Videos
Through video hosting sites, you can take a video and show it to the entire world (e.g., Youtube).
Sound, Music, or Audio
If videos are too much for you, you can always record sounds. You can now share your sound bites to the entire world (e.g., Soundcloud).
Online games
Game developers now create what is called "browser-based games". You do not need to install these games to your computer as they run in most updated web browsers (e.g., AdventureQuest, Farmville, Candy Crush).
Online test
Online survey forms and tests that automatically display the results when finished (e.g., Online IQ and personality Test).
Courseware
Online courses that simulate the classroom online(e.g., E- Learning Courses using Learning Management System).
Podcasts
An episodic series of audio or text files streamed online (e.g., Stuff You Should Know, Ted Talks, The Starters, Ear Biscuit).
BodCasts
AN episodic series of video streamed online (e.g., Youtube series/ shows like video game high school, Good Mythical Morning.
Five elements of a concept paper
Introduction, Purpose, Description, Support, Contact Information
Introduction
Includes your group's mission and vision and a brief introduction of your project.
Purpose
INCLUDES THE REASON WHY
THIS PROJECT IS WORTH YOUR
GROUP AND YOUR SPONSOR'S
TIME, EFFORT, AND MONEY
Description
Includes all the necessary information about the project. In ICT, it involves the site you are going to produce and the purpose of each and how they work in unison
Support
Contains the budget needed for the project.
Some concept papers do not specify any amount requested from the sponsor.
Contact Information
Includes information on how the group can be contacted.
PLANNING
CONCEPTUALIZING YOUR PROJECT
RESEARCHING ON AVAILABLE DATA ABOUT YOUR TOPIC
SETTING DEADLINES AND MEETINGS
ASSIGNING PEOPLE TO VARIOUS TASKS
FINDING A WEB OR BLOG HOST
CREATING A SITE MAP FOR YOUR WEBSITE
LISTING DOWN ALL APPLICATION THAT YOU NEED INCLUDING WEB APPS
FUNDING (IF APPLICABLE)
Development
-Involves the actual creation of the website(s); involves the production of images, infographics, etc.
Release and Promotion
-Involves the actual pelease of the website for public view and promoting it. Promotion typically starts before the actual release.
Cybercrimes
-ARE ILLEGAL ACTS DONE THROUGH THE USE OF THE INTERNET. IN 2012, STEPHEN NALE (COMPLEX.COM) POSTED A LIST OF TEN MOST COMMON INTERNET __________ AS FOLLOW:
Phishing/Spoofing
-The act of sending multiple emails to multiple users in hopes of having a number of them clicking on the links Or malwares attached to the Email.
Blackmail/Extortion
-The act of using the internet to threaten ordamage someone's reputation to extort money or anything else of value.
Assessing Stored Communication
Hacking the act of obtaining unauthorized access to data from computer network. This is typically done to commercial and government sites to a threaten its owner.
Sports Betting
-The act of wagering on any sports event over the Internet. In some countries, gambling (including sports betting) is illegal even if you are doing it over the internet.
Non-delivery of Merchandise
-The act of devising a scheme wherein a culprit posts an item or services for sale on the Internet and once the transactions have been done, does not really give the item or service.
Electronic harassment
-The act of anonymously using the Internet to harass, abuse threaten, or annoy other people. This is also an act of cyberbullying, however, because the culprit is anonymous, it is hard to detect who is bullying you.
Child Pornography
-The act of using the Internet to show child pornography. This act is highly punishable by law.
Prostitution
-The act of using the Internet to engage in prostitution.
Drug trafficking
-The act of selling illegal substances using the internet.
Network Security
-Before a hacker can get through the un authorized files he or she is targeting, the hacker has to get through several security measure like firewalls, secure connections, passwords, anti-malwares, and data encryptions.
Investigation
-URL tracing and logging are used by website to track your unique IP addresses. This can be used by investigators to trace hackers. In piracy, trackers are used to identify IP addresses currently sharing a pirated file.
Penalties
-More and more laws are being created and implemented today. Penalties include both fine and imprisonment.
The people power revolution, 1983 to 1986, President Ferdinand Marcos, Cardinal Sin, February 22 to 25, 1986, two million people
__________________________lasted from ____________. During a radio broadcast of Radyo Veritas, _________ encouraged the Filipinos to help end the regime of then ___________________. A major protest took place along Edsa From ___________, 1986 involving __________ Filipinos From different sectors. These included civilians, political parties, the military, and religious groups.
This also known as the 2001 Edsa Revolution, happened during January 17 to 21, 2001. It was fueled after Il_ prosecutors of then president joseph Estrada walked out of the impeachment trial. As a result, the crowd in EDSA grew over the course of a few days through text brigades. Like the first People Power Revolution, Edsa Dos would not have been successful without the text brigades.