You are on page 1of 99

Batangas State University

RIZAL AVE. EXT., BATANGAS CITY


College Department

Edukasyong
PANTAHANAN
PANGKABUHAYAN
Information and Communications
Technology (ICT)
BRYAN S. CABREROS, MAEd
Instructor
Chapter 2: Information and Communications Technology

OBJECTIVES
1. Enumerate the different safety and
ethical practices in the use of ICT.
2. Develop ICT-based products using
collaborative and productivity
tools.
3. Practice responsible use of ICT.
Information and
Communications
Technology
Chapter 2: Information and Communications Technology

What is ICT?
• Deals with the use of different
communication technologies such to locate,
save, send, and edit information.
• Refers to all technology that is used to
handle telecommunication and access
information
• Includes broadcast media, management
systems, and network-based control
• Convergence of several technologies
including internet and wireless medium.
History of
Computers
Chapter 2: Information and Communications Technology

History of Computers
• First Generation
• Second Generation
• Third Generation
• Fourth Generation
• Fifth Generation
Chapter 2: Information and Communications Technology

Computer Evolution
With the evolution of technology,
computers have taken a major role in the
last three decades. This is due to the fact
that people have become increasingly
dependent on computers to do their daily
tasks in school, at work, or in their routines.
What started off as simply for research
purposes, computers are now designed to
be more compact, more mobile, and more
integrated in people's daily activities.
Chapter 2: Information and Communications Technology

Computer Evolution
Computers have evolved based on the
type of components used in the
design. At present, scientists and
researchers have identified five
generations based on design,
suitability, and reliability. These
generations of computers are briefly
defined below (Pepito, 2002).
Chapter 2: Information and Communications Technology

First-generation Computer (1946-1959)


The first electronic computer was
developed in 1946. Designed by J.
Presper Eckert and John W. Mauchly
from the University of Pennsylvania
and financed by the United States
Army, the Electronic Numeric
Integrator and Calculator (ENIAC) is
considered to be the first-generation
computer.
Chapter 2: Information and Communications Technology

First-generation Computer (1946-1959)


ENIAC was a modular computer, composed
of several panels capable of performing
different functions. However, it could store
only limited or small amount of information
and only do arithmetic operations such as
addition and subtraction of up to 10 digits.
The computer was roughly 167 square
meters in size, and weighed 27 tons.
Chapter 2: Information and Communications Technology
Chapter 2: Information and Communications Technology

Second-generation Computer (1959-1965)


In this second generation, the
transistor was used as the interior
sections of the computer. Transistors
were much smaller, faster, and more
dependable than the vacuum tubes of
the first generation computer. They
generated less heat and consumed
less electricity but were still very
costly.
Chapter 2: Information and Communications Technology
Chapter 2: Information and Communications Technology
Chapter 2: Information and Communications Technology

Third-generation Computer (1965-1971)


In 1965, Jack Kilby invented the
integrated circuit (IC) that was used
instead of transistors as the interior
sections to build the computer. A
single IC has many transistors,
resistors, and capacitors that even the
full circuit board of a transistor can be
replaced entirely with one chip.
Chapter 2: Information and Communications Technology
Chapter 2: Information and Communications Technology

Fourth-generation Computer (1971-1980)


From 1971 to 1980, very large
scale integrated (VLSI) circuits
were used to build computers.
These circuits have about 5,000
transistors and other circuit
elements with their connected
circuits on a single chip known as
the microprocessor.
Chapter 2: Information and Communications Technology

Fourth-generation Computer (1971-1980)


These fourth generation computers
such as personal computers became
more powerful, dense, reliable, and
inexpensive. The other application of
this microprocessor technology can
be used and applied for pocket
calculators, television sets,
automotive devices, and audio and
video appliances.
Chapter 2: Information and Communications Technology
Chapter 2: Information and Communications Technology

Fifth-generation Computer (1980-onwards)


In this fifth generation, the VLSI technology
has evolved into what is called ultra large-scale
integration (ULSI) technology, with the
manufacture of microprocessor chips having
10 million electronic components, This
generation involves computer intelligence
which is associated with artificial intelligence
(Al), natural language, and expert systems that
interpret the means and practices of producing
computers that think like human beings.
Chapter 2: Information and Communications Technology
Computer
Components
Chapter 2: Information and Communications Technology

Computer Components
• Hardware
• Software
• Peopleware
Chapter 2: Information and Communications Technology
Chapter 2: Information and Communications Technology

Computer Components
A computer is the device that manipulates
information or data. It has to store, retrieve,
and process data. It contains both hardware
components end software applications.

The hardware pertains to the computer's


physical devices is any part of the computer
that can be seen and touched. A computer's
hardware consists of interrelated electronic
devices that are used to manipulate the
computer's operation, input devices, and
output devices.
Chapter 2: Information and Communications Technology

Input Devices
Working with a computer would be ineffective
if one does not intermingle with it because the
machine cannot accept and receive
instructions and/or deliver an output on its
own. Input devices enter or send data and
instructions from the user or from another
computer system on the internet while output
devices send back the administered data to the
user or to another computer system.
Chapter 2: Information and Communications Technology

Input Devices
Keyboard - is the most common input device
that accepts letters, numbers, and commands
from the user.
Chapter 2: Information and Communications Technology

Input Devices
Mouse - lets one select options from on-screen
menus. A mouse is used by moving it on a flat
surface, pressing its two buttons (left and
right), and scrolling the wheel that is located
between the buttons.
Chapter 2: Information and Communications Technology

Input Devices
There are also alternatives to using a mouse. A
trackball has a ball that can rotate using a
finger or the palm of a hand to move the
pointer. A touchpad also called a trackpad is a
touch-sensitive pad that lets the user move the
pointer by touching and dragging his or her
finger on the pad. Touchpads are commonly
built-in on laptop computers
Chapter 2: Information and Communications Technology

Input Devices
Microphone - allows a user to
speak into the computer to
input data and instructions.
While there are available
stand-alone microphones for
computers, most of the time,
users buy a headset—a
combination of microphone
and earphones—for the sake
of practicality.
Chapter 2: Information and Communications Technology

Input Devices
Scanner- converts printed
material (such as text and
pictures) into a form the
computer can use, There are
different types of scanners
available; the most common
is the flatbed scanner.
Scanners look like miniature
printers with a flip-up cover
protecting the glass platen.
Chapter 2: Information and Communications Technology

Input Devices
They are often built into multi-function
printers (MFPs) Another type becoming
common nowadays is the hand-held or
portable scanners. Portable scanners
can be small enough to fit inside one’s
pocket. Pen scanners are just a bit
bigger than fountain pens and can scan
the text of a document line by line.
They do not give high-resolution scans
and are more expensive than flatbed
scanners.
Chapter 2: Information and Communications Technology

Input Devices
Digital camera — allows one to take pictures then
transfer the photographed images to the computer or
printer instead of storing the images on a traditional
film.
Chapter 2: Information and Communications Technology

Input Devices
PC video camera — is a digital video camera that
enables users to create a movie or take still
photographs electronically. With the PC video
camera attached to the computer, users can see each
other as they communicate via the computer.
Chapter 2: Information and Communications Technology

Output Devices
An output device is any hardware
component that transmits information to
one or more people.
Chapter 2: Information and Communications Technology

Output Devices
Printer— produces text and graphics on a physical
medium such as paper. The two types of printer are
the impact printer and the non-impact printer. An
impact printer makes contact with the paper by
pressing an inked ribbon against the paper using a
hammer of pins.
Chapter 2: Information and Communications Technology

Output Devices
Monitor — displays text, graphics, and videos on a
screen. Many monitors look similar to a television.
The three types of monitor available in the market are
the following
Chapter 2: Information and Communications Technology

Output Devices
Speaker - allows one to hear music, voice, and other
sounds, The signal used to produce the sound that
comes from a computer speaker is created by the
computer’s sound card.
Chapter 2: Information and Communications Technology

System Unit
The system unit is the enclosure composed
of the main elements of a computer that are
used to administer data. This can be referred
to as a computer case or tower. The circuitry
of the system unit containing the primary
components of a computer with connectors
into which other circuit boards can be
positioned is recognized as motherboard.
Chapter 2: Information and Communications Technology

System Unit
Chapter 2: Information and Communications Technology

Storage Devices
A computer can be utilized with only
processing, memory, input, and output
devices. To make it very valuable, however, a
computer also needs a place to hold
program files and all! related files when they
are not in use. The goal of using a storage is
to keep data permanently.
Chapter 2: Information and Communications Technology

Storage Devices
There are many types of storage devices which
include the Stash disk drive, a small portable
storage device often referred to as pen drives,
thumb drives, or jump drives. It has a memory
capacity of 2GB, 4GB, 8GB, 16GB, 32GB, 64GB,
128GB, ITB, and now up to 2TB. Another type of
storage is the hard disk drive. Most personal
computers have at least one non-removable hard
disk that 18 regarded as a non-volatile memory
which permanently stores and retrieves data.
Chapter 2: Information and Communications Technology

Storage Devices
Another storage device is the compact
disc. It is a flat, round, and portable
metal disc. One type of compact disc is
a CD-ROM, which can be accessed
using most CD and DVD drives.
Another type of compact disc is a DVD-
ROM, which has enough storage
capacity to store a full-length movie.
Chapter 2: Information and Communications Technology
Using the Computer
Components
Chapter 2: Information and Communications Technology
Chapter 2: Information and Communications Technology
Chapter 2: Information and Communications Technology
Chapter 2: Information and Communications Technology
Chapter 2: Information and Communications Technology
Chapter 2: Information and Communications Technology
Software
Chapter 2: Information and Communications Technology

Productivity Software
Productivity Software may include:
• Word Processing
• Spreadsheet
• Presentation
• Publisher
Chapter 2: Information and Communications Technology

Productivity Tools
One of the most popular productivity
suited is the Microsoft Office developed
by Microsoft. This includes word
processing, electronic spreadsheet,
presentation software, and database,
and desktop publishing program.
Chapter 2: Information and Communications Technology

Productivity Tools
These tools will help you create,
organize, and present information to an
audience for a more effective
communication.
These programs are also made
available to mobile devices which are
also downloadable from the web.
Chapter 2: Information and Communications Technology

Word Processing
One of the software of the Microsoft
Office 2013 suite. It offers a set of tools
that is advanced compared to its
previous versions. Along with its new
features are the advanced techniques
including hyperlinks, macros, and mail
merge.
Chapter 2: Information and Communications Technology

Sample Word Processing Interface


Chapter 2: Information and Communications Technology

Word Processing Interface


Chapter 2: Information and Communications Technology

Text Wrapping in MS Word


IN LINE WITH TEXT
This is the default setting for images
that inserted or integrated in your
document. It treat your image like a text
font with the bottom side totally aligned
with the text line.
Chapter 2: Information and Communications Technology

Text Wrapping in MS Word


This setting is usually used when you need
to place your image at the beginning of a
paragraph. When placed between texts in a
paragraph or sentence, it distorts the overall
appearance and arrangement of the text in
the paragraph because it will take up the
space it needs vertical pushing whole lines
of texts upward as in the example below.
Chapter 2: Information and Communications Technology

In line with text


Chapter 2: Information and Communications Technology

Square
This setting allows the image you
inserted to be placed anywhere within
the paragraph with the text going
around the image in a square patters
like a frame.
Chapter 2: Information and Communications Technology

Square
Chapter 2: Information and Communications Technology

Tight
This is almost the same as Square setting,
but here the text“hugs” or conforms to the
general shape of the image. This allows you
to get a more creative effect on your
document. This setting can mostly be
achieved if you are using an image that
supports transparency like .GIF or .PNG file.
Chapter 2: Information and Communications Technology

Tight
Chapter 2: Information and Communications Technology

Through
This setting allows the text on you document
to flow even tighter, taking the contours and
shape of the image. Again, this can be best
used with .GIF and .PNG type of image.
Chapter 2: Information and Communications Technology

Through
Chapter 2: Information and Communications Technology

Top and Bottom


This setting pushes the texts away vertically
to the top and/or the bottom of the image so
that the image occupies a whole text line on
its own as in the example.
Chapter 2: Information and Communications Technology

Top and Bottom


Chapter 2: Information and Communications Technology

Behind Text
This allows your image to be dragged and
placed anywhere on your document but with
all the texts floating in front of it. It
effectively makes the image look like a
background.
Chapter 2: Information and Communications Technology

Behind Text
Chapter 2: Information and Communications Technology

In Front of Text
As it suggests, this setting allows your
image to be placed on the top of the text as
if your image was dropped right on it. That
means whatever parts of the text you placed
the image on, it will be covered by the
image.
Chapter 2: Information and Communications Technology

In Front of Text
Chapter 2: Information and Communications Technology

Word Processing
One of the software of the Microsoft
Office 2013 suite. It offers a set of tools
that is advanced compared to its
previous versions. Along with its new
features are the advanced techniques
including hyperlinks, macros, and mail
merge.
Chapter 2: Information and Communications Technology

Sample Spreadsheet Interface


Chapter 2: Information and Communications Technology

MS Excel Interface
Chapter 2: Information and Communications Technology

Basic Excel Activities


• Insert or delete cells, rows and
columns.
• Freeze panes to lock rows and
columns.
• Move or copy cells and cell contents.
• Merge and unmerge cells.
• Conditional Formatting
Chapter 2: Information and Communications Technology

Basic Excel Activities


• Aside from Formulas, Excel also offers
predefined operations called Functions to
make the worksheet construction easier.

• Functions are built-in formulas that help


in worksheet operations. The following
are the common Excel Functions:
Chapter 2: Information and Communications Technology

Formulas and Functions


=SUM - Calculates the sum of the values of a range of cells
=SUM(number1, [number2], …)

=AVERAGE - Calculates the arithmetic mean of a range of cells


=AVERAGE(number1, [number2], …)

=MAX - Gives the maximum value in a range of cells


=MAX(number1, [number2], …)

=MIN - Gives the minimum value in a range of cells


=MIN(number1, [number2], …)
Chapter 2: Information and Communications Technology

Formulas and Functions


=COUNT - Count the number of cells in a range of cells
=COUNT(value1, [value2],…)

=SUMIF - Function used to count the cells with a specified


content with a range.
=SUMIF (range, criteria, [sum_range])

=AVERAGEIF A function used to compute for the average of a range


if a certain condition is met.
=AVERAGEIF (range, criteria, [average_range])

=IF - it allows you to make logical comparisons between a


value and what you expect.
=IF(logical_test, [value_if_true], [value_if_false])
Chapter 2: Information and Communications Technology

Sample Presentation Interface


Internet Safety,
Security and
Netiquettes
Chapter 2: Information and Communications Technology

Internet Crimes

• Cyberbullying
• Hacking
• Identity Theft
• Plagiarism
• IP Rights And Copyright Issues
Chapter 2: Information and Communications Technology

Online Tips
• Be mindful of what you share online
and what site you share it to.
• Do not just accept terms and
conditions; read it.
• Check out the privacy policy page of a
website to learn how the website
handles the information you share.
Chapter 2: Information and Communications Technology

Online Tips
• Know the security features of the social
networking site you use. By keeping your
profile private, search engines will not be
able to scan your profile
• Do not share your passwords with anyone.
• Avoid logging in to public networks/wifi.
Browsing in “incognito” (or private) mode,”
a feature of the browser, will not protect you
from hackers
Chapter 2: Information and Communications Technology

Online Tips
Chapter 2: Information and Communications Technology

Online Tips
• Do not talk to strangers whether online or
face-to-face.
• Never post anything about a future vacation.
It is similar to posting, “rob my house at this
date”.
• Add friends you know in real life.
• Avoid visiting untrusted websites.
• Install and update an antivirus software on
your computer. Use only one antivirus to
avoid conflict.
Chapter 2: Information and Communications Technology

Online Tips
• If you have a wi-fi at home, make it a private
network by adding a password.
• Buy the software; do not use pirated ones.
• Do not reply or click links from suspicious
emails.
• Avoid downloading anything from untrusted
websites. You are most vulnerable in peer-to-
peer downloads (torrents) as the download
is most likely not monitored by the site
owner.
Chapter 2: Information and Communications Technology

Internet Threats
1. Malware
a. virus
b. worm
c. trojan
- rogue security software
d. spyware
- keyloggers
e. adware
2. Spam
3. Phishing
- pharming
Chapter 2: Information and Communications Technology

Malware
Stands for malicious software

A. VIRUS – a malicious program designed to


replicate itself and transfer from one
computer to another either through the
internet and local networks or data storage
like flash drives and CDs.
Chapter 2: Information and Communications Technology

Malware
Stands for malicious software

A. VIRUS – a malicious program


designed to replicate itself and
transfer from one computer to
another either through the internet
and local networks or data storage
like flash drives and CDs.
Chapter 2: Information and Communications Technology

Malware
C. TROJAN – a malicious
program that is disguised
as a useful program but
once downloaded or
installed, leaves your PC
unprotected and allows
hackers to get your
information.
Chapter 2: Information and Communications Technology

Malware
Rogue security software –
tricks the user into posing
that it is a security
software. It asks the user to
pay to improve his/her
security but in reality they
are not protected at all.
Chapter 2: Information and Communications Technology

Malware
D. Spyware – a program that
runs in the background
without you knowing (thus
called “spy”). It has the
ability to monitor what
you are currently doing and
typing through keylogging.
Chapter 2: Information and Communications Technology

Malware
E. Adware – a program
designed to send you
advertisements, mostly
as pop – ups.
Chapter 2: Information and Communications Technology

Spam
Unwanted email mostly
from bots or advertisers.
It can be used to send
malware.
Chapter 2: Information and Communications Technology

Phishing
Its goal is to acquire sensitive
personal information like
password and credit card
details. This is done by sending
you an email that will direct the
user to visit a website and be
asked to update his / her
username, password, credit
card or personal information.
Chapter 2: Information and Communications Technology

Pharming
A more complicated way of
phishing where it exploits
the DNS (domain name
service) system.
Chapter 2: Information and Communications Technology

You might also like