Empowerment Technologies (E-Tech) (Unit 1 to 2)
A.Y. 2023 – 2024
Unit 1
Empowerment Technologies or E-Tech – often deals with the use of different technologies that can able to locate,
save, communicate, and to inform. (e.g. Mobile phones, Telephone, Computer, etc.)
The importance of E-Tech:
To make lives easier. It makes our individual lives easier in different aspects such as for school matters,
office or work matters and for our individual matters.
Modernization plans. It can strengthen plans to be competitive with other countries.
INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT)
Refers to all electronic and communication technologies that enable the management and distribution of
information.
The acquisition, analysis, manipulation, storage and distribution of information; and the design and provision
of equipment and software.
ICT defined as basic information-handling tools, a varied set of goods, applications, and services that are
used to produce, store, process, distribute, and exchange information.
Components of ICT
People – People refer to individuals who are responsible for the development improvement, and maintenance
of an ICT system. People are also responsible for the input and supply of data to the system and
make decisions from the input information from the system.
Procedures – Procedures are actions performed in a certain order and condition to make sure an ICT system
runs smoothly. This also includes the exchange of data or information between different people
or systems.
Hardware – Hardware is the technical term used to describe physical or tangible parts of an ICT system. If
you can touch it, then it is considered hardware.
Software – Software is the generic term for programs and applications installed on your personal computer,
laptop, or smartphone. It is an ICT component that is responsible for providing sets of instructions
that the computer has to follow to accomplish a specific task.
Data – Data are the raw facts or figures that can be processed, stored, and transmitted by an ICT system.
Data, when viewed by us, can seem simple, random, and without meaning, until it is processed and
organized which transforms the data into information. Data are the building blocks of information much
like the individual pieces of a jigsaw puzzle.
Information – Information is the result of processed, organized, and structured data. It is the output of an ICT
system with context and meaning that makes it useful for the people using the system.
Impacts of ICT on the Society
ICT at Home. ICT is present in daily households activities.
ICT as a Communication Tool. The development of mobile phones and other technologies that are capable
of connecting to the internet and the introduction of applications that support different formats of
communications.
ICT and Education. With the use of search engines and learning communities, students and teachers are
now capable of gaining new knowledge and skills that will help them study in advance or learn about various
topics.
ICT and Government. E-governance is a standard practice in most of our government agencies that
encourages the use of ICT to improve the access and delivery of government services.
ICT and Commerce. Online shops have become very popular through the rise of smartphones and the
continuous development of internet infrastructure.
ICT and the Entertainment Industry. Movies, documentaries, and even songs can be made available on-
demand using applications for streaming and downloading media.
CONVERGENT TECHNOLOGIES AND EVOLUTION OF THE WEB
Convergence of Technology
It refers to a state in which two or more technology entities and functions are combined into one device or
system.
Refers to the trend or phenomenon where two or more independent technologies integrate and form a new
outcome.
3Cs of Technological Convergence
Computing Technology – Refers to the improvements made on electronic devices or gadgets by combining
the functions of two or more devices into one gadget.
Content Technology – A category of technology convergence that combines different media formats such
as text, pictures, sounds, and videos into one multimedia content.
Communication Technology – Refers to the fast and effective transfer of information through the
collaboration of different communication technologies.
WEBSITE VS. WEBPAGE
A Website consists of one or more web pages that refer to the individual links or pages of a website. It acts
like the pages of a book. Once a user clicks a link or presses a button on a website, it instructs the site to
jump from one web page to another web page, thus changing the display on the computer screen.
A Web page or Webpage is a document, commonly written in HTML that is viewed in an Internet browser. A
web page can be accessed by entering a URL address into a browser’s address bar. A Web page may contain
text, graphics, and hyperlinks to other web pages and files.
HyperText Markup Language (HTML) is the set of markup symbols or codes inserted into a file intended for display
on the Internet. The markup tells web browsers how to display a web page's words and images.
STATIC WEB PAGE VS. DYNAMIC PAGE
Static web pages are characterized by their fixed content, which means that it shows the same content every
time the web page is accessed. All the elements like textual information and multimedia content are hard-
coded and embedded in the web page, making it difficult to update or modify.
Dynamic web pages, on the other hand, are known for being changeable, which means that its content can
change each time the web page is accessed. The elements like text, graphics, audio files, and videos are
saved in the server, making it very easy to update.
THE EVOLUTION OF THE WEB
Web 1.0 was the first generation of websites that was marked as read-only web. The websites developed
with this technology were all static web pages, which meant that the content was fixed and difficult to update
or modify. The Web 1.0 websites were mostly used by business organizations and industries for the purpose
of advertising their products. Websites created during this time only served as an information portal where
users could only search and browsed for information on the screen.
Web 2.0 is the second generation of websites that is referred to as the writable web. Websites belonging to
this type have transformed web pages from static websites to dynamic websites. These contain web pages
that are capable of updating their content in real-time using applications embedded in the system. Web 2.0 is
also referred to as social web because of its capability to engage its users through interaction, collaboration,
and information sharing.
Web 3.0 is the executable web of web evolution. This generation of websites can deliver customized service,
perform real-time analysis, and generate reports with the use of technologies such as artificial intelligence
and machine learning. Machine learning equipped ICT devices with the ability to learn and interpret the
meaning of words and choices made by user in his or her online activities.
SOCIAL, MOBILE AND ASSISTIVE MEDIA
SOCIAL MEDIA
Social media refers to the means of interactions among people in which they create, share, and/or exchange
information and ideas in virtual communities and networks.
Social media comes in different forms and shapes depending on the purpose that it serves. Social media sites
and applications can be used for communicating information, interacting with other users, and sharing
multimedia content like pictures and videos
Types of Social Media
Social Networking Sites - (SNS) The most popular type of social media due to their capability to provide
users with a real-time conversation via text messages, audio, or video chat. Social networking sites also
paved the way for the formation of “virtual communities’ that enable people from around the world to form
channels for information exchanges. (e.g. Facebook, Twitter, Linkedin, etc.)
Media Sharing Sites - can be classified as the type of social media for individuals and organizations whose
primary purpose is to share multimedia contents like photographs, audio files, or videos. It encourages people
to upload their creations on the network for other people to appreciate and use. (e.g. Youtube, Tiktok, Vimeo,
Spotify, etc.)
Discussion Sites - are social media websites designed for individuals who are avid fans of forums and
debates. Discussion sites like Reddit and Quora facilitate the active exchange of views, comments, and
opinions on issues and matters discussed among its participants. (e.g. Qoura, Reddit, etc.)
Bookmarking and Content Curation Sites - are social media platforms for people who are searching for
information or ideas that will help them on a project they are working on. These types of websites aid users in
discovering, sharing, and discussing the latest trend of media. (e.g. Pinterest, Digg, etc.)
Blogging and Publishing Network Sites - are websites designed for people who dream of publishing their
ideas or creations online. These types of websites provide users with the tools that will help them to publish
their content in a creative and engaging manner. (e.g. Wordpress, Tumblr, Blogspot, etc.)
Consumer Review Networks - are social media sites for people who want to provide and share information
about different products. It builds a connection between individuals who have used or availed the products
and customers who are interested in purchasing. (e.g. tripadvisor, yelp, etc.)
MOBILE MEDIA
Refers to communication devices that are characterized by portability or their ability to be moved or
carried easily. Mobile media technology introduced devices that are either handheld or pocket-sized but
equipped with the capacity to capture and share high quality multimedia content produced at lightning
speeds.
ASSISTIVE MEDIA
Are electronic devices or programs that seek to reach out to people with disabilities by providing the
support that will increase or improve their functional capabilities through the use of technology.
Types of Assistive Media
Assistive Media for the Visually Impaired
This refers to electronic devices that enable blind or visually impaired individuals to read books and
signage's, access smartphones and computers, and use wayfinding. It includes text-to-speech devices,
reading pens, braille displays, magnifiers, and talking devices
Assistive Media for People with Hearing Impairments
This is the type of assistive media for people who are deaf or who experience difficulty in hearing. The
assistance is through sound amplification, conversion of sounds into visual cues, and conversion of
sounds into sensory signals like vibrations.
Assistive Media for People with Speech Difficulty
This refers to electronic devices used to aid people who are mute or who experience difficulty in speaking.
These devices enable users to communicate with other people or express their thoughts using system
that converts visual cues to audible speech.
Assistive Media for People with Learning Difficulty
It refers to assistive technology used to help individuals who experience difficulty in learning and
comprehension. These electronic devices or software act as instructional supports for learners to
understand their lessons according to their pace or abilities.
USES OF THE INTERNET, ONLINE SYSTEMS, AND PLATFORMS
USES OF THE INTERNET
Internet as a Communication Tool
Internet as a tool for Performing Business Transactions
Internet as a Tool for Research
Internet as an Entertainment Tool
ONLINE SYSTEMS
An online system is a collaboration of hardware, software, and network that facilitates the transfer and
processing of data among internet-enabled devices. It is an automated system that handles and
processes instructions or queries from devices like a smartphone to another device like a computer or
database server.
Components of an Online Systems
Terminal Devices – Are electronic devices such as desktop computers, laptop computers, tablets, or
smartphones that are used to send requests or instructions over the internet.
Network – A network is a collection of computer, internet devices, and communication media that are
used to carry data from one device to another. A network is composed of hardware like switches, hubs,
routers or modems; and communication media like Ethernet, Bluetooth, or wireless fidelity.
Server – A server refers to the hardware that serves as the storage house of data coming in and out of
the system. It is an essential element in an online system because it contains databases that are used to
add, update, search, and delete data that are stored in the server.
Processing Systems - The processing system, also referred to as the “information system,” is a group
of hardware and software that is designed to collect, process, store, and distribute information.
ONLINE PLATFORMS
Online platforms refer to websites or online applications that use the internet to offer their products or services.
The goal of these services is to provide assistance in performing our tasks with greater ease and efficiency.
Online Platforms Services
Social Media Platforms – are internet services that promote social interaction and information sharing among
members of virtual communities.
Web Search Engines - are internet-based systems that are used to locate information on the World Wide
Web.
Online Payment System – is a web-based application that allows customers to send a payment for their
purchases using a facility that organizes the transfer of monetary funds from the customer’s bank account to
the company’s account.
Online Advertising Platforms – is an internet service that allows business organizations to post their
advertisements to websites and online applications.
Creative Content Outlets – are web services that offer assistance to individuals and organizations in the
development of innovative and engaging multimedia content for their websites.
Unit II
ONLINE SAFETY AND ETHICS
CYBER WORLD
The cyber world, also known as cyberspace, is composed of complex interconnected networks that provides
a virtual environment for different users to interact with each other. It is virtual in nature and unbounded unlike
our physical environment.
Dangers and Threats on the Internet
Exposure to unsuitable Contents
Photos and videos content that are not age suitable are everywhere. The exposure of children and teenagers
to these content can have a great impact on the emotional and psychological state of the viewer. Some
examples are
• Pornography
• Graphic violence
• Verbal obscenity
Crime-Related Dangers
The most common criminals found on the internet are:
• Hackers – These criminals will try to access private information, accounts, websites, or servers in
order to steal, manipulate, destroy, sell or use the information gathered for their own benefit.
• Identity Thieves – These criminals steal important and personal information from their target in order
to fake an identity. They usually use this information to access bank accounts of the user, or assume
an identity to hide from the authorities making them untraceable.
• Internet Predators – are individuals who lure children or teenagers into engaging to sexual acts or
relationship online.
• Cyberbullies – cyberbullying is an online form of bullying with the aid of the internet and other
technology-based communication. It is commonly seen on social networking sites through hate
speech, racism, and curse words directed to their target individual.
Privacy-Related Dangers
Privacy-related danger occurs due to carelessness of the user or caused by unauthorized access of a person’s
private information. The criminal’s goal is usually to cause psychological and mental harm to individual by
destroying the reputation of their target.
Malicious Software-Related Dangers
A malware or malicious software, is created to invade and destroy the computer system. There are seven
main types of malware:
• Virus - is a software that inserts its code into files and programs infecting other software inside the
computer system.
• Worms – are software that can rapidly spread from one computer to another by replicating itself
through the computer network even without human interaction. This kind of malware infects the
computer through a downloaded file.
• Trojan virus – also known as trojan horse, is often hidden as a real and helpful software but once
it’s installed, it will gain access to private and sensitive information stored in your computer.
• Spyware – secretly invades your computer and targets sensitive information, this kind of malware is
usually used by hackers and identity thieves to steal personal information by giving them access to
the target’s computer.
• Adware – is used to gather data from your computer while providing you with advertisements.
Although this kind of malware is not always dangerous, it can redirect you to untrusted websites that
might contain viruses or worms.
• Ransomware – is often part of a phishing scam. When the victim clicks an untrusted link, it will
download the file and encrypts the sensitive information in your device denying any access from the
target.
• Fileless Malware – is different from the other traditional malware attacks because it does not leave
any trace on your computer making it hard to detect.
TIPS TO STAY SAFE ONLINE
1. Think before you click.
2. Do not share personal information.
3. Beware of phishing scam.
4. Keep your device secure.
5. Never give out your password.
6. Never agree to meet anyone you just met on online chat rooms.
7. Tell your guardian if something is making you uncomfortable online.
8. Cover your webcam.
9. Use a strong password.
10. Make sure you log out when using a public device.
NETIQUETTE
Netiquette represents the importance of proper manners and behavior online.
Netiquette is etiquette governing communication on the internet.
The set of rules about behavior that is acceptable when communicating with people over the internet.
Netiquette Rules:
1. Remember the HUMAN.
2. Adhere to the same standards of behavior online that you follow in real life.
3. Know where you are in Cyberspace.
4. Respect other People’s times and bandwidth.
5. Make yourself look good online.
6. Share expert knowledge.
7. Help keep flame wars under control.
8. Respect other people’s privacy.
9. Don’t abuse your power.
10. Be forgiving of other people’s mistakes.
GOVERNMENT LAWS FOR INTERNET
Terms and Conditions / Terms of Service
Are commonly seen on different websites offering services. This is a way to protect the user and the service
provider through an agreement before anyone can use a service. E-commerce websites such as shopee,
Lazada, Zalora, etc. have their own terms and conditions before a buyer can use their online services.
INTERNET LAW
Internet law, also known as cyberlaw, refers to the legal principles applied using the internet and computer-
related actions and interactions of people. It governs all different forms of technology-related rules with regards
to data privacy, intellectual property, cybersecurity, and cybercrime.
Internet laws should be updated every now and then due to uniqueness of the cyber world. It is not definite
and solid unlike other legal aspects in the real world so the rules should just accordingly while maintaining
fairness in the implementation.
What are the Internet Laws?
Laws that govern the Internet Service Provider (ISP)
Laws connected to website creation
Laws concerning conflict resolution over domain names
Laws involving online trademarks
Laws regarding how you can link to a site
Different Types of Internet Regulations
Laws. Laws are attempts to legally handle the issues of the Internet.
Architecture. It deals with Internet limitations of technology.
Norms. Proper behavior that govern our human behavior
Markets. The online marketplace and the fluctuations within it have an impact on what happens online.
Internet Policies and Regulations
Policies for Online Marketing
The goal of these policies is to prevent deceptive and unfair marketing such as illegal distribution of customer’s
data, making fake news websites, disguising ads to gather personal information, false advertisements, and
the like.
Laws for Intellectual Property
In order to protect creators, copyright is implemented all around the world through the use of patents,
trademarks, and copyrights. It is also a good practice to revise and cite your source to avoid plagiarism as it
falls under intellectual property violation.
Laws for Online Privacy
Privacy-related laws are enforced to protect the data of the users on the internet from illegal distribution and
misuse. These laws are also used to prevent online misconduct and cybercrime such as cyberbullying,
cybersex, and cyber trafficking.
ETHICS IN CONDUCTING ONLINE RESEARCH
ONLINE RESEARCH
Is a method that involves the collection of information from the internet whether it may be a personal or
professional purpose, it has a great impact on building one’s knowledge.
Advantages of Online Research:
• Researchers have easier access to large information whether they are at school or home through devices
such as smartphones.
• Researchers acquire diverse information in different formats, such as videos and audio recordings that may
not be present in a library’s collection.
• Researchers save more time in researching online than doing the traditional way.
• Researchers get up-to-date and relevant information since internet sources are updated more frequently than
print sources.
• Researchers can reduce the cost conducting research.
Disadvantages of Online Research:
• Researchers may encounter inconsistent information since it can be easily edited.
• Researchers may be challenged in determining whether the source is reliable.
• Researchers may be charged with payments to have access to some sources, such as some online journals.
• Researchers may find difficulty in locating information since some may require exact details to search.
• Researchers may risk their security and privacy online.
Five simple Search Process:
Clarify
• Define the task first
• Take time to think about what information you are actually looking for in your research.
Search
• Use unique and specific search terms.
• Proper spelling and punctuation marks may also affect the search results.
Delve
• Know what search results to click on is also an important process.
• Consider the most trusted and reliable sources
Evaluate
• Double check the information.
• Check multiple sources to compare and contrast the information you search.
Cite. Being well informed about plagiarism and copyright infringement is one thing you should not forget when
acquiring information you need.
-----End of Unit 1 and 2-----
Prepared by:
AIMEE C. BOLOHABO
E-Tech Subject Teacher