You are on page 1of 14

Technology - The application of scientific knowledge for practical purposes, especially in industry.

A
machinery and equipment developed from the application of scientific knowledge.

ICT – Information and Communications Technology.

It is an extended term of Information Technology (IT).

It stresses the role of unified communications and the integration of telecommunications,


computers, as well as necessary enterprise software, middleware, storage, and audio-visual systems,
which enable users to access, store, transmit, and manipulate information.

Unified Communication (UC) = integration of real-time enterprise (satisfying organizations rather than
individuals) communication services (instant messaging, presence of information, voice, mobility
features, audio, web, & video conferencing, fixed-mobile convergence, desktop sharing, data sharing,
etc.

Sharing data in a common place using different mediums for access.

Middleware – Software glue. These are the internal software or applications that help common
software to function properly. It is like the codes that make the operating system work--- the hidden
algorithms.

Sharing data in a common place using different mediums for access.

WEB 1.0

• It is a term coined to differentiate the first stage of the World Wide Web (www) in comparison
with the present stage of the internet technology.

• At the beginning, there were few web content creators.

• Webpages were static and were called read only web.

• The only available feedback mechanism was through private emails.

Read Only web - Because there was no user interaction available. You can only read text and look at the
pictures. There

HTML (HyperText Markup Language) is the most basic building block of the Web. It describes and
defines the content of a webpage.

Portal is a term, generally synonymous with gateway, for a World Wide Web site that is or proposes to
be a major starting site for users when they get connected to the Web or that users tend to visit as an
anchor site. SEARCH ENGINE

WEB 2.0

• The term Web 2.0 was first used around 2004.

• Internet technology became more and more interactive.

• The internet became more available for everyone.


• The users can now interact, contribute, and create their own internet space and content
(Explosion of Information & Social Media).

XML stands for eXtensible Markup Language. XML was designed to store and transport data. XML was
designed to be both human- and machine-readable.

RSS (Rich Site Summary; originally RDF Site Summary; often called Really Simple Syndication) is a type
of web feed[2] which allows users to access updates to online content in a standardized, computer-
readable format.

WEB 3.0

• It is described by Time Berners-Lee (Father of the WWW) as the read-write-execute web.

• It is referred to as the semantic web or data driven web content and response.

• The context of the search of the user is processed by a programming language to help the user
by presenting options of what the person is interested in.

• It will not make Web 2.0 obsolete.

Microformats are small patterns of HTML to represent commonly published things like people, events,
blog posts, reviews and tags in web pages.

Microdata is a WHATWG HTML specification used to nest metadata within existing content on web
pages.

RDFa (or Resource Description Framework in Attributes) is a W3C Recommendation that adds a set of
attribute-level extensions to HTML, XHTML and various XML-based document types for embedding rich
metadata within Web documents.

Technology Convergence

It is an evolution of technological developments that merge into a new system bringing together
different types of applications and media.

SOCIAL MEDIA

It is a collection of internet-based communication tools and computer assisted channels dedicated to


allow users to interact, communicate, and share information in a virtual community and network.

Facebook

It is a popular free social networking site with more than a billion users around the globe that allows its
users to create profiles, upload photos and videos, create and join groups, react to friend’s posts,
creative events, send messages, keeping in touch with close friends, and relatives.

Twitter

With more than 300 Million users in 2016, this social networking site allows users to microblog or
broadcast short messages called “tweets.” Registered Tweeter members can also read and follow
tweets of other users.
Instagram

Snapchat

MOBILE MEDIA

A range of handheld devices, from mobile phones, tablets, and e-readers to game consoles, primarily
used as personal, interactive, Internet-enabled and user-controlled portable platforms that allow
interconnected users to exchange personal and nonpersonal information ( Wei, 2013 ).

ASSISTIVE MEDIA

• It is a nonprofit organization founded in 1996 in Michigan, USA. It was founded by David H.


Harvey.

• The organization was the first internet-based reading service for persons with visual and reading
impairments.

• The produce and publish voice-recorded written materials on cassettes, CDs, and in the internet.

Dangers on the Internet

Email Spam

• AKA Junk mail

• Usually unsolicited commercial email sent from an unknown source with identical message
sent to multiple recipients.

• Usually not dangerous but can be time and space consuming.

• Dangerous ones can carry viruses and other malicious software (Malware)

Email Spoofing

• It is a deceitful email practice in which the sender address is changed, so that it would appear
to have come from a different source which is usually someone you know.

• Email spoofing is usually used by spammers to hide the origin of the spam.

Phishing

• It is a deceitful practice of trying to get confidential information such as passwords and


usernames, and credit card details by making it appear as if it comes from a trustworthy
source.

• It is usually done through emails or using popular entity such as Microsoft, Yahoo, Google,
Amazon, and financial institutions.

Pharming

• This is a dangerous hacker attack on a website which directs all traffic to that website to
another fictitious website.
• The main objective is to obtain username and passwords, as well as credit cards ad financial
information, and use these to steal their money electronically or use the credit cards of the
victims.

• It is a major concern of many online banking and electronic commerce transactions.

Spyware

• A computer program that is installed covertly on a personal computer to collect information


or even take control over the computer without the knowledge of the user.

• It can monitor and collect information about the user’s internet habits and practices.

• It can also affect the performance and setting of the computer.

Computer Worm

• It is a dangerous computer program that replicates itself through a network.

• Some worms delete files, others disrupt the network function.

• It is usually spread through email and running of attachments from suspicious sources.

• It spreads by exploiting weaknesses in operating systems (but BLESS OS updates!)

Trojan Horse

• A malware fronting to perform a good task, but covertly performs undesirable function with
the intention of entering the computer without the user’s consent.

• It can disable the computer’s defenses, opening it to unauthorized entry. It can erase data, can
corrupt files and allow access to computer.

Computer Virus

• It is a program that duplicates itself and then infects the computer. It spreads like a biological
virus.

• It can be transferred by the use of removable storage media devices.

• Damages may be mild to severe.

Hacker

• This is a person who is able to enter and control other people’s computer without
authorization.

• Usually vandalizes the victims’ website, steals personal information, obtains intellectual
property, and performs credit card fraud.

• Firewalls are able to prevent entry by hackers.

Online Systems, Functions, and Platforms

PLATFORMS
If you can program it, then it’s a platform.

If you can’t, then it’s not.”

- Marc Andreessen

Online Platforms in ICT

It makes it easier for users to interact, to collect, and use the data from the user’s interactions for their
own particular needs.

Online Platform Categories

• Social Media

• Search Engines

• Communication Services

• Payment Systems

• Advertising Platforms

• Creative Content Outlets

PLATFORMS

Web Search Engines

It is a software system that is designed to search for information on the World Wide Web
(WWW). The search results are generally presented in a line of results referred to as Search Engine
Results Page (SERPs).

The information may be a mix of webpages, images, and other types of files.

Top 10 Search Engines (2016)

1. Google

2. Bing (Microsoft)

3. Yahoo (No. 1 email provider)

4. Ask.com (Ask Jeeves)

5. AOL.com (America Online)

6. Baidu (China)

7. Wolframalpha (Computational Knowledge Engine)

8. DuckDuckGo (simple)

9. Internet Archive (histories of a domain)

10. ChaCha.com (similar to Ask.com)


Communication Services

These are outsourced enterprise communications solutions that can be leased from a single
vendor or provider.

A Communications Service Provider (CSP) is a provider that transports information


electronically and can encompass public and private companies in telecom, internet, cable,
satellite, and managed services business.

Payment System

It is any system used to settle financial transactions through transfer of monetary value, and
includes the institutions, instruments, people, rules, procedures, standards, and technologies.

Advertising Platforms

It allows users to create and manage advertising campaigns, generate reports, and retrieve
information about the ads, campaigns, and organizations that are associated with an account.

Creative Content Outlets

It is content that needs to be translated creatively.

Topic/concept  Creative presentation it

ONLINE PLATFORMS

1. Presentation Tools – Prezi, Zoho Shows, MS PowerPoint.

2. Newsletter, ICT Content Platforms – Dropbox, Tumblr, Wix

3. Photo Editing Tools – Picasa, Adobe Photoshop, GIMP

4. Video Editing Tools – Sony Vegas Pro, Windows Movie Maker, Adobe Premier Pro

5. Photo uploading and hosting Tools – Dropbox, Flickr

6. Online Collaborative Tools – Google Drive, Viber, Facebook

7. Cloud Computing – Dropbox, Google Drive, Microsoft One Drive

8. Blog Tools – Blogger, WordPress, LiveJournal

9. Mapping Tools – Google Maps, Waze, Wikimapia

10. Music Production – Sony Vegas Pro, Audacity, Virtual DJ

11. Survey and Forms – Google Forms

12. ICT Projects and Content Publishing and Uploading Platforms – WordPress, MS Office Project
Server, File Manager

13. Web Design Platforms – Wix, Weebly, Adobe Dreamweaver

14. Web Management Platforms – Drupal, WordPress, Joomla


Windows Security

1. Changing and Adding User Accounts

2. Creating a New Password

3. Setting up/Changing the Screen Saver Security Setting, and

4. Fortifying the Security Center

CHANGING AND ADDING USER ACCOUNTS

Possible users of your account are your parents, siblings, children, friends, lovers, etc.

The disadvantage of having a single account is that everyone who uses the computer will share
the same application settings, files, and system permissions.

Kinds of Accounts

1. Computer Administrator – controls all the contents and users of the computer, installs
programs, and adds and deletes users.

2. Limited Account – has limited control and only have access to his/her particular account.

3. Guest – accounts created for transient users and do not have access to the other computer
accounts and their content.

Creating a Password

This is one of the first line of defense for information security.

It must be:

1. Case sensitive

2. At least 8 characters using letters, symbols, and/or numbers.

3. Hard to guess.

4. Something you could always remember.

Security Center

This is the place where you can set additional protection from threats to your computer,
especially when using the internet.

1. Firewall

2. Automatic Updates

3. Virus Protection

Firewall
It helps in protecting the computer from unauthorized entries, viruses, or worms from the Internet or
network (installers and downloads).

It is recommended that you keep this setting ON.

Automatic Updates

Many of the updates coming from Microsoft are usually meant to update some Windows
feature, secure areas of vulnerability, fix any bugs in the OS, and others.

Virus Protection

It is meant to locate, find, and remove virus threats that are already in your computer.

It prevents malware from gaining entry into your computer.

It must be constantly updated to ensure that its Anti-Virus definition is current.

10 Commandments of Computer Ethics

It was written by Dr. Ramon C. Barquin in 1992 from the Computer Ethics Institute.

It means to create a set of standards to guide and instruct people on the ethical use of
computers.

1. Thou shalt not use a computer to harm other people.

2. Thou shalt not interfere with other people’s computer work.

3. Thou shalt not snoop around in other people’s files.

4. Thou shalt not use a computer to steal.

5. Thou shalt not use a computer to bear false witness.

6. Thou shalt not use or copy software which you have not paid (ouch..)

7. Thou shalt not use other people’s computer resources without authorization.

8. Thou shalt not appropriate other people’s intellectual output.

9. Thou shalt think about social consequences of the program you write.

10. Thou shalt use a computer in many ways that show considerati

Microsoft Word – Mail Merge, Label Generation, Inserting Photos.

Microsoft PowerPoint - Custom Animation, Hyperlinking, and Embedding Files.

Microsoft Excel – Advanced and Complex Formulas and Computations

Basic Principles in Graphics and Layout

1. Layout:

It is the process of planning and arranging graphics or text in a page or book.


A good layout should have a balanced make up and alignment of elements.

2. Asymmetrical:

It may be asymmetrical when there is an artistic and different intensity on one side of the page.

3. Text - The text type should be:

Legible

Appropriate font face

Left justified, Right justified, or centered

The flow of text should be easy to read.

4. Image - The image should be:

Proportionate

Sharp in color

With high resolution

With appropriate captions

5. Proximity and Harmony:

The elements should be close together and scattered and arranged apart from each other.
Elements should not be cluttered and not compete with each other.

6. Consistency:

There should be uniformity of theme on each page.

7. Color and Shape:

Use color to create interest by providing variety in the design (color contrast and shapes).

8. Emphasis:

There should be one point of interest in a page. The elements to be emphasized should have a
different size, color, shape, or background.

SOURCES OF PHOTOS AND GRAPHICS

1. Personal and Professional Photos:

• Taken by amateur or professional photographers.

• Downloaded and stored in the computer.

2. Scanned Images:

• Photos transferred from printed photos and graphics using scanning devices to your computer.
3. Stock Photo Library:

• Photographs and created images that are available for sale.

• Comes in CDs or DVDs

• Royalty-free

4. Online Stock Photos:

• Found in the World Wide Web (most dominant source)

• May be subjected to copyright and fees.

Online Digital File Formats

FILE FORMAT

• It is a ways of encoding and storing information to storage.

• Uses suffixes that are added to the end of the filename File Name Extensions.

• File Name Extensions. = It is a means of identifying the format of the file with a period before it
after the file name.

Digital File Formats

1. Proprietary Formats

• Owned and controlled by individuals or corporations.

• File format specifications are not available to the public

• Usually covered by copyrights.

2. Open Formats

• AKA Free File Formats

• Free and can be used by the public.

• Does not have copyrights or patents.

• Sustained and maintained by a group of individuals or organizations.

Digital File Formats Major Groups

1. Uncompressed or Raw Format: It is used for storing original file format. It is a flexible form but
needs bigger memory to store.

2. Lossless File Format: It is a file format that was compressed to replicate the original quality but
at a reduced file size. It is ideal for storing important files (images, audio, or video).

3. Lossy File Format – It is a file format that was compressed as an approximation of the original
file but is good enough. It has better compression rate requiring the least memory.
Image File Formats

These are means of storing and organizing digital images, photos, and illustrations.

It can be classified into two types:

• Raster/Bitmap Image Files

• Vector Graphics Files

Raster Image Files

• AKA Bitmap Image

• It is representing digital images in bits of information for storage, which translates to PIXELS
when viewed on screen.

• Majority of raster images are LOSSY.

• It is the common format you will encounter in the internet.

The concept of PIXELS

Pixels

• Pix = Picture; El = Element

• It is the smallest information of an image.

• It is represented by dots or squares that are arranged and added together to form a picture.

Types of Raster Image Formats

.bmp (.dib)

• Bitmap Image File

• Developed and used on Microsoft Windows environment.

• It is stored in the graphic file format called Device-independent Bitmap (DIB).

• Not common in www since it has a large file size.

.gif

• Graphic Interchange Format File

• It is very popular in www because of its portability (Small file size) and support for animation.

• It is ideal for images with large areas of uniform color, small images, images with text,
navigation buttons.

• It supports only a small 8-bits per pixel color scheme.

.jpg
• Standardized by Joint Photographic Experts Group (JPEG).

• It is a common method for photographic images as well as transmission of photos on the www.

• It supports 24-bit per pixel color scheme.

• Not ideal use on line art.

.png

• Portable Network Graphic (PNG)

• It is a free, open-source bitmap image format made to improve on GIF.

• It supports 24-bit per pixel color and true color (16 million colors).

• It does not support animation.

• Employs lossless compression.

.psd

• Photoshop Document (PSD)

• It is a native file format for Adobe Photoshop.

• Photoshop has the ability to read all of the other formats and edit them.

VECTOR Image Files

• AKA Vector Forma or Graphic

• These are lossless files created using mathematical geometric equations to represent images in
digital computer graphics.

• It retains the quality of the images in any desired image size.

• It is the preferred format for those who desire quality prints and display of images.

Types of VECTOR Image Formats

.ai

• Adobe Illustrator File

• It is the file extension for graphics created using Adobe Illustrator.

• It is created using paths and lines connected by points instead of bitmaps (objects, color, and
text).

.drw

• Drawing File

• It is a generic drawing created and stored in a vector format that uses lines or paths to represent
images.
• Apple Appleworks, Microsoft Picture It, CorelDraw, & Corel Paint Shop Pro.

.dxf

• Drawing Exchange Format File

• It is a drawing format developed and introduced by Autodesk, the maker of AutoCAD.

• It is used for computer-aided design (CAD) vector images.

.ps

• PostScript

• It is a Page Description Language (PDL) developed by Adobe.

• It is a language for printing documents on laser printers and image setters used to produce
camera ready copies.

• Can be changed in size without image quality loss.

.svg

• Scalable Vector Graphics (SVG)

• Most common vector graphic format in the internet.

• It was developed by The World Wide Web Consortium (W3C).

• It can be opened by Adobe, Corel, etc.

Basic Techniques of Image Manipulation

There are various ways to manipulate images:

- Resizing - Cropping

- Color Adjustment - Balance

- Brightness & Contrast - Combined Photos

- Combined Text & Photos - Added Effects

1. BACKGROUND COLOR

You can change the background if it does not match the image or the totality of the
presentation.

You can also add effects to the background.

2. MULTIPLE IMAGES

You can combine multiple images to make a point or use to highlight your message.

3. SHADOW
Using shadow effect will make the image realistic.

4. PROPORTION

When combining images, resize the image to make it proportionate and realistic.

5. BLENDING COLOR

You can use color blending to match the background with other elements in the page.

6. EMPHASIS

There should be a focal point to a page that will attract viewers. The element you want to
emphasize should be sharp, big, and most vibrant in your design.

Combining Text, Graphics, and Images

1. TRANSPARENT SHAPES

Add simple shapes with a slight transparency behind your text to clearly see the text you want
to emphasize.

2. FONTS AND SHAPES

Fonts and shapes should complement each other. You can use rounded shapes with rounded
fonts and sharp shapes with sharps fonts.

3. TEXT AND BACKGROUND

Text and background should be aligned to have an organized look. You can align text with
shapes or geometric figures in the image.

4. CLEAN AND CLEAR BACKGROUND

Use a clean and clear background for the message to be readable. Background should not
washout your message.

You might also like