E-TECH
INFORMATION AND Browser wars
COMMUNICATION A browser war is competition for
dominance in the usage share of web
TECHNOLOGY
browsers.
- Deals with the use of
different technological
TYPES OF WEB PAGES
inventions
Web 1.0
- Hardware
• The web
- Software
• First stage of the www
evolution
ICT in the Philippines
• Flat/stationary page
• ICT Hub of Asia
• Cannot be manipulated by
• Huge growth of ict-related
user
jobs
Web 2.0
• Call centers
• The social web
• Tech companies
• Allows users to interact with
the page
Internet
• User may be able to
• Global system of
comment or create a user
interconnected networks
account
• INTERconnected NETworks
• Most websites we visit today
• INTERNET
Web 3.0
• Internet protocol suite
• Semantic web
• Provides a framework that
World Wide Web
allows data to be shared and
• Information system on the
reuse to deliver web content
internet that allows
• Machine learning
documents to be connected
• Search engine learns what
to other documents by
you want and likes
hypertext links
• Personalized ads
• Invented by Tim-Berners Lee
Web browsers
E-TECH
ONLINE PLATFORMS • Used for storing, naming,
sorting and handling of
AND SITES computer files
• Allows you to convert and
Types of Online Platforms manage files without
Presentation or visualization platform download in the software
• Allows you to present and tool
share presentations, Mapping platform
infographics, and videos with • Transformation taking the
other people points of on space into the
• Used to communicate points of the same or
information clearly and another space
efficiently • Uses GPS to detect location
and used for navigation
Social media platform
• Computer mediated tools
that allow large group of
people to create, share or
exchange information
• Information shared can be in
Cloud computing platform the form of ideas, pictures,
• The cloud videos or anything that you
• Using a network of remote want to create and share to
servers hosted on the virtual communities
internet
• Instead of using your Types of social media platform
computer’s hard drive, you Social networks
store and access your data Allow you to connect with other
and programs over the people with the same interests or
internet background
Bookmarking sites
Sites that allow you to store and
manage links to various websites and
resources
Social news
File Management platform
E-TECH
Sites that allow users to post their
own news items or links to other news 1. Never give any personal info
sources about yourself over the
Media sharing internet
• Sites that allow you to upload 2. Do not give banking or
and share media content like sensitive info unless you are
images, music, and video. sure that it is a reputable
• Can be specific for video business having a secure
sharing, photo sharing, slide service
sharing, social bookmarking 3. Never open messages or
and gaming attachments from someone
Microblogging you do not know
• Focus on short updates from 4. Regularly review your
the user privacy settings in your
• Those subscribed to the user online accounts
will be able to receive these 5. Delete your browsing data
updates before leaving when using
• Posts are brief that range public computers
typically from 140-200 6. Keep your software updated
characters to avoid security holes
Blogs and forums 7. Do not download or install
• Websites that allow users to software or anything on your
post their content computer/cp that is
• Other users can comment on unknown to you
the said topic
Core Rules of Netiquette
ONLINE SAFETY, 1. Remember the Human
• For this, remember, it is
SECURITY AND important to remember the
NETIQUETTE human. You should never say
something to someone
Netiquette is short for "Internet online that you would not say
etiquette." Just like etiquette is a code to him or her in person.
of polite behavior in society, • It is also useful to remember
netiquette is a code of good behavior that online interactions are
on the Internet. nearly always recorded and
backed up. If you act
inappropriately, these
Online Safety Measures
E-TECH
recordings will serve as you up online. Make sure you
evidence against you. set a good impression.
2. Be ethical 6. Share expert knowledge
• In life, people generally 7. Keep disagreement healthy
follow the law. It can
however be easy to let your
ethics slip when online. Illegal
streaming of movies, illegal
downloading of music and
copyright infringement is still 8. Respect other people’s privacy
breaking the law.
3. Know where you are
• Netiquette varies from 9. Don’t abuse your power
website to website. What is 10. Be forgiving to others
acceptable in one
environment is not Flame war
acceptable in another. For Series of flame posts or messages in a
example, the way you behave thread that are considered derogatory
on university websites and in nature or are completely off-topic
discussion forums will be
very different to how you Often these flames are posted for the
behave on a social network sole purpose of offending or upsetting
like Facebook. other users
4. Respect other people’s time
and data limits Flame becomes a flame war when
• When you post anything other users respond to the thread
online, write an email or with their own flame message
share a post it will take other
people's time to read. Shea Online Threats
(2011) argues "it's your Deemed any malicious act that
responsibility to ensure that attempts to gain access to a computer
the time they spend reading network without authorization or
your posting isn't wasted". permission from the owners
5. Make yourself look good online
• Make sure you are careful Usually done by computer hackers
with what you share. It is who uses the World Wide Web to
always advisable not to share facilitate cybercrime
anything embarrassing, illegal
or inappropriate. People you
have not even met may look
E-TECH
• Refers to the use of internet
Types of Online Threats services or software to
Phishing defraud or take advantage of
• Happens when an email is victims for financial gain
sent from an internet
criminal disguised as an email
from a legitimate,
trustworthy source
• The message is meant to lure
you into revealing sensitive
or confidential information
Pharming
• Happens when a hacker or
“pharmer” directs an internet
user to a fake website
instead of a legitimate one
• These spoofed sites can
capture a victim’s
confidential information,
including usernames,
password, and credit card Internet robots
data • Also known as spiders,
• It can install malware on their crawlers and web bots
computer, pharmers usually • Software that is programmed
focus on websites in the to do certain tasks
financial sector, including • Automated, which means
banks, online payment or e- they run according to their
commerce destinations instructions without a human
user
• Some bots are useful, such as
search engine bots that index
content for search or
customer service bots that
help users
Malware
Internet scam
E-TECH
• Malicious software is any and/or encrypts your files,
program or file that is then forces you to pay
harmful to a computer user ransom to get them back
Types of malware
Adware
• Advertising supported
software
• Unwanted software designed
to throw advertisements up
on your screen
• Pop-up ads, banner ads
Spyware
• Malware that secretly
observes the computer user’s
activities without permission
and reports it to the
software’s author
• Keylogger- Tools/software
that record what a person
types on a device
Virus and worms
• Attach to another program Spams
• Replicates itself by modifying • Unsolicited emails, instant
other programs and infecting messages, coming from
them recipients that are not
granted verifiable permission
Trojan/trojan horse for the message to be sent
• One of the most dangerous • Can be damaging if you open
malware types or respond to it
• Represents as something Cyberstalking
useful to trick you • The use of internet or other
• Can gain unauthorized access electronic device to harass or
to computers stalk individuals or
organizations
Cyberbullying
Ransomware • The use of internet or other
• A form of malware that locks electronic device to harass or
you out of your device
E-TECH
stalk individuals or
organizations
Spoofing
• Happens when someone or
something pretends to be
something else to gain our
confidence, get access to our
systems, steal data, steal
money, or spread malware
EFFECTIVE INTERNET
RESEARCH
Search engines
-are websites used for retrieval of
data, files or documents from
databases.
Some popular engines
Anatomy of a URL
E-TECH
- finding documents
- searching site
Boolean logic – narrows, broadens, or
eliminates search term
a. Boolean “or” – this operator
will find pages that include
either of the search terms
Ex. A or B
A URL is one type of Uniform
Resource Identifier (URI) b. Boolean “and”- this operator
It is a generic term for all types of will retrieve only pages
names and addresses that refer to containing both terms
objects on the WWW
Ex. A and B
Knowing the URL endings will give you
clues to who is sponsoring the website
and help evacuate the sources
Popular Domains
c. Boolean “not” – this
operator will find pages that
do not include search term
immediately following it
Search skills and tools
Phase searching – used to search for
- Boolean logic
famous quotes, proper names,
- phase searching
recommendations etc.
- plus (+)
It encloses the phrase in quotation
- minus (-)
marks
- ampersand (@)
Example:
- hashtag (#)
E-TECH
“Jane Doe” Searching site – sites find webpage
“To be or not to be” from website
Plus (+) – indicates that the word after Example:
the sign is a required word must be technology definition on Wikipedia
found in search
Example: Example:
Technology +torrent technology site:Wikipedia.com
*Take note there should be space
between terms The web provides access to some
excellent information and can also
Minus (-) – indicates to exclude a give access to those that are irrelevant
word from your search that is not and outdated
required on result
Example: • Authority
Technology -hacking • Purpose
• Coverage
Ampersand (@) – used to find social • Currency
tags • Objectivity
Example: • Accuracy
@SteveJobs
Authority
Hashtag (#) – used to find popular • It reveals that the person,
hashtags institution, or agency
Example: responsible for a site has the
#LawOfClassroom qualifications and knowledge
to do so
Finding documents – using the • authorship – it should be
filetype refines the search for clear who developed the site
documents on the web • Contact information should
Example: be clearly provided
filetype:pdf • Email address, snail mail
filetype:doc address, phone number and
filetype:xls fax number
• Credentials – the author
Example: should state qualifications,
ICT Philippines pdf credentials, personal
backgrounds that gives them
E-TECH
authority to present Currency
information • It refers to how current the
• Check to see if the site information presented is
supported by an organization • It refers to how often the site
or a commercial body is updated or maintained
Purpose • It is important to know when
• The purpose of the a site was created, when it
information presented on the was last updated, and if all of
site should be clear the links are current
• Some sites are meant to • First written
inform, persuade, state an • Placed on the web
opinion, entertain, or parody • Last revised
something or someone
• Does the content support the
purpose of the site?
• Is the information geared to a Objectivity
specific audience? • Objective sites present
• Is the site organized and information with a minimum
focused? of bias
• Are the outside links • Is the information presented
appropriate for the site? with a particular bias?
• Does the site evaluate the • Does the information try to
links? sway the audience?
Coverage • Does site advertising conflict
• This refer to how with the content?
comprehensive the website is • Is the site trying to explain,
in their discussion of certain inform, persuade, or sell
topics something?
• Does the site claim to be Accuracy
selective or comprehensive? • It refers to the credibility of
• Are the topics explored in the website
depth? • Reliability – is the author
• Compare the value of the affiliated with a known,
site’s information compared respectable institution?
to other similar sites • References: do statistics and
• Do the links go to outside other factual information
sites rather than its own? receive proper references as
• Does the site provide to their origin?
information with no relevant
outside links?
E-TECH
• Is the information
comparable to other sites on
the same topic?
• Does the text follow basic
rules of grammar, spelling
and composition?
• Is a bibliography or reference
list included?