Empowerment Technology11
Empowerment Technology11
Empowerment Technology11
Information and Communication Technology •Might have higher maintenance costs if the
content changes often.
What is Information and Communication
Technology or ICT? •No user registrations, or advanced functionality
usually connected with dynamic sites.
--It deals with the use of different communication
technologies such as mobile phones, Internet and •Dependent on a developer to make changes,
etc. to locate, save, send, and edit information. which can be a problem during public holidays, or
on short notice, whereas with a dynamic site you
--Having a unified way to communicate is one of can make changes to the content any time.
the goals of ICT. We spend less because of ICT.
Some Examples of Static Websites
World Wide Web
•www.9boninnes.co.za
--The World Wide Web, commonly referred to as
WWW, W3, or simply the Web is an •www.quayside906.co.za
interconnected system of public webpages •www.fibercom.co.za
accessible through the Internet. It was invented
Sir Tim Berners-Lee in 1989. •www.blouberg-holiday.co.za
--Web pages are what make up the world wide •www.strongroom.co.za
web and it can either be static or dynamic.
Web 2.0
Web 1.0
--term used to describe the present generation of
--Web pages are static and not interactive. You the World Wide Web that concentrates on its
can't post comments or create an account. capability of providing people the m eans to
collaborate and share information online.
Advantages of Static Websites
+The second stage in World Wide Web
•Lower once-off cost
+Dynamic Website
•Faster loading than dynamic sites
-The content of the website changes
•Cheaper hosting required than dynamic sites, as
they usually use less bandwidth and server +Interactive
resources than dynamic sites.
-The user may be able to comment or create
•Developer independent. Dynamic sites are user account.
usually built in a specific way, with a specific
framework, and thus requires a developer with a +Enables an increased user participation in the
specific skill set to manage. web.
Features of Web 2.0 Web 3.0
1. Social Networks - sites that allow you to The popularity of smartphones and tablets has
connect with other people with same interests or taken a major rise over the years. This is largely
background. because of the devices' capability to do tasks that
were originally found in personal computers.
Examples: Facebook, Google+
Different types of mobile operating systems:
2. Bookmarking Sites - sites that allow users you
to store and manage links to various websites 1. iOS - used in Apple devices such as the iPhone
and resources, and to tag. and iPad
Trends in ICT
3. Assistive Media
Online Safety, Security, Ethics, and Etiquette 8. Address - Hopefully you answered no to this
one. Giving your address is a whole other level. It
Online Safety, Security and Netiquette would be much easier for a criminals to find you.
--In these times, more and more people are 9. Birthday - Having this it in your profile makes
already engaged in the use of technology. These you vulnerable to identity theft.
people who are raised in a digital, media
saturated world are called digital natives. To avoid these online crimes, follow the online
safety measures;
WHAT IS IT
•Never give any personal information about
-Online safety refers to the practices and yourself over the internet.
precautions that should be observed.
•Do not give any banking sensitive information
Type of Information and its Risks: unless are sure that it is a reputable business
having secure.
1. First Name - Chances are, hacker already
knows plenty of stuff about. •Regularly review your privacy settings in your
online accounts to e sure you are not sharing
2. Last Name - If sharing your first name is a small important personal information.
risk, having both your first and last is a more risky.
You will be vulnerable to being searched for using •Do not download or install software or anything
search engines, which include image search. on your computer or cell phone that is unknown
to you.
3. Middle Name - Sharing your just middle name
is probably not the most risky of these shared Here are some ways you can check if a website is
information, but sharing your entire full name trustworthy.
would be.
Reliable websites:
4. School - Most people who steal identities study
their subject. They can use this information for -Usually end in .edu or.gov
verification purposes.
-Don't have errors
5. Cellphone Number - Your cellphone number
-Are up to date
should never be posted over the internet. The
internet is a public place. It is the same as posting -Use facts
your number on a billboard.
-Use experts
6. Name of your Mother and Father - Risky,
especially your Mother's maiden name. In fact, if Unreliable websites:
you have already encountered many website that
require your mother's maiden name as an answer -Might end in .com.
to a secret question whenever you lose your
-Have errors
password.
-Are outdated
10 rules of netiquette