Sunteți pe pagina 1din 42

EMPOWERMENT

TECHNOLOGY
ONLINE SYSTEM,
FUNCTION AND
PLATFORMS
ONLINE PLATFORMS
IN ICT
- It makes it easier for users
to interact, to collect, and use the data
from the user’s interactions for their
own particular needs.
ONLINE PLATFORMS
CATEGORIES

• Social Media Systems


• Search Engines • Advertising
• Communication Platforms
Services • Creative
• Payment Content Outlets
PLATFORMS
WEB SEARCH ENGINE
- It is a software system that is
designed to search for information on the World
Wide Web (WWW). The search results are
generally presented in a line of results referred to
as Search Engine Results Page (SERPs). The
information may be a mix of webpages, images,
and other types of files.
TOP 10 ONLINE
SEARCH ENGINE (2019)

1. Google 6. Baidu
2. Bing 7. Wolframalpha
3. Yahoo 8. DuckDuck Go
4. Ask.com 9. Internet Archieve
5. AOL.com 10. Yandex.ru
PLATFORMS
COMMUNICATION SERVICE

- These are outsourced enterprise


communications solutions that can be leased from a
single vendor or provider. A Communications
Service Provider (CSP) is a provider that transports
information electronically and can encompass
public and private companies in telecom, internet,
cable, satellite, and managed services business.
TELECOM INTERNET
AND CABLE
PLATFORMS
PAYMENT SYSTEM
- It is any system used to
settle financial transactions through
transfer of monetary value, and includes
the institutions, instruments, people,
rules, procedures, standards, and
technologies.
PAYMENTS
PLATFORMS
ADVERTISING
- It allows users to create and
manage advertising campaigns, generate
reports, and retrieve information about
the ads, campaigns, and organizations
that are associated with an account.
PAYMENTS
PLATFORMS
CREATIVE CONTENT OUTLET

- It is a content that needs to


be translated creatively. Topic/concept
Creative presentation it.
CREATIVE CONTENT
OUTLET
ONLINE SAFETY
SECURITY, ETHICS AND
ETIQUETTE
DANGERS ON THE INTERNET
EMAIL SPAM

• AKA Junk mail


• Usually unsolicited commercial email
sent from an unknown source with
identical message sent to multiple
recipients.
DANGERS ON THE INTERNET
EMAIL SPAM

• Usually not dangerous but can be time


and space consuming.
• Dangerous ones can carry viruses and
other malicious software (Malware)
DANGERS ON THE INTERNET
SITUATIONAL ANALYSIS

• WHAT IS THE BEST WAY TO GET RID OF


JUNK MAILS?
DANGERS ON THE INTERNET
EMAIL SPOOFING

• It is a deceitful email practice in which the sender


address is changed, so that it would appear to
have come from a different source which is
usually someone you know.
• Email spoofing is usually used by spammers to
hide the origin of the spam.
DANGERS ON THE INTERNET
SITUATIONAL ANALYSIS

• HOW WOULD YOU KNOW IF SOMEONE


SPOOFING AT YOU?
DANGERS ON THE INTERNET
PHISHING
• It is a deceitful practice of trying to get
confidential information such as passwords and
usernames, and credit card details by making it
appear as if it comes from a trustworthy source.
• It is usually done through emails or using popular
entity such as Microsoft, Yahoo, Google, Amazon,
and financial institutions.
DANGERS ON THE INTERNET
SITUATIONAL ANALYSIS

• HOW WOULD YOU KNOW IF SOMEONE


PHISHING AT YOU?
DANGERS ON THE INTERNET
PHARMING
• This is a dangerous hacker attack on a website which
directs all traffic to that website to another fictitious
website.
• The main objective is to obtain username and
passwords, as well as credit cards ad financial
information, and use these to steal their money
electronically or use the credit cards of the victims.
DANGERS ON THE INTERNET
SITUATIONAL ANALYSIS

• HOW WOULD YOU KNOW IF SOMEONE


IS TRYING TO PHARMYOU?
DANGERS ON THE INTERNET
SPYWARE
• A computer program that is installed covertly on a
personal computer to collect information or even take
control over the computer without the knowledge of the
user.
• It can monitor and collect information about the user’s
internet habits and practices.
• It can also affect the performance and setting of the
computer.
DANGERS ON THE INTERNET
SITUATIONAL ANALYSIS

• WHAT CAN WE DO TO PREVENT


INSTALLING A SPYWARE
DANGERS ON THE INTERNET
COMPUTER WORM
• It is a dangerous computer program that
replicates itself through a network.
• Some worms delete files, others disrupt the
network function.
• It is usually spread through email and running of
attachments from suspicious sources. It spreads
by exploiting weaknesses in operating systems
DANGERS ON THE INTERNET
SITUATIONAL ANALYSIS

• How do we know it is a worm- infected


file?
DANGERS ON THE INTERNET
TROJAN HORSE
• A malware fronting to perform a good task, but
covertly performs undesirable function with the
intention of entering the computer without the
user’s consent. •
• It can disable the computer’s defenses, opening it
to unauthorized entry. It can erase data, can
corrupt files, allow access to computer
DANGERS ON THE INTERNET
SITUATIONAL ANALYSIS

• How do we know it is a trojan horse-


infected file?
DANGERS ON THE INTERNET
COMPUTER VIRUS
• It is a program that duplicates itself and then
infects the computer. It spreads like a biological
virus.
• It can be transferred by the use of removable
storage media devices.
• Damages may be mild to severe.
DANGERS ON THE INTERNET
SITUATIONAL ANALYSIS

• How do we know it is a virus- infected


file?
DANGERS ON THE INTERNET
HACKER
• This is a person who is able to enter and control
other people’s computer without authorization.
• Usually vandalizes the victims’ website, steals
personal information, obtains intellectual
property, and performs credit card fraud.
• Firewalls are able to prevent entry by hackers.
DANGERS ON THE INTERNET
SITUATIONAL ANALYSIS

• How do we know you are being


hacked?
CONTEXTUALIZED
ONLINE SEARCH AND
REASERCH SKILLS
ONLINE SEARCH
is the process of
interactively searching for and retrieving
requested information via a computer
from databases that are online. Interactive
searches became possible in the 1980s
with the advent of faster databases and
smart terminals.
Advantages
and Disadvantages
1. Ability to obtain coded so no data
a large sample, entry errors
which increases 3. Reduced cost of
statistical power conducting
2. Data is research
automatically
Advantages
and Disadvantages
1. Online is not totally 2. Some of the materials
secure and theft is one on the internet have not
of the numerous danger been evaluated by
it poses, researchers experts or thoroughly
personal information is screened.
at risk of being access by 3. Lack of accreditation
rogue persons. and low quality
RESEARCH SKILLS
“research” leads to an
original contribution to knowledge in a
particular field of inquiry by defining an
important question or problem and then
answering or solving it in a systematic
way.
IMPORTANT ASPECT
OF RESEARCH
• Research design covers the key issues in developing
a successful research project.
• Research methods takes you to resources on
essential techniques for carrying out convincing
research.
• Working with data will provide resources on the use
of statistics and other numerical skills in research.
THANK YOU…

S-ar putea să vă placă și