You are on page 1of 4

5.

) Software as a Service – users will subscribe to a


Empowerment software only when needed rather than purchasing
Technology them. This is a cheaper option if you do not always
need to use a software.
INFORMATION AND COMMUNICATION TECHNOLOGY 6.) Mass Participation – diverse information sharing
● deals with the use of different communication technologies. through universal web access. Since most users can
● having a unified way to communicate is one of the goals of use the Internet, Web 2.0’s content is based on people
ICT. from various cultures.
INTERNET WEB 3.0
● was first introduced in 1974, in the first RFC regarding the ● one of the most important elements of Web 3.0 is the
Internet transmission Control Program. Semantic Web. It is also being described as Web 3.0 itself, but it
● the internet is an abbreviation of the words “inter-networking”. may have different meanings.
ICT IN THE PHILIPPINES ● Semantic Web – provides a common framework that allows
● Several international companies dub the Philippines as the data to be shared and reused across application, enterprise, and
“ICT Hub of Asia”. community boundaries.

Web 1.0 6 TYPES OF SOCIAL MEDIA


● When the World Wide Web was invented, most web pages Social Networks
were “static” ● is a website, application or online channel that enables web
users to create, co-create, discuss, modify, and exchange user-
● focused more on business and commercial purposes (e-mail,
e-commerce). generated content. (Facebook and Google+)
Bookmarking Sites
● Social Media and Multimedia were not present.
● These are sites that allow you to store and manage links to
● Internet was still separated from mobile, which relied on SMS
various websites and resources. (StumbleUpon and Pinterest)
technology.
Social News
WEB 2.0 ● These are sites that allow users to post their own news items
● Web 2.0 is the evolution of Web 1.0 by adding “dynamic” or links to other news sourve. (Reddit and Digg)
web pages Media Sharing
● The term was first used in a 1999 article written by Darcy ● These are sites that allow you to upload and share media
DiNucci called “Fragmented Future”. content like images, music, and video. (Flicker, Youtube, and
● Tim O’ Reilly, which was also the founder of the summit is Instagram)
Microblogging
dubbed as the person who coined the term Web 2.0.
● These are sites that focus on short updates from the user.
● He also described it as “Web as a Platform” wherein software
applications are web-based rather than being on a desktop. (Twitter and Plurk)
Blogs and Forums
FEATURES OF WEB 2.0
1.) Folksonomy – allows users to categorize and classify/ ● These websites allow users to post their content. Other users
arrange information using freely chosen keywords. are able to comment on the said topic. (Blogger, WordPress,
2.) Rich User Experience – content is dynamic and is and Tumblr)
responsive to user’s input.
3.) User Participation – the owner if the website is not the MOBILE TECHNOLOGIES
only one who is able to put content. Others are able to ● Smartphones and tablet devices can do tasks that were
place a content of their own by means of comments, originally found in personal computers.
reviews, and evaluations. ● 4g Network (LTE) which is currently the fastest mobile
4.) Long Tail – services that are offered on demand rather network.
on a one-time purchase. In certain case, time-based o iOs – Apple, iPad, iPhone, Mac
pricing is better than size-based pricing or vice versa.
o Android – an open source operating system developed either through the internet and local networks or
by Google. Being open source means several mobile data storage like flash drives and CDs
phone companies use this OS for free. b. Worm – a malicious program that transfer from one
o Blackberry OS – BlackBerry Devices computer to another by any type of means.
o Windows OS – a closed source and proprietary c. Trojan – a malicious program that is disguised as a
operating system develop by Microsoft. useful program but once downloaded or installed,
o Symbian – the original smartphone OS: Nokia leaves your PC unprotected and allows hackers to
o WebOS – originally used for smartphones: now used for get your information
smart TVs d. Rogue security software – tricks the user into
ASSISTIVE MEDIA posing that it is a security software. It asks users to
● A non- profit service designed to help people who have visual pay to improve his/her security but in reality they
and reading impairments. are not protected at all.
● A database of audio recordings is used to read to the user. e. Spyware – a program that runs in the background
without you knowing it. It has the ability to monitor
ONLINE SAFETY AND ETHICS what you are currently doing and typing through
● the internet is defined as the information superhighway key logging.
f. Key loggers – used to record the keystroke done
● anyone has access to this highway can place information and
by the users. This is done to steal their password
can grab information.
or any other sensitive information. It can record
Keeping yourself safe online.
email, messages, or any information you type
According to Google’s support, you should:
through your keyboard,
● check for viruses and malware g. Adware – a program designed to send you
● do an account security checkup future in your account’s page advertisements, mostly as pop ups.
that allows an overall checkup and for a possible update of your 2. Spam – unwanted email mostly from bots or
details. advertisers. It can be used to send malware
3. Phishing – its goal is to acquire sensitive personal
NETIQUETTE information like password and credit card details.
● set of rules for behaving properly online a. Pharming – a more complicated way of phising
● respecting other user’s views and displaying common courtesy where it exploits the DNS (Domain Name Service)
when posting your views to online discussion group. system.
CORE RULES OF NETIQUETTE
1. Remember the human
2. Adhere to the same standards of behaviour online that
you follow in real life.
3. Know where you are in cyberspace INTELECTUAL PROPERTY
4. Respect other people’s time and bandwidth If you create something – an idea, an invention, a form
5. Make yourself look good online of literary work, or a research, you have the right as to
6. Share expert knowledge how it should be used by others.
7. Help keep flame wars under control
8. Respect other people’s privacy CONREXTUALIZED ONLINE SEARCH AND RESEARCH
9. Don’t abuse your power SKILLS
10. Be forgiving of the people’s mistakes 1. Have a question in mind.
Focus on a question you want answered. If it is a series of
INTERNET THREATS questions, start with one. Never search everything on one go.
1. Malware – stands for malicious software. 2. Narrow it down.
a. Virus – a malicious program designed to replicate Search engines like Google, Bing, Yahoo use several filters to
itself and transfer from one computer to another determine the most appropriate result for you.
3. Advance Search
The best way to filter information you get from search engines is been reaping the benefits of the computer and of course the
by using the advanced search. This will allow you to filter out internet.
information you do not need. PRODUCTIVITY
In Microsoft search engine, Bing, you can use certain According to Hodgetts & Kuratko
keywords and symbols for your advance search It’s observed as a significant factor for success in an organization
and in a competitive situation.
Mail Merge
- One of the important reasons in using computers is its ability to
do recurring tasks automatically.
- A tool allowing a user to form a letters and mailing labels by
linking main documents to a certain set of data or data source.
Custom Animation and Timing
- We’ve all heard of Power point already and we’ve all probably
have used it more times than we can count our presentations, so
Similar to the MDAS, whenever you solve an arithmetic problem, there will be no argument against the application being one of the
term grouping and Boolean functions are supported in the most powerful tool we have in our arsenal.
following preferred order: Types of Animation:
1. Parenthesis • Entrance - animations determine how the slide object
2. Quotation Marks appears on the slide.
3. NOT + - • Emphasis - animation effect that determines how the
4. AND & element calls attention to itself while it is on-screen.
5. OR | • Exit - animation effects determine how an animated
4. Look for a credible source slide object disappears from the slide.
Some wikis, though filled with updated information, are not a • Motion Path - animations determine the route (path)
credible source. This is due to the fact that anyone can edit its and the direction in which the animated slide object
content. moves across or around on the slide.

5. Give credit
If you are going to use the information from a source for Hyperlinking in Presentations
educational purposes, give credit to original author of the page or - A PowerPoint is designed so that any objects in a slide show
information. from a symbol to a piece of text can be given an action setting.
ONLINE SEARCH SKILLS Integrating Images and External Materials
1. Google Search. - One feature that is valuable to all word processor is the ability
2. Use the “-” symbol to exclude terms to show images in the document.
3. Use the “~” symbol to search using synonyms - Integrating or inserting pictures in your document is fun and it
4. Use “site:website.com” then the search term to provide results improves the impression of your document.
from the specific website. Kinds of Materials:
5. Use an asterisk (*) if you do not know the exact terms 1. Pictures – Generally, these are electronic or digital
6. Use “related:website.com” to provide related websites pictures or photographs you have saved in any local
7. Use Google calculator storage device.
8. Use Google to convert currencies and measurement Three types of picture files:
9. Use Google to provide actual weather • .JPG or .JPEG – (Joint Photographic Experts Group)
10. Use Google to provide actual time • .GIF – (Graphics Interchange Format)
• .PNG – (Portable Network Graphics)
ADVANCEMENT AND TECHNOLOGY 2. Clip Art – This is generally a .GIF type; line drawing or
Advancement and Technology play a pivotal role in a business images used as a generic representation for ideas and
productivity. In fact, many businesses in the last decade have objects that you might want to integrate in your
document.
3. Shapes – These are printable objects or materials that
you can integrate in your document to enhance its
appearance or to allow you to have some tools to use
for representing ideas or messages.
4. Smart Art – Generally, these are predefined sets of
different shapes grouped together to form ideas that are
organizational or structural in nature.
5. Chart – Another type of material that you can integrate
in your word document that allows you to represent data
characteristics and trends.
6. Screenshot – the integration of a more realistic image
of what you are discussing on your report or manual.
Embedded Files and Data
- In Web page design, a multimedia file can be inserted or
embedded into the web page. This is what is called as an
embedded file, and the imbedded file can be about anything from
videos, music, and images.
Advance and Complex Formulas
- Excel is an application for spreadsheets, it helps monitor and
maintain data. Most companies value Excel for it aids in
calculating and analyzing numerical information.
COMPLEX FORMULA ORDER OF OPERATIONS:
1. Numbers in Parenthesis
2. Exponential calculations
3. Multiplication and Division
4. Addition and Subtraction

“FOCUS ON WHERE YOU WAN’T TO


GO NOT ON WHAT YOU FEAR.”

You might also like