLOSSARY OF TERMS
• 3. Convergent Technologies - an extension of the
term convergence which means a “coming
together of two or more disparate disciplines or
technologies. For example, the so-called fax
revolution was produced by a convergence of
telecommunications technology, optical scanning
technology, and printing technology.” Convergent
Technologies also refers to an American
computer company formed by a small group of
people who left Intel Corporation and Xerox PARC
in 1979
12. TRIVIA/GLOSSARY OF TERMS
• 4. Information and Communications Technology (ICT) - ICT
(information and communications technology - or
technologies) is an umbrella term that includes any
communication device or application, encompassing: radio,
television, cellular phones, computer and network hardware
and software, satellite systems and so on, as well as the
various services and applications associated with them, such as
videoconferencing and distance learning. ICTs are often
spoken of in a particular context, such as ICTs in education,
health care, or libraries. The term is somewhat more common
outside of the United States. It may also be defined as
Information and Communication Technologies (ICT or ICTs)
are digital forms of communication including tools available on the
Internet, such as blogging and email, as well as computer software,
such as Microsoft PowerPoint and Word 3
13. TRIVIA/GLOSSARY OF TERMS
• 5. Mobile Media –This refers to “media devices such as mobile
phones and PDA’s were the primary source of portable
media from which we could obtain information and
communicate with one another. More recently, the smartphone
(which has combined many features of the cellphone with the
PDA) has rendered the PDA next to obsolete. The growth of
new mobile media as a true force in society was marked by
smartphone sales outpacing personal computer sales in
2011.”
• 6. Online systems - Are online versions of information systems
which is “the process of and tools for storing, managing,
using and gathering of data and communications in an
organization. An example of information systems are tools for
sending out communications and storing files in a business.”
14. TRIVIA/GLOSSARY OF TERMS
• 7. Social Media - “are computer-mediated tools
that allow people or companies to create,
share, or exchange information, career interests,
ideas, and pictures/videos in virtual
communities and networks.”
• 8. Web 2.0 - “describes World Wide Web sites
that emphasize user-generated content,
usability, and interoperability. The term was
popularized by Tim O'Reilly and Dale
Dougherty at the O'Reilly Media Web 2.0
Conferenceinlate2004, though it was coined
15. TRIVIA/GLOSSARY OF TERMS
• 9. Web 3.0 - “a phrase coined by John Markoff
oftheNewYorkTimesin2006,referstoa
supposed third generation of Internet-based
services that collectively comprise what
might be called ‘the intelligent Web’ — such as
those using semantic web, microformats,
natural language search, data-mining, machine
learning, recommendation agents, and
artificial intelligence technologies — which
emphasize machine-facilitated understanding
of information in order to provide a more
productive and intuitive user experience.
16. Assignment
1. Explore the content of the Networked World
Readiness assessment via this link:
http://cyber.law.harvard.edu/readinessguide/intro.ht
ml or whenever available, its printed version.
2. Compare and contrast the implications of varied
online platforms, sites and content; to best achieve
specific needs, objectives; or to best address the
challenges in the classroom or that of your
community. On a piece of paper or in whatever
suitable digital tool is available, write down your
insight in 300 words .
17. LESSON 2: Online safety, security,
ethics, and etiquette
• How is your digital media life like?
• What is social media’s role in your life?
- social media promotes disengagement, self-
absorption, loneliness and sadness.
18. LESSON 2: Online safety, security,
ethics, and etiquette
Lesson Objectives:
Apply online safety, security, ethics, and
etiquette standards and practice in the use of
ICTs as it would relate to your specific
professional tracks.
19. Online Safety or Internet Safety
- One of the biggest concerns every parent has
for their children.
Common Concerns:
1. Malicious Users – Spam, phishing,
cyberbullying, cyberstalking etc.
2. Websites and Software – malware, computer
viruses, etc.
3. Various types of obscene or offensive
content
20. Online Security or Internet Security
- it is a tree branch of computer security
specifically related to the Internet
- is defined as a process to create rules and
actions to take to protect against attacks over
the Internet
Examples: online system that prevents credit
card numbers from being stolen on a shopping
website
21. Online Etiquette or Internet Etiquette
• is the correct or acceptable way of communicating or
behaving on the internet.
Basic Rules that Should Follow
1. Think before you send
2. Respect the time and bandwidth of others
3. Don’t send messages that could be misinterpreted as
threatening or hurtful
4. Follow the conventions of writing when sending formal
emails or posting online. For informal such as text
message to a friend, use correct spelling. Writing in ALL
CAPS considered shouting
5. Respect others’ right to privacy
22. Online Ethics
• It is defined as a set of rules for acceptable online
behavior. It focuses on the acceptable use of
online resources in an online social environment.
• Being a good netizen in the online world means:
1. Internet is not a new world but an extension of our
existing society.
2. Understanding and accepting the laws online
3. Acknowledgement of cultural differences
4. Respecting the rights to privacy
23. Tips for Privacy and Security
• Websites covered in flashy ads- common source of
spywares
• Check for website safety – http with padlock
• Lock your Screen or Device
• Choose strong and varied password and secure it –mix of
letters, numbers and symbols
• Avoiding spyware – spyware records your actions without
your knowledge. It is the biggest treat to privacy and
security on the internet. Install anti-spyware and anti-virus
is a must
• Minimizing info. and maximize privacy setting – think about
how a thief could locate information
• Singing in and out – public computers can access you
account when it’s sign out
• Use secure Network – don’t trust public WI-FI. Service
provider can monitor all traffic network
24. TRIVIA/GLOSSARY OF TERMS
• 1. Aggregator is a website or Web application where
headlines and other content are collected for easy
viewing. Aggregators such as Google News compile news
articles and posts. An avatar is a two- or three-
dimensional icon that represents a computer user or
a gamer.
• 2. Avatar can be a cartoonish graphic, a photograph, a
screen name, or a fully-developed character.
• 3. Blog, from the term “weblog, ” is a type of website
usually updated by an individual or a group of bloggers.
Some blogs provide news or opinions on a specific subject,
while others are more like online journals. Most blogs allow
readers to leave comments on blog posts.
25. TRIVIA/GLOSSARY OF TERMS
• 4. Flaming is the act of saying mean things online,
usually in ALL CAPS, and often in a public forum
with the intention to humiliate. Flame wars can
occur easily online, as it can be difficult to figure
out people’s intentions or emotions online.
• 5. Mash-up is a remix or blend of multiple songs,
videos, or other media content into one product.
Fan fiction writing is one form of a mash-up, as
writers take characters from a well-known video
game, movie, or book, and rewrite their actions
or relationships.
26. TRIVIA/GLOSSARY OF TERMS
• 6. Massively multiplayer online game (MMOG) is
usually an online virtual world that multiple
players navigate and play in together. While in
this virtual world, their avatars chat, cooperate,
and quest together, oftentimes towards a goal.
• 7. P2P, or Peer-to-Peer, network allows for
sharing of mp3s, videos, and other digital files by
transferring information directly between two
computers rather than by going through a central
server. P2P technology is also behind the popular
Internet phone service Skype.
27. TRIVIA/GLOSSARY OF TERMS
• 8. Phishing is the illegal act of sending emails or messages
that appear to come from authentic sources, but really
come from spammers. Phishers often try to get people to
send them their personal information, everything from
account numbers to passwords.
• 9. Podcast is a downloadable video or audio file. Podcasts
can be verbal, based on a certain topic, or can include
music, video, and commentary. Most podcasts are updated
regularly through the addition of new episodes.
• 10. Short Message Service (SMS), or text message, is a
short message of fewer than 160 characters sent from a cell
phone. A Multimedia Messaging Service (MMS) is a text
message that contains an attached multimedia file, such as
a picture or song.
28. LESSON 3: Contextualized online
search and research skills
“Are you a smarter user of search engines”