Professional Documents
Culture Documents
1-15
March 31, 2018regisjoyce
LESSON 1: INTRODUCTION
TO ICT
Web Pages
Web page is a hypertext document connected to the World Wide Web. It is a document that
is suitable for the World Wide Web.
The different online platforms of World Wide Web:
1. Web 1.0 – refers to the first stage in the World Wide Web, which was entirely made up of
the Web pages connected by hyperlinks.
2. Web 2.0 – is the evolution of Web 1.0 by adding dynamic pages. The user is able to see
a website differently than others.
– Allows users to interact with the page; instead of just reading the page, the user may be
able to comment or create user account.
3. Web 3.0 – this platform is all about semantic web.
– Aims to have machines (or servers) understand the user’s preferences to be able to
deliver web content.
Static Web Page- is known as a flat page or stationary age in the sense that the page is ‘’as
is’’ and cannot be manipulated by the user. The content is also the same for all users that is
referred to as Web 1.0
Dynamic Web Pages– web 2.0 is the evolution of web 1.0 by adding dynamic web pages.
The user is able to see website differently than others e.g. social networking sites, wikis,
video sharing sites.
FEATURES OF WEB 2.0
1. Folksonomy- allows user to categorize and classify information using freely chosen
keywords e.g. tagging by FB, Twitter, use tags that start with the sign #, referred to as
hashtag.
2. Rich User Experience – content is dynamic and is responsive to user’s input
3. User Participation- The owner of the website is not the only one who is able to put content.
Others are able to place a content of their own by means of comments, reviews and
evaluation e.g. Lazada, Amazon.
4. Long Tail– services that are offered on demand rather than on a one-time purchase. This is
synonymous to subscribing to a data plan that charges you for the amount of time you spent
in the internet.
5. Software as a services- users will be subscribe to a software only when needed rather than
purchasing them e.g. Google docs used to create and edit word processing and spread sheet.
6. Mass Participation– diverse information sharing through universal web access. Web 2.0’s
content is based on people from various cultures.
TRENDS IN ICT
b)Bookmarking Sites – Sites that allow you to store and manage links to various website
and resources. Most of the sites allow you to create a tag to others.
Stumble Upon, Pinterest
c) Social News – Sites that allow users to post their own news items or links to
other news sources. The users can also comment on the post and comments may also be
rank.
Ex. Reddit and Digg
d) Media Sharing – sites that allow you to upload and share media content like images,
music and video.
Ex. Flickr, YouTube and Instagram
e) Microblogging – focus on short updates from the user. Those that subscribed to the user
will be able to receive these updates.
Ex. Twitter and Plurk
f) Blogs and Forums – allow user to post their content. Other users are able to
comment on the said topic.
Ex. Blogger, WordPress and Tumblr
3. Mobile Technologies– The popularity of smartphones and tablets has taken a major rise
over the years. This is largely because of the devices capability to do the tasks that were
originally found in PCs. Several of these devices are capable of using a high-speed internet.
Today the latest model devices use 4G Networking (LTE), which is currently the fastest.
MOBILE OS
iOS – use in apple devices such as iPhone and iPad
Android – an open source OS developed by Google. Being open source means mobile
phone companies use this OS for free.
Blackberry OS – use in blackberry devices
Windows phone OS – A closed source and proprietary operating system developed by
Microsoft.
Symbian – the original smartphone OS. Used by Nokia devices
WebOS- originally used in smartphone; now in smart TVs.
Windows Mobile – developed by Microsoft for smartphones and pocket PCs
4. Assistive Media– is a non- profit service designed to help people who have visual and
reading impairments. A database of audio recordings is used to read to the user.
-Instead of running an e-mail program on your computer, you log in to a Web
e-mail account remotely. The software and storage for your account doesn’t exist
on your computer – it’s on the service’s computer cloud.
It has three components
1. Client computers – clients are the device that the end user interact with cloud.
2. Distributed Servers – Often servers are in geographically different places, but server acts
as if they are working next to each other.
3. Datacenters – It is collection of servers where application is placed and is accessed via
Internet.
TYPES OF CLOUDS
PUBLIC CLOUD allows systems and services to be easily accessible to the general public.
Public cloud may be less secured because of its openness, e.g. e-mail
PRIVATE CLOUD allows systems and services to be accessible within an organization. It
offers increased security because of its private nature.
COMMUNITY CLOUD allows systems and services to be accessible by group of
organizations.
HYBRID CLOUD is a mixture of public and private cloud. However, the critical activities
are performed using private cloud while the non-critical activities are performed using
public cloud.
LESSON 2: ONLINE SAFETY,
SECURITY AND RULES OF
NETIQUETTE
INTERNET SAFETY- it refers to the online security or safety of people and their
information when using internet.
NETIQUETTE- is network etiquette, the do’s and don’ts of online communication.
ConfidentIality
Data confidentiality
Privacy
Integrity
Data integerity System integrity
Availability
Threat Consequence Threat Action ( Attack)
Exposure: Sensitive data are directly released to
an unauthorized entity.
Interception: An unauthorized entity directly
accesses sensitive data traveling between
Unauthorized Disclosure authorized sources and destinations.
A circumstance or event whereby an Inference: A threat action whereby an
entity gains access to data for which unauthorized entity indirectly accesses sensitive
the entity is not authorized. data by reasoning from characteristics or
byproducts of communications.
Intrusion: an unauthorized entity gains access to
sensitive data by circumventing a system’s
security protections.
Disruption Incapacitation: prevents or interrupts system
A circumstances or even that operation by disabling a system component.
Corruption: Undesirably alters system operation
by adversely modifying system functions or data.
interrupts or prevents the correct Obstruction: A threat action that interrupts
operation of system services and delivery of system services by hindering system
functions. operation.
Deception Masquerade: An unauthorized entity gains
A circumstance or event that may access to a system or performs a malicious act by
result in an authorized entity posing as an authorized entity.
receiving false data and believing it to Falsification: False data deceive an authorized
be true. entity.
Repudiation: An entity deceives another by
falsely denying responsibility for an act.
Usurpation
Misappropriation: An entity assumes
A circumstances or event that results
unauthorized logical or physical control of a
in control of system services or
system resource.
functions by an unauthorized entity.
Misuse: Causes a system component to perform a function or service that is detrimental to
system security.
Types of System Intruders
Masquerader
Hackers
Clandestine user
Parts of Virus
Infection mechanism
Trigger
PayloaD
Virus stages
Dormant phase
Virus is idle.
Propagation phase
Virus places an identical copy of itself into other programs or into certain system areas on t
the disk.
Triggering phase
Virus is activated to perform the function for which it was intended.
Caused by a variety of system events
Execution phase
Function is performed
Key Terms
Cyber crime- a crime committed or assisted through the use of the Internet.
Privacy Policy/Terms of Services (ToS) – tells the user how the website will handle its
data.
Malware- stands for malicious software.
Virus- a malicious program designed to transfer from one computer to another in any
means possible.
Worms– a malicious program designed to replicate itself and transfer from one file folder
to another and also transfer to other computers.
Trojan-a malicious program designed that is disguised as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hacker to get your
information.
Spyware– a program that runs in the background without you knowing it. It has the ability
to monitor what you are currently doing and typing through key logging.
Adware- a program designed to send you advertisement, mostly pop-ups.
Spam– unwanted email mostly from bots or advertisers.
Phishing- acquires sensitive personal information like passwords and credits card details.
Pharming- a more complicated way of phishing where it exploits the DNS system.
Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your
consent is punishable by law.
Fair Use- means that an intellectual property may be used w/o consent as long as it is used
in commentaries, criticism, parodies, research and etc.
Keyloggers- used to record the keystrokes done by user. This is done to steal passwords or
any other sensitive information.
Rogue security softwares– is a form of malicious software and internet fraud that misleads
users into believing there is a virus on their computer, and manipulates them into paying
money for a fake malware removal tool.
Four search strategies
Keyword searching
Enter terms to search
Use quotation marks to search as a phrase and keep the words linked together
Common words are ignored (That, to, which, a, the …)
+ and – can be used to include or exclude a word
Boolean
AND – enter words connect with AND- it will include sites where both words and found
Uses: joining different topics (i.e. global warming AND California)
OR – requires at least one of the terms is found.
Uses: join similar or synonymous topics (i.e. global warming OR greenhouse effect)
NOT – searches for the first term and excludes sites that have the second term.
(i.e. Washington NOT school)
Question
a question may be entered in the search field of search engine
Advanced
Features are offered on many engines by going to an “Advanced search” page and making
selections. Effective in narrowing search returns to a specific topic or phrase.
B. Label Generation
Included in the mail merge feature on Microsoft Word is the Label Generator. It just
makes sense that after you print out your form letters, you will need to send it to individual
recipients in an envelope with the matching address printed directly on the envelope or on a
mailing label to stick on. By using virtually the same process as a standard mail merge,
Microsoft Word will print individual addresses to a standard form that it has already pre-
formatted. Simply put, it creates a blank form document that simulates either a blank label
or envelope of pre-defined size and will use the data file that you selected to print the
information, typically individual addresses. So even in generating labels, the two essential
components of creating a merged document are present: the form document and the data
file. Only in this case, you did not have to type or create the form document yourself
because it was already created and pre-formatted in Microsoft Word. All you need to do is
select the correct or appropriate size for the label or envelope and select the data file that
contains the addresses (data) to be printed. You can also preview your merged labels before
printing if you want to.
II. Integrating Images and External Materials
Integrating or inserting pictures in your document is fun and it improves the
impression of your document. A common use of inserting a picture on a document is when
you are creating your resume. Though seemingly simple to do, your knowledge on the
different kinds of materials that you can insert or integrate in a Word document and its
characteristics can help you create a more efficient, richer document not only in content but
also in physical form. A better understanding of the physical form of your document as well
as the different materials you would integrate in it would allow you to be more efficient and
versatile in using Microsoft Word.
A. Kinds of Materials
There are various kinds of materials Microsoft Word is capable of integrating to make
the documents richer, more impressive, and more informative.
1. Pictures
Generally, these are electronic or digital pictures or photographs you have saved in
any local storage device. There are three commonly used types of picture files. You can
identify them by the extension on their file names.
a. .JPG/JPEG
This is pronounced as “jay-peg“ and is the short form of .jpeg or Joint Photographic
Experts Group. Like all the rest of the image file extensions, it identifies the kind of data
compression process that it uses to make it more compatible and portable through the
Internet. This type of image file can support 16.7 million colors that is why it is suitable for
use when working with full color photographic images. Unfortunately, it does not support
transparency and therefore, images of this file type can be difficult to integrate in terms of
blending with other materials or elements in your document. But if you are looking for the
best quality image to integrate with your document then this is the image file type for
you. .JPG does not work well on lettering, line drawings, or simple graphics. .JPG images
are relatively small in file size.
b. .GIF
This stands for Graphics Interchange Format. This type of image file is capable of
displaying transparencies. Therefore, it is good for blending with other materials or
elements in your document. It is also capable of displaying simple animation. Apparently,
this may not be too useful on a printed document but if you are sending documents
electronically or through email, or even post documents into a website, then this could be
quite impressive. The downside is that it can only support up to 256 colors so it is good
mostly on logos and art decors with very limited, and generally solid colors. .GIF is much
better for logos, drawings, small text, black and white images, or low-resolution files.
Example of a .gif format picture.
c. .PNG
This is pronounced as “ping“. It stands for Portable Network Graphics. It was built
around the capabilities of .GIF. Its development was basically for the purpose of
transporting images on the Internet at faster rates. It is also good with transparencies but
unlike .GIFs, it does not support animation but it can display up to 16 million colors, so
image quality for this image file type is also remarkably improved. .PNG allows the control
of the transparency level or opacity of images.
Smart Art
5. Chart
Another type of material that you can integrate in your Word document that allows you to
represent data characteristics and trends. This is quite useful when you are preparing reports
that correlate and present data in a graphical manner. You can create charts that can be
integrate in your document either directly in Microsoft Word or imported from external files
like Microsoft Excel.
Chart – Used to illustrate and compare data.
6. Screenshot
Sometimes, creating reports or manuals for training or procedures will require the
integration of a more realistic image of what you are discussing on your report or manual.
Nothing can get you a more realistic image than a screenshot. Microsoft Word even
provides a snipping tool for your screen shots so you can select and display only the part
that you exactly like to capture on your screen.
LESSON 4: Advanced
Spreadsheet Skills
1. What is a Spreadsheet Software? • allows users to organize data in rows an columns and
perform calculations on the data • These rows and columns collectively are called
worksheet.
2. 3. Examples of Spreadsheet Software: • LibreOffice Calc • OpenOffice.org Calc • Google
Sheets • Apple iWork Numbers • Kingsoft Office Spreadsheets • StarOffice Calc •
Microsoft Excel
3. 4. MICROSOFT EXCEL
4. 5. To open Microsoft Excel, Press “Windows Logo” + R then type “excel” then enter.
5. 6. Key Terms in MS Excel: • Row – horizontal line of entries in a table • Column – vertical
line of entries in a table • Cell – the place where info. is held in a spreadsheet
6. 7. Key Terms in MS Excel: • Active Cell – the selected cell • Column Heading – the box at
the top of each column containing a letter • Row Heading – the row number
7. 8. Key Terms in MS Excel: • Cell Reference – the cell address of the cell usually combine
letter and number (ex. A1, B4, C2) • Merge – combining or joining two or more cells •
Formula – is an expression which calculates the value of a cell.
8. 9. Key Terms in MS Excel: • Functions – are predefined formulas and are already available
in Excel • Formula Bar – the bar that displays the contents of a cell
9. 10. FUNCTIONS
10.11. BASIC MATH OPERATIONS: • =SUM(x,y) or =SUM(range) – returns the sum of x
and y or (all the numbers within the range) • =PRODUCT(x,y) – returns the product of x
and y • =QUOTIENT(x,y) – returns the quotient of x divided by y • =x-y – returns the
difference of x subtracted by y
11.12. BASIC MATH OPERATIONS: • =x+y – returns the sum of x and y • =x*y – returns the
product of x and y • =x/y – returns the quotient of x divided by y • =x-y – returns the
difference of x subtracted by y
12.13. OTHER FUNCTIONS: • =ABS(x) – returns the absolute value of x • =AVERAGE(x,y)
– returns the average of x and y • =CONCATENATE(x,y) – joins x and y
13.14. OTHER FUNCTIONS: • =IF(Condition, x, y) – returns x if the condition is true, else it
returns y • =ISEVEN(x) – returns true if x is an even number • =ISODD(x) – returns true if
x is an odd number
14.15. OTHER FUNCTIONS: • =COUNT(range) – counts the number of cell containing a
number within a range • =COUNTIF(range, criteria) – count the number of cell that fits
with the criteria within the range
15.16. OTHER FUNCTIONS: • =ISNUMBER(x) – returns true if x is a number • =ISTEXT(x)
– returns true if x is a text • =LEN(x) – returns the length of characters in x • =PROPER(x)
– returns the proper casing of x
16.17. OTHER FUNCTIONS: • =LEFT(x,y) – returns the characters of x specified by y (from
the left) • =RIGHT(x,y) – returns the characters of x specified by y (from the right) • =PI()
– returns the value of pi
17.18. OTHER FUNCTIONS: • =MIN(x,y) – returns the smallest number between x and y •
=MAX(x,y) – returns the largest number between x and y • =MIN(range) – returns the
smallest number within the range • =MAX(range) – returns the largest number within the
range
18.19. OTHER FUNCTIONS: • =POWER(x,y) – returns the value of x raised to the power of
y • =ROUND(x,y) – rounds x to a specified number of digits (y) =COLUMN(x) – returns
the column number of x • =ROW(x) – returns the row number of x
19.20. OTHER FUNCTIONS: • =SQRT(x) – returns the square root of x • =TRIM(x) –
removes extra spaces in x • =UPPER(x) – returns x in all capital form • =LOWER(x) –
returns x in non- capital form
20.21. OTHER FUNCTIONS: • =TODAY() – returns the current date • =NOW() – returns the
current date and time
21.22. EXERCISES
22.23. Consider this data: NAME MATH GRADE SCIENCE GRADE FILIPINO GRADE
ENGLISH GRADE A.P GRADE MARK 75 70 78 81 78 PETE 84 87 86 88 85 ANA 91 92
95 90 90 REA 73 75 74 75 70
23.24. Give the formulas to get : • Mark’s , Pete’s, Ana’s and Rea’s averages • The highest
grade that Ana got • The lowest grade that Mark got? • Sum of all Math Grade? Science?
A.P.? • Sum of all Rea’s Grades • The Lowest Number among all grades • The remarks
(Passed or Failed)
24.25. Now, consider this data: FIRST NAME MIDDLE NAME LAST NAME MARK
CURTIS WILLIAMS PETE MCCLOEY HARRISON ANA MONROE FRITZ REA TAN
COLLINS
25.26. Give the formulas to get : • Mark’s Full Name • Ana’s Full Name in Proper Case •
Count the number of letters that Pete’s Last Name has • “COLL” from Rea’s Last Name •
“LOEY” from Pete’s Middle Name • Combining “WILL” and “LINS” from Mark and
Rea’s Last Names respectively
LESSON 5: Advanced
Presentation Skills
Powerpoint is a highly innovative and versatile program that can ensure a successful
communication whether you’re presenting in front of potential investors, a lecture theatre or
simply in front of your colleagues. The following are the five features you should be using-
if youy aren’t already. Learn everything about these tips: they will improve your
presentation skills and allow you to communicate your message successfully. The five
features of powerpoint was
1)adding smart art
2)Inserting Shapes
3)Inserting and Image
4)Slide Transitions
5)Adding Animations
Creating an Effective Presentation
1. Minimize: Keep slides counts to a minimum to maintain a clear message and to keep the
audience attentive. Remember that the presentation is just a visual aid. Most information
should still come from the reporter.
2.Clarity: Avoid being to fancy by using font style that is easy to read. Make sure that it is
also big enough to be read by the audience. Once you start making your presentation,
consider how big the screen is during your report.
3.Simplicity: Use bullets or short sentences. Summarize the information on the screen to
have your audience focus on what the speaker is saying than on reading the slide. Limit the
content to six lines and seven words per line. This is known as the 6 x 7 rule.
4. Visual: Use graphics to help in your presentation but not too many to distract the
audience. In addition, instead of using table of data, use charts and graphs.
5. Consistency: Make your design uniform. Avoid having different font styles and
backgrounds.
6. Contrast: Use a light font on dark background or vice versa. This is done so that it is
easier to read. In most instances, it is easier to read on screen if the background is dark. This
is due to the brightness of the screen.
LESSON 6: Imaging and Design
for Online Environment
PHOTO EDITING
Photo editing encompasses the processes of altering images, whether they are digital
photographs, traditional photo chemical photographs, or illustrations. Traditional analog
image editing is known as photo retouching, using tools such as an airbrush to modify
photographs, or editing illustrations with any traditional art medium.
Graphic software programs
Which can be broadly grouped into vector graphics editors, raster graphics editors, and 3D
modelers are the primary tools with which a user may manipulate, enhance, and transform
images. Many image editing programs are also used to render or create computer art from
scratch.
BASIC OF IMAGE EDITING
1. RASTER IMAGESare stored in a computer in the form of a grid of picture elements or
pixels.
2. VECTOR IMAGESsuch as Adobe Illustrator, Inkscape and etc. are used to create and
modify vector images, which are stored as descriptions of lines, Bezier curves and text
instead of pixels.
DIFFERENCE BETWEEN RASTER AND VECTOR IMAGES
SELECTION One of the prerequisites for many of the app mentioned below is a method of
selecting part(s) of an image, thus applying a change selectively without affecting the entire
picture
Ø MARQUEE TOOL for selecting rectangular or other regular polygon-shaped regions
Ø LASSO TOOL for freehand selection of a region
Ø MAGIC WAND TOOL selects objects or regions in the image defined by proximity of
color or luminance
LAYERS which are analogous to sheets of transparent acetate, stacked on top of each other,
each capable of being individually positioned, altered and blended with the layers below,
w/o affecting any of the elements on the other layers.
IMAGE SIZE resize images in a process often called image scaling, making them larger,
or smaller. High image resolution cameras can produce large images which are often
reduced in size for Internet use.
CROPPING creates a new image by selecting a desired rectangular portion from the image
being cropped. The unwanted part of the image is discarded. Image cropping does not
reduce the resolution of the area cropped.
CLONING uses the current brush to copy from an image or pattern. It has many uses: one
of the most important is to repair problem areas in digital photos.
IMAGE ORIENTATION – Image editors are capable of altering an image to be rotated in
any direction and to any degree. Mirror images can be created and images can be
horizontally flipped or vertically flopped. Rotated image usually require cropping
afterwards, in order to remove the resulting gaps at the image edges.
PERSPECTIVE – is the art of drawing solid objects on a two- dimensional surface so as to
give the right impression of their height, width, depth and position in relation to each other
when viewed from a particular point.
SHARPENING AND SOFTENING– Sharpening makes images clearer. Too much
sharpening causes grains on the surface of the image. Softening makes images softer that
removes some of the highly visible flaws. Too much causes the image to blur.
SATURATION- is an expression for the relative bandwidth of the visible output from a
light source. As saturation increase, colors appear more “pure.’’ As saturation decreases,
colors appear more ‘’ washed-out.’’
CONTRAST AND BRIGHTENING
Contrast of images and brighten or darken the image. Underexposed images can be often be
improved by using this feature.
Brightening lightens the image so the photo brightens up. Brightness is a relative expression
of the intensity of the energy output of a visible light source.
Adjusting contrast means adjusting brightness because they work together to make a better
image.
PHOTO MANIPULATION
Photo manipulation involves transforming or altering a photograph using various methods
and techniques to achieve desired results. Some photo manipulations are considered skillful
artwork while others are frowned upon as unethical practices, especially when used to
deceive the public, such as hat used for political propaganda , or to make a product or
person look better.
DIFFERENCES
PHOTO EDITING – signifies the regular process used to enhance photos and to create
them ‘’Actual editing simple process’’. Also includes some of the regular programs used for
editing and expose how to use them.
PHOTO MANIPULATION – includes all simple editing techniques and have some
manipulation techniques like erasing, adding objects , adding some graphical effects,
background correction, creating incredible effect, change elements in an image, adding
styles , eliminating blemishes from a person’s face and changing the features of a person’s
body.
b.) Infographics
also known as data visualization, information design, and communication design
It is any graphic that display and explains information, whether that be data or words. When
we use the term ‘’infographics’’, we’re using it as a general term used to describe data
presented in a visual way.
Infographics are important because they change the way people find and experience stories.
Infographics are being used to augment editorial content on the web, it create a new way of
seeing the world of data, and they help communicate complex ideas in a clear and beautiful
way.
TYPES OF INFOGRAPHICS
1. Statistical
2. Process Flow
3. Geographic
PROCESS OF MAKING INFOGRAPHICS
1. Research
2. a)Know what is needed
3. b)Take a reference
4. c)Know the audience
5. d)Decide the type of infographics
6. Brainstorm
7. a)Gather ideas
8. b)Build thought process
9. Design
10.a) Choose your tool and start designing
11.Review
12.a) Cross check the data to deliver flawless output
13.Launch
14.a) Make it viral
15.b) Share on social network
BEST PRACTICES WHEN CREATING INFOGRAPHICS
1. a)Maintain a structure
2. b)Don’t use more than 3 color palletes
3. c)Typography matters a lot
4. d)Include source and references
2. Instagram
Weebly is one of the easiest website builders in the market. They allow you to drag and
drop content into a website, so it’s very intuitive to use (click here to see our opinion on
Weebly).
By using Weebly’s website building elements, you can literally drag them into your website
and have a website built relatively quickly, and painlessly. The beauty of this system is that
you can pretty much drag the elements to wherever you want – so it’s not very restrictive on
where and how you place your website content.
Weebly’s elements include pictures, paragraphs, videos, buttons, maps, contact forms –
basically all the basics for website building.
2. Tumblr
Pinterest is a free website that requires registration to use.Users can upload, save, sort, and
manage images—known as pins—and other media content (e.g., videos) through
collections known as pinboards. Pinterest acts as a personalized media platform. Users can
browse the content of others in their feed. Users can then save individual pins to one of their
own boards using the “Pin It” button, with pinboards typically organized by a central topic
or theme. Users can personalize their experience by pinning items, creating boards, and
interacting with other members. The end result is that the “pin feed” of each user displays
unique, personalized results.
Content can also be found outside of Pinterest and similarly uploaded to a board via the
“Pin It” button, which can be downloaded to the bookmark bar on a web browser, or be
implemented by a webmaster directly on the website. They also have the option of sending
a pin to other Pinterest users and email accounts through the “Send” button. Some websites
include red and white “pin it” buttons on items, which allow Pinterest users to pin them
directly.
Initially, there were several ways to register a new Pinterest account. Potential users could
either receive an invitation from an already registered friend, or they could request an
invitation directly from the Pinterest website that could take some time to receive. An
account can also be created and accessed by linking Pinterest to
a Facebook or Twitter profile. When a user re-posts or re-pins an image to their own board,
they have the option of notifying their Facebook and Twitter followers. This feature can be
managed on the settings page.
On the main Pinterest page, a “pin feed” appears, displaying the chronological activity from
the Pinterest boards that a user follows.
A “board” is where the user’s pins are located. Users can have several boards for various
items such as quotes, travel or, most popularly, weddings. A “pin” is an image that has
either been uploaded or linked from a website. Once users create boards and add pins, other
users can now repin, meaning they can pin one user’s image to their board as well. Once the
user has set up their account and boards, they can browse, comment, and like other pins.
Users might be discouraged by repeated images and difficult-to-follow direct linking
features. Pinterest has also added the option of making boards “secret” so that the user can
pin to and view boards that only the user can see when logged into their own account.
Pinterest does not generate its own content; rather, it draws from many resources around the
web and compiles them in one convenient location for users.
Before starting your project, your group should be able to do the necessary paperwork. This
allows experts to see if your project is doable over the time frame that was given and if it is
significant enough to be made into reality.
Accessing Stored Communications or hacking; Intentionally accessing, without
authorization, a facility through which an electronic communication service is provided.
The act of obtaining unauthorized access to data from computer network. This is typically
done to commercial and government sites to threaten its owner. In late 2015, a group
of Anonymous Philippines hacked the Twitter account of actress Maine Mendoza, who
plays the famous character Yaya Dub of the popular AlDub tandem and posted links and
messages on the account
4. Sports Betting
Sports Beating is engaging in the business of betting or wagering on any sporting event or
contest over the Internet. In some countries, gambling (including sports betting) is illegal
even if you are doing it over the Internet.
5. Non-Delivery of Merchandise
Devising any scheme to defraud, or for obtaining money or property by means of false or
fraudulent pretenses, or promises, and using the Internet for the purpose of executing the
scheme. The non-delivery scam occurs when the scammer places an item up for sale when
there is actually no item at all. The item is subsequently never delivered to the buyer after
they purchase the item.
6. Electronic/ Cyber Harassment
Cyber harassment refers to online harassment. Cyber harassment or bullying is the use of
email, instant messaging, and derogatory websites to bully or otherwise harass an individual
or group through personal attacks. Cyber harassment can be in the form of flames,
comments made in chat rooms, sending of offensive or cruel e-mail, or even harassing
others by posting on blogs or social networking sites. Cyber harassment is often difficult to
track as the person responsible for the acts of cyber harassment remains anonymous while
threatening others online. This usually applies to school-age children.
7. Child Pornography
Criminal Copyright Infringement, the act of piracy mainly for financial gain. In late 2014,
the number one pirate website, The PirateBay, was raided for the second time due to years
of pirating movies, music, games, books, and other software. These kinds of websites earn
money through advertsing.
Module from:
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/