Sie sind auf Seite 1von 4

 Information - facts provided or learned about 2. Rich User Experience.

Content is dynamic and is


something or someone. responsive to user’s input.
 Communication - the imparting or exchanging 3. Long Tail is synonymous to subscribing to a data plan
of information or news. that charges you for the amount of time you spent in
 Technology - machinery and equipment the Internet.
developed from the application of scientific 4. User Participation. The owner of the website is not
knowledge. the only one who is able to put content.
5. Software as a Service. Users will subscribe to a
ICT (Information and Communication Technology) - software only when needed rather than purchasing it.
deals with the use of different communication 6. Mass Participation. It is a diverse information sharing
technologies such as mobile phones, telephone, through universal web access.
Internet, etc. to locate, save, send and edit information  Web 3.0: Semantic Web
- The Semantic Web is a movement led by the World
5S - Is a philosophy and a way of organizing and Wide Web Consortium (W3C). “The Semantic Web
managing the workspace and work flow. provides a common framework that allows data to be
Japanese English shared and reused across application, enterprise, and
S1 Seiri Sort community. The aim of Web 3.0 is to have machines (or
S2 Seiton Set servers) understand the user’s preferences to be able to
S3 Seiso Shine deliver web content specifically targeting the user.
S4 Seiketsu Standardize Problems:
S5 Shitsuke Sustain 1. Com
bility
Makati City – Selfie Capital of the World, 258 selfie taker HTM
per 100,000 people (Time Magazine, 2014) files
Cebu City – 9th placer, 99 selfie takers per 100k people curre
Ranked 74th out of 77 countries in terms of 4G speed web
Download speed of just 8.24 Mbps (CNN Phils, Nov. brow
2017) could
supp
The World Wide Web - is an information space where Web
documents and other web resources are identified by 2. Secu
Uniform Resource Locators (URLs), interlinked by The
hypertext links, and can be accessed via the Internet. user
 Web 1.0 (Early 90’s) secu
- When the World Wide Web was created by Tim is al
Berners-Lee, most web pages were static. Static ques
(stationary page) in the sense that the page is “as is” since
and cannot be manipulated by the user. The content is mach
also the same for all users. is sa
 Web 2.0 : Dynamic Web Pages (1999) his o
- is the evolution of Web 1.0 by adding dynamic web prefe
pages - the user is able to see a website differently es.
than others. Examples of Web 2.0 include social 3. Vast
networking sites, blogs, wikis, video sharing sites, - The
hosted services, and web applications. Worl
- Web 2.0 allows users to interact with the page: Wide
instead of just reading a page, the user may be able to Web
comment or create a user account. Most of the sites alrea
we visit today are Web 2.0. cont
Features: billio
1. Folksonomy - It allows users to categorize and of w
classify/arrange information using freely chosen page
keywords, hashtag or pound sign #
4. Vaguenes d. Media Sharing. These are sites that allow you to
s upload and share media content like images, music,
Certain and video.
words e. Microblogging. These are sites that focus on
are short updates from the user.
imprecise f. Blogs and Forums. These websites allow users to
. The post their opinions or knowledge depending on
words topics that they accessed on said websites.
“old”3. Assistive Media - is a nonprofit service designed to
and help people who have visual and reading impairments.
“small”
A database of audio recordings is used to read to the
woulduser.
depend
4. Mobile Technologies - The popularity of
on the
smartphones and tablets has taken a major rise over
user.the years. This is largely because of the devices’
5. Logiccapability to do tasks that were originally found in
Sincepersonal computers. Operating Systems: IOS, Android.
machines
Blackberry OS, Windows Phone OS, Windows Mobile,
use Symbian, Web OS
logic,
thereOnline
are Systems
certain
- is a system that is connected to the Internet. An offline
limitation
system would be a system that is disconnected from
s forthe
a Internet.
computer
Online Functions
to be- include email notifications from the server, the
ableupdating
to of web blacklists (lists of undesirable
predict
websites), updating of the list of file- sharing programs,
whatandthe remote access to Child.
userOnline
is Platforms
referring
- an online marketplace that places one party in touch
to atwith
a another, such as buyers and sellers.
given
time.Internet
- is defined as the information superhighway. This
TRENDS IN ICT: means that anyone has access to this highway, can
1. Convergence - Technological convergence is the place info, and can grab that info.
synergy of technological advancements to work on a
similar goal or task. TYPES OF INFORMATION WITH RISK:
2. Social Media - Social media is a website, application, Mother’s, father’s & siblings name, full name, address,
or online channels that enable web users to create, co- current and previous school, home & cellphone
create, discuss, modify, and exchange user generated numbers, birthday, email address…
content.
a. Social Networks. These are sites that allow you to SOME TIPS TO STAY SAFE ONLINE:
connect with other people with the same interests or 1. Be mindful on what you share online.
background. 2. Do not just accept terms and conditions, read it.
b. Bookmarking Sites. These are sites that allow you to 3. Do not share your password with anyone.
store and manage links to various websites and 4. Do not talk to strangers whether online or face-to-
resources. face.
c. Social News. These are sites that allow users to post 5. Never post anything about a future vacation.
their own news items or links to other news sources. 6. Add friends you know in real life.
7. Avoid visiting untrusted websites.
8. If you have WiFi at home, make it private by adding Date – By including a date, the website allows readers
a password. to make decisions about whether that information is
9. Install and update an antivirus software on your recent enough for their purposes.
computer. look for a "last updated" date on the page or site.
10. Avoid downloading anything from untrusted Sources – Credible websites, like books and scholarly
websites. articles, should cite the source of the information
11. Buy the software, do not use pirated ones. presented.
12. Do not reply or click links from suspicious emails.

INTERNET THREATS: Word Processor – is an electronic device or computer


1. Malware – stands for malicious software. software application that performs the task of
a. Virus – a malicious program designed to replicate composing, editing, formatting, and printing of
itself and transfer from one computer to another documents. OPENOFFICE WRITER, LIBREOFFICE
(internet, local networks, FDs, CDs, etc.) WRITER, POLARIS OFFICE, KINGSOFT WRITER,
b. Worm – a malicious program that transfers fromone WORDPERFECT, WORDPAD, MICROSOFT WORD
computer to another by any types of means. Ex.
ILOVEYOU Worm (Pandacan Manila, May 5 2000) Microsoft Word - is a word processor developed by
c. Trojan – a malicious program that disguises as a Microsoft. It was first released on October 25, 1983. It
useful program but once downloaded or installed, is also known as MS Word.
leaves your PC unprotected and allows hackers to get
your information. MICROSOFT WORD FEATURES
d. Spyware – a program that runs in the background Features and functions of MS Word.
withoutyou knowing it (thus called “spy”). It has the 1. AutoCorrect – corrects common spelling errors as
ability to monitor what you are currently doing and well as capitalization mistakes.
typing through keylogging. 2. AutoFormat – applies formatting to text, e.g. number
e. Adware – a program designed to send you listing, bullet, hyperlinks.
advertisements, mostly as pop-ups. 3. Grammar Checker – proofreads documents for
f. Ransomware – or ransom software is a type of grammar, writing style, sentence structure errors and
malicious software from cryptovirology that threatens reading statistics.
to publish the victim's data or perpetually block access 4. Template – a document that contains the formatting
to it unless a ransom is paid. necessary for a specific document type.
2. Spam – an unwanted email mostly from bots or 5. Thesaurus – provides synonyms for a word in a
advertisers. It can be used to document.
send malware. 6. Tables – organize information into rows and
3. Phishing – anunwanted acquisition of sensitive columns.
personal information like passwords and credit card 7. Mail Merge – a feature that allows you to create a
details. document and merge them with another document or
data file.
Online Search - is the process of interactively searching 8. Text Wrap – adjusts how the image behaves around
for and retrieving requested information via a other objects or text.
computer from databases that are online.
KEYBOARD SHORTCUTS IN WORD PROCESSING
Search Engine – is a software system that isdesigned to SOFTWARE
search for information on the World Wide Web. The Ctrl + A – Select All
search results are generally presented in a line of Ctrl + B – Bold Text
results often referred to as search engine results pages. Ctrl + C – Copy Text
Ctrl + D – Show Font Dialog Box
DADS: Ctrl + E – Align Text to Center
Domain – Some domains such as .com, .org, and .net Ctrl + F – Display Find Dialog Box
can be purchased and used by any individual. Ctrl + G – Display Go To Dialog Box
Author - Information on the internet with a listed Ctrl + H – Display Replace Dialog Box
author is one indication of a credible site. Ctrl + I – Italicize Text
Ctrl + J – Justify Text
Ctrl + K – Create a hyperlink
Ctrl + L – Align Text to Left Microsoft PowerPoint is a
Ctrl + M – Tab presentation program, created by
Ctrl + N – Create a new document Robert Gaskins and Dennis Austin at
Ctrl + O – Open a document a software company named
Ctrl + P – Display Print dialog box Forethought, Inc. It was released on
Ctrl + R – Align Text to Right April 20, 1987, initially for Macintosh
Ctrl + S – Save a document computers only. Microsoft acquired
Ctrl + U – Underline Text PowerPoint for $14 million three
Ctrl + V – Paste a copied text months after it appeared.
Ctrl + X – Cut a selected Text
Ctrl + Y – Redo the last undone action Microsoft Excel is a spreadsheet
Ctrl + Z – Undo the last action developed by Microsoft for Windows,
macOS, Android and iOS. It features
CUSTOMIZING A WORD DOCUMENT calculation, graphing tools, pivot
1. Home Tab – allows you to change document settings, tables, and a macro programming
such as the font properties, adding bullets or a language called Visual Basic for
numbered list, adjusting styles, and other common Applications.
features.
2. Text Alignment – Left, Center, Right, Justified.
3. Page Layout Tab – refers to the arrangement of text,
images, and other objects on a page. Page Sizes: Short
(Letter) –8.5” by 11”, Long (Folio) –8.5” by 13”,
A4 –8.27“ by 11.69"
4. Image Placement– This is the default setting for
images that are inserted or integrated in a document.
 Square – This setting allows the image you
inserted to be placed anywhere within the
paragraph with the text going around the image
in a square pattern like a frame.
 Tight – This is almost the same as the
square setting, but here the text “hugs” to the
general shape of the image.
 Through – This setting allows the text on your
document to flow even tighter, taking the
contour and shape of the image.
 Top and Bottom – This setting pushes the text
away vertically to the top and/or the bottom of
the image so that the image occupies a whole
text line on its own.
 Behind Text – This allows your image to bed
ragged and placed anywhere on your
document but with all text floating in front of
it.
 In Front of Text – This setting allows your
image to be placed right on top of the text as if
your image was dropped right on it.

Das könnte Ihnen auch gefallen