0 Bewertungen0% fanden dieses Dokument nützlich (0 Abstimmungen)
48 Ansichten4 Seiten
The document discusses several key topics related to information and communication technology (ICT):
1. It defines ICT as dealing with the use of communication technologies like mobile phones, the internet, etc. to locate, save, send and edit information.
2. It outlines the evolution of the World Wide Web from Web 1.0 to 2.0, with Web 1.0 being static pages and Web 2.0 allowing for dynamic content and user interaction/contribution.
3. Web 2.0 features that enable user participation and interaction are discussed, including folksonomy, dynamic content, and social media/sharing sites.
The document discusses several key topics related to information and communication technology (ICT):
1. It defines ICT as dealing with the use of communication technologies like mobile phones, the internet, etc. to locate, save, send and edit information.
2. It outlines the evolution of the World Wide Web from Web 1.0 to 2.0, with Web 1.0 being static pages and Web 2.0 allowing for dynamic content and user interaction/contribution.
3. Web 2.0 features that enable user participation and interaction are discussed, including folksonomy, dynamic content, and social media/sharing sites.
The document discusses several key topics related to information and communication technology (ICT):
1. It defines ICT as dealing with the use of communication technologies like mobile phones, the internet, etc. to locate, save, send and edit information.
2. It outlines the evolution of the World Wide Web from Web 1.0 to 2.0, with Web 1.0 being static pages and Web 2.0 allowing for dynamic content and user interaction/contribution.
3. Web 2.0 features that enable user participation and interaction are discussed, including folksonomy, dynamic content, and social media/sharing sites.
Information - facts provided or learned about 2. Rich User Experience.
Content is dynamic and is
something or someone. responsive to user’s input. Communication - the imparting or exchanging 3. Long Tail is synonymous to subscribing to a data plan of information or news. that charges you for the amount of time you spent in Technology - machinery and equipment the Internet. developed from the application of scientific 4. User Participation. The owner of the website is not knowledge. the only one who is able to put content. 5. Software as a Service. Users will subscribe to a ICT (Information and Communication Technology) - software only when needed rather than purchasing it. deals with the use of different communication 6. Mass Participation. It is a diverse information sharing technologies such as mobile phones, telephone, through universal web access. Internet, etc. to locate, save, send and edit information Web 3.0: Semantic Web - The Semantic Web is a movement led by the World 5S - Is a philosophy and a way of organizing and Wide Web Consortium (W3C). “The Semantic Web managing the workspace and work flow. provides a common framework that allows data to be Japanese English shared and reused across application, enterprise, and S1 Seiri Sort community. The aim of Web 3.0 is to have machines (or S2 Seiton Set servers) understand the user’s preferences to be able to S3 Seiso Shine deliver web content specifically targeting the user. S4 Seiketsu Standardize Problems: S5 Shitsuke Sustain 1. Com bility Makati City – Selfie Capital of the World, 258 selfie taker HTM per 100,000 people (Time Magazine, 2014) files Cebu City – 9th placer, 99 selfie takers per 100k people curre Ranked 74th out of 77 countries in terms of 4G speed web Download speed of just 8.24 Mbps (CNN Phils, Nov. brow 2017) could supp The World Wide Web - is an information space where Web documents and other web resources are identified by 2. Secu Uniform Resource Locators (URLs), interlinked by The hypertext links, and can be accessed via the Internet. user Web 1.0 (Early 90’s) secu - When the World Wide Web was created by Tim is al Berners-Lee, most web pages were static. Static ques (stationary page) in the sense that the page is “as is” since and cannot be manipulated by the user. The content is mach also the same for all users. is sa Web 2.0 : Dynamic Web Pages (1999) his o - is the evolution of Web 1.0 by adding dynamic web prefe pages - the user is able to see a website differently es. than others. Examples of Web 2.0 include social 3. Vast networking sites, blogs, wikis, video sharing sites, - The hosted services, and web applications. Worl - Web 2.0 allows users to interact with the page: Wide instead of just reading a page, the user may be able to Web comment or create a user account. Most of the sites alrea we visit today are Web 2.0. cont Features: billio 1. Folksonomy - It allows users to categorize and of w classify/arrange information using freely chosen page keywords, hashtag or pound sign # 4. Vaguenes d. Media Sharing. These are sites that allow you to s upload and share media content like images, music, Certain and video. words e. Microblogging. These are sites that focus on are short updates from the user. imprecise f. Blogs and Forums. These websites allow users to . The post their opinions or knowledge depending on words topics that they accessed on said websites. “old”3. Assistive Media - is a nonprofit service designed to and help people who have visual and reading impairments. “small” A database of audio recordings is used to read to the woulduser. depend 4. Mobile Technologies - The popularity of on the smartphones and tablets has taken a major rise over user.the years. This is largely because of the devices’ 5. Logiccapability to do tasks that were originally found in Sincepersonal computers. Operating Systems: IOS, Android. machines Blackberry OS, Windows Phone OS, Windows Mobile, use Symbian, Web OS logic, thereOnline are Systems certain - is a system that is connected to the Internet. An offline limitation system would be a system that is disconnected from s forthe a Internet. computer Online Functions to be- include email notifications from the server, the ableupdating to of web blacklists (lists of undesirable predict websites), updating of the list of file- sharing programs, whatandthe remote access to Child. userOnline is Platforms referring - an online marketplace that places one party in touch to atwith a another, such as buyers and sellers. given time.Internet - is defined as the information superhighway. This TRENDS IN ICT: means that anyone has access to this highway, can 1. Convergence - Technological convergence is the place info, and can grab that info. synergy of technological advancements to work on a similar goal or task. TYPES OF INFORMATION WITH RISK: 2. Social Media - Social media is a website, application, Mother’s, father’s & siblings name, full name, address, or online channels that enable web users to create, co- current and previous school, home & cellphone create, discuss, modify, and exchange user generated numbers, birthday, email address… content. a. Social Networks. These are sites that allow you to SOME TIPS TO STAY SAFE ONLINE: connect with other people with the same interests or 1. Be mindful on what you share online. background. 2. Do not just accept terms and conditions, read it. b. Bookmarking Sites. These are sites that allow you to 3. Do not share your password with anyone. store and manage links to various websites and 4. Do not talk to strangers whether online or face-to- resources. face. c. Social News. These are sites that allow users to post 5. Never post anything about a future vacation. their own news items or links to other news sources. 6. Add friends you know in real life. 7. Avoid visiting untrusted websites. 8. If you have WiFi at home, make it private by adding Date – By including a date, the website allows readers a password. to make decisions about whether that information is 9. Install and update an antivirus software on your recent enough for their purposes. computer. look for a "last updated" date on the page or site. 10. Avoid downloading anything from untrusted Sources – Credible websites, like books and scholarly websites. articles, should cite the source of the information 11. Buy the software, do not use pirated ones. presented. 12. Do not reply or click links from suspicious emails.
INTERNET THREATS: Word Processor – is an electronic device or computer
1. Malware – stands for malicious software. software application that performs the task of a. Virus – a malicious program designed to replicate composing, editing, formatting, and printing of itself and transfer from one computer to another documents. OPENOFFICE WRITER, LIBREOFFICE (internet, local networks, FDs, CDs, etc.) WRITER, POLARIS OFFICE, KINGSOFT WRITER, b. Worm – a malicious program that transfers fromone WORDPERFECT, WORDPAD, MICROSOFT WORD computer to another by any types of means. Ex. ILOVEYOU Worm (Pandacan Manila, May 5 2000) Microsoft Word - is a word processor developed by c. Trojan – a malicious program that disguises as a Microsoft. It was first released on October 25, 1983. It useful program but once downloaded or installed, is also known as MS Word. leaves your PC unprotected and allows hackers to get your information. MICROSOFT WORD FEATURES d. Spyware – a program that runs in the background Features and functions of MS Word. withoutyou knowing it (thus called “spy”). It has the 1. AutoCorrect – corrects common spelling errors as ability to monitor what you are currently doing and well as capitalization mistakes. typing through keylogging. 2. AutoFormat – applies formatting to text, e.g. number e. Adware – a program designed to send you listing, bullet, hyperlinks. advertisements, mostly as pop-ups. 3. Grammar Checker – proofreads documents for f. Ransomware – or ransom software is a type of grammar, writing style, sentence structure errors and malicious software from cryptovirology that threatens reading statistics. to publish the victim's data or perpetually block access 4. Template – a document that contains the formatting to it unless a ransom is paid. necessary for a specific document type. 2. Spam – an unwanted email mostly from bots or 5. Thesaurus – provides synonyms for a word in a advertisers. It can be used to document. send malware. 6. Tables – organize information into rows and 3. Phishing – anunwanted acquisition of sensitive columns. personal information like passwords and credit card 7. Mail Merge – a feature that allows you to create a details. document and merge them with another document or data file. Online Search - is the process of interactively searching 8. Text Wrap – adjusts how the image behaves around for and retrieving requested information via a other objects or text. computer from databases that are online. KEYBOARD SHORTCUTS IN WORD PROCESSING Search Engine – is a software system that isdesigned to SOFTWARE search for information on the World Wide Web. The Ctrl + A – Select All search results are generally presented in a line of Ctrl + B – Bold Text results often referred to as search engine results pages. Ctrl + C – Copy Text Ctrl + D – Show Font Dialog Box DADS: Ctrl + E – Align Text to Center Domain – Some domains such as .com, .org, and .net Ctrl + F – Display Find Dialog Box can be purchased and used by any individual. Ctrl + G – Display Go To Dialog Box Author - Information on the internet with a listed Ctrl + H – Display Replace Dialog Box author is one indication of a credible site. Ctrl + I – Italicize Text Ctrl + J – Justify Text Ctrl + K – Create a hyperlink Ctrl + L – Align Text to Left Microsoft PowerPoint is a Ctrl + M – Tab presentation program, created by Ctrl + N – Create a new document Robert Gaskins and Dennis Austin at Ctrl + O – Open a document a software company named Ctrl + P – Display Print dialog box Forethought, Inc. It was released on Ctrl + R – Align Text to Right April 20, 1987, initially for Macintosh Ctrl + S – Save a document computers only. Microsoft acquired Ctrl + U – Underline Text PowerPoint for $14 million three Ctrl + V – Paste a copied text months after it appeared. Ctrl + X – Cut a selected Text Ctrl + Y – Redo the last undone action Microsoft Excel is a spreadsheet Ctrl + Z – Undo the last action developed by Microsoft for Windows, macOS, Android and iOS. It features CUSTOMIZING A WORD DOCUMENT calculation, graphing tools, pivot 1. Home Tab – allows you to change document settings, tables, and a macro programming such as the font properties, adding bullets or a language called Visual Basic for numbered list, adjusting styles, and other common Applications. features. 2. Text Alignment – Left, Center, Right, Justified. 3. Page Layout Tab – refers to the arrangement of text, images, and other objects on a page. Page Sizes: Short (Letter) –8.5” by 11”, Long (Folio) –8.5” by 13”, A4 –8.27“ by 11.69" 4. Image Placement– This is the default setting for images that are inserted or integrated in a document. Square – This setting allows the image you inserted to be placed anywhere within the paragraph with the text going around the image in a square pattern like a frame. Tight – This is almost the same as the square setting, but here the text “hugs” to the general shape of the image. Through – This setting allows the text on your document to flow even tighter, taking the contour and shape of the image. Top and Bottom – This setting pushes the text away vertically to the top and/or the bottom of the image so that the image occupies a whole text line on its own. Behind Text – This allows your image to bed ragged and placed anywhere on your document but with all text floating in front of it. In Front of Text – This setting allows your image to be placed right on top of the text as if your image was dropped right on it.