SlideShare a Scribd company logo
EMPOWERMENT
TECHNOLOGIES
LESSON 1
2
ICT (INFORMATION AND COMMUNICATION
TECHNOLOGY)
3
•ICT deals with the use of different
communication technologies such as mobile
phones, telephone, Internet, etc. to locate,
save, send, and edit information.
•Example: when we make a video call, we use
internet.
4
ICT IN THE PHILIPPINES
•Philippines as the “ICT Hub of Asia”.
•huge growth of ICT related jobs around the
country, one of which is call center or BPO
(Business Process Outsourcing) centers.
•According to 2013 edition of Measuring
the Information Society by the
International
5
ICT IN THE PHILIPPINES
Telecommunication Union, there are 106.8
cellphones per 100 Filipinos in the year
2012.
In a data gathered by the Annual Survey
of Philippines Business and Industries
in 2010, the ICT industry shares 19.3%
of the total employment population.
ICT IN THE PHILIPPINES
•Time magazines declared Makati City,
Philippines-Rank 1 as the “Selfiest Cities
around the world, and Rank 9 is Cebu City.
WWW-WORLD WIDE WEB
•When WWW was invented, most web pages were
static. Static (also known as flat page or
stationary page) in the same that the page “as
is” and cannot be manipulated by the user.
This referred to as Web 1.0.
7
EXAMPLE OF WEB 2.0
• Social Networking sites
• Blogs
• Wikis
• Video sharing sites
8
WEB 2.0
•Web 2.0 allows the user to interact with
the page known as DYNAMIC PAGE; instead of
just reading a page, the user may be able
to comment or create a user account.
Dynamic page refers to the web pages that
are affected by user input or preference.
9
KEY FEATURES OF WEB 2.0
Folksonomy - allows users to categorize and
classify/arrange information using freely
chosen keywords
(e.g. tagging). Popular social networking sites
such as Twitter, Instagram, Facebook, etc.
use tags that start with a pound sign (#) or
hashtag.
10
KEY FEATURES OF WEB 2.0
Rich User Interface - content is dynamic and
is responsive to user's input. An example
would be a website
that shows local content. In the case of
social networking sites, when logged on, your
account is used
to modify what you see in their website.
11
KEY FEATURES OF WEB 2.0
•User Participation– the owner of website is
not the only one who is able to put content.
Others are able to place a content on their
own by means of comments, reviews, and
evaluation.
12
•Long Tail – services are offered on demand
rather than on a one-time purchase. This is
synonymous to subscribing to a data plan that
charges you for the amount of time you spent
on Internet or a data plan that charges you
for the amount of bandwidth you used.
KEY FEATURES OF WEB 2.0
13
WEB 3.0 AND THE SEMANTIC WEB
•Semantic Web– is a movement led by the
World Wide Web Consortium(W3C). The semantic
web provides a framework that allows data to
be shared and reuse to deliver web content
specifically targeting the user.
14
WEB 3.0 IS YET TO BE FULLY REALIZED
BECAUSE OF SEVERAL PROBLEMS:
•Compatibility-HTML files and current web
browsers could not support Web 3.0.
•Security – The user’s security is also
question since the machine is saving his or
her preferences.
•Vastness-The World Wide Web already
contains billions of web pages.
15
Vagueness – Certain words are imprecise. The words “old”
and “small” would depend to the user.
Logic - since machine use logic, there are certain limitations
for a computer to be able to predict what the user is referring
to at a given time.
WEB 3.0 IS YET TO BE FULLY REALIZED
BECAUSE OF SEVERAL PROBLEMS:
16
TRENDS IN ICT
1. Convergence – is the synergy of
technological advancements to work on a
similar goal or task. For example, besides
using your personal computer to create
word documents, you can now use your
smartphone.
2. Social Media - is a website, application, or
online channel that enables web users to
create, co-create, discuss, modify, and
exchange user generated content.
17
SIX TYPES OF SOCIAL MEDIA
1.) Social Networks – These are sites
that allows you to connect with other
people with the same interests or
background. Once the user creates
his/her account, he/she can set up a
profile, add people, share content,
etc.
Example : Facebook and Google+
18
19
2.) Bookmarking Sites– These are
sites that allow you to store and
manage links to various website
and resources. Most of these
sites allow you to create a tag
allows you to and others easily
share them.
Ex. : StumbleUpon/Pinterest
SIX TYPES OF SOCIAL MEDIA
20
21
SIX TYPES OF SOCIAL MEDIA
3.) Social News - These are sites that
allow users to post their own news intems
or links to other new sources. The users
can also comment on the post and comments
may also be rank.
Example: reddit and Digg
22
23
SIX TYPES OF SOCIAL MEDIA
4.)Media Sharing – These are sites that
allow you to upload and share media
content like images, music and video.
Example: Flickr, YouTube and Instagram.
24
25
SIX TYPES OF SOCIAL MEDIA
5.) Microblogging– These are sites that
focus on short updates from the user.
Those that subscribed to the user will
be able to receive these updates.
Example: Twitter
26
27
SIX TYPES OF SOCIAL MEDIA
6.) Blogs and Forums– These websites allow
user to post their content. Other users
are able to comment on the said topic.
Example: Blogger, WordPress and Tumblr
28
TRENDS IN ICT
3. Mobile Technologies – The popularities of
smartphones and tablets has taken a
major rise over the years. This is
largely because of the devices
capability to do the tasks that were
originally found in PCs.
Several of these devices are Caple of
using high-speed internet. Today the
latest model devices use 4G
Networking(LTE), which is currently the
fastest mobile network.
29
MOBILE OS
IOS – use in apple devices such as iPhone and
iPad.
Android - an open source OS developed by google.
Being open source means mobile phone companies
use this OS for free.
Blackberry OS – use in Blackberry devices.
Windows Phone OS – a closed source and
proprietary operating system developed by
Microsoft.
30
Symbian – the original smartphone OS; used by
Nokia devices.
WebOS – originally used in smartphones; now
smart TV’s. used in
Windows Mobile – developed by Microsoft for
smartphones and pocket PCs.
MOBILE OS
31
TRENDS IN ICT
4. Assistive Media - is a non-profit
service designed to help people who
have visual and reading impairments. a
database of audio recordings is
used to read to the user.
32
KEY TERMS
•Web 1.0 – static websites without
interactivity.
•Web 2.0 – websites that contain dynamic
content.
•Web 3.0 – a concept of the World Wide Web
that is designed to cater to the individual
user.
•Static – refers to the web that are the same
regardless of the user.
33
KEY TERMS
•Dynamic – refers to the that are affected by
user input or preference.
•Folksonomy – allows user to categorize and
classify/arrange information.
•Hashtag # – used to “categorize” posts in a
website.
•Convergence – the synergy of technological
advancements to work a similar goal or task.
34
•Social Media – websites, applications or
online channels that enable users to co-
create, discuss, modify, and exchange user-
generated content.
KEY TERMS
35
QUIZ
36
INSTRUCTION: WRITE (T) IF THE STATEMENT IS TRUE, WRITE
(F) IF THE STATEMENT IS FALSE
1.) Web 2.0 is classified as dynamic webpage.
2.) People Magazine conducted the research on “The
Selfiest Cities in the World”.
3.) Web 2.0 introduced static web pages that allow users
to interact with the web page.
4.) Folksonomy allows user to categorize and locate
information.
5.) Technological convergence is the synergy of
technological advancement to work on a similar goal or task.
6.) According to Nielsen, users who use the Internet spend
more time in social media sites than in any other type of
site.
37
7.) Blogging sites are sites that focus on short
updates from the user.
8.) Android is a mobile operating system for Apple
devices.
9.) Assistive media is a nonprofit service designed
to help people who have visual and reading
impairments.
10.) ICT deals with the use of diff. comm. Tech. to
locate, send, save & edit info.
11.) Semantic web means that the page is stationary
or flat page.
INSTRUCTION: WRITE (T) IF THE STATEMENT IS TRUE, WRITE
(F) IF THE STATEMENT IS FALSE
38
Write SO if the item is for Social Networks, BS for bookmarking, MS
for Media sharing, SN for Social News, MB for Micro-Blogging and BF
for Blogs and Forums.
1. Facebook 6. Google+ 11. WordPress
2. Plurk 7. Instagram 12. Digg
3. Twitter 8. Pinterest 13. YouTube
4. Tumblr 9. Blogger 14. Flicker
5. Reddit 10.StumbleUpon
39
ANSWER KEY
4
1. T
2. F
3. F
4. T
5. T
6. T
7. F
8. F
9. T
10. T
11. F
PART I
41
1. SO 8. BS
2. MI 9. BF
3. MB 1O. BS
4. BF 11. BF
5. SN 12. SN
6. SO 13. MS
7. SO 14. MS
PART II
42
LESSON 2
43
Online Safety, Security, Ethics,
and Etiquette
44
45
This picture shows the speed at
which The Internet is changing
the world.
The sites we visit are so
overwhelmingly popular to both
adults and children.
46
The online world is
increasingly integrated
into our daily lives.
The internet like the
physical world, maybe safe
or unsafe depending on our
habits.
47
Sometimes, we do not
pay much attention
about the information
that we share.
48
SAFETY FIRST
49
Being safe and secured online depends
on how we protect ourselves.
Analyze the following statements
Guess the correct answer by giving a
thumbs-up if You agree and thumbs
–down if not.
50
1. Without
worries,
download
anything from
untrusted
websites.
51
2. It is fine
to log-in to a
public
networks/Wi-Fi
52
3. Install and
update an
antivirus
software on
your computer.
53
4. Reply or
click links
from suspicious
e-mail
54
5. Be mindful
of what you
share in the
internet and
what site you
share it to.
55
6. Visit website
that are in your
most interest
without checking
its privacy
polices.
56
7. Buy the
software; do
not use pirated
ones
57
8. Do not talk
to strangers
whether online
or face-to-face
58
Let’s
Check your
groups
scores!
59
The internet is define as the
information superhighway. This
means that anyone has access to
this highway, can place
information and can grab that
Information.
60
The more information you
share online the higher
the risks such as:
61
INTERNET
THREATS
62
INTERNET THREATS
Identity Theft
Phishing
Malware Infection
63
software that is
specifically
designed to disrupt,
damage, or gain
unauthorized access
to a computer
system.
MALWARE
64
It is a malicious
program that usually
transfer from one device
to another with the aid
of the local networks ,
but commonly through
data storage such as
flash drives and hard
drive.
VIRUS
65
This Malware
replicates itself
and can transfer by
any type of
means,but more often
through computer
network.
WORM
66
This malicious program
disguise as a useful
program, however left
your device unprotected
and became vulnerable to
other malwares once you
accessed or download.
TROJAN
67
A malicious program
that monitors the
device, and the
actions of the users
without its
knowledge.
68
Used to record the
keystroke done by
the users. This is
done to steal their
password or any
information.
KEYLOGGERS
69
A program designed
to send you
advertisements
mostly popups
ADWARE
70
TYPES OF MALWARE
VIRUS
WORM
TROJAN
SPYWARE
ADWARE
71
HERE ARE SOME TIPS TO
STAY SAFE AND SECURE IN
USING
ONLINE PLATFORMS
72
73
What are the different
internet threats?
74
• Identity Theft
• Phishing
• Malware Infections
75
What are the 5 types of
malwares?
76
• Virus
• Worm
• Trojan
• Spyware
• Adware
77
This Malware replicates itself
and can transfer by any type
of means, but more often
through computer network.
78
WORM
79
Can you give one example of
malware and its harmful effects
on your computer.
80
1.Why do we have to be
aware on the different
MALWARES or threats in
the internet?
81
Is uploading and
downloading of software in
the internet are safe?
Why?
82
As a student, fun of
online games, what will be
your steps before
uploading a game app to
avoid malwares in your
computer/cellphone?
83
Name at least five malwares you see in the
picture
84
VIRUS
WORM
TROJAN
SPYWARE
ADWARE
85
TEST II. TRUE OR FALSE
Direction: Write True if you agree or False if you
do not agree with the statements below.
______ 1. Read the terms and conditions before accepting it.
______ 2. Only download music or video from a trusted website.
______ 3. You can use a pirated software for personal use only.
______ 4. There is a danger for posting future vacation.
______ 5. Avoid logging in to free WIFI.
86
TEST II. TRUE OR FALSE
Direction: Write True if you agree or False if you
do not agree with the statements below.
TRUE 1. Read the terms and conditions before accepting it.
TRUE 2. Only download music or video from a trusted website.
FALSE 3. You can use a pirated software for personal use only.
TRUE 4. There is a danger for posting future vacation.
TRUE 5. Avoid logging in to free WIFI.
TEST II. Match Column A with Column B.
DIRECTION: Read Column A and Identify the correct answer by choosing
answers in Column B. Write the LETTER of the correct answer at the
space provided before the number.
Answers A B
________1. It is a malicious program that
usually transfer from one device to
another with the aid of the local
networks , but commonly through
data storage such as flash drives
and hard drive.
a. Worm
b. Virus
c. Trojan
d. Hacking
e. Spyware
f. Adware
g. Spam
________2. This malicious program disguise as
a useful program, however left
your device unprotected and
became vulnerable to other
malwares once you accessed or
download.
________3. A program designed to send you
advertisements mostly popups
________4. A malicious program that monitors
the device, and the actions of the
users without its knowledge.
________5. This Malware replicates itself and
can transfer by any type of means,
but more often through computer
network.
88
1.VIRUS
2. TROJAN
3.ADWARE
4.SPYWARE
5.WORM
89
90
91
92
93
94
95
96
97
98
99
100

More Related Content

Similar to EMPOWERMENT LESSON 1-2.pptx

MODULE 1- WEEK 2.pptx
MODULE 1- WEEK 2.pptxMODULE 1- WEEK 2.pptx
MODULE 1- WEEK 2.pptx
FrenzDelaCruz2
 
Information and Communication Technology (ICT) - Empowerment Technologies
Information and Communication Technology (ICT) - Empowerment TechnologiesInformation and Communication Technology (ICT) - Empowerment Technologies
Information and Communication Technology (ICT) - Empowerment Technologies
Mark Jhon Oxillo
 
EMTECH_Module-1.pptx
EMTECH_Module-1.pptxEMTECH_Module-1.pptx
EMTECH_Module-1.pptx
RochellOliver2
 
Lesson 1 2 Edited
Lesson 1 2 EditedLesson 1 2 Edited
Lesson 1 2 Edited
Juvywen
 
etech.pptx
etech.pptxetech.pptx
etech.pptx
LiezlLumapac
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1S
Juvywen
 
ICT-EMPOWERMENT.pptx
ICT-EMPOWERMENT.pptxICT-EMPOWERMENT.pptx
ICT-EMPOWERMENT.pptx
JoyceNolos
 
unit1-181110135541.pptx
unit1-181110135541.pptxunit1-181110135541.pptx
unit1-181110135541.pptx
adrianjaydelara
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1
Jesus Rances
 
Information and Communications Technology.pptx
Information and Communications Technology.pptxInformation and Communications Technology.pptx
Information and Communications Technology.pptx
RupertGarryTorres1
 
Empowerment Module 1.pptx
Empowerment Module 1.pptxEmpowerment Module 1.pptx
Empowerment Module 1.pptx
CristineAuditor
 
empowermenttechnologies-module1-.pptx
empowermenttechnologies-module1-.pptxempowermenttechnologies-module1-.pptx
empowermenttechnologies-module1-.pptx
razielyurag
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptx
sittiepalao
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
christiancalatcat1
 
Introduction to Empowerment Technology.pptx
Introduction to Empowerment Technology.pptxIntroduction to Empowerment Technology.pptx
Introduction to Empowerment Technology.pptx
Jerome Bigael
 
empowerment technology 123.pptx
empowerment technology 123.pptxempowerment technology 123.pptx
empowerment technology 123.pptx
JasonPDelosSantos
 
empowerment technology 123.pptx
empowerment technology 123.pptxempowerment technology 123.pptx
empowerment technology 123.pptx
JasonPDelosSantos
 
LESSON 1 Em Tech.pptx
LESSON 1 Em Tech.pptxLESSON 1 Em Tech.pptx
LESSON 1 Em Tech.pptx
DixsonCaluag2
 
LESSON 3 Em Tech.pptx
LESSON 3 Em Tech.pptxLESSON 3 Em Tech.pptx
LESSON 3 Em Tech.pptx
DixsonCaluag2
 

Similar to EMPOWERMENT LESSON 1-2.pptx (20)

MODULE 1- WEEK 2.pptx
MODULE 1- WEEK 2.pptxMODULE 1- WEEK 2.pptx
MODULE 1- WEEK 2.pptx
 
Information and Communication Technology (ICT) - Empowerment Technologies
Information and Communication Technology (ICT) - Empowerment TechnologiesInformation and Communication Technology (ICT) - Empowerment Technologies
Information and Communication Technology (ICT) - Empowerment Technologies
 
EMTECH_Module-1.pptx
EMTECH_Module-1.pptxEMTECH_Module-1.pptx
EMTECH_Module-1.pptx
 
Lesson 1 2 Edited
Lesson 1 2 EditedLesson 1 2 Edited
Lesson 1 2 Edited
 
etech.pptx
etech.pptxetech.pptx
etech.pptx
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1S
 
ICT-EMPOWERMENT.pptx
ICT-EMPOWERMENT.pptxICT-EMPOWERMENT.pptx
ICT-EMPOWERMENT.pptx
 
unit1-181110135541.pptx
unit1-181110135541.pptxunit1-181110135541.pptx
unit1-181110135541.pptx
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Information and Communications Technology.pptx
Information and Communications Technology.pptxInformation and Communications Technology.pptx
Information and Communications Technology.pptx
 
Empowerment Module 1.pptx
Empowerment Module 1.pptxEmpowerment Module 1.pptx
Empowerment Module 1.pptx
 
empowermenttechnologies-module1-.pptx
empowermenttechnologies-module1-.pptxempowermenttechnologies-module1-.pptx
empowermenttechnologies-module1-.pptx
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptx
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Introduction to Empowerment Technology.pptx
Introduction to Empowerment Technology.pptxIntroduction to Empowerment Technology.pptx
Introduction to Empowerment Technology.pptx
 
empowerment technology 123.pptx
empowerment technology 123.pptxempowerment technology 123.pptx
empowerment technology 123.pptx
 
empowerment technology 123.pptx
empowerment technology 123.pptxempowerment technology 123.pptx
empowerment technology 123.pptx
 
LESSON 1 Em Tech.pptx
LESSON 1 Em Tech.pptxLESSON 1 Em Tech.pptx
LESSON 1 Em Tech.pptx
 
LESSON 3 Em Tech.pptx
LESSON 3 Em Tech.pptxLESSON 3 Em Tech.pptx
LESSON 3 Em Tech.pptx
 

More from Andrew_Braza

Module-5-Language-and-Literacy-Development-of-Children-and-Adolescents.pptx
Module-5-Language-and-Literacy-Development-of-Children-and-Adolescents.pptxModule-5-Language-and-Literacy-Development-of-Children-and-Adolescents.pptx
Module-5-Language-and-Literacy-Development-of-Children-and-Adolescents.pptx
Andrew_Braza
 
Module-1-Nature-and-Principles-of-Develpment.pptx
Module-1-Nature-and-Principles-of-Develpment.pptxModule-1-Nature-and-Principles-of-Develpment.pptx
Module-1-Nature-and-Principles-of-Develpment.pptx
Andrew_Braza
 
G-11 ICT TITLE DEFENSE.pptx
G-11 ICT TITLE DEFENSE.pptxG-11 ICT TITLE DEFENSE.pptx
G-11 ICT TITLE DEFENSE.pptx
Andrew_Braza
 
EXISTENTIALISM.pptx
EXISTENTIALISM.pptxEXISTENTIALISM.pptx
EXISTENTIALISM.pptx
Andrew_Braza
 
Approach-Method-Strategy-Technique.pptx
Approach-Method-Strategy-Technique.pptxApproach-Method-Strategy-Technique.pptx
Approach-Method-Strategy-Technique.pptx
Andrew_Braza
 
Introduction-to-technology-for-teaching-and-learning-kissie.pptx
Introduction-to-technology-for-teaching-and-learning-kissie.pptxIntroduction-to-technology-for-teaching-and-learning-kissie.pptx
Introduction-to-technology-for-teaching-and-learning-kissie.pptx
Andrew_Braza
 
Class Prophecy.pptx
Class Prophecy.pptxClass Prophecy.pptx
Class Prophecy.pptx
Andrew_Braza
 
CMS PRESENTATION.pptx
CMS PRESENTATION.pptxCMS PRESENTATION.pptx
CMS PRESENTATION.pptx
Andrew_Braza
 
PRESENTATION SHINE TLC.pptx
PRESENTATION SHINE TLC.pptxPRESENTATION SHINE TLC.pptx
PRESENTATION SHINE TLC.pptx
Andrew_Braza
 
Computer Assembly.pptx
Computer Assembly.pptxComputer Assembly.pptx
Computer Assembly.pptx
Andrew_Braza
 
web3-architecture-thesis.pptx
web3-architecture-thesis.pptxweb3-architecture-thesis.pptx
web3-architecture-thesis.pptx
Andrew_Braza
 
smart
smartsmart
Gurney · SlidesCarnival.pptx
Gurney · SlidesCarnival.pptxGurney · SlidesCarnival.pptx
Gurney · SlidesCarnival.pptx
Andrew_Braza
 
ARAL PAN 7 CURRICULUM MAP.pdf
ARAL PAN 7 CURRICULUM MAP.pdfARAL PAN 7 CURRICULUM MAP.pdf
ARAL PAN 7 CURRICULUM MAP.pdf
Andrew_Braza
 
Play.pptx
Play.pptxPlay.pptx
Play.pptx
Andrew_Braza
 
GRAMMAR TRANSLATION METHHOD.pptx
GRAMMAR TRANSLATION METHHOD.pptxGRAMMAR TRANSLATION METHHOD.pptx
GRAMMAR TRANSLATION METHHOD.pptx
Andrew_Braza
 
MIL Lesson 3.pptx
MIL Lesson 3.pptxMIL Lesson 3.pptx
MIL Lesson 3.pptx
Andrew_Braza
 
MIL Lesson 2.pptx
MIL Lesson 2.pptxMIL Lesson 2.pptx
MIL Lesson 2.pptx
Andrew_Braza
 
Media Information Literacy (MIL)Lesson 1
Media Information Literacy (MIL)Lesson 1Media Information Literacy (MIL)Lesson 1
Media Information Literacy (MIL)Lesson 1
Andrew_Braza
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.ppt
Andrew_Braza
 

More from Andrew_Braza (20)

Module-5-Language-and-Literacy-Development-of-Children-and-Adolescents.pptx
Module-5-Language-and-Literacy-Development-of-Children-and-Adolescents.pptxModule-5-Language-and-Literacy-Development-of-Children-and-Adolescents.pptx
Module-5-Language-and-Literacy-Development-of-Children-and-Adolescents.pptx
 
Module-1-Nature-and-Principles-of-Develpment.pptx
Module-1-Nature-and-Principles-of-Develpment.pptxModule-1-Nature-and-Principles-of-Develpment.pptx
Module-1-Nature-and-Principles-of-Develpment.pptx
 
G-11 ICT TITLE DEFENSE.pptx
G-11 ICT TITLE DEFENSE.pptxG-11 ICT TITLE DEFENSE.pptx
G-11 ICT TITLE DEFENSE.pptx
 
EXISTENTIALISM.pptx
EXISTENTIALISM.pptxEXISTENTIALISM.pptx
EXISTENTIALISM.pptx
 
Approach-Method-Strategy-Technique.pptx
Approach-Method-Strategy-Technique.pptxApproach-Method-Strategy-Technique.pptx
Approach-Method-Strategy-Technique.pptx
 
Introduction-to-technology-for-teaching-and-learning-kissie.pptx
Introduction-to-technology-for-teaching-and-learning-kissie.pptxIntroduction-to-technology-for-teaching-and-learning-kissie.pptx
Introduction-to-technology-for-teaching-and-learning-kissie.pptx
 
Class Prophecy.pptx
Class Prophecy.pptxClass Prophecy.pptx
Class Prophecy.pptx
 
CMS PRESENTATION.pptx
CMS PRESENTATION.pptxCMS PRESENTATION.pptx
CMS PRESENTATION.pptx
 
PRESENTATION SHINE TLC.pptx
PRESENTATION SHINE TLC.pptxPRESENTATION SHINE TLC.pptx
PRESENTATION SHINE TLC.pptx
 
Computer Assembly.pptx
Computer Assembly.pptxComputer Assembly.pptx
Computer Assembly.pptx
 
web3-architecture-thesis.pptx
web3-architecture-thesis.pptxweb3-architecture-thesis.pptx
web3-architecture-thesis.pptx
 
smart
smartsmart
smart
 
Gurney · SlidesCarnival.pptx
Gurney · SlidesCarnival.pptxGurney · SlidesCarnival.pptx
Gurney · SlidesCarnival.pptx
 
ARAL PAN 7 CURRICULUM MAP.pdf
ARAL PAN 7 CURRICULUM MAP.pdfARAL PAN 7 CURRICULUM MAP.pdf
ARAL PAN 7 CURRICULUM MAP.pdf
 
Play.pptx
Play.pptxPlay.pptx
Play.pptx
 
GRAMMAR TRANSLATION METHHOD.pptx
GRAMMAR TRANSLATION METHHOD.pptxGRAMMAR TRANSLATION METHHOD.pptx
GRAMMAR TRANSLATION METHHOD.pptx
 
MIL Lesson 3.pptx
MIL Lesson 3.pptxMIL Lesson 3.pptx
MIL Lesson 3.pptx
 
MIL Lesson 2.pptx
MIL Lesson 2.pptxMIL Lesson 2.pptx
MIL Lesson 2.pptx
 
Media Information Literacy (MIL)Lesson 1
Media Information Literacy (MIL)Lesson 1Media Information Literacy (MIL)Lesson 1
Media Information Literacy (MIL)Lesson 1
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.ppt
 

Recently uploaded

Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

EMPOWERMENT LESSON 1-2.pptx

  • 3. ICT (INFORMATION AND COMMUNICATION TECHNOLOGY) 3 •ICT deals with the use of different communication technologies such as mobile phones, telephone, Internet, etc. to locate, save, send, and edit information. •Example: when we make a video call, we use internet.
  • 4. 4 ICT IN THE PHILIPPINES •Philippines as the “ICT Hub of Asia”. •huge growth of ICT related jobs around the country, one of which is call center or BPO (Business Process Outsourcing) centers. •According to 2013 edition of Measuring the Information Society by the International
  • 5. 5 ICT IN THE PHILIPPINES Telecommunication Union, there are 106.8 cellphones per 100 Filipinos in the year 2012. In a data gathered by the Annual Survey of Philippines Business and Industries in 2010, the ICT industry shares 19.3% of the total employment population.
  • 6. ICT IN THE PHILIPPINES •Time magazines declared Makati City, Philippines-Rank 1 as the “Selfiest Cities around the world, and Rank 9 is Cebu City. WWW-WORLD WIDE WEB •When WWW was invented, most web pages were static. Static (also known as flat page or stationary page) in the same that the page “as is” and cannot be manipulated by the user. This referred to as Web 1.0.
  • 7. 7 EXAMPLE OF WEB 2.0 • Social Networking sites • Blogs • Wikis • Video sharing sites
  • 8. 8 WEB 2.0 •Web 2.0 allows the user to interact with the page known as DYNAMIC PAGE; instead of just reading a page, the user may be able to comment or create a user account. Dynamic page refers to the web pages that are affected by user input or preference.
  • 9. 9 KEY FEATURES OF WEB 2.0 Folksonomy - allows users to categorize and classify/arrange information using freely chosen keywords (e.g. tagging). Popular social networking sites such as Twitter, Instagram, Facebook, etc. use tags that start with a pound sign (#) or hashtag.
  • 10. 10 KEY FEATURES OF WEB 2.0 Rich User Interface - content is dynamic and is responsive to user's input. An example would be a website that shows local content. In the case of social networking sites, when logged on, your account is used to modify what you see in their website.
  • 11. 11 KEY FEATURES OF WEB 2.0 •User Participation– the owner of website is not the only one who is able to put content. Others are able to place a content on their own by means of comments, reviews, and evaluation.
  • 12. 12 •Long Tail – services are offered on demand rather than on a one-time purchase. This is synonymous to subscribing to a data plan that charges you for the amount of time you spent on Internet or a data plan that charges you for the amount of bandwidth you used. KEY FEATURES OF WEB 2.0
  • 13. 13 WEB 3.0 AND THE SEMANTIC WEB •Semantic Web– is a movement led by the World Wide Web Consortium(W3C). The semantic web provides a framework that allows data to be shared and reuse to deliver web content specifically targeting the user.
  • 14. 14 WEB 3.0 IS YET TO BE FULLY REALIZED BECAUSE OF SEVERAL PROBLEMS: •Compatibility-HTML files and current web browsers could not support Web 3.0. •Security – The user’s security is also question since the machine is saving his or her preferences. •Vastness-The World Wide Web already contains billions of web pages.
  • 15. 15 Vagueness – Certain words are imprecise. The words “old” and “small” would depend to the user. Logic - since machine use logic, there are certain limitations for a computer to be able to predict what the user is referring to at a given time. WEB 3.0 IS YET TO BE FULLY REALIZED BECAUSE OF SEVERAL PROBLEMS:
  • 16. 16 TRENDS IN ICT 1. Convergence – is the synergy of technological advancements to work on a similar goal or task. For example, besides using your personal computer to create word documents, you can now use your smartphone. 2. Social Media - is a website, application, or online channel that enables web users to create, co-create, discuss, modify, and exchange user generated content.
  • 17. 17 SIX TYPES OF SOCIAL MEDIA 1.) Social Networks – These are sites that allows you to connect with other people with the same interests or background. Once the user creates his/her account, he/she can set up a profile, add people, share content, etc. Example : Facebook and Google+
  • 18. 18
  • 19. 19 2.) Bookmarking Sites– These are sites that allow you to store and manage links to various website and resources. Most of these sites allow you to create a tag allows you to and others easily share them. Ex. : StumbleUpon/Pinterest SIX TYPES OF SOCIAL MEDIA
  • 20. 20
  • 21. 21 SIX TYPES OF SOCIAL MEDIA 3.) Social News - These are sites that allow users to post their own news intems or links to other new sources. The users can also comment on the post and comments may also be rank. Example: reddit and Digg
  • 22. 22
  • 23. 23 SIX TYPES OF SOCIAL MEDIA 4.)Media Sharing – These are sites that allow you to upload and share media content like images, music and video. Example: Flickr, YouTube and Instagram.
  • 24. 24
  • 25. 25 SIX TYPES OF SOCIAL MEDIA 5.) Microblogging– These are sites that focus on short updates from the user. Those that subscribed to the user will be able to receive these updates. Example: Twitter
  • 26. 26
  • 27. 27 SIX TYPES OF SOCIAL MEDIA 6.) Blogs and Forums– These websites allow user to post their content. Other users are able to comment on the said topic. Example: Blogger, WordPress and Tumblr
  • 28. 28 TRENDS IN ICT 3. Mobile Technologies – The popularities of smartphones and tablets has taken a major rise over the years. This is largely because of the devices capability to do the tasks that were originally found in PCs. Several of these devices are Caple of using high-speed internet. Today the latest model devices use 4G Networking(LTE), which is currently the fastest mobile network.
  • 29. 29 MOBILE OS IOS – use in apple devices such as iPhone and iPad. Android - an open source OS developed by google. Being open source means mobile phone companies use this OS for free. Blackberry OS – use in Blackberry devices. Windows Phone OS – a closed source and proprietary operating system developed by Microsoft.
  • 30. 30 Symbian – the original smartphone OS; used by Nokia devices. WebOS – originally used in smartphones; now smart TV’s. used in Windows Mobile – developed by Microsoft for smartphones and pocket PCs. MOBILE OS
  • 31. 31 TRENDS IN ICT 4. Assistive Media - is a non-profit service designed to help people who have visual and reading impairments. a database of audio recordings is used to read to the user.
  • 32. 32 KEY TERMS •Web 1.0 – static websites without interactivity. •Web 2.0 – websites that contain dynamic content. •Web 3.0 – a concept of the World Wide Web that is designed to cater to the individual user. •Static – refers to the web that are the same regardless of the user.
  • 33. 33 KEY TERMS •Dynamic – refers to the that are affected by user input or preference. •Folksonomy – allows user to categorize and classify/arrange information. •Hashtag # – used to “categorize” posts in a website. •Convergence – the synergy of technological advancements to work a similar goal or task.
  • 34. 34 •Social Media – websites, applications or online channels that enable users to co- create, discuss, modify, and exchange user- generated content. KEY TERMS
  • 36. 36 INSTRUCTION: WRITE (T) IF THE STATEMENT IS TRUE, WRITE (F) IF THE STATEMENT IS FALSE 1.) Web 2.0 is classified as dynamic webpage. 2.) People Magazine conducted the research on “The Selfiest Cities in the World”. 3.) Web 2.0 introduced static web pages that allow users to interact with the web page. 4.) Folksonomy allows user to categorize and locate information. 5.) Technological convergence is the synergy of technological advancement to work on a similar goal or task. 6.) According to Nielsen, users who use the Internet spend more time in social media sites than in any other type of site.
  • 37. 37 7.) Blogging sites are sites that focus on short updates from the user. 8.) Android is a mobile operating system for Apple devices. 9.) Assistive media is a nonprofit service designed to help people who have visual and reading impairments. 10.) ICT deals with the use of diff. comm. Tech. to locate, send, save & edit info. 11.) Semantic web means that the page is stationary or flat page. INSTRUCTION: WRITE (T) IF THE STATEMENT IS TRUE, WRITE (F) IF THE STATEMENT IS FALSE
  • 38. 38 Write SO if the item is for Social Networks, BS for bookmarking, MS for Media sharing, SN for Social News, MB for Micro-Blogging and BF for Blogs and Forums. 1. Facebook 6. Google+ 11. WordPress 2. Plurk 7. Instagram 12. Digg 3. Twitter 8. Pinterest 13. YouTube 4. Tumblr 9. Blogger 14. Flicker 5. Reddit 10.StumbleUpon
  • 40. 4 1. T 2. F 3. F 4. T 5. T 6. T 7. F 8. F 9. T 10. T 11. F PART I
  • 41. 41 1. SO 8. BS 2. MI 9. BF 3. MB 1O. BS 4. BF 11. BF 5. SN 12. SN 6. SO 13. MS 7. SO 14. MS PART II
  • 43. 43 Online Safety, Security, Ethics, and Etiquette
  • 44. 44
  • 45. 45 This picture shows the speed at which The Internet is changing the world. The sites we visit are so overwhelmingly popular to both adults and children.
  • 46. 46 The online world is increasingly integrated into our daily lives. The internet like the physical world, maybe safe or unsafe depending on our habits.
  • 47. 47 Sometimes, we do not pay much attention about the information that we share.
  • 49. 49 Being safe and secured online depends on how we protect ourselves. Analyze the following statements Guess the correct answer by giving a thumbs-up if You agree and thumbs –down if not.
  • 51. 51 2. It is fine to log-in to a public networks/Wi-Fi
  • 52. 52 3. Install and update an antivirus software on your computer.
  • 53. 53 4. Reply or click links from suspicious e-mail
  • 54. 54 5. Be mindful of what you share in the internet and what site you share it to.
  • 55. 55 6. Visit website that are in your most interest without checking its privacy polices.
  • 56. 56 7. Buy the software; do not use pirated ones
  • 57. 57 8. Do not talk to strangers whether online or face-to-face
  • 59. 59 The internet is define as the information superhighway. This means that anyone has access to this highway, can place information and can grab that Information.
  • 60. 60 The more information you share online the higher the risks such as:
  • 63. 63 software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. MALWARE
  • 64. 64 It is a malicious program that usually transfer from one device to another with the aid of the local networks , but commonly through data storage such as flash drives and hard drive. VIRUS
  • 65. 65 This Malware replicates itself and can transfer by any type of means,but more often through computer network. WORM
  • 66. 66 This malicious program disguise as a useful program, however left your device unprotected and became vulnerable to other malwares once you accessed or download. TROJAN
  • 67. 67 A malicious program that monitors the device, and the actions of the users without its knowledge.
  • 68. 68 Used to record the keystroke done by the users. This is done to steal their password or any information. KEYLOGGERS
  • 69. 69 A program designed to send you advertisements mostly popups ADWARE
  • 71. 71 HERE ARE SOME TIPS TO STAY SAFE AND SECURE IN USING ONLINE PLATFORMS
  • 72. 72
  • 73. 73 What are the different internet threats?
  • 74. 74 • Identity Theft • Phishing • Malware Infections
  • 75. 75 What are the 5 types of malwares?
  • 76. 76 • Virus • Worm • Trojan • Spyware • Adware
  • 77. 77 This Malware replicates itself and can transfer by any type of means, but more often through computer network.
  • 79. 79 Can you give one example of malware and its harmful effects on your computer.
  • 80. 80 1.Why do we have to be aware on the different MALWARES or threats in the internet?
  • 81. 81 Is uploading and downloading of software in the internet are safe? Why?
  • 82. 82 As a student, fun of online games, what will be your steps before uploading a game app to avoid malwares in your computer/cellphone?
  • 83. 83 Name at least five malwares you see in the picture
  • 85. 85 TEST II. TRUE OR FALSE Direction: Write True if you agree or False if you do not agree with the statements below. ______ 1. Read the terms and conditions before accepting it. ______ 2. Only download music or video from a trusted website. ______ 3. You can use a pirated software for personal use only. ______ 4. There is a danger for posting future vacation. ______ 5. Avoid logging in to free WIFI.
  • 86. 86 TEST II. TRUE OR FALSE Direction: Write True if you agree or False if you do not agree with the statements below. TRUE 1. Read the terms and conditions before accepting it. TRUE 2. Only download music or video from a trusted website. FALSE 3. You can use a pirated software for personal use only. TRUE 4. There is a danger for posting future vacation. TRUE 5. Avoid logging in to free WIFI.
  • 87. TEST II. Match Column A with Column B. DIRECTION: Read Column A and Identify the correct answer by choosing answers in Column B. Write the LETTER of the correct answer at the space provided before the number. Answers A B ________1. It is a malicious program that usually transfer from one device to another with the aid of the local networks , but commonly through data storage such as flash drives and hard drive. a. Worm b. Virus c. Trojan d. Hacking e. Spyware f. Adware g. Spam ________2. This malicious program disguise as a useful program, however left your device unprotected and became vulnerable to other malwares once you accessed or download. ________3. A program designed to send you advertisements mostly popups ________4. A malicious program that monitors the device, and the actions of the users without its knowledge. ________5. This Malware replicates itself and can transfer by any type of means, but more often through computer network.
  • 89. 89
  • 90. 90
  • 91. 91
  • 92. 92
  • 93. 93
  • 94. 94
  • 95. 95
  • 96. 96
  • 97. 97
  • 98. 98
  • 99. 99
  • 100. 100