Professional Documents
Culture Documents
1st Day Reviewer ML
1st Day Reviewer ML
MOUNTAINEERING
- Defined as a sport in attaining or
attempting to attain high points in
mountainous regions, mainly for
the pleasure of the climb.
- Enthusiasts see this as a sport, a
profession or recreation as it
challenges one’s determination,
capacity, and skills.
PHILOSOPHY
It is the “study of the fundamental
nature of knowledge, reality, and
existence.”
It helps us better understand who
we are, why we are here, and
where we are going.
ETHICAL THEORIES
VIRTUE ETHICS- Virtuous, or
moral character.
DEONTOLOGICAL ETHICS- Duty
ethics adhering to ethical
principles.
CONSEQUENTIALISM- The
morality of an action upon the
consequences of the outcome.
dealings are witnessed by Allah.
Adherence to the moral code and
ethical behavior is part of the Six
Pillars of Iman.
1. Practice freedom of
enterprise
2. Be honest and truthful
3. Trade through mutual
consent
4. Treat workers fairly
5. Keep one’s word
6. Be humble
7. Seek halal earnings
IMPACT OF BUDDHISM IN
BUSINESS PRACTICES:
Buddhism’s main tenet is to do
no harm. An analysis will show that
Buddhism can affect business
practices positively.
1. Foster minimalistic world
view and free oneself
from worldly
attachments.
2. Strike a balance between
toiling and overworking.
IMPACT OF BELIEF SYSTEM IN 3. The Eightfold path states
BUSINESS to say the truth, practice
non-harm in words and
actions, and commit no
IMPACT OF CHRISTIANITY IN wrong.
BUSINESS PRACTICES: 4. Must free oneself from
Christians glorify God in many temptations, cravings,
ways through worship, evangelism, and distractions.
giving alms, having faith and doing 5. No exploitation.
actions in imitation of God. They
apply their beliefs to align with IMPACT OF JUDAISM IN
business practices are BUSINESS PRACTICES
demonstrated in examples below: There are 613 mitzvot
1. In producing goods (commandments) that are equal in
2. In employing people and importance to the “Ten Commandments”.
being employed 1. Business in good faith.
3. In buying and selling 2. Treatment of workers.
4. In earning profit 3. Trading
IMPACT OF ISLAM TO
BUSINESS PRACTICES: THE SIX PILLARS OF FAITH (IMAN) IN
The Islamic Code of Ethics is ISLAM
governed strictly so that Muslims 1. Belief in the existence and unicity
are required to behave in of Allah.
accordance to it because all 2. Belief in the existence of Angels.
3. Belief in the books of Allah.
4. Belief in Allah’s messengers and
that Muhammad is the last of them.
5. Belief in the Day of Judgement.
6. Belief in the Qadhaa’ & Qadr
(Doom & Divine Decree)
1. Right understanding
(Samma ditthi)- to understand
wholesome deeds and
comprehend the law of Karma.
TYPES OF COMPUTER:
SUPERCOMPUTERS- used to email, designing graphics and
process very large amounts of even playing games.
information including processing Examples:
information to predict hurricanes, Word Processing
satellite images and navigation, Software
and process military war scenarios. Spreadsheet Software
MAINFRAMES- used by Database Software
government and businesses to Presentation Graphic
process very large amounts of Software
information. Graphics Software
PERSONAL COMPUTERS (PC)- Multimedia Software
smaller and less powerful than the
others. They are used in homes, PARTS OF A COMPUTER
schools, and small businesses.
SYSTEM UNIT- this houses the
ELEMENTS OF A COMPUTER SYSTEM Motherboard, Microprocessor,
Memory Chips, Buses, Ports,
A. PEOPLEWARE- refers to the Expansion Slots, and Cards.
role people play in usage, MOTHERBOARD/ MAINBOARD/
maintenance, and development of SYSTEM BOARD- The main
hardware and software. circuit board of a computer. It
B. HARDWARE- refers to the set contains all the circuits and
of electronic program instructions components that run the computer.
or data a computer processor CENTRAL PROCESSING UNIT
reads in order to perform a task or (CPU)- The processor is the main
operation. “brain” or “heart” of a computer
C. SOFTWARE- if a computer is to system. It performs all of the
function, software is not functional. instructions and calculations that
Everything that a computer does, are needed and manages the flow
from the time you turn the power of information through a computer.
switch on until you shut the system PRIMARY STORAGE- Is the
down, is under the control of computer’s working storage space
software. that holds data, instructions for
2 general categories of software: processing and processed data
System Software- includes the (information) waiting to be sent to
programs that are dedicated to secondary storage.
managing the computer’s TYPES OF PRIMARY STORAGE
hardware and software resources Read Only Memory (ROM)- Is
in order for the computer to work non-volatile, meaning it holds data
efficiently. even when the power is ON or
Examples: OFF.
Operating System (OS) Random Access Memory (RAM)-
Software Utilities Is volatile, meaning it holds data
Disk Operating System only when the power is ON.
(DOS)
SECONDARY STORAGE
Application Software- productivity DEVICES- Device use for storing
programs or end-user programs or safekeeping of files.
that enables users to complete Examples:
task such as creating documents, Floppy Disk Drive (Diskette)
doing online research, sending Optical Drives
CD- Compact Disc Philippines is one of the largest
VCD- Video Compact Disc countries which houses BPO
DVD- Digital Versatile Disc centers.
Hard Disk Drive (HDD) There are 106.8 cellphones for
Flash Disk Drive (FDD) every 100 Filipinos.
Solid State Drive (SSD)
Tim Berners-Lee created the World Wide
INPUT DEVICES- Device used to Web.
enter data or give instructions to
the computer. Web 1.0 (Static Page) – it is the
Examples: “readable” phrase of the World
Keyboards Wide Web with flat data. A static
Mouse pages’ meaning users cannot
Microphone interact with the page and the page
Camera is in read-only format.
Stylus Pen Examples:
Touch Screen Shopping carts
Bar Code Reader Mp3.com
Scanners
Web 2.0 (Dynamic Page)- it is the
OUTPUT DEVICES- Device that “writable” phrase of the World
are used to display or produce the Wide Web with interactive data. It
outputs of the computer. allows users to interact more freely
Examples: with each other. It also encourages
Monitor participation, collaboration, and
Speakers information sharing.
Printers Examples:
Projectors YouTube
Flickr
Facebook
INTRODUCTION TO
INFORMATION Web 2.0- Dynamic Webpage
COMMUNICATION The term used to describe the
TECHNOLOGY collection of web applications used
for interaction and collaboration.
Digital Natives- a person born or It was coined by Darcy DiNucci in
brought up during the age of digital 1999. It does not refer to a new
technology. version of the web, just a refocus
of its use.
ICT IN OUR COUNTRY It is more than the retrieval of
In Philippines, dubbed by most as information. It is the participation
the ICT Hub in Asia due to the in a website.
growth of BPO Industries.
Time Magazine’s “The Selfiest Features of Web 2.0
Cities Around the World for 2014” 1. Folksonomy. It allows users to
placed two cities from the categorize and classify/arrange
Philippines in the top 1 and 9 information freely chosen
spots. keywords (tagging). This is also
Makati City- Ranked 1st referred to as hashtag.
Cebu City- Ranked 9th 2. Rich User Experience. Content is
dynamic and is responsive to
user’s input. An example would be 3. Vastness. The World Wide Web
a website that shows local content. already contains billions of web
3. Long Tail. Services are offered on pages.
demand rather than on a one-time 4. Vagueness. Certain words are
purchase. In certain cases, time- imprecise. The words "old" and
based pricing is better than file- "small" would depend on the user.
size-based pricing or vice versa. 5. Logic. Since machines use logic,
4. User Participation. The owner of there are certain limitations for a
the website is not the only one who computer to be able to predict what
is able to put content. the user is referring to at a given
(Amazon.com, Online stores) time.
5. Software as a Service. Users will
subscribe to a software only when Trends in ICT
needed rather than purchasing 1. Convergence- is the synergy of
item. (Google Docs, Word technological advancements to
Processor) work on similar goal or task. For
6. Mass Participation. It is a diverse example, besides using your
information sharing through personal computer to create word
universal web access. It is based documents, you can now use your
on people from various cultures. smartphone.
2. Social Media- a website,
application, or online channel that
enables web users to create, co-
create, discuss, modify, and
Web 3.0 and the Semantic Web exchange user generated content.
Semantic Web- is a movement led Six types of Social Media:
by the Word Wide Web A. Social Networks. Sites that allow
Consortium (W3C). It provides a you to connect with other people
framework that allows data to be with the same interests or
shared and reused to deliver web background.
content specifically targeting the Examples:
user. Facebook
Web 3.0- It is the “executable” Google+
phrase of Word Wide Web with
dynamic applications, interactive B. Bookmarking Sites. Sites that
services, and “machine-to- allow you to store and manage
machine” interaction. One links to various websites and
example of Web 3.0 is Tivo, a resources.
digital video recorder. Its recording Examples:
program can search the web and StumbleUpon
read what it finds to you based on Pinterest
your preferences.
C. Social News. Sites that allow
Several Problems of Web 3.0 users to post their own news items
1. Compatibility. HTML files and or links to other news sources.
current web browsers could not Examples:
support Web 3.0. Reddit
2. Security. The user's security is Digg
also in question since the machine
is saving his or her preferences. D. Media Sharing. Sites that allow
you to upload and share media
content like images, music, and
video. 4. Assistive Media- is a non-profit
Examples: service designed to help people
Flicker who have visual and reading
YouTube impairments. A database of audio
Instagram recordings is used to read to the
user.
E. Microblogging. Sites that focus
on short updates from the user.
Examples: RULES OF NETIQUETTE
Twitter Internet- defined as the
Plurk information superhighway.
Online Safety and Security-
F. Blogs and Forums. Websites common threats faced by the
allow users to post their content. netizens everyday include other
Examples: netizens with malicious intent
Blogger (scamming, phishing, and other
WordPress cybercrimes), unsecured
Tumblr programmed web applications, and
malwares (virus, worm, trojan
horse, etc.)
3. Mobile Technologies- The
popularities of smartphones and
tablet has taken a major rise over
the years. This is largely because
of the devices capability to do the
tasks that were originally found in
PCs.
Mobile OS:
A. iOS - used in Apple devices such
as the iPhone and iPad.
B. Android- an open source
operating system developed by
Google. Being open source means
several mobile phone companies
use this OS for free.
C. Blackberry OS - used in TIPS TO STAY SAFE ONLINE
Blackberry devices. Here are some tips to help you stay safe
D. Windows Phone OS- a closed when using the Internet.
source and proprietary operating 1. Be mindful of what you share
system developed by Microsoft. online and what site you share it
E. Symbian- the original smartphone to.
OS; used by Nokia devices. 2. Do not just accept terms and
F. Webos- originally used for conditions; read it.
smartphones; now used for smart
TVs.
G. Windows Mobile- developed by
Microsoft® for smartphones and
pocket PCs.
3. Check out the privacy policy page transfer from one computer to
of a website to learn how the another either through the Internet
website handles the information and local networks of data storage
you share.
4. Know the security features of the
social networking site you use. By
keeping your profile private, search
engines will not be able to scan
your profile.
5. Do not share your password with
anyone.
6. Avoid logging in to public
networks/Wi-Fi. Browsing in
"incognito (or private) mode," a Like flash drives and CDs.
feature of the browser, will not b. Worm - a malicious program that
protect you from hackers. transfers from one computer to
7. Do not talk to strangers whether another by any type of means
online or face-to-face. Often, it uses a computer network
8. Never post anything about a future to spread itself. For example, the
vacation. It is similar to posting, ILOVEYOU worm (Love Bug
"Rob my house at this date." Worm) created by a Filipino,
9. Add friends you know in real life. c. Trojan - a malicious program that
10. Avoid visiting untrusted websites. is disguised as a useful program
11. Install and update an antivirus but once downloaded or installed,
software on your computer. Use leaves your PC unprotected and
only one anti-virus software to allows hackers to get your
avoid conflicts. Information.
12. If you have a Wi-Fi at home, make *Rogue security software -
it a private network by adding a tricks the user into posing that it is
password. a security software. It asks the
13. Avoid downloading anything from user to pay to improve his/her
untrusted websites. You are most security but in reality, they are not
vulnerable in peer-to-peer protected at all.
downloads (torrents) as the d. Spyware - a program that runs in
download is most likely not the background without you
monitored by the site owner. knowing it (thus called "spy”). It
14. Buy the software; do not use has the ability to monitor what you
pirated ones. are currently doing and typing
15. Do not reply or click links from through keylogging.
suspicious emails. *Keyloggers- used to record
the keystroke done by the users.
This is done to steal their
password or any other sensitive
information. It can record email,
Internet Threats messages, or any information you
Here are some of the threats you should type using your keyboard.
be aware of when using the Internet: e. Adware - a program designed to
1. Malware - stands for malicious send you advertisements, mostly
software. as pop ups.
a. Virus - a malicious program
designed to replicate itself and
2. Spam - unwanted email mostly 2. Your friends depend on you to
from bots or advertisers. It can be protect their reputation online.
used to send malware. Talk to your friends about this
3. Phishing- Its goal is to acquire serious responsibility.
sensitive personal information like 3. Set your post to "private" In this
passwords and credit card details. way, search engines will not be
This is done by sending you an able to scan that post.
email that will direct the user to 4. Avoid using names. Names are
visit a website and be asked to easy for search engines to scan.
update his/her username, 5. If you feel that a post can affect
password, credit card, or personal you or other's reputation, ask
information. the one who posted it to pull it
*Pharming - a more down or report it as
complicated way of phishing where inappropriate.
it exploits the DNS (Domain Name
Service) system. Copyright Infringement
Intellectual Property- an idea, an
4. Scamming- an act of the attacker invention, a form of literary work, or
that seeks to gain the victim’s trust a research, you have the right as
takes advantage of the victim to to how it should be used by others.
perform further attacks. Copyright Law- includes your
5. Hacking- Obtaining unauthorized rights over your work, anyone who
access to data from a certain uses it without your consent is
computer network. punishable with law.
Copyright Page- you will find
Protecting Reputations Online disclaimer with the words: “No part
In the past, doing something of this book may be copied,
embarrassing was not much a big reproduced…”
deal.
Nowadays, embarrassing
moments are captured using any
device you could imagine.
This could impact not your Tips that could help you avoid
reputation but also the people copyright infringement:
around you. 1. Understand. Copyright protect
literary works, photographs,
Think Before You Click paintings, drawings, films, music
T- Is it True? (and lyrics), choreography, and
H- Is it Helpful? sculptures.
I- Is it Inspiring? 2. Be Responsible. Even if a
N- Is it Necessary? material does not say that it is
K- Is it Kind? copyrighted, it is not a valid
defense against copyright.
1. Before you post something on 3. Be Creative. Ask yourself whether
the web, ask these questions to what you are making is something
yourself: that came from you or something
Would you want your made from somebody else’s
parents or grandparents creativity.
to see it? 4. Know the Law. There are some
Would you want your limitations to copyright laws. It is
future boss to see it? also provision of “fair use” which
mean that intellectual property may correspondence from a simple
be used without a consent as long office memo to mail-merged from
as it is used in commentaries, letters with hundreds of addresses.
criticisms, search engines, ENVELOPES- Can be created or
parodies, news reports, etc. Word can read a letter you have
typed in the program, collect the
Online Research address information and
1. Have a question in mind. Focus automatically create a matching
on a question you want answered. envelope.
2. Narrow it down. Search engines
like Google, Bing, or Yahoo use FORMAT USING MS WORD:
several filters to determine the Header & Footer
most appropriate result for you. Headings, Subtitles
3. Advanced Search. The best way Cover Page
to filter information you get from Picture (format, arrange)
search engines is by using the Drop Cap
advanced search. It is also a set of Table of Contents
digital tool that aid user in References
performing research. Page Border, Color & Watermark
4. Look for credible source. Some
wikis, filled with updated
information, are not a credible MICROSOFT EXCEL- Electronic
source. When using wikis, check spread sheet programs were
out the link of the cited text. originally based on paper spread
5. Give credit. Give credit to the sheets used for accounting. The
original author of the page or horizontal rows are identified by
information. To properly site a numbers and the vertical
reference, you may use the format columns by letters of the
below. alphabet.
Name of the person or organization (the author of
the information). Title of the homepage in italics
MICROSOFT POWERPOINT-
(title shown in the title bar but is sometimes
APPLIED PRODUCTIVITY TOOL WITH Used to create professional looking
missing or unrelated). URL. Date last seen.
ADVANCED APPLICATION slide shows that can be displayed
on projectors or big screen TVs.
MICROSOFT WORD- the most FEATURES:
important word-processing office Slide Master
application used by students, Design
teachers, IT professionals and Transition
companies, etc. around the world. Animation (Entrance, Emphasis,
FEATURES: Exit, Motion Path)
Template Animation Pane
Clipboard
Font (Color, Size, Style) CREATING A PRESENTAION
Paragraph 24 is the default font size
Styles Dark background = light text
Editing Light Background = dark text
View Color Scheme
Animation & Transition should be
LETTERS- Microsoft enables you on point
to create a range of
A text or object that contains a link to
CREATING AN EFFECTIVE another life, web page, a place in a
PRESENTATION document, a link to a new document, or an
Minimize- keep slides to a email address.
minimum to maintain a clear
message and to keep the audience LINK TO OPTIONS:
attentive. a) Existing file or web page- creates
Clarity- avoid being fancy by using a hyperlink to website or a local file
a font style that is easy to read. saved in your hard drive.
Make sure that it is also easy to b) Place in this document- creates a
read. hyperlink that allows you to jump to
Simplicity- summarize the a specific slide in your
information on the screen. Limit presentation.
that content to six lines and seven c) Create a new document- creates
words per line also known as 6x7 a hyperlink that clicked, creates a
rule. new document on your specific
Visuals- use graphics to help you location.
in the presentation but not too d) E-mail address- creates a
many to distract the audience. hyperlink that opens Microsoft
Consistency- make your design outlook that automatically adds
uniform. Avoid having different font your specified recipient on a new
styles and backgrounds. mail.
Contrast- use light font on dark
background or vice versa. In most
instances, it is easier to read on
the screen if the background is
dark.
EMBEDDING
The act of placing objects within the
presentation.
1. Go to Insert tab.
2. On the Text group, click on
Object.
3. The insert Object dialog box would
appear:
OPTIONS
a) Creates New- creates a new file
from scratch. You can select on a
wide variety of files listed.
b) Create from file- creates a file
from an existing file save in your
drive.
HYPERLINK