You are on page 1of 3

REVIEWER IN ICT: that will ever attain with the current engine

 ICT IN THE PHILIPPINES schema. It is mainly true from the


The Philippine ICT industry is still expected to perspective of the machine conception
improve and become more profitable due to when opposed to human understanding.
the overall growth of the different sectors like  Accurate information of what the users
telecommunications, business process need should be put into the web
management, financial and health IT sectors.  TRENDS IN ICT
In 2016, IT industry size is 22.9 billion dollar. 1. Convergence- is the synergy of
 EVOLUTION OF WEB 1.0, 2.0, 3.0 technological advancement to work on similar
Web 1.0 Static Web goals or  tasks. 
 refers to the first stage of internet 2. Social Media- a website, application or
evolution. Before, there were just some online channel that enables web users to
content creators in Web 1.0 with most of create,  co create, discuss, modify, exchange
the users who are the consumers of user generated content. 
content. Types of Social Media 
 Read only website a) Social Networks – sites that
 has content that the user cannot allow you to connect with other
manipulate. people with the same  interest
Web 2.0 Dynamic Web or background. (Facebook,
 refers to the world wide site that highlights google) 
the user-generated content, b) Bookmarking sites- sites
interoperability, and usability for the end- that allow you to store and
users. Web 2.0 is called a participative manage links to various 
social web. Web browser technologies websites  
can be used in Web 2.0 development as c) and resources. (Stumble Upon, Pinterest) 
well as includes JavaScript and AJAX d) Social News- sites that allows
frameworks. users to post their own news
 MAJOR FEATURES OF THE WEB 2.0 items or links to other  new
1. Folksonomy- allows users to categorize sources (Reddit and Digg) 
or classify/arrange information using freely e) Media Sharing- sites that allows
chosen keywords. This is also referred as you to upload and share media
# hashtag. Example: FB, Twitter and IG #. content like images,  music and
2. Rich User Experience- content is video. (Flicker, Youtube and
dynamic and is responsive to users input. Instagram) 
Example: Website that shows local content f) Micro blogging- sites that
3. User Participation- the owner of the focus on short updates from
website is not the only one who is able to users. (Twitter and Plurk)
put content. Others place content of their g) Blogs and Forums- websites
own by means of comments, reviews and that allow users to post their
evaluation. Example: Online stores content. (Blogger, WordPress) 
4. Long tail- these are services that are 3. Mobile Technologies – Refers to
offered on demand rather than on a one smartphones and tablets that has
time purchase. Example: Data Plan the capability to do  Task that were
5. Software as a service- users will originally found on personal
subscribe to a software only when needed computers. 
rather than purchasing them. Example: Different Operating Systems: 
Google Docs
a) iOS – for apple devices such as iPhone
6. Mass Participation- diverse information
and iPad 
sharing through universal web access.
b) Android- mobile phones companies used
Since most users can use the internet,
this OS for free 
Web 2.0 is based on people from various
c) Blackberry OS – use for blackberry
cultures.
devices 
Web 3.0 Semantic Web
d) Windows Phone OS- a closed
 assures to establish “world’s information”
source of proprietary operating
in a reasonable way compared to Google
system developed by   Microsoft network services, doing nothing, or just
as replacement to windows annoying. 
mobile.   ● Worm – a malicious program that
e) Symbian- the original smartphone OS replicates itself, transferring from one
used by nokia devices  computer to another by  any type or means
f) WebOS- originally used for smartphones but not alter any files on your machine.  
now used in smart TVs  ● Trojan – a malicious program that
g) Window Mobile- discontinued family of disguises as a useful program but once
mobile operating downloaded or  installed, leaves your PC
 TIPS TO STAY SAFE ONLINE unprotected, and allows hackers to get your
 Internet Safety – refers to the online information. It is designed  to appear
safety of the people and their information harmless on the victim’s computer, but in
when using  the internet. It is an act of fact, it accesses files or extracts sensitive 
maximizing the user’s awareness of data.  
personal safety and security risk  to private ● Spyware – a program that runs in the
information and property associated with background without you knowing it (thus
using the internet and self-protection from  called “spy”).  It can monitor what you are
computer crime.  currently doing and typing through
 Netiquette – is short for “Internet keylogging.  
Etiquette”. It refers to the rules of online *Keyloggers used to record the keystroke
courtesy, proper  manners, and behavior done by the users. This is done to steal
online. It caters to the do’s and don’ts of their password or any other sensitive
online communication.  information. It can record email, messages,
1. Don’t share with anyone especially online or any information  you type using a
all the information with risk. Example: Full keyboard. 
name, Mother & Father Full name, Address, ● Adware – stands for advertising malware.
Birthday, Phone number, Email address, A program designed to send you
Bank accounts, and username and advertisements,  mostly as pop-ups. 
password that you always use via online. 3. Spam – an unwanted email mostly from
2. Always be mindful on what you share bots or advertisers. It can be used to send
online malware  and unsolicited message to large
3. Do not just simply accept terms and numbers of recipients for the purpose of
conditions, permitting apps or software to commercial  advertising.  
manipulate your mobile phone and computer 3. Phishing – an unwanted acquisition of
data. Practice reading it always before sensitive personal information like passwords
deciding to accept terms. and  credit card details. Its method is to
4. Do not share your password with anyone. gather personal information using deceptive
5. Avoid visiting and entering untrusted and emails and  websites.  
unknown websites. *Pharming a more complicated way
6. Install antivirus software on your computer of phishing where it exploits the DNS
and always update it to the latest. 7. Avoid (Domain  Name Service) System.  
downloading anything from untrusted  ADVANCED WORD PROCESSING
websites. SKILLS
8. Do not reply or click links from suspicious MAIL MERGE
emails.  is a handy feature that incorporates data
INTERNET THREATS   from both Microsoft Word and Microsoft
1. Malware – stands for malicious software. Excel and allows you to create multiple
It is a computer program designed to documents at once, such as letters, saving
infiltrate  and damage computers without you the time and effort of retyping the
user consent.   same letter over and over.
5 Type of Malware   Kinds of Materials 
● Virus – a malicious program designed to 1. Pictures these are electronic or digital
replicate itself and transfer from computer to pictures or photographs you have saved in
another  destroying data or crashing any  local storage device.
a) .JPG/JPEG Joint Photographic preparing reports that correlate and present
Experts Group. Like all the rest of the data oon graphical manner.
image file extensions, it identifies the 6. SCREEN SHOT Gets realistic image. Word
kind of data compression process provides snipping tool for your screenshot so
that it uses to make it more you can select and display only the part that
compatible and portable through the you exactly like to capture on your screen.
Internet. This type of image file can IMAGE REPLACEMENT
support 16.7 million colors that is why 1. In the text line Treats your image like a
it is suitable for use when working text font with the bottom side totally aligned
with full color photographic images. If with text line.
you are looking for the best quality 2. Square This setting allows the image you
image to integrate with your inserted to be placed anywhere within the
document then this is the image file paragraph with the text going around the
type for you. .JPG does not work well image in square pattern like a frame.
on lettering, line drawings, or simple 3. Tight This is almost the same as the
graphics. JPG images are relatively Square setting, but here the text “hug” or
small in file size. conforms to the general shape of the
b) .GIF raphics Interchange Format. This type image.
of image file is capable of displaying 4. This setting allows the text on your
transparencies. Therefore, it is good for document to flow even tighter taking the
blending with other materials or elements contours and shape of the image.
in your document. It is also capable of 5. Top and Bottom This setting pushes the
displaying simple animation. The downside texts away vertically to the top and/or the
is that it can only support up to 256 colors bottom of the image so that the image
so it is good mostly on logos and art occupies a whole text line on its own.
decors with very limited, and generally 6. Behind Text This allows your image to be
solid colors. .GIF is much better for logos, dragged and placed anywhere on your
drawings, small text, black and white document but with all the texts floating in
images, or low-resolution files.  front of it. It effectively makes your image
c) .PNG It stands for Portable Network look like a background.
Graphics. It was built around the 7. In front of the text this setting allows your
capabilities of .GIF. Its development was image to be placed right on top of the text
basically for the purpose of transporting as if your image was dropped right on it.
images on the Internet at faster rates. That means whatever part of the text you
.GIFs, it does not support animation but it placed the image on, it will be covered by
can display up to 16 million colors, so the image
image quality for this image file type is also
remarkably improved. .PNG allows the
control of the transparency level or opacity
of images.
2. Clip Art These are line drawings or images
used as generic representations for ideas and
objects in Word Documents.
3. Shapes These are printable objects and
materials that you can integrate in your
document to enhance its appearance to allow
you to have some tools to use for representing
ideas and messages.
4. Smart Art These are pre defined sets of
different shapes grouped together to form
ideas that are organizational or structural in
nature.
5. Chart Allows you to represent data
characteristics and trends in your word
document. This is useful when you are

You might also like