You are on page 1of 5

SUBJECT any one computer can get information from

E-
any other computer.
World Wide Web

TECH
@ JHULIA ALESSANDRA An information system on the internet that
VILLANUEVA
allows documents to be connected to other
LESSON 1: INFORMATION TECHNOLOGY documents by hypertext links, enabling the
ICT– Information and Communication user to search for information by moving
Technologies from one document to another.
 Is an information space where documents
 It deals with the use of different and other web resources are identified by
communication technologies such as mobile URLs, interlinked by hypertext links, and
phones, telephone, Internet to locate, save, can be accessed via the Internet .
send, and edit information.  Invented by Tim-Berners Lee
 Is a study of computers as data processing
tools. It introduces students to the Web Pages
fundamental of using computer systems in  Web page is a hypertext document
an internet environment. connected to the World Wide Web. It is a
ICT in the Philippines document that is suitable for the World
Wide Web.
 Philippines is dub as the ‘’ICT Hub of
Asia” because of huge growth of ICT- The different online platforms of World Wide
related jobs, one of which is BPO, Business Web:
Process Outsourcing, or call centers. 1. Web 1.0 – refers to the first stage in the
 ICT Department in the Philippines is World Wide Web, which was entirely made
responsible for the planning, development up of the Web pages connected by
and promotion of the country’s information hyperlinks.
and communications technology (ICT) 2. Web 2.0 – is the evolution of Web 1.0 by
agenda in support of national development. adding dynamic pages. The user can see a
website differently than others.
Computer – an electronic device for storing and
processing data, typically in binary form, according  Allows users to interact with the page;
to instructions given to it in a variable program. instead of just reading the page, the user
may be able to comment or create user
Internet – is the global system of interconnected account.
computer networks that use the internet protocol 3. Web 3.0 – this platform is all about
suite (TCIP/IP) to link billions of devices semantic web.
worldwide.  Aims to have machines (or servers)
understand the user’s preferences to be able
to deliver web content.
 Means of connecting a computer to any
other computer anywhere in the world via Static Web Page - is known as a flat page or
dedicated routers and servers. stationary age in the sense that the page is ‘’as is’’
and cannot be manipulated by the user. The content
 Sometimes called simply ‘’the Net’’, is a
is also the same for all users that is referred to as
worldwide system of computer networks- a
Web 1.0.
network of networks in which the users at
Dynamic Web Pages – web 2.0 is the evolution of a) Social Networks – These are sites that
web 1.0 by adding dynamic web pages. The user allows you to connect with other people with
can see website differently than others e.g., social the same interests or background. Once the
networking sites, wikis, video sharing sites. user creates his/her account, he/she can set
up a profile, add people, share content, etc.
FEATURES OF WEB 2.0
Example: Facebook and Google+
1. Folksonomy - allows user to categorize and
classify information using freely chosen b) Bookmarking Sites – Sites that allow you
keywords e.g., tagging by FB, Twitter, use to store and manage links to various website
tags that start with the sign #, referred to as and resources. Most of the sites allow you to
hashtag. create a tag to others.
2. Rich User Experience – content is dynamic
Example: Stumble Upon, Pinterest
and is responsive to user’s input.
3. User Participation - The owner of the c) Social News – Sites that allow users to post
website is not the only one who is able to their own news items or links to other news
put content. Others can place a content of sources. The users can also comment on the
their own by means of comments, reviews, post and comments may also be rank.
and evaluation e.g., Lazada, Amazon.
Example: Reddit and Digg
4. Long Tail – services that are offered on
demand rather than on a one-time purchase. d) Media Sharing – sites that allow you to
This is synonymous to subscribing to a data upload and share media content like images,
plan that charges you for time you spent on music, and video.
the internet.
Example: Flickr, YouTube, and Instagram
5. Software as a service - users will be
subscribe to a software only when needed e) Microblogging – focus on short updates
rather than purchasing them e.g., Google from the user. Those that subscribed to the
docs used to create and edit word processing user will be able to receive these updates.
and spread sheet.
Example: Twitter and Plurk
6. Mass Participation – diverse information
sharing through universal web access. Web f) Blogs and Forums – allow user to post their
2.0’s content is based on people from content. Other users are able to comment on
various cultures. the said topic.
TRENDS IN ICT Example: Blogger, WordPress, and Tumblr
1. Convergence – is the synergy of 3. Mobile Technologies – The popularity of
technological advancements to work on a smartphones and tablets has taken a major
similar goal or task. For example, besides rise over the years. This is largely because of
using your personal computer to create word the devices capability to do the tasks that
documents, you can now use your were originally found in PCs. Several of
smartphone. these devices are capable of using a high-
2. Social Media – is a website, application, or speed internet. Today the latest model
online channel that enables web users web devices use 4G Networking (LTE), which is
users to create , co-create, discuss modify, currently the fastest.
and exchange user generated content.
MOBILE OS
Six types of Social Media:
 iOS – use in apple devices such as iPhone public. Public cloud may be less secured
and iPad. because of its openness, e.g., e-mail.
 Android – an open-source OS developed by  PRIVATE CLOUD - allows systems and
Google. Being open source means mobile services to be accessible within an
phone companies use this OS for free. organization. It offers increased security
 Blackberry OS – use in blackberry devices. because of its private nature.
 Windows phone OS – A closed source and  COMMUNITY CLOUD - allows systems
proprietary operating system developed by and services to be accessible by group of
Microsoft. organizations.
 Symbian – the original smartphone OS.  HYBRID CLOUD - is a mixture of public
Used by Nokia devices and private cloud. However, the critical
 WebOS- originally used in smartphone, activities are performed using private cloud
now in smart TVs. while the non-critical activities are
performed using public cloud.
 Windows Mobile – developed by Microsoft
for smartphones and pocket PCs. LESSON 2: Online safety, Security and Rules of
4. Assistive Media – is a non- profit service Netiquette
designed to help people who have visual and
INTERNET SAFETY - it refers to the online
reading impairments. A database of audio
security or safety of people and their information
recordings is used to read to the user.
when using internet.
5. e.g., Yahoo!, Gmail, HotmailCloud
computing -distributed computing on NETIQUETTE - is network etiquette, the do’s and
internet or delivery of computing service don’ts of online communication.
over the internet.
Key Terms
 Instead of running an e-mail program on
your computer, you log in to a Web e-mail Cybercrime - a crime committed or assisted
account remotely. The software and storage through the use of the Internet.
for your account doesn’t exist on your
Privacy Policy/Terms of Services (ToS) – tells the
computer – it’s on the service’s computer
user how the website will handle its data.
cloud.
Malware - stands for malicious software.
It has three components:
Virus - a malicious program designed to transfer
1. Client computers – clients are the
from one computer to another in any means
device that the end user interact with
possible.
cloud.
2. Distributed Servers – Often servers are Worms – a malicious program designed to replicate
in geographically different places, but itself and transfer from one file folder to another
server acts as if they are working next to and also transfer to other computers.
each other.
Trojan - a malicious program designed that is
3. Datacenters – It is collection of servers
disguised as a useful program but once downloaded
where application is placed and is
or installed, leaves your PC unprotected and allows
accessed via Internet.
hacker to get your information.
TYPES OF CLOUDS
Spyware – a program that runs in the background
 PUBLIC CLOUD - allows systems and without you knowing it. It has the ability to monitor
services to be easily accessible to the general
what you are currently doing and typing through Mail Merge – allows you to create documents and
key logging. combine or merge them with another document or
data file.
Adware - a program designed to send you
Two Components of Mail Merge
advertisement, mostly pop-ups.
I. Form Document - It is the first component
Spam – unwanted email mostly from bots or of mail merge document. It is generally the
advertisers. document that contains the main body of the
message we want to convey or send.
Phishing - acquires sensitive personal information
like passwords and credits card details. *Placeholders (data fields or merge fields)
- This marks the position on your form document
Pharming - a more complicated way of phishing where individual data or information will be
where it exploits the DNS system. inserted.
Copyright - a part of law, wherein you have the II. List or Data File - It is the second
rights to work, anyone who uses it w/o your consent component of mail merge document. This is
is punishable by law. where the individual information or data
needs to be plugged in(merged) to the form
Fair Use - means that an intellectual property may document is placed and maintained.
be used w/o consent as long as it is used in Integrating Images and External Materials
commentaries, criticism, parodies, research and etc.
JPG - Identifies the kind of data compression
Keyloggers - used to record the keystrokes done process that it uses to make it more compatible and
by user. This is done to steal passwords or any other portable through the internet.
sensitive information. - can support 16.7 million of colors
Rogue security softwares – is a form of malicious PNG - Good with transparencies
software and internet fraud that misleads users into
GIF - It can only support up to 256 colors.
believing there is a virus on their computer and
manipulates them into paying money for a fake Clip Art - Line art drawings or images used as
malware removal tool. generic representation for ideas and object that can
be integrated.
TEN RULES OF NETIQUETTE
Shapes - To enhance the appearance of your
1. Remember the human. document
2. Adhere to the same standards online that you Smart Art - Predefined sets of different shapes
follow in real life. grouped together to form ideas that are
3. Know where you are in cyberspace. organizational, or structural in nature.
4. Respect other people’s time and bandwidth. Chart - Correlate and present data in graphical
5. Make yourself look good online. manner.
6. Share expert knowledge.
Text Wrapping - Allows you to move the image in
7. Help keep flame wars under control.
position where you want it to appear in relation to
8. Respect other people’s privacy. the text on your document.
9. Don’t abuse your power.
10. Be forgiving of other people’s mistake. ADVANCE SPREADSHEET SKILLS
MS Excel - It provides an automated way of
Lesson 3 – MAIL MERGE
displaying any statistical data. It can be used an
automatically computer for several factors that are
not easy to notice especially when faced by a large Simplicity - Use bullets or short sentences.
data.
Visual - Use graphics to help you in your
Formula -  are useful in performing various presentation; however too many graphics might
mathematical, statistical, and logical operation. you distract the audience.
type in the formula, you must start with an equal
sign, so Excel knows that the data in the cell is a Consistency - Make your design uniform. Avoid
formula.  having different font styles and backgrounds per
slide.
Function - is a predefined formula that performs
calculations using specific values in a particular Contrast - Use a light font on a dark background or
order.  vice versa.

AverageIf Arguments
Range - Required. One or more cells to average, GOODLUCK!!
including numbers or names, arrays, or references
that contain numbers.
Criteria - Required. The criteria in the form of a
number, expression, cell reference, or text that
defines which cells are averaged.
Average_range - Optional. The actual set of cells
to average. If omitted, range is used.
Excel Function
COUNT - function used to count the cells with
content in a range.
SUM – function used to compute for the summation
of the number of a range.
AVERAGE – function used to compute
for the average of the number of ranges.
COUNTIF – function used to count the cells with a
specified content within a range.
SUMIF – function used to compute for the
summation of a range if a certain condition is met.
AVERAGEIF - function used to returns the
average (arithmetic mean) of all the cells in a range
that meet a given criteria.
ADVANCE PRESENTATION SKILLS
Presentation program - is used to design
presentations in the form of the slide show.
Minimize - Keep slide counts to a minimum to
maintain a clear message and to keep the audience
attentive.
Clarity - Avoid being fancy by using font style that
is easy to read. Make sure that it is also big enough
to be read by the audience.

You might also like