Professional Documents
Culture Documents
Emtech Quarter 1
Emtech Quarter 1
4. USER PARTICIPATION
Web 2.0 (Dynamic Web Pages)
- The owner of the website is not the only one who is
- Is the evolution of Web 1.0 by adding dynamic able to put content. Others are able to place a content
web pages. (Dynamic web pages – the user is of their own by means of comment, reviews, and
able to see a website differently than others) evaluation.
- The “Wildly read-write Web”
- Allows users to interact with the page (the user 5. SOFTWARE AS A SERVICE
may be able to comment or create a user - Users will subscribe to a software only when needed
account (parang Facebook, etc.) rather than purchasing them. This is a cheaper option if
- Allows users to use web browsers instead of you do not always need to use a software.
just using their operating system.
6.MASS PARTICIPATION TRENDS IN ICT
INTERNET RISK
Cyberbullying
Identity Theft
Cyber Stalking
Sexting
• Virus – a malicious program that replicates - it is a word that came from two words “net” and
itself by copying itself to another program. “etiquette”. It is an etiquette applied online that shows
• Trojan Horse – a malicious program that proper manners and behavior. If you are a member of
disguises as a legitimate program that user will an online society through social media, you are called a
accept and use but takes control of your netizen. And in interacting with another netizen online,
computer. we need to maintain good behavior which is acceptable
• Worm – a malicious program that copies itself to others in an online community.
and spreads to other computers.
• Spyware – A malicious program that gathers
information from a victim’s computer and sends THE TEN COMMANDMENTS
it back to the hacker.
The Ten Commandments of computer ethics have
• Adware – An unwanted advertisement that will
been defined by the Compute Ethics Institute.
pop up several times on the victim’s computer
then behaves abnormally and tedious to close 1. Thou shalt not use a computer to harm other
them. people.
• Keylogger – A program that runs in the 2. Thou shalt not interfere with other people's
background and steals user credentials and computer work.
confidential information and sends it back to 3. Thou shalt not snoop around in other people's
hack by recording every keystroke that a user files.
makes on their computer or device. 4. Thou shalt not use a computer to steal.
• Botnet – A collection of infected internets– 5. Thou shalt not use a computer to bear false
connected devices such as PC and mobile witness.
phones that are controlled by a common type 6. Thou shalt not use or copy software for which
of malware. you have not paid.
• Rootkit – A software tool used by hackers to 7. Thou shalt not use other people's computer
gain control over a computer on a network resources without authorization
without being exposed. 8. Thou shalt not appropriate other people's
• Ransomware – A ransom virus that blocks the intellectual output.
user from accessing the programs or files and 9. Thou shalt think about the social consequences
demands to pay the ransom through an online of the program you write.
method for the removal of the virus. 10. Thou shalt use a computer in ways that show
• Spam - also known as junk email or unwanted consideration and respect.
email send by advertiser or bot. It can be used
to send malware.
Think Before You Click
• Phishing - a cyber-attack method using
deceptive emails and websites to acquire 1. Before you post something on the web, ask these
sensitive personal information. questions to yourself: Would you want your parents or
• Cybercrime - a crime in which a computer is grandparents to see it? Would you want your future
used as an object and tool in committing a boss to see it? Once you post something on the web,
crime such as hacking, phishing, spamming, you have no control of who sees your posts.
child pornography, libel, hate crimes, identity
2. Your friends depend on you to protect their
thief and others.
reputation online. Talk to your friends about this
• Cybercrime Law - a law that deals with all forms
serious responsibility.
of cybercrime.
3. Set your post to “private.” In this way, search
engines will not be able to scan that post.
4. Avoid using names. Names are easy for search 3. Do not make a profit from copyrighted work.
engines to scan.
- is the use of copyrighted material for comment, • Is a full function word processor, so you can
teaching, criticism, news reporting, research, create professional documents and add
scholarship, and another similar purpose that is indexes, captions and table of figures. You can
not an infringement of copyright. specify languages and dictionaries, insert
- In fair use, 5% of the content of the reference standard text and create bibliographies.
can only be copied. If 20% or less of Sometimes called Winword, MS Word, or Word,
- the reference is copied, there must be a Microsoft Word is a word processor published
secondary use agreement and fee. And if 20% by Microsoft.
or more of the reference is copied, it requires • It is one of the office productivity applications
purchasing creative work. included in the Microsoft Office suite. Originally
developed by Charles Simonyi and Richard
Guidelines for Fair Use
Brodie, it was first released in 1983. And have
1. Majority of the contents created must be yours. the file extenxion .doc/ .docm/.docx and etc.
• Is a web-based productivity office suite offered A DBMS is a software tool for creating, editing,
by Google within its Google Drive service. and managing collection of information called
• Google Docs allows users to create and edit databases.
documents online while collaborating with
MICROSOFT ACCESS
other users in real- time. Edits are tracked by
user with a revision history presenting changes. • Is an information management tool, or
relational database, that helps you store
information for reference, reporting and
2. SPREADSHEET
analysis.
A spreadsheet is an application tool that store, • Access can also overcome the limitations found
organize, and calculate data in tables. They are used when trying to manage large amounts of
primarily in recordkeeping tasks and accounting. information in Excel or other spreadsheet
applications.
MICROSOFT EXCEL
MICROSOFT SQL SERVER
• Excel is a spreadsheet application developed
and published by Microsoft. It is part of the • Is a RDBMS (relational database management
Microsoft Office suite of productivity software. system) created by Microsoft.
• Excel organizes data in columns and rows. Rows • It is used as a central location to save and
and columns intersect at a space called a cell. obtain data needed for applications. It uses SQL
Each cell can contain a single of data, such as (structured query language) for queries that
text, a numerical value, or a formula. store or retrieve data.
• Excel was originally code-named Odyssey during • SQL Server began in 1989 from the cooperation
development. It was first released on of Sysbase, Ashton Tate, and Microsoft, and at
September 30, 1985. the time was very close to Sysbase SQL Server
• It is used primarily to enter, edit, format, sort, 3.0 for Unix.
perform mathematical computations, save,
GOOGLE DRIVE
retrieve and print numeric data. Files created in
Microsoft Excel are often referred to as • Is a cloud-based file storage service from
spreadsheets or workbooks and have the file Google. It also offers a free software suite that
extension .xls or .xlsx and etc. includes a word processor, and many others for
spreadsheets, presentations, drawings, and
GOOGLE SHEETS
several others.
• Is a spreadsheet program included as part of • Since Google Drive is an online service, it allows
the free, web-based Google Docs Editors suite users to share files with one another, mutually
offered by Google. edit documents, and synch their saved files
• The app allows users to create and edit files across multiple devices.
online while collaborating with other users in
real-time.
4. GRAPHIC SUITE
• Edits are tracked by user with a revision history
presenting changes. An editor's position is A graphics suite is a group of programs that are used to
highlighted with an editor-specific color and view, manipulate, and print computer graphics. Popular
cursor and a permissions system regulates what examples are Adobe Photoshop and CorelDRAW.
users can do.
ADOBE PHOTOSHOP
• Relevant
• Informative
• Interesting