Professional Documents
Culture Documents
Information means valuable context that gives meaning and relevance to many people such as name of
place, birth date, color, money, your name, depending on the context.
Communication refers to the conveying of information between two or more people in different places.
Information and Communication Technology (ICT) deals with the use of different communication
technologies such as mobile phones, telephone, Internet, etc. to locate, save, send and edit information.
Internet is the global system of interconnected computer networks that use the internet protocol
suite (TCIP/IP) to link billions of devices worldwide.
World Wide Web An information system on the internet that allows documents to be connected to other
documents by hypertext links, enabling the user to search for information by moving from one document
to another.
Web Page is a hypertext document connected to the World Wide Web. It is a document that is suitable
for the World Wide Web.
1. Static Web Page- is known as a flat page or stationary age in the sense that the page is ‘’as is’’ and
cannot be manipulated by the user.
2. Dynamic Web Pages- is the evolution of web by adding dynamic web pages. The user is able to see
website differently than others e.g. social networking sites, wikis, video sharing sites.
1. Web 1.0 – refers to the first stage in the World Wide Web, which was entirely made up of the Web
pages connected by hyperlinks.
2. Web 2.0 – is the evolution of Web 1.0 by adding dynamic pages. The user is able to see a website
differently than others.
– Allows users to interact with the page; instead of just reading the page, the user may be
able to comment or create user account.
– Aims to have machines (or servers) understand the user’s preferences to be able to deliver
web content.
2. Rich User Experience. Content is dynamic and is responsive to user’s input. An example would
be a website that shows local content. In the case of social networking sites, when logged on,
your account is used to modify what you see in their website.
3. Long Tail. Services are offered on demand rather than on a one-time purchase. In certain cases,
time-based pricing is better than file-size-based pricing or vice versa. This is synonymous to
subscribing to a data plan that charges you for the amount of time you spent in the Internet, or a
data plan that charges you for the amount of bandwidth you used.
4. User Participation. The owner of the website is not the only one who is able to put content. Others
are able to place a content of their own by means of comment, reviews, and evaluation. Some
websites allow readers to comment on an article, participate in a poll, or review a specific product
(e.g., Amazon.com, online stores).
5. Software as a Service. Users will subscribe to software only when needed rather than purchasing
them. This is a cheaper option if you do not always need to use software. For instance, Google
Docs is a free web-based application that allows the user to create and edit word processing and
spreadsheet documents online. When you need a software, like a Word Processor, you can
purchase it for a one-time huge amount and install it in your computer and it is yours forever.
Software as a service allows you to “rent” a software for a minimal fee.
6. Mass Participation. It is a diverse information sharing through universal web access. Since most
users can use the Internet, Web 2.0’s content is based on people from various cultures.
Trends in ICT
2. Social Media is a website, application, or online channels that enable web users to create, co-
create, discuss, modify, and exchange user-generated content.
1. Social Networks. These are sites that allow you to connect with other people with the same interests
or background.
2. Bookmarking Sites. These are sites that allow you to store and manage links to various websites and
resources.
3. Social News. These are sites that allow users to post their own news items or links to other news
sources.
4. Media Sharing. These are sites that allow you to upload and share media content like images, music,
and video.
5. Microblogging. These are sites that focus on short updates from the user.
6. Blogs and Forums - allow user to post their content. Other users are able to comment on the said
topic.
3. Mobile Technologies The popularity of smart phones and tablets has taken a major rise over the
years. This is largely because of the devices’ capability to do tasks that were originally found in
personal computers.
Operating system - is a system software that manages computer/device hardware, software resources,
and provides common services for computer/device programs.
b. Android - an open source OS developed by Google. Being open source means mobile
phone companies use this OS for free.
Ø Internet of things (IoT)- is a system of interrelated computing devices, mechanical and digital
machines provided with unique identifiers (UIDs) and the ability to transfer data over a network without
requiring human-to-human or human-to-computer interaction. IoT technology is most synonymous with
products pertaining to the concept of the "smart home", including devices and appliances (such as
lighting fixtures, thermostats, home security systems and cameras, and other home appliances) that
support one or more common ecosystems, and can be controlled via devices associated with that
ecosystem, such as smart phones and smart speakers.
4. Assistive Media is a nonprofit service designed to help people who have visual and reading
impairments. A database of audio recordings is used to read to the user.
5. Cloud computing- distributed computing on internet or delivery of computing service over the
internet. Instead of running an e-mail program on your computer, you log in to a Web
1. Client computers – clients are the device that the end user interact with cloud.
2. Distributed Servers – Often servers are in geographically different places, but server acts as if
they are working next to each other.
3. Datacenters – It is collection of servers where application is placed and is accessed via Internet
Types of Clouds
1. Public cloud allows systems and services to be easily accessible to the general public.ublic cloud
may be less secured because of its openness, e.g. e-mail.
2. Private cloud allows systems and services to be accessible within an organization. It offers
increased security because of its private nature.
4. Hybrid cloud is a mixture of public and private cloud. However, the critical activities are performed
using private cloud while the non-critical activities are performed using public cloud.
WEEK 2
Because of the wide capacity of Web 2.0, it has helped in creating dynamic online platform sites.
Online platform is a specially developed platform using Internet technology. Online platforms have
revolutionized access to any information. Online platforms currently include, but are not limited to:
Presentation or Visualization
Cloud Computing
File Management
Mapping
Social Media
2. Cloud Computing Platform is also called as “The cloud.” It is the practice of using a network of
remote servers hosted on the internet. Instead of using your computer’s hard drive, you store and
access your data and programs over the Internet.
3. File Management Platform is used for the storing, naming, sorting, and handling of computer files.
Allows you to convert and manage files without download in the software tool.
4. Mapping Platform is a transformation taking the points of one space into the points of the same or
another space. Uses GPS to detect location and used for navigation.
5. Social Media Platform is a computer-mediated tools that allow large group of people to create,
share or exchange information, interest and the information shared can be in the form of ideas,
pictures, videos or anything that you want to create and share to virtual communities. It can be in
the following platforms
Social Networks. These sites allow you to connect with other people with the same interests or
background.
Bookmarking Sites. These are sites that allow you to store and manage links to various websites and
resources.
Social News. These are sites that allow users to post their own news items or links to other news
sources.
Media Sharing. These are sites that allow you to upload and share media content like images, music,
and video. Media sharing sites can be specific for video sharing, photo sharing, slide sharing, social
bookmarking, and gaming.
Microblogging. These are sites that focus on short updates from the user. Those subscribed to the user
will be able to receive these updates. Posts are brief that range typically from 140 – 200 characters.
Blogs and Forums. These are websites that allow users to post their content. Other users can comment
on the said topic.
WEEK 4
The internet is the guiding technology of the Information Technology Age just as the electrical
engine was of the Industrial Age. In these times, more and more people are already engaged in the use of
technology. These people who are raised in a digital, media-saturated world are called digital natives. No
doubt, the Internet has been very useful to us but with the rise of instant messaging, chat rooms, emails
and social networking sites, it can also bring trouble - from cyberbullying to more serious Internet
dangers, including exposure to sexual predators. Thus, internet safety is always our primary concern.
Online threat is any malicious act that attempts to gain access to a computer network without
authorization or permission from the owners.
These are usually done by computer hackers who uses the World Wide Web to facilitate
cybercrime.
Web threats pose a broad range of risks, including financial damages, identity theft, loss of
confidential information/data, theft of network resources, damaged brand/personal reputation, and erosion
of consumer confidence in e-commerce and online banking.
1. Phishing- happens when an email is sent from an internet criminal disguised as an email from a
legitimate, trustworthy source. The message is meant to lure you into revealing sensitive or
confidential information.
2. Pharming happens when a hacker (or “pharmer”) directs an internet user to a fake website instead of a
legitimate one.
These “spoofed” sites can capture a victim’s confidential information, including usernames,
passwords, and credit card data, or install malware on their computer.
Pharmers usually focus on websites in the financial sector, including banks, online payment
platforms, or other e-commerce destinations.
3. Internet Scam generally refers to someone using internet services or software to defraud or take
advantage of victims, typically for financial gain.
Cybercriminals may contact potential victims through personal or work email accounts, social
networking sites, dating apps, or other methods in attempts to obtain financial or other valuable
personal information.
Online scams may come in various forms such as lottery scam, charity fraud scams, job offer
scams, and online dating scams to name a few.
4. Internet robots are also known as spiders, crawlers, and web bots. It is a software application that is
programmed to do certain tasks.
Bots are automated, which means they run according to their instructions without a human user.
Some bots are useful, such as search engine bots that index content for search or customer
service bots that help users. Other bots are "bad" and are programmed to break into user
accounts, scan the web for contact information for sending spam, or perform other malicious
activities.
5. Malware or malicious software, is any program or file that is harmful to a computer user.
6. Spams are unsolicited emails, instant messages coming from recipients that are not granted verifiable
permission for the message to be sent. Spam messages can be damaging if you open or respond to
it.
7. Cyberstalking refers to the use of the internet or other electronic device to harass or stalk individuals
or organizations.
8. Cyberbullying refers to the act of tormenting, harassing, or embarrassing another person using the
internet.
9. Spoofing happens when someone or something pretends to be something else to gain our confidence,
get access to our systems, steal data, steal money, or spread malware.
There are numerous delinquencies that can be committed on the internet such as stalking, identity theft,
privacy violations, and harassment.
To avoid these online crimes, follow the following online safety measures:
Never give any personal information about yourself over the internet.
Do not give any banking or sensitive information unless you are sure that it is a reputable business having
a secure service. To make sure that you are in a secured network, the website address should begin with
“https://’ as opposed to “http://”. Never access your accounts by following an email link, instead type your
URL by yourself.
2. Security questions – Commonly, banks will ask you to set up security questions. These questions
will be personal to you and you should never share your answers with anybody.
4. Two-factor authentication – means that more than just a username and password are required
when logging in to an account. This works by sending a unique code to the user via SMS. This
code will expire after a certain amount of time and also lets people know if anyone is attempting
to gain access to their account without permission.
The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, stay in
touch with the old ones. It is also a source of entertainment.
But like most things in this world, there is always “another side of the coin.” The Internet is one of the
most dangerous places, especially if you do not know what you are doing.
Online safety refers to the practices and precautions that should be observed when using the internet to
ensure that the users as well as their computers and personal information are safe from crimes
associated with using the internet.
Netiquette is a combination of the words network and etiquette. It is a set of rules for behaving properly
online.
Flame war is a series of flame posts or messages in a thread that are considered derogatory in nature or
are completely off-topic. Often these flames are posted for the sole purpose of offending or upsetting
other users. The flame becomes a flame war when other users respond to the thread with their own flame
message
WEEK 5
Anatomy of a URL
A URL or also known as UNIFORM RESOUCE LOCATOR is one type of Uniform Resource
Identifier (URI). It is a generic term for all types of names and addresses that refer to objects on the World
Wide Web. Knowing the URL endings will give you clues to who is sponsoring the website and help
evaluate the sources.
Ex. A or B
b. Boolean “and” –
this operator will
retrieve only pages
containing both
terms
Ex. A and B
Ex. A not B
2. Phase Searching – is used to search for famous quotes, proper names, Recommendations,
etc. It encloses the phrase in quotation marks.
3. Plus (+) – indicates that the word after the sign is a required word must be found in search.
Example: +fire
4. Minus (–) sign – indicates to exclude a word from your search that is not required on the result.
Example: Jaguar speed –car
5. Ampersand (@) is used to find social tags. Example: @SteveJobs
filetype:pdf
filetype:doc
filetype:xls
1. Authority. It reveals that the person, institution or agency responsible for a site has the
qualifications and knowledge to do so. Evaluating a web site for authority:
Authorship: It should be clear who developed the site.
Contact information should be clearly provided: e-mail address, snail mail address,
phone number, and fax number.
Credentials: the author should state qualifications, credentials, or personal background
that gives them authority to present information.
Check to see if the site supported by an organization or a commercial body
2. Purpose. The purpose of the information presented in the site should be clear. Some sites are
meant to inform, persuade, state an opinion, entertain, or parody something or someone.
Evaluating a web site for purpose:
Does the content support the purpose of the site?
Is the information geared to a specific audience (students, scholars, general reader)?
Is the site organized and focused?
Are the outside links appropriate for the site?
Does the site evaluate the links?
3. Coverage. This refers to how comprehensive the website is in their discussion of certain topics.
Evaluating a web site for coverage:
Does the site claim to be selective or comprehensive?
Are the topics explored in depth?
Compare the value of the site’s information compared to other similar sites.
Do the links go to outside sites rather than its own?
Does the site provide information with no relevant outside links?
4. Currently. It refers to: (1) how current the information presented is, and (2) how often the site is
updated or maintained. It is important to know when a site was created, when it was last
updated, and if all of the links are current. Evaluating a web site for currency involves finding the
date information was:
first written
placed on the web
last revised
5. Objectivity. Objective sites present information with a minimum of bias. Evaluating a web site
for objectivity:
WEEK 6
Productivity Tools
Productivity Tools also known as productivity software are software that people use to create and
produce professional quality documents, presentations, databases, charts, graphs, and more
What is MS-WORD?
MS-WORD is a word processor. It is an application you use to “process”— format, manipulate, save,
print, share — a text-based document.
Word 1.0 for Windows was released in 1989, it was one of the first word processors that offered a
WYSIWYG (what you see is what you get) interface
Quick Access Toolbar – Collection of buttons that provide one click access to commonly used
commands such as Save, Undo or Redo. You can also customize this according to your preference.
Title Bar – A bar the display the name of active document.
Ribbon – The main set of commands and controls organized task in Tabs and groups, you can also
customize the ribbon according to your preference
Vertical Scroll Bar – Scroll bar to use when you want to scroll vertically through the document window
Horizontal Scroll Bar – Scroll bar to use when you want to scroll horizontally through
the document window.
Zoom Control – Used for magnifying and shrinking of the active document.
View Shortcut – Buttons used to change how the worksheet content is displayed. Print Layout, Full
Screen Reading, Web Layout, Outline or Draft.
Status Bar – It displays information about your document, such as what page you are currently viewing
and how many words are in your document, etc.
Ruler – It used to set the alignment and margins of the elements in the documents.
What is MS Excel?
Microsoft Excel is a spreadsheet developed by Microsoft for Windows, macOS, Android and iOS. It
features calculation, graphing tools, pivot tables, and a macro programming language called Visual Basic
for Applications.
It has been a very widely applied spreadsheet for these platforms, especially since version 5 in 1993, and
it has replaced Lotus 1-2-3 as the industry standard for spreadsheets. Excel forms part of the Microsoft
Office suite of software.
Microsoft PowerPoint is a presentation program, created by Robert Gaskins and Dennis Austin at a
software company named Forethought, Inc. It was released on April 20, 1987, initially for Macintosh
System Operating system based computers only.
Microsoft acquired PowerPoint for about $14 million three months after it appeared.
PowerPoint became a component of the Microsoft Office suite, first offered in 1989 for Macintosh[11]
and in 1990 for Windows which bundled several Microsoft apps. Beginning with PowerPoint 4.0 (1994),
PowerPoint was integrated into Microsoft Office development, and adopted shared common
components and a converged user interface.
WEEK 7 & 8
What is an IMAGE?
2-Dimensional Image
Two Dimensional Object is an object with just height and width, and without depth; therefore, two
dimensional objects are flat.
3-Dimensional Image
describes an image that provides the perception of depth.
these are visual images or designs on some surface, such as a wall, canvas, screen, paper, or
stone to inform, illustrate, or entertain.
What is LAYOUT ?
It is part of graphic design that deals in the arrangement of visual elements on a page.
1. Balance - The visual weight of objects, texture, colors, and space is evenly distributed on the
screen.
There are two kinds of balance:
Symmetrical Balance. The visual weight is distributed evenly, either vertically or horizontally. You can
draw a line straight through the middle of the design, and the visual balance would be evenly distributed.
Asymmetrical Balance. There is an artistic and different intensity on one side of the page.
2. Color - is used for emphasis or may elicit emotions from viewers. Determined by its :
hue (name of color),
intensity (purity of the hue)
value (lightness or darkness of hue)
3. ALIGNMENT - is simply the way visual elements are arranged so that they line up in some way.
There are two basic kinds of alignment:
Edge alignment determines the placement of elements in relation to the edge of the page or
canvas. This can mean the elements are aligned to the left side or right side, but it can also mean
they are aligned to the top or bottom of the page, so long as it uses an edge to organize
everything.
Center alignment aligns all the elements so that an invisible, central line on the page will always
be in the center of the elements.
4. REPETITION It is the process of repeating elements throughout a design to give a unified look.
Repetition goes with consistency of your design on font, font size, patterns, and colors.
5. PROXIMITY is simply the process of ensuring related design elements are placed together. Any
unrelated items should be spaced apart. Close proximity indicates that items are connected or
have a relationship to each other and become one visual unit which helps to organize or give
structure to a layout (Smith, 2017).
6. CONTRAST is the divergence of opposing elements (opposite colors on the color wheel, or value
light / dark, or direction – horizontal / vertical). Contrast allows us to emphasize or highlight key
elements in your design.
White Space is the art of nothing. It is also known as the negative space. It is the portion of a
page left unmarked: margins, gutters, and space between columns, lines of type, graphics,
figures, or objects drawn or depicted.
1. Gain Attention
2. Creating Meaning
3. Facilitate Retention
Infographics
1. Be unique
2. Make it simple
3. Be creative and bold
4. Less is more
5. The importance of getting it across
JPEG:
JPEG stands for Joint Photographic Expert Group
Most common used format by Digital Camera and other capturing device
Most common format when saving pictures on the internet
Size over Quality
GIF:
GIF stands for Graphic Interchange Format
Not recommended for large images with many colors
File size are very small and load very fast
Good choice for simple animation
PNG:
PNG stands for Portable Network Graphics.
Supports 24-bit images and generate background transparency without jagged edges
Best format for logos that involves transparency and fading
PDF:
PDF stands for Portable Document File
It is optimized in a smaller file size without losing the file quality
Can be viewed using its Reader or through Web Browers
DOC:
DOC is short for Document File
File format created by Microsoft and commonly used by Microsoft Word
Can include charts, illustration, formatted texts, tables and etc.
Choose the right file format. Try to make a real-life photograph into GIF to see the difference
between PNG, GIF, and JPEG. Knowing the purpose is the key to finding out the best file
format.
Choose the right image size. A camera with 12 megapixels constitutes to a bigger image size.
Monitors have a resolution limit, so even if you have a million megapixels, it will not display
everything.
Caption it. Remember to put a caption on images whenever possible. If it is not related to the
web page, then remove it.
5. Filters - Making the image look sketched, grainy, classic black and white or even let it have
neon colors. This gives your image a twist from its original look
6. Cloning - Copying or duplicating a part of an image.
7. Changing the Background - Adding background to make your image stand out .
8. Removing the Color - Removing certain colors in your image or desaturating the color of the
image.
9. Combining Text, Graphics and Image - Adding multiple elements in your layout.