Professional Documents
Culture Documents
This is
FIRST QUARTER REVIEWER referred to as Web 1.0.
Lesson 1 – Introduction to ICT
Web 2.0: Dynamic Web Pages
ICT in Our Everyday Lives evolution of Web 1.0 by adding dynamic web
Online platforms, Sites, and Content pages—the user is able to see a website
Web 2.0 and Web 3.0 differently than others.
The World Wide Web Examples of Web 2.0 include social networking
Trends in ICT sites, blogs, wikis, video sharing sites, hosted
Online platforms, Sites, and Content services, and web applications.
Web 2.0 and Web 3.0 allows users to interact with the page: instead
The World Wide Web of just reading a page, the user may be able to
Trends in ICT comment or create a user account
also allows users to use web browsers instead
Information and Communication Technologies (ICT) of just using their operating system
use of different communication technologies Browsers can now be used for their user
such as mobile phones, telephone, Internet, etc. interface, application software (or web
to locate, save, send and edit information. applications), and even for file storage.
Most websites that we visit today are Web 2.0.
ICT in the Philippines (Info from book only)
Several international companies dub the Features of Web 2.0:
Philippines as the “ICT Hub of Asia” 1. Folksonomy
There is a huge growth of ICT-related jobs allows users to categorize and
around the country, one of which is the call classify/arrange information using freely
center or BPO (Business Process Outsourcing) chosen keywords (e.g., tagging)
centers Popular social networking sites such as
2013 edition of Measuring the Information Twitter, Instagram, Facebook, etc. use tags
Society by the International Telecommunication that start with the pound sign (#). This is
Union: There are 106.8 cellphones per 100 also referred to as hashtag.
Filipinos in the year 2012. 2. Rich User Experience
For every 100 Filipinos you meet, there is a high Content is dynamic and is responsive to
user’s input
change that they have a cellphone and
An example would be a website that shows
approximately for the seven of them, they have
local content
two
In the case of social networking sites, when
Annual Survey of Philippine Business and logged on, your account is used to modify
Industries, NSO, in 2010: the ICT industry shares what you see in their website
19.3% of the total employment population here 3. Long Tail.
in the Philippines Services are offered on demand rather than
Time Magazine’s “The Selfiest Cities around the on a one-time purchase
World” of 2013 places two cities from the In certain cases, time-based pricing is better
Philippines in the top 1 and top 10 spots. The than file-size-based pricing or vice versa
study was conducted using Instagram, a popular This is synonymous to subscribing to a data
photo sharing application. plan that charges you for the amount of
time you spent in the Internet, or a data
plan that charges you for the amount of
Web 1.0 bandwidth you used.
When the World Wide Web was invented, most 4. User Participation.
web pages were static The owner of the website is not the only
Static (also known as flat page or stationary one who is able to put content.
page) in the sense that the page is “as is” and
cannot be manipulated by the user.
Others are able to place a content of their 4. Vagueness
own by means of comment, reviews, and Certain words are imprecise. The words “old”
evaluation. and “small” would depend on the user.
Some websites allow readers to comment 5. Logic
on an article, participate in a poll, or review Since machines use logic, there are certain
a specific product (e.g., Amazon.com, online limitations for a computer to be able to predict
stores). what the user is referring to at a given time.
5. Software as a Service.
Users will subscribe to a software only Trends in ICT:
when needed rather than purchasing them. 1. Convergence
This is a cheaper option if you do not always Technological convergence is the synergy of
need to use a software. For instance, technological advancements to work on a
Google Docs is a free web-based application similar goal or task.
that allows the user to create and edit word 2. Social Media
processing and spreadsheet documents Social media is a website, application, or online
online. When you need a software, like a channels that enable web users to create, co-
Word Processor, you can purchase it for a create, discuss, modify, and exchange user-
one-time huge amount and install it in your generated content.
computer and it is yours forever. Six types of social media:
Software as a service allows you to “rent” a a. Social Networks – These are sites that allow
software for a minimal fee. you to connect with other people with the
6. Mass Participation. same interests or background.
It is a diverse information sharing through b. Bookmarking Sites – These are sites that
universal web access. allow you to store and manage links to
Since most users can use the Internet, Web various websites and resources.
2.0’s content is based on people from c. Social News – These are sites that allow
various cultures. users to post their own news items or links
to other news sources.
Web 3.0 and the Semantic Web d. Media Sharing – These are sites that allow
Semantic Web you to upload and share media content like
a movement led by the World Wide Web images, music, and video.
Consortium (W3C). e. Microblogging – These are sites that focus
The W3C standard encourages web developers on short updates from the user.
to include semantic content in their web pages. f. Blogs and Forums – These websites allow
According to the W3C, “The Semantic Web users to post their content.
provides a common framework that allows data 3. Mobile Technologies
to be shared and reused across application, The popularity of smartphones and tablets has
enterprise, and community boundaries.” taken a major rise over the years. This is largely
The aim of Web 3.0 is to have machines (or because of the devices’ capability to do tasks
servers) understand the user’s preferences to that were originally found in personal
be able to deliver web content specifically computers.
targeting the user. Kinds of Operating Systems:
a. iOS – used in Apple devices such as the
Several problems of Web 3.0: iPhone and iPad
1. Compatibility b. Android – an open source operating system
HTML files and current web browsers could not developed by Google. Being open source
support Web 3.0. means several mobile phone companies use
2. Security this OS for free.
The user’s security is also in question since the c. Blackberry OS – used in Blackberry devices
machine is saving his or her preferences. d. Windows Phone OS – a closed source and
3. Vastness proprietary operating system developed by
The World Wide Web already contains billions Microsoft
of web pages.
e. Symbian – the original smartphone OS; especially those that deliver common
used by Nokia devices government services.
f. WebOS – originally used by smartphones; Initially, the following development systems
now used for smart TVs will be targeted for integration: e-Serbisyo as
g. Windows Mobile – developed by Microsoft the single sign-on portal, Unified-Purpose ID
for smartphones and pocket PCs (UMID), the Philippines Key Infrastructure (PKI),
eBayad and the Philippines Government
4. Assistive Media Electronic Procurement System (PhilGEPS).
Assistive media is a nonprofit service designed to help
people who have visual and reading impairments. A Electronic Governance in Local Government Unit
database of audio recordings is used to read to the user. Projects (E-LGU Projects)
is intended to revolutionized local governance
Current State of ICT in the Philippines by making the LGUs electronically enabled
Electronic Government (e-Government) thereby improving the delivery of public
The use of information and communication services, promoting transparency in
technology and other web-based technology to government transactions and increasing public
enhance access of information and improve access to government information services,
delivery, efficiency and effectiveness of services among others. Some projects are:
to the public. Electronic Real Property Tax System (eRPTS)
Electronic Business Permit and Licensing
ICT Projects in the Philippines: System (eBPLS)
Electronic Treasury Operations
Nationwide Operational Assessment of Hazards (NOAH) Management System (eTOMS)
DOST’s mobile version of Project NOAH enables
Filipinos to access real time information Contact Center ng Bayan (CCB)
relevant to weather conditions and disaster is a joint initiative to improve service delivery
preparedness in the palm of their hands (mobile and reduce red tape in government frontline
phone) and new ways of using mobile devices, services. Through a single number, a citizen can
thereby saving lives and potential economic gain access to government services and
loss. information, report complaints and ask
assistance through various communication
Mobile Operational System for Emergency Services channels.
(MOSES)
Aims to support the current operations of Philippines Community eCenter (CeC)
project NOAH. - Design to help Local Disaster is a program that seeks to establish new CeCs in
Risk Reduction Management Council in making municipalities where there are no shared
decisions concerning the impending disaster, internet access facilities, transform existing
whether to declare suspension of works or school computer laboratories and internet
classes in schools or to take evacuation actions cages, where feasible, to become CeCs and
in their areas of concern. enhance and strengthen existing CeCs.
It can receive real-time weather and flood
information from PAGASA and Project NOAH. E-Government Philippines Health Insurance Corporation
Additionally, it allows users to access weather (PhilHealth)
data such as: temperature, moisture, and other Personally Controlled Health Records (PCHR) -
vital information directly accessible from The plan for PhilHealth to release specifications
Doppler radar, water level sensor, and water for PCHR to enable a transformation on health
gauges. data management is expected to recreate a
patient-centric care as well as stimulating a new
Integrated Government Philippines business sector on health data stewardship. The
is a joint project of DOST-ICTO and DOST-ASTI, PCHR will be owned by the patients and co-
the project aims to set-up a government- managed with their health providers such as
shared network that will facilitate, deployment hospitals and clinics
and integration of mission-critical ICT projects
iPinay Program Estrada Administration: Policies
The continuing commitment to address the 2000: The Electronic Commerce Act
gender ICT gap, by empowering more women Defines the government’s policies on e-
with ICTs. We are also engaging with more local commerce and electronic transactions
and international partners to provide Recognize electronic evidence as admissible
opportunities for our CeCs in various areas: in court
Health information services & telemedicine 2000: Government Information Systems Plan
Employment and Livelihood Opportunities (GSIP) 2000 framework (Executive Order 265 s.
Linking with Libraries 2000)
Global connection and Exchange with high Computerize key frontline and common
school government services and operation
Tech Age Girls Created Information Technology and
Micro-entrepreneurship & Business skills eCommerce Council (ITECC)
mentoring Community Based on line content Partnership between public and private
development. sectors for IT and eCommerce matters
ISP.COM strategy
Ramos Administration: Policies
1994: National Information Technology Plan Arroyo Administration: Policies
2000 (NITP2000) Placed ICT as a priority in its agenda
1994 & 1998: Executive Order 190 s. 1994 General Appropriations Act of 2004 – 2010
(amended by EO 469 in 1998) established the establishes an e-Government fund as
National Information Technology Council (NITC) source of funding for mission-critical, high-
Directly policy body in ICT matters in the impact, and cross-agency government ICT
country projects
Mandated the designation of Information Strengthened Information Technology and
System Planners in each government eCommerce Council (ITECC) which was created
agency to take charge. by President Estrada
1997: Government-approved IT21 was 2004: Commission on ICT (CICT), a de facto DICT
formulated CICT formulated Philippines IT Roadmap
Countries action agenda for year 2000 and Fell short compared to Malaysia’s
beyond Wawasan 2020 and Singapore’s iN2015
Promoted best practices in ICT governance (shortly after roadmap was formulated,
Encouraged outsourcing of government ICT National Broadband Network (NBN) scandal
projects to promote ICT growth erupted, consumed greater part of public
1997: Administrative Order 3332: Directives for attention
Government Agencies’ Internet Connectivity
Aims to connect for greater efficiency in Aquino Administration: Policies
communication and data interchange. Abolished CICT, instead moved IT directives
Government under DOST-ICTO (Information and
Academe Communication Technology Office)
Industry business sector Minimized red-tapes for starting a business, tax
Stimulate the growth of the Philippines web holidays for business operating in PEZA
– thereby strengthening the role of May 23, 2016: Signed into law bill creating the
telecommunications systems, network and Department of Information and
communications systems, content Communications Technology or DICT
management and applications to provide The department will promote ICT
better services development, institutionalize e-government
Meant to develop the Philippines and manage the country’s ICT environment
Information Infrastructure (PII) framework The department shall be the primary policy,
planning, coordinating, implementing, and
administrative entity of the Executive
Branch of the government that will plan,
develop and promote national ICT Who your Mother and Father are – full names
development agenda. are risky, especially the mother’s maiden name
as it could be an answer to a secret question for
Duterte Administration: Policies a lost password
Open PH to foreign telos (or telcos idk) to speed Who your siblings are – strangers can use their
up internet connections identity to dupe you
Develop national broadband plan for the Your address – criminals can find you
Philippines Your home phone number – scams use this to
Creation of NIPC or National ICT Confederation deceive and a stranger can pretend to know
of the Philippines your parents or can pretend to be you
Commit to create one million direct jobs Your birthday – prone to identity theft
and three million indirect jobs in the
countryside by 2020 The Internet is defined as the Information
superhighway = anyone has access to this highway,
Lesson 2 – Rules of Netiquette can place information, and can grab that
information
Netiquette
network etiquette, the do’s and don’ts of online Tips to Stay Safe Online:
communication 1. Be mindful of what you share online and what
site you share it to
10 best rules of netiquette: 2. Read before accepting terms and conditions
1. The Golden Rule 3. Check out the privacy policy page of a website
2. No Flaming 4. Know the security features of the social
3. Don’t type in all caps networking site you use
4. Don’t spam 5. Do not share your password with anyone
5. Don’t talk with people you do not know 6. Avoid logging in to public networks/Wi-Fi.
6. Obey Copyright Laws “Incognito browsing” won’t protect you from
7. Use proper grammar and spelling hackers
8. Be honest/Be yourself 7. Don’t talk to strangers whether online or face-
9. Follow the TOS (Term of Service) to-face
10. Shop secure sites 8. Never post anything about a future vacation
9. Add friends you know in real life
Online security, safety, and ethics 10. Avoid visiting untrusted websites
the internet is a powerful tool, but it also has 11. Install and update an antivirus software on your
“another side of the coin” computer
dangerous place if you do not know what you are 12. Make your Wi-Fi at home a private network by
doing adding a password
Internet Safety – online security or safety of 13. Avoid downloading anything from untrusted
people and their information when using the websites (torrents = most vulnerable, not
internet monitored by site owner)
HTTPS – “Hyper-Text Transfer Protocol Secure” 14. Buy the software, don’t use pirated ones
Types of Information: 15. Do not reply or click links from suspicious emails
First Name – hackers can know plenty of stuff
just from your first name Internet threats
Last Name – sharing both first and last names is 1. Malware
riskier; prone identity theft malicious software
Middle Name – not the riskiest; entire full name set of instructions that run on your computer
would be most risky and make your system do something that an
Current and previous schools (s) – can be used attacker wants it to do
for verification purposes good for stealing personal information, deleting
Your Cellphone Number – same as posting your files, clicking fraud, stealing software serial
number on a billboard numbers and using your computer as relay
kinds of malware:
Virus 2. Spam – transmission of unsolicited messages from
malicious program designed to replicate various origins using electric messaging systems;
itself and transfer from one computer unwanted email mostly from bots or advertisers
to another either through the internet 3. Phishing
and local networks or data storage like software or a program used by an attacker to
flash drives and CDs obtain personal information
a computer virus is a piece of malicious targets the passwords to hack and take control
computer code that attaches itself to a of a user account
software program, email or computer goal is to acquire sensitive personal information
file without your permission like passwords and credit card details
can transfer through the internet and
local networks or data storage like flash Pharming
drives and CD’s more complicated way of phishing where it
Worm exploits the DNS (Domain Name Service)
A malicious program that transfers from system
one computer to another by any type of
means How to avoid these threats?
uses computer network to spread itself A very effective way of avoiding these threats is
Example: ILOVEYOU worm, Love Bug verifying the authenticity and credibility of the
Worm created by Filipino WEB source.
Trojan
A malicious program that is disguised as Government Provisions for Online Courtesy and
a useful program but once downloaded Etiquette
or installed, leaves your PC unprotected Republic Act 10627 or Anti-Bullying Act of 2013
and allows hackers to get your Republic Act 10175 or Cybercrime Prevention
information Act of 2012
Rogue security software – tricks the
user into posting that it is a security Think Before You Click
software. It asks the user to pay to 1. Before you post something on the web, ask
improve his/her security but in reality these questions to yourself: Would you want
they are not protected at all your parents or grandparents to see it? Would
you want your future boss to see it? Once you
Both Trojan and Worm spread to other post something on the web, you have no
computers. control of who sees your posts.
2. Your friends depend on you to protect their
Spyware reputation online. Talk to your friends about
program that runs in the background this serious responsibility.
without you knowing it 3. Set your post to “private.” In this way, search
has the ability to monitor what you are engines will not be able to scan that post.
currently doing and typing through 4. Avoid using names. Names are easy for search
keylogging engines to scan.
Keyloggers – used to record the 5. If you feel that a post can affect you or other’s
keystroke done by the user. This is done reputation, ask the one who posted it to pull it
to steal their password or any other down or report it as inappropriate.
sensitive information. It can also record
email, messages or any information you Copyright (Copyright Infringement)
type using your keyboard intellectual property = If you create something
Adware —an idea, an invention, a form of literary work,
program designed to send your or a research, you have the right of how it
advertisement, mostly as pop-ups should be used by others
Some tips to avoid copyright infringement:
Understand – Copyright protects literary
works, etc. but it generally does not protect
underlying ideas and facts; you can express Tips in conducting online research
something using your own words but you 1. Have a question in mind
should give credit to the source 2. Narrow it down
Be responsible – Be responsible enough to 3. Advanced search (Google)
know if something has copyright Bing certain keywords and symbols for
Be creative – Ask yourself whether what advanced search:
you are making is something that came
from you or something made from
somebody else’s creativity
Know the law – in the Philippines,
copyrights only last a lifetime (of the
author) plus 50 years; there are also
provisions for “fair use” where intellectual
property may be used without consent as
long as it is used in commentaries,
criticisms, search engines, parodies, news
reports, research, library archiving, teaching
and education; fan-fiction is copyright
infringement and some copyright holders By default, all searches are AND searches
ignore them but they can opt to use their You must capitalize the NOT and OR functions
rights Stop words (commonly occurring words and
numbers that are omitted to speed a full-text
Effective Searching search) and all punctuating marks, except for
Search Engines: Google, YouTube, SlideShare, Scribd the symbols noted in this topic, are ignored
unless they are surrounded by quotation marks
What happens when you Google? or preceded by the + symbol
Only the first ten terms are used to get search
results
Similar to the MDAS, term grouping and
Boolean functions are supported in the
following order: parentheses, quotation marks,
NOT +-, AND &, OR|
Operators
Arithmetic
- (negative) % ^ (Exponent) * / +
Comparison
= < > <= >= <>
Text
Functions &
A predefined formula Reference
: (Colon) _ (Space) , (Comma)
Operator Order
Formulas are read from Left to Right
1. ( )
2. Negation
3. %
4. ^
5. or /
6. + or –
7. &
8. = < > <= >= <>
Conditional Summing
Formula that adds all the sales in January:
=SUMIF(B2:B13, “=Jan”, C2:C13)
Add up sales made by other sales
representative:
=SUMIF(A2:A13, “<> Rogers”, C2:C13)
Add up the sales greater than a certain value:
=SUMIF(C2:C13, “>500”,C2:C13)
*When inserting text to a web page, you can simply Editor Edit
copy a text to your html editor, or you can upload it 1. Open PhotoScape then choose editor
on a website as a PDF file. Most browsers support 2. Choose the folder where the image you want to
“add-ons” so that you can open PDF files without manipulate is located using the file explorer on
leaving the browser. the upper left
3. Once you have selected the folder, you will see
Principles and Basic Techniques of Image Manipulation a preview of all the images found on that folder
Tips to help you edit images for your website: at the bottom of the file explorer
1. Choose the right file format – Try to make a 4. From the preview, select the image you want to
real-life photograph into GIF to see the use. The image will now be shown on a much
difference between PNG, GIF, and JPEG. bigger preview inside your work area similar to
Knowing the purpose is the key to finding out what is shown below
the best file format. 5. Notice the properties of the image like the file
2. Choose the right image size – A camera with 12 name, the image size (in pixels), and the file size
megapixels constitutes to a bigger image size. found on the bottom of the preview
Monitors have a resolution limit, so even if you 6. Manipulate the image using the tools on the
have a million megapixels, it will not display bottom
everything. a. Home tab – this is where you can add a
3. Caption it – Remember to put a caption on frame, resize, sharpen, and add filters and
images whenever possible. If it is not related to effects to your image
the web page, then remove it. b. Objects tab – this is where you can place a
wide variety of images like texts, shapes,
Creating and Manipulating Images Using Photoscape and symbols
1. Viewer – picture viewer with features the same c. Crop – this is where various tools can be
with most image viewers like changing image found in order to properly crop an image to
orientation a desirable size
2. Editor – alters the appearance of a single image d. Tools – includes other tools like red eye
3. Batch Editor – alters the appearance of multiple correction, mole removal, mosaic effect and
images brush tools. For more information about a
tool, simply click it and a tip will be
displayed describing how to use it.
7. Click Save located on the lower right of the
program. The Save As dialog box will appear.
Save it in your activities folder with the file
name editorexer.jpg. Check the file size and see
how much space you need.
Batch Edit
one of the most useful tools when trying to easily
manipulate all images at the same time 4. Once selected, a progress bar will appear
1. Select the folder where your photos are indicating that the image is uploading. This may
located, then on the Preview window, drag the take a moment and will depend on your
photos you want to be part of the batch edit to Internet connection. Once you are done, you
the work area (center) will see an indicator similar to the one shown in
2. Use the tools on the right to edit your photo. the image below.
This is similar to the options in edit except the
Crop and Tools tab which are replaced by the
Filters tab. The Filters tab is used to add a
certain filter that will apply to all your photos.
3. Resize the pictures so that they do not exceed a. View Uploads – views photos you just
800 pixels in width. Add filters if you want. uploaded which also grants you options to
4. Click on Convert All button found on the upper share and edit them individually
right
5. The Save dialog box will appear that will allow b. Share Album – shares everything you just
you to change the location, the name of the uploaded plus the other contents of your
images, and the file type. specified folder
Infrastructure-as-a-Service (IaaS)
A service model that involves outsourcing the
basic infrastructure used to support
operations--including storage, hardware,
servers, and networking components.
The service provider owns the infrastructure
equipment and is responsible for housing,
running, and maintaining it. The customer
typically pays on a per-use basis.
The customer uses their own platform
(Windows, Unix), and applications
Professional User
foundation, input and output, hardware or
Platform-as-a-Service (PaaS) software, networking
A service model that involves outsourcing the maintained by system administrator
basic infrastructure and platform (Windows, combination of SAAS and PAAS
Unix)
PaaS facilitates deploying applications without
the cost and complexity of buying and
managing the underlying hardware and
software where the applications are hosted.
The customer uses their own applications
Professional User
Web application – dynamic or static, online
Mobile application – installed on mobile
phone
System application – apps installed in
computer