Empowerment Technology11

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

ICT Disadvantages of Static Websites

Information and Communication Technology •Might have higher maintenance costs if the
content changes often.
What is Information and Communication
Technology or ICT? •No user registrations, or advanced functionality
usually connected with dynamic sites.
--It deals with the use of different communication
technologies such as mobile phones, Internet and •Dependent on a developer to make changes,
etc. to locate, save, send, and edit information. which can be a problem during public holidays, or
on short notice, whereas with a dynamic site you
--Having a unified way to communicate is one of can make changes to the content any time.
the goals of ICT. We spend less because of ICT.
Some Examples of Static Websites
World Wide Web
•www.9boninnes.co.za
--The World Wide Web, commonly referred to as
WWW, W3, or simply the Web is an •www.quayside906.co.za
interconnected system of public webpages •www.fibercom.co.za
accessible through the Internet. It was invented
Sir Tim Berners-Lee in 1989. •www.blouberg-holiday.co.za
--Web pages are what make up the world wide •www.strongroom.co.za
web and it can either be static or dynamic.
Web 2.0
Web 1.0
--term used to describe the present generation of
--Web pages are static and not interactive. You the World Wide Web that concentrates on its
can't post comments or create an account. capability of providing people the m eans to
collaborate and share information online.
Advantages of Static Websites
+The second stage in World Wide Web
•Lower once-off cost
+Dynamic Website
•Faster loading than dynamic sites
-The content of the website changes
•Cheaper hosting required than dynamic sites, as
they usually use less bandwidth and server +Interactive
resources than dynamic sites.
-The user may be able to comment or create
•Developer independent. Dynamic sites are user account.
usually built in a specific way, with a specific
framework, and thus requires a developer with a +Enables an increased user participation in the
specific skill set to manage. web.
Features of Web 2.0 Web 3.0

Folksonomy - It allows users to categorize and -Also called as Semantic Web


classify/arrange information using freely chosen
keywords (e.g., tagging). Popular social -Semantics - ability of Web technologies to
networking sites such as Twitter, Instagram, understand and interpret human-generated
Facebook, etc. use tags that start with the pound content
sign (#). This is also referred to as hashtag.
-The aim of Web 3.0 is to have machines
Rich User Experience - Content is dynamic and is understand the user's preferences to be able to
responsive to user's input. An example would be deliver web content specifically targeting the user.
a website that shows local content. In the case of
-The Internet is able to predict the best possible
social networking sites, when logged on, your
answers to your question by "learning from your
account is used to modify what you see in their
previous choices
website.
Example:
User Participation - The owner of the website is
not the only one who is able to put content. Apple's Siri
Others are able to place a content of their own by
means of comment, reviews, and evaluation. Trends in ICT
Some websites allow reader s to comment on an
article, participate in a poll, or review a specific As the world of ICT continues to grow, the
pro duct (e.g., Amazon.com, online stores). industry h as focused on several innovations.
These innovations cater to the needs of the
Software as a Service - Users will subscribe to a people that benefit most out of ICT. Whether it is
software only when needed rather than for business or personal use, the se trends are
purchasing them. This is a cheaper option if you current front runners in the innovation of ICT.
do not always need to use a software. For
instance, Google Docs is a free w eb-based 1. Convergence
application that allows the user to create and edit
Technological convergence is the combination of
word proces sing and spreadsheet documents
two or more different entities of technologies to
online. When you need a software, like a Word
create a new single device.
Processor, you can purchase it for a one-time
huge amount and install it in your computer and Example: Using of smartphone to create word
it is yours forever. Software as a service allows documents that was previously can only be
you to "rent" a software for a minimal fee. created using desktop computer.
Mass Participation - It is a diverse information 2. Social Media
sharing through universal web access. Since most
users can use the Internet, We 2.0's content is It is a website, application, or online channel that
based on people from various cultures. enables web users to create, co-create, modify,
and exchange user-generated content.
Types of Social Media 4. Mobile Technologies

1. Social Networks - sites that allow you to The popularity of smartphones and tablets has
connect with other people with same interests or taken a major rise over the years. This is largely
background. because of the devices' capability to do tasks that
were originally found in personal computers.
Examples: Facebook, Google+
Different types of mobile operating systems:
2. Bookmarking Sites - sites that allow users you
to store and manage links to various websites 1. iOS - used in Apple devices such as the iPhone
and resources, and to tag. and iPad

Examples: StumbleUpon, Pinterest 2. Android - an open source operating system


developed by Google. Being open source means
3. Social News - sites that allow users to post several mobile phone companies use this OS for
their own news items or links to other news free.
sources.
3. Blackberry OS - used in blackberry devices
Examples: reddit, dig
4. Windows Phone OS - a closed source and
4. Media Sharing - sites that allow you to upload proprietary operating system developed by
and share media content like images, music, and Microsoft.
video.
5. Symbian - the original smartphone OS used by
Examples: Flickr, YouTube, and Instagram Nokia devices
5. Microblogging - sites that focus on short 6. WebOS - originally used for smartphones; now
updates from the user. Those who are subscribed used for smartTVs.
will receive updates.
7. Windows Mobile - developed by Microsoft for
Examples: Twitter smartphones and pocket PCs.
6. Blogs and Forums - sites that allow users to
post their content.

Examples: Blogger, WordPress, Tumblr

Trends in ICT
3. Assistive Media

It is a nonprofit service designed to help people


who have visual and reading impairments. A
database of audio recordings is used to read to
the user. You may visit http://assistivemedia.
/assistivemedia.org/ for several of t heir audio
recordings.
Empowerment Technologies 7. Who your siblings - This is a huge risk,
especially if you have younger siblings. Stranger
Quarter 3-Module 2 may pretend or use their identity to dupe you.

Online Safety, Security, Ethics, and Etiquette 8. Address - Hopefully you answered no to this
one. Giving your address is a whole other level. It
Online Safety, Security and Netiquette would be much easier for a criminals to find you.

--In these times, more and more people are 9. Birthday - Having this it in your profile makes
already engaged in the use of technology. These you vulnerable to identity theft.
people who are raised in a digital, media
saturated world are called digital natives. To avoid these online crimes, follow the online
safety measures;
WHAT IS IT
•Never give any personal information about
-Online safety refers to the practices and yourself over the internet.
precautions that should be observed.
•Do not give any banking sensitive information
Type of Information and its Risks: unless are sure that it is a reputable business
having secure.
1. First Name - Chances are, hacker already
knows plenty of stuff about. •Regularly review your privacy settings in your
online accounts to e sure you are not sharing
2. Last Name - If sharing your first name is a small important personal information.
risk, having both your first and last is a more risky.
You will be vulnerable to being searched for using •Do not download or install software or anything
search engines, which include image search. on your computer or cell phone that is unknown
to you.
3. Middle Name - Sharing your just middle name
is probably not the most risky of these shared Here are some ways you can check if a website is
information, but sharing your entire full name trustworthy.
would be.
Reliable websites:
4. School - Most people who steal identities study
their subject. They can use this information for -Usually end in .edu or.gov
verification purposes.
-Don't have errors
5. Cellphone Number - Your cellphone number
-Are up to date
should never be posted over the internet. The
internet is a public place. It is the same as posting -Use facts
your number on a billboard.
-Use experts
6. Name of your Mother and Father - Risky,
especially your Mother's maiden name. In fact, if Unreliable websites:
you have already encountered many website that
require your mother's maiden name as an answer -Might end in .com.
to a secret question whenever you lose your
-Have errors
password.
-Are outdated

-Use opinions and unreliable sources


NETIQUETTE

-a combination of the words network and


etiquette. It is a set of rules for behaving properly
online.

10 rules of netiquette

The Core Rules of Netiquette

Rule 1: Remember the Human.

Rule 2: Adhere to the same standards of behavior


online that you follow in real life.

Rule 3: Know where you are in cyberspace.

Rule 4: Respect other people's time and


bandwidth.

Rule 5: Make yourself look good online.

Rule 6: Share expert knowledge.

Rule 7: Help keep flame wars under control.

Rule 8: Respect other people's privacy.

Rule 9: Don't abuse your power.

Rule 10: Be forgiving of other people's mistakes.


Assessment ___7. I have experience using online or mobile
social media (ex. Facebook, Twitter)
True or False.
___8. I have experience viewing videos online
Write T if the statement is correct, otherwise (YouTube)
write F.
___9. I have experience filling out forms and
___1. Web pages that are the same regardless of taking quizzes online.
the user are referred to static.
___10. I have experiences using cloud-based
___2. Blogging sites are sites that focus on short programs such as Google Drive or Google Docs.
updates.
___11. I have experience searching online for
___3. Android is a mobile operating system for academic resources (ex. Google Scholar)
Apple devices.
___12. I have experience with video conferencing
___4. Folksonomy deals with information tagging. (ex. Skype).
___5. ICT deals with the use of different ACTIVITY
technologies to work on a similar goal or task.
Share an experience that you have always tend to
Direction: Read and reflect in each item carefully. do but later did you discover that it is not a
State whether you agree or disagree to each of standard of ONLINE SAFETY, SECURITY, ETHICS
the statements by drawing a happy face ( ) if AND ETIQUETTE.
you agree and a sad face( ) if otherwise. There
are no right or wrong answers for this activity.
Write your answers on your notebook.

___1. I have reliable access to a computer, mobile


phone, tablet, or any gadget that can act as
substitute to computers.

___2. I have access to a high-speed internet


connection with video streaming capabilities.

___3. I have experience using email: I can create,


send, forward, reply to, and save email messages
and attachments.

___4. I have experience in word processing: I can


create, edit, save, and navigate documents using
software program such as Microsoft Word or
Pages for Mac.

___5. I have experience in creating slide


presentations: I can use programs such as
Microsoft PowerPoint or Keynote for Mac.

___6. I know how to search the web using


Internet browsers such as Firefox or Google
Chrome.

You might also like