REVIEWER IN ICT: that will ever attain with the current engine
ICT IN THE PHILIPPINES schema. It is mainly true from the
The Philippine ICT industry is still expected to perspective of the machine conception improve and become more profitable due to when opposed to human understanding. the overall growth of the different sectors like Accurate information of what the users telecommunications, business process need should be put into the web management, financial and health IT sectors. TRENDS IN ICT In 2016, IT industry size is 22.9 billion dollar. 1. Convergence- is the synergy of EVOLUTION OF WEB 1.0, 2.0, 3.0 technological advancement to work on similar Web 1.0 Static Web goals or tasks. refers to the first stage of internet 2. Social Media- a website, application or evolution. Before, there were just some online channel that enables web users to content creators in Web 1.0 with most of create, co create, discuss, modify, exchange the users who are the consumers of user generated content. content. Types of Social Media Read only website a) Social Networks – sites that has content that the user cannot allow you to connect with other manipulate. people with the same interest Web 2.0 Dynamic Web or background. (Facebook, refers to the world wide site that highlights google) the user-generated content, b) Bookmarking sites- sites interoperability, and usability for the end- that allow you to store and users. Web 2.0 is called a participative manage links to various social web. Web browser technologies websites can be used in Web 2.0 development as c) and resources. (Stumble Upon, Pinterest) well as includes JavaScript and AJAX d) Social News- sites that allows frameworks. users to post their own news MAJOR FEATURES OF THE WEB 2.0 items or links to other new 1. Folksonomy- allows users to categorize sources (Reddit and Digg) or classify/arrange information using freely e) Media Sharing- sites that allows chosen keywords. This is also referred as you to upload and share media # hashtag. Example: FB, Twitter and IG #. content like images, music and 2. Rich User Experience- content is video. (Flicker, Youtube and dynamic and is responsive to users input. Instagram) Example: Website that shows local content f) Micro blogging- sites that 3. User Participation- the owner of the focus on short updates from website is not the only one who is able to users. (Twitter and Plurk) put content. Others place content of their g) Blogs and Forums- websites own by means of comments, reviews and that allow users to post their evaluation. Example: Online stores content. (Blogger, WordPress) 4. Long tail- these are services that are 3. Mobile Technologies – Refers to offered on demand rather than on a one smartphones and tablets that has time purchase. Example: Data Plan the capability to do Task that were 5. Software as a service- users will originally found on personal subscribe to a software only when needed computers. rather than purchasing them. Example: Different Operating Systems: Google Docs a) iOS – for apple devices such as iPhone 6. Mass Participation- diverse information and iPad sharing through universal web access. b) Android- mobile phones companies used Since most users can use the internet, this OS for free Web 2.0 is based on people from various c) Blackberry OS – use for blackberry cultures. devices Web 3.0 Semantic Web d) Windows Phone OS- a closed assures to establish “world’s information” source of proprietary operating in a reasonable way compared to Google system developed by Microsoft network services, doing nothing, or just as replacement to windows annoying. mobile. ● Worm – a malicious program that e) Symbian- the original smartphone OS replicates itself, transferring from one used by nokia devices computer to another by any type or means f) WebOS- originally used for smartphones but not alter any files on your machine. now used in smart TVs ● Trojan – a malicious program that g) Window Mobile- discontinued family of disguises as a useful program but once mobile operating downloaded or installed, leaves your PC TIPS TO STAY SAFE ONLINE unprotected, and allows hackers to get your Internet Safety – refers to the online information. It is designed to appear safety of the people and their information harmless on the victim’s computer, but in when using the internet. It is an act of fact, it accesses files or extracts sensitive maximizing the user’s awareness of data. personal safety and security risk to private ● Spyware – a program that runs in the information and property associated with background without you knowing it (thus using the internet and self-protection from called “spy”). It can monitor what you are computer crime. currently doing and typing through Netiquette – is short for “Internet keylogging. Etiquette”. It refers to the rules of online *Keyloggers used to record the keystroke courtesy, proper manners, and behavior done by the users. This is done to steal online. It caters to the do’s and don’ts of their password or any other sensitive online communication. information. It can record email, messages, 1. Don’t share with anyone especially online or any information you type using a all the information with risk. Example: Full keyboard. name, Mother & Father Full name, Address, ● Adware – stands for advertising malware. Birthday, Phone number, Email address, A program designed to send you Bank accounts, and username and advertisements, mostly as pop-ups. password that you always use via online. 3. Spam – an unwanted email mostly from 2. Always be mindful on what you share bots or advertisers. It can be used to send online malware and unsolicited message to large 3. Do not just simply accept terms and numbers of recipients for the purpose of conditions, permitting apps or software to commercial advertising. manipulate your mobile phone and computer 3. Phishing – an unwanted acquisition of data. Practice reading it always before sensitive personal information like passwords deciding to accept terms. and credit card details. Its method is to 4. Do not share your password with anyone. gather personal information using deceptive 5. Avoid visiting and entering untrusted and emails and websites. unknown websites. *Pharming a more complicated way 6. Install antivirus software on your computer of phishing where it exploits the DNS and always update it to the latest. 7. Avoid (Domain Name Service) System. downloading anything from untrusted ADVANCED WORD PROCESSING websites. SKILLS 8. Do not reply or click links from suspicious MAIL MERGE emails. is a handy feature that incorporates data INTERNET THREATS from both Microsoft Word and Microsoft 1. Malware – stands for malicious software. Excel and allows you to create multiple It is a computer program designed to documents at once, such as letters, saving infiltrate and damage computers without you the time and effort of retyping the user consent. same letter over and over. 5 Type of Malware Kinds of Materials ● Virus – a malicious program designed to 1. Pictures these are electronic or digital replicate itself and transfer from computer to pictures or photographs you have saved in another destroying data or crashing any local storage device. a) .JPG/JPEG Joint Photographic preparing reports that correlate and present Experts Group. Like all the rest of the data oon graphical manner. image file extensions, it identifies the 6. SCREEN SHOT Gets realistic image. Word kind of data compression process provides snipping tool for your screenshot so that it uses to make it more you can select and display only the part that compatible and portable through the you exactly like to capture on your screen. Internet. This type of image file can IMAGE REPLACEMENT support 16.7 million colors that is why 1. In the text line Treats your image like a it is suitable for use when working text font with the bottom side totally aligned with full color photographic images. If with text line. you are looking for the best quality 2. Square This setting allows the image you image to integrate with your inserted to be placed anywhere within the document then this is the image file paragraph with the text going around the type for you. .JPG does not work well image in square pattern like a frame. on lettering, line drawings, or simple 3. Tight This is almost the same as the graphics. JPG images are relatively Square setting, but here the text “hug” or small in file size. conforms to the general shape of the b) .GIF raphics Interchange Format. This type image. of image file is capable of displaying 4. This setting allows the text on your transparencies. Therefore, it is good for document to flow even tighter taking the blending with other materials or elements contours and shape of the image. in your document. It is also capable of 5. Top and Bottom This setting pushes the displaying simple animation. The downside texts away vertically to the top and/or the is that it can only support up to 256 colors bottom of the image so that the image so it is good mostly on logos and art occupies a whole text line on its own. decors with very limited, and generally 6. Behind Text This allows your image to be solid colors. .GIF is much better for logos, dragged and placed anywhere on your drawings, small text, black and white document but with all the texts floating in images, or low-resolution files. front of it. It effectively makes your image c) .PNG It stands for Portable Network look like a background. Graphics. It was built around the 7. In front of the text this setting allows your capabilities of .GIF. Its development was image to be placed right on top of the text basically for the purpose of transporting as if your image was dropped right on it. images on the Internet at faster rates. That means whatever part of the text you .GIFs, it does not support animation but it placed the image on, it will be covered by can display up to 16 million colors, so the image image quality for this image file type is also remarkably improved. .PNG allows the control of the transparency level or opacity of images. 2. Clip Art These are line drawings or images used as generic representations for ideas and objects in Word Documents. 3. Shapes These are printable objects and materials that you can integrate in your document to enhance its appearance to allow you to have some tools to use for representing ideas and messages. 4. Smart Art These are pre defined sets of different shapes grouped together to form ideas that are organizational or structural in nature. 5. Chart Allows you to represent data characteristics and trends in your word document. This is useful when you are