Empowerment educated generation ever; marked Ä Static – known as flat page
by the internet or stationary page; the page
Technologies is “as is” and cannot be silent generation – people who Information and Communication manipulated by the user; Technology (ICT) – deals with content is also the same for were born before 1945; best organized for their upholding the use of different all users; referred to as Web values; shows/have the loyalty communication technologies 1.0 to their own beliefs and posses Web 2.0 – a term coined by Darcy ICT in the Philippines DiNucci on January 1999; a strong work ethic • Several international evolution of Web 1.0 by adding baby boomers – born between 1946 companies dub the Philippines dynamic web pages—user is able and 1964; they believed that you as of the “ICT Hub of Asia” to see a website differently should dedicate your time and • There is a huge growth ICT- than others; allows user to effort into your career to be related jobs around the interact with the page; allows successful; independent, country, one of which is the user to use web browsers instead competitive, goal-centered, call center or BPO (Business of just using their operating focused Process Outsourcing) centers system • According to the 2013 edition generation x – born between 1965 of Measuring the Information features of web 2.0 and 1979; works in specialized Society by the International 1. folksonomy – allows user to and highly skilled jobs and more Telecommunication Union, categorize and likely to be valued by their there are 106.8 cellphones classify/arrange information talents; easily adapt to a per 100 Filipinos in the year using freely chosen keywords; continuous changing environment 2012 Twitter, Facebook, Instagram • Philippines is one of the 2. rich user experience – generation y – known as the countries that benefits most content is dynamic and is millennials; grew up in a time out of ICT responsive to user’s input where technological explosion 3. user participation – the and huge societal changes Ä Internet has been a vital owner of website is not only happened; digital natives who tool to our modern lives that the one who is able to put grew up surrounded by technology is why it is also important content; some websites allow to make the best of the readers to comment on an generation z – composed of internet article, participate in poll, tweens, teens, youth, and young Ä When the WWW was invented, or review specific product adults; most sophisticated and most pages were static (Amazon.com, online stores) 4. long tail – services that are web 3.0 is yet to be fully exchange user-generated offered on demand rather than realized because of several content on a one-time or vice versa problems: - six types: 5. software as a service – users 1. compatibility – HTML files a) social networks – allow will subscribe to a software and current web browsers you to connect with other only when needed rather than could not support web 3.0 people with the same purchasing them; a cheaper 2. security – user’s security is interests or background option if you do not always also in question since the (ex. Facebook, Google) need to use a software machine is saving his or her b) bookmarking sites – allow (Google Docs) preferences you to store and manage 6. mass participation – diverse 3. vastness – the WWW already links to various websites information sharing through contains billions of web and resources; allow you universal web access pages to create a tag that 4. vagueness – certain words are allows you and others to semantic web – a movement led by imprecise easily search or share the World Wide Web Consortium 5. logic – there are certain them (ex. StumbleUpon, (W3C); provides common framework limitations for a computer to Pinterest) that allows data to be shared be able to predict what the c) social news – allows and reused application, user is referring to at a users to post their own enterprise, and community given time news items or links to boundaries; component for web other news sources; users 3.0 trends in ICT can also comment on post 1. convergence and comments may also be W3C – encourages web developers - technological convergence: ranked (ex. reddit, Digg) to include semantic content in the synergy of technological d) media sharing – allow you their web pages advancements to work on a to upload and share media similar goal or task content like images, web 3.0 – aims to have machines - using several technologies music and video (ex. (or servers) understand the to accomplish a task Flicker, YouTube, user’s preferences to be able to conveniently Instagram) deliver web content specifically 2. social media e) microblogging – sites targeting the user; it has - a website, application, or that focus on short everything that we need online channel that enables updates (ex. Twitter, web users to create, co- Plurk) create, discuss, modify, and f) blogs and forums – allow users to post their content (ex. Blogger, - used to promote your text/call you or WordPress, Tumblr) business, gain new friends, pretend they are 3. mobile technologies and stay in touch with the someone else a) iOS – used in Apple old ones name of risky, yet not as devices (iPhone, iPad) - a source of entertainment father and risky as posting b) android – open source through games, online mother their full name operating developed by communities, and everything name of pretend/use this Google in between your identity to dupe c) blackberry OS – used in - one of the most dangerous siblings you Blackberry device places address easier for d) windows phone OS – closed - the information superhighway criminals to find source and proprietary (anyone has access to this you operating system developed highway) home phone use this info to by Microsoft number deceive you e) Symbian – original type of risks birthday makes you smartphone OS; used by info vulnerable to Nokia devices first name a hacker may identity theft f) WebOS – originally used already know for smartphones; now used plenty of stuff tips to stay safe online for smart TVs about you even if 1) be mindful of what you share g) Windows Mobile – developed you only give out 2) don’t just accept terms & by Microsoft for your first name conditions; read it smartphones and pocket PCs last name you will be 3) check out the privacy policy 4. assistive media – a nonprofit vulnerable to page of a website service designed to help being searched 4) know security features of people who have visual and for using search social networking site used reading impairments engines 5) don’t share your password middle name probably not the w/anyone cybercrime – crime most risky of 6) avoid logging in to public committed/assisted through use these shared info networks/Wi-Fi of internet current and can use this info 7) don’t talk to strangers privacy policy – tells user how previous for verification whether online or face-to- the website will handle its date school(s) purpose face online safety and security your phone you would not 8) never post anything about a number want random future vacation internet strangers to 9) add friends you know in real posing that it is a life security software to avoid copyright infringement: 10) avoid visiting untrusted d. spyware – program that runs ¦ understand websites in background w/o you ¦ be responsible 11) install and update an knowing it; ability to ¦ be creative antivirus software on your monitor what you are ¦ know the law computer currently doing and typing 12) make your Wi-Fi at home a thru keylogging tips in conducting online private network keyloggers – record the research: 13) avoid downloading anything keystroke done by users; ¦ have a question in mind from untrusted websites done to steal password or ¦ narrow it down 14) buy the software, don’t any other sensitive info ¦ advanced search use pirated ones e. adware – designed to send ¦ look for a credible source 15) don’t reply/click links you advertisements, mostly ¦ give credit from suspicious emails as pop-ups 2) spam – unwanted email; used mail merge – a feature that internet threats to send malware allows you to create documents 1) malware – malicious software 3) phishing – to acquire and combine/merge them with a. virus – replicate itself and sensitive personal info; another document/date file transfer from one computer sending an email that will to another either through direct user to visit website two components of mail merge internet and local networks and be asked to update Ä form document – contains main or data storage like flash his/her personal info body of message we want to drives and CDs pharming – more complicated convey/send b. worm – transfers from one way of phishing where it Ä list/date file – individual computer to another by any exploits the DNS (domain name information/data/recipient’s type of means (ILOVEYOU service) system information worm: created by a Filipino) c. trojan – disguised as a copyright – you have the rights label generation – creates a useful program but once to your work, and anyone who blank form document that downloaded or installed, uses it w/o your consent is stimulates either blank label or leaves your PC unprotected punishable by law envelope of pre-defined size and and allows hackers to get will use the data file that you your information fair use – an intellectual selected to print the rogue security software – property may be used without a information tricks the user into consent integrating/inserting pictures – c) .PNG – stands for portable correlate and present data in it improves the impression of network graphics; built a graphical manner your document; common use is around capabilities of ´ screenshot – a more realistic when you’re creating a resume .GIF; development (purpose image of what you are of transporting images on discussing kinds of materials internet at faster rates; ´ pictures – electronic/digital good w/transparencies but text wrap – adjusts how image pics/photographs you have unlike GIFs it doesn’t behaves around other objects or saved in any local storage support animation; image text device quality is remarkable; a) JPG. – short form for .jpeg allows control of different characteristics of or joint photographic transparency level or text wrapping options experts group; suitable for opacity of images s in line with text – default use when working w/full ´ clip art – a .GIF type; setting for images that are color photographic images; generic representations for inserted/integrated in your it doesn’t support ideas and objects document transparency; doesn’t work ´ shapes – printable objects or s square – allows images you well on lettering, line materials that you can inserted to be placed drawing or simple graphics; integrate in your document to anywhere within the paragraph relatively small in file enhance its appearance; allow w/text going around images in size you to have some tools to use a square pattern like a frame b) .GIF – stands for graphics for composing and s tight – allows you to get a interchange format; capable representing ideas/messages more creative effect in your of displaying ´ smart art – predefined sets document; text “hugs” or transparencies; good for of diff shapes grouped conforms to general shape of blending w/other together to form ideas that image elements/materials in your are organizational/structural s through – allows text on your document; support up to 256 in nature; used to represent document to flow even colors only; good mostly on an organization process, tighter, taking contours and logos and art decors w/very relationships, or flow for shape of image limited, and generally infographic documents s top and bottom – pushes texts solid colors; for logos, ´ chart – allows you to away vertically to top and/ drawings, small text, black represent data or bottom of image & white images, or low- characteristics and trends; s behind text – allow image to resolution file quite useful for reports that be dragged and placed anywhere on your document but w/all texts floating in front Criteria – label that determines F consistency. make design of it if a cell is part of range to be uniform; avoid having diff s in front of text – allows averaged font styles and bg image to be placed right on AverangeRange – actual range of F contrast. light font -> dark top of text as if your image cells that will be averaged background, dark font -> was dropped right on it Ctrl + 1 – shortcut key for light background; done so Format cells dialog box that it is easier to read Microsoft Excel – create spreadsheets w/c can later be designing your presentation is hyperlink – text/object that used to analyze statistical data the fun part of creating a contains a link to another file, Accounting Number Format – report for it gives you a chance web page, a place in a document, number format used for to be creative a link to new document, or an accounting email address; shortcut key Ctrl accounting – puts a dollar quick tips in creating an + K symbol before each value by effective presentation link to options: default F minimize. keep slide counts existing file/web page – creates Orientation – angle at w/c a to minimum to maintain clear hyperlink to website or local text is displayed message and to keep audience file saved in hard drive Count – used to count cells with attentive; presentation is place in this document – creates contents in a range just a visual aid, most info hyperlink that allows you to Sum – used to compute for should come from reporter jump to specific slide in summation of number of range F clarity. avoid being fancy by presentation Average - used to compute for using font style that is easy create a new document – creates average of number of range to read; font size is big hyperlink that once clicked it COUNTIF – used to count cells enough to be read by creates new document on w/a specific content within a audience; when making a specified location range presentation, consider how e-mail address – creates a SUMIF – used to compute for big the screen is your screen hyperlink that opens MS Outlook summation of range if a certain during report that automatically adds your condition is met F simplicity. use bullets/short specified recipient on a new AVERAGEIF - used to compute for sentences; summarize info; email average of range if a certain limit content to 6 lines and condition is met; syntax 7 words per line (6x7 rule) embeddings – act of placing (average range, range, criteria) F visuals. use graphics to help objects within presentation Range – range of cells where you your presentation but not too want to look for criteria many; use charts and graphs image. representation of D variety. uses several design external form a person or thing elements to draw viewer’s in art; captured by natural attention objects and phenomena infographics – information types: graphics; used to represent o 2D – photograph or screen or information statistical data, or screen display knowledge in graphical manner o 3D – statue or hologram Piktochart – a free online app graphics. visual images/designs that allows you to create your on some surface own infographic examples: photographs, drawings, line PhotoScape – a free image arts, graphs, diagrams, manipulation tool that contains typography, engineering many features to help you in drawings, symbols, geometric creating images for websites designs, maps, computer § batch editor – edits graphics, numbers multiple pics at once; one of its features layout. deals in the arrangement of visual elements on a page batch editing – easily manipulate all images at the Basic Principles of Graphics and same time Layout D balance. deals w/the visual Photobucket – a free image weight of objects, texture, hosting site that allows you to colors, and space that are share photos over the internet evenly distributed on screen D emphasis. area designed to bandwidth – amount of data used attract viewer’s attention to download your image by D movement. guides viewer’s eye multiple users around the screen D proportion. visual elements that create a sense of unity where they relate well with one another