You are on page 1of 32

Start muna tayo sa mga questionismsmsm na binibigay ni sir ariel kasi baka ito yung

lumabas (sana)

DIAGNOSTIC TEST: source: lumi quiz eme ni sir noong nag diagnostic test tau

Smart telecommunication - one of the communication service provider in the Philippines.


Blackberry OS - the operating system of blackberry phones.
Pinterest is a bookmarking site
Microblogging - type of social media websites that focuses on short updates posted by the
user.
Google drive - online platform where you can store your files online
Twitter - online platform used for hashtags and posting pictures
Pinterest - platform can be useful for marketing tangible products
Youtube - leading video-sharing platform
Instagram - used for advertising
Social media - electronic communication platform used for broadcasting information
Facebook - social networking site can register and post your profile, connect with friends and
comment on topics in a generally interactive way
LinkedIn - designed for businesses and professionals
Adverstising platforms - allows users to create and manage advertising campaigns, generate
reports and retrieve information about the ads, campaigns and organizations, associated with
an account.
Philippines - a country that had a 58% rate of social media penetration and higher than the
average of 47% in SEA
Facebook - site allows you to upload and share media content like images and music
Netiquette - showing manners and etiquette on the internet

If you receive a test or email from someone you don’t know, leave it in your inbox until you
figure out who it is

Name, age, and address - never give on the internet!!

Observe proper netiquette rules to avoid being cyber-bullied

If you feel you are being cyber bullied, tell a trusted adult like a parent or teacher

If you get an embarrassing picture from someone, never discourage the person forms
ending persons like that

Avoid doing the following in a chat room:

1. Posting your phone number


2. Posting your address
3. Revealing financial information
It is OK to forward or post and email message that you received if it does not contain any
copyrighted material
Before posting to a discussion group you should, find the Frequently Asked Questions (FAQ)
document, read it and read some of the existing posts to get an idea of the tone and character
of the group

Flame - a post or email message that expresses a strong opinion or criticism

Golden tule of netiquette: remember the human

Spamming - posting or emailing unsolicited advertising messages to a wide audience

The following that best explains why knowledge and understanding of netiquette are useful:
1. Help you create a positive impression on those you meet in cyberspace
2. Explains the conventions already being used by millions of cybernauts
3. Explains some of the technical limitations of online communications

If you have been sent a virus warning, Go to a security Web site to learn if it is a real virus

In a chat room, you should:


1. Make it clear when you are directing a question or response to a specific user
2. Introduce yourself when you enter a room
3. Report disruptive users

WHO WANTS TO BE A MILLIONAIRE qs ft. Aya Paulino, our millionaire (based sa notes ni
kitchie)

Windows 10 - not a hardware


Operating System - how software uses hardware
Megabyte - Which of the following is the largest?
RAM - Random access memory
Bill Gates - started microsoft
Adware - malware software that displays unwanted ads
Viruses - attached to files for download
Cyber stalking - harassment on internet just as frightening as other forms of stalking
CTRL J - justify
Deliverables - Project stakeholders have once the project completes

Who discovered the first caldera? Emz

QUIZIZZ! (pabilisan mag screenshot kanina, chariz)

Twitter - microblogging
Marc (tahimik lang, charz) Prensky - claims that DIGITAL IMMIGRANTS always have an
accent or a foot in the past

Long tail - refers to a business strategy that allows companies to realize significant profits by
selling low volumes of hard-to-find items to many customers, instead of only selling large
volumes of a reduced number of a popular item

Convergence - ICT trend involves the erosion of boundaries between previously separate ICT
services, networks and business practices

The author of Digital natives Digital immigrants classify teaching content by:
1. Legacy
2. Future

Rich User Experience - web 2.0 features the content being dynamic and is responsive to
user’s input

Methodology-content - teachers should change this to reach DN students, accdg to Digital


natives, digital immgirants

Blog, forum - tumblr is an example of this social media

ICT - deals with use of different technologies to locate, save, send and edit information

Static website - contains web pages with fixed content. Each page is coded in HTML and
displays the same info to every visitor

Semantic web - proposed development of Web 3.0 in which data in web pages is structured
and tagged in such a way that it can be read directly from by computers

Assistive media is a nonprofit service designed to help people who have visual and reading
impairments

Dropbox as paid subscription is an example of software as service

Dynamic - allows interaction from the user

Hashtag # - categorize posts in a website

Assistive - designed to help people who have visual and reading impairments

Microblogging - focuses on short updates posted by the user


Software as service - web 2.0 feature users subscribe to a software only when needed rathen
purchasing them

Challenges in realizing Web 3.0


1. Compatibility
2. Security
3. Vagueness
4. Logic

Folksonomy - feature where users are able to categorize and classify arrange information

Social media - computer-mediated tools that allow people or companies to create, share or
exchange information, career interests, ideas and pictures in virtual communities and networks

Convergent technologies - coming together of two or more disparate disciplines or


technologies. Category of business software that adds broad social networking capabilities to
work processes. Group of software or hardware devices by chich people with disabilities can
access computers

Web 3.0 - a phrase coined by John Markoff of the Ner YOrk Times in 2006 which refers to a
supposed third generation of internet-based services that collectively comprise what might be
called the intelligent web

Online system - online versions of information system which is the process of and tools for
storing, managing, using and gathering of data and communications in an organization

Mobile media - media devices such as mobile phones and PDAs were the primary source of
portable media from which we could obtain information and communicate with one another

ICT - umbrella term that includes communication device or application (ang haba nito basta
paulit ulit na toh sa reviewer na toh huhu)

Web 2.0 - describes www sites that emphasize user generated content, usability and
interoperability

Netizen - user of the internet, a habitual or avid one

MS EXCEL stuffs (sorry tinamad na ako magtype hahaha)


https://support.microsoft.com/en-us/office/calculation-operators-and-precedence-in-excel-48be4
06d-4975-4d31-b2b8-7af9e0e2878a
https://support.microsoft.com/en-us/office/excel-functions-alphabetical-b3944572-255d-4efb-bb9
6-c6d90033e188
Keyboard shortcuts:
https://support.microsoft.com/en-us/windows/keyboard-shortcuts-in-windows-dcc61a57-
8ff0-cffe-9796-cb9706c75eec

(infos from the module!!)

Week 1

INFORMATION AND COMMUNICATION TECHNOLOGIES


- Deals with the use of different communication technologies such as mobile phones,
telephone, Internet, etc. to locate, save, send, and edit information.
- Internet – we use it in making video call
- Cellular networks – we use it when we send a text or making a call
- ICT has saved companies a lot of resources (time and money) with the kind of
communication technology they use.

FUNCTIONALITIES OF A COMPUTER
Any digital computer carries out five functions in gross terms:
• Takes data as input
• Stores the data/instructions in its memory and use them when required.
• Processes the data and converts it into useful information.
• Generates the output.
• Controls all the above four steps.

Computer Components:
- Hardware
- Software

Hardware:
● the collection of physical elements that constitutes a computer system.
● refers to the physical parts or components of a computer such as the monitor, mouse,
keyboard, computer data storage, hard drive disk (HDD), system unit (graphic cards,
sound cards, memory, motherboard and chips), etc. all of which are physical objects that
can be touched.

INPUT DEVICES
● any peripheral (piece of computer hardware equipment to provide data and control
signals to an information processing system such as a computer or other information
appliance.
● Translate data from a form that humans understand to one that the computer can work
with. Most common are keyboard and mouse.
Central Processing Unit (CPU)
● A CPU is the brain of a computer.
● responsible for all functions and processes.
● Regarding computing power, the CPU is the most important element of a
computer system.

The CPU is comprised of three main parts :


1. Arithmetic Logic Unit (ALU)
● Executes all arithmetic and logical operations.
● Arithmetic calculations like addition, subtraction, multiplication and division.
● Logical operation like compare numbers, letters, or special characters

2. Control Unit (CU): controls and co-ordinates computer components.


1. Read the code for the next instruction to be executed.
2. Increment the program counter so it points to the next instruction.
3. Read whatever data the instruction requires from cells in memory.
4. Provide the necessary data to an ALU or register.
5. If the instruction requires an ALU or specialized hardware to complete, instruct
the hardware to perform the requested operation.
3. Registers: Stores the data that is to be executed next, "very fast storage area".

PRIMARY MEMORY
1. RAM: Random Access Memory (RAM)
● is a memory scheme within the computer system responsible for storing data on
a temporary basis so that it can be promptly accessed by the processor as and
when needed.
● It is volatile in nature (data will be erased once supply to the storage device is
turned off)
● stores data randomly and the processor accesses these data randomly from the
RAM storage.
● considered "random access" because you can access any memory cell directly if
you know the row and column that intersect at that cell.
2. ROM (Read Only Memory):
● a permanent form of storage.
● stays active regardless of whether the power supply to it is turned on or off.
● devices do not allow data stored on them to be modified.

SECONDARY MEMORY
Stores data and programs permanently: it's retained after the power is turned off.
1. Hard drive (HD):
● hard disk is part of a unit, often called a "disk drive," "hard drive,"
or "hard disk drive,"
● store and provide relatively quick access to large amounts of data on an
electromagnetically charged surface or set of surfaces.
2. Optical Disk:
● Optical Disc Drive (ODD) - is a disk drive that uses laser light as part
of the process of reading or writing data to or from optical discs.
● Some drives can only read from discs, but recent drives are commonly both
readers and recorders, also called burners or writers. Compact discs, DVDs,
and Blu-ray discs are common types of optical media which can be read and
recorded by such drives.
● Optical drive is the generic name; drives are usually described as "CD" "DVD", or
"Bluray", followed by "drive", "writer", etc.
● There are three main types of optical media: CD, DVD, and Blu-ray disc.
● CDs can store up to 700 megabytes (MB) of data
● DVDs can store up to 8.4 GB of data
● Blu-ray discs, which are the newest type of optical media, can store up to 50 GB
of data. This storage capacity is a clear advantage over the floppy disk storage
media (a magnetic media), which only has a capacity of 1.44 MB.

3. Flash Disk:
● A storage module made of flash memory chips.
● have no mechanical platters or access arms, but the term "disk" is used because
the data are accessed as if they were on a hard drive.
● The disk storage structure is emulated.

OUTPUT DEVICES
● any piece of computer hardware equipment used to communicate the results of data
processing carried out by an information processing system (such as a computer)
● converts the electronically generated information into human readable form

Example on Output Devices:


1. Monitor 5. Plotters
2. LCD Projection Panels 6. Speaker(s)
3. Printers (all types) 7. Projector
4. Computer Output Microfilm (COM)

SOFTWARE TYPES

A. System software
● is responsible for controlling, integrating, and managing the individual
hardware components of a computer system
● consists of an operating system and some fundamental utilities such as disk
formatters, file managers, display managers, text editors, user authentication
(login) and management tools, and networking and device control software.

B. Application software
● is used to accomplish specific tasks other than just running the computer
system.
● consist of a single program, such as an image viewer
● a small collection of programs (often called a software package) that work closely
together to accomplish a task, such as a spreadsheet or text processing system
● a larger collection (often called a software suite) of related but independent
programs and packages that have a common user interface or shared data
format, such as Microsoft Office, which consists of closely integrated word
processor, spreadsheet, database, etc.;

UNIT OF MEASUREMENTS

Storage measurements
● The basic unit used in computer data storage is called a bit (binary digit).
● Computers use these little bits, which are composed of ones and zeros, to do things and
talk to other computers.
● All your files, for instance, are kept in the computer as binary files and translated into
words and pictures by the software (which is also ones and zeros).
● This two number system is called a “binary number system” since it has only two
numbers in it.
● The decimal number system in contrast has ten unique digits, zero through nine.

Computer Storage Units


Bit BIT 0 or 1

Kilobyte KB 1024 bytes

Megabyte MB 1024 kilobytes

Gigabyte GB 1024 megabytes

Terabyte TB 1024 gigabytes

Size example
● 1 bit - answer to an yes/no question
● 1 byte - a number from 0 to 255.
● 90 bytes: enough to store a typical line of text from a book.
● 4 KB: about one page of text.
● 120 KB: the text of a typical pocket book.
● 3 MB - a three minute song (128k bitrate)
● 650-900 MB - an CD-ROM
● 1 GB -114 minutes of uncompressed CD-quality audio at 1.4 Mbit/s
● 8-16 GB - size of a normal flash drive

COMPUTERS CLASSIFICATION
Computers can be generally classified by size and power as follows, though there is
Considerable overlap:
● Personal computer: A small, single-user computer based on a microprocessor.
In addition to the microprocessor, a personal computer has a keyboard for
entering data, a monitor for displaying information, and a storage device for
saving data.
● Workstation: A powerful, single-user computer. A workstation is like a personal
● computer, but it has a more powerful microprocessor and a higher-quality
monitor.
● Minicomputer: A multi-user computer capable of supporting from 10 to hundreds
of users simultaneously.
● Mainframe: A powerful multi-user computer capable of supporting many
hundreds or thousands of users simultaneously.
● Supercomputer: An extremely fast computer that can perform hundreds of
● millions of instructions per second.

LAPTOP AND SMARTPHONE COMPUTERS


LAPTOP:
● is a battery or AC-powered personal computer that can be easily carried and used in a
variety of locations.
● are designed to have all of the functionality of a desktop computer, which means they
can generally run the same software and open the same types of files.
● However, some laptops, such as netbooks, sacrifice some functionality in order to be
even more portable.

Netbook:
● a type of laptop that is designed to be even more portable.
● are often cheaper than laptops or desktops.
● are generally less powerful than other types of computers, but they provide enough
power for email and internet access, which is where the name "netbook" comes from.

Mobile Device:
● is basically any handheld computer.
● designed to be extremely portable, often fitting in the palm of your hand or in your
pocket.
● allow you to do many of the same things you can do with a desktop or laptop computer.
● Ex: tablet computers, e-readers, and smartphones.

Tablet Computers:
● The most obvious difference is that tablet computers don't have keyboards or touchpads.
● the entire screen is touch-sensitive, allowing you to type on a virtual keyboard and use
your finger as a mouse pointer.
● Tablet computers are mostly designed for consuming media, and they are optimized for
tasks like web browsing, watching videos, reading e-books, and playing games.

SAMPLE QUESTIONS FOR WEEK #1: (oo di na sya naka-question type kasi inedit ko)

1. RAM - Random Access Memory


2. Bit - the smallest unit of measure
3. CPU - Central Processing Unit
4. Which of the following is the largest?
A. Bit C. Entertainment
B. Byte D. Megabyte
5. Who started Microsoft? Bill Gates

SAMPLE QUESTIONS #2:

1. Which of the following is NOT hardware?


A. CPU C. Mouse
B. Keyboard D. Windows 10
2. Which things are common to all computers?
A. Calculate and design C. calculate, design, type and print
B. input, store, process and output D. type and print
3. How many digits does a binary number system use? 2
4. Operating System - Manages how software uses the hardware of a computer
5. Who started Apple? Steve Jobs

Week 2

INFORMATION AND COMMUNICATION TECHNOLOGIES


● The Current State of ICT ICT – Information and Communications Technology.
● It is an extended term of Information Technology (IT).
● It stresses the role of unified communications and the integration of telecommunications,
computers, as well as necessary enterprise software, middleware, storage, and audio-
visual systems, which enable users to access, store, transmit, and manipulate
information.

Web 1.0, Web 2.0 and Web 3.0 with their difference
Web 1.0
● refers to the first stage of the World Wide Web evolution
● advertisements on websites while surfing the internet is banned
● Ofoto is an online digital photography website, on which user could store, share,
view and print digital pictures.
● Web 1.0 is a content delivery network (CDN) which enables to showcase the piece of
information on the websites.
● it can be used as personal websites.
● It costs to use as per pages viewed.
● It has directories which enable user to retrieve a particular piece of information.

Four design essentials of a Web 1.0 site include:


1. Static pages.
2. Content is served from the server’s file-system.
3. Pages built using Server Side Includes or Common Gateway Interface (CGI).
4. Frames and Tables used to position and align the elements on a page.

Web 2.0: Dynamic Web Pages


● term coined by Darcy DiNucci in January 1999.
● In her article titled, “Fragmented Future”.
● the evolution of Web 1.0 by adding dynamic web pages – the user is able to see a
website differently than others, including social networking sites, blogs, wikis, video
sharing sites, hosted services, and web applications.
● allows users to interact with the page, instead of just reading a page, the user may be
able to comment or create a user account.
● use web browser instead of just using their operating system. Browsers can
now be used for their user interface, application software, and even for file storage.
Folksonomy, Rich User Experience, User Participation, Long Tail, Software as a
Service and Mass Participation as among the features of Web 2.0

Web 3.0 and the Semantic Web


● Semantic Web is a movement led by the World Wide Web Consortium (W3C).
● the W3C standard encourages web developers to include semantic content in their web
pages.
● The term was coined by the inventor of the World Wide Web, Tim Berners-Lee, noted
that the Semantic Web is a component for Web 3.0
● The Semantic Web provides a common framework that allows data to be shared and
reused across application, enterprise, and community boundaries.
● The aim of Web 3.0 is to have machines (or servers) understand the user’s preferences
to be able to deliver web content specifically targeting the user.
● Web 3.0 fully realized some several problems: Compatibility, Security, Vastness,
Vagueness, and Logic
Trends in ICT

1. Converge.
● Technological convergence is the synergy of technological advancement to work
on a similar goal or task

2. Social Media.
● Social Media is a website, application, or online channel that enables web users
to create, co-create, discuss, modify, and exchange user-generated content.
Types of Social Media:
a. Social Network
b. Bookmarking Sites
c. Social News
d. Media Sharing
e. Microblogging
f. Blogs and Forums

3. Mobile Technologies.
● These devices are capable of using high-speed Internet using 4G Networking
(LTE).

Operating Systems on Mobile Devices


a. iOS – used in Apple devices such as iPhone and iPad
b. Android – an open source operating system developed by Google.
c. Blackberry OS – used in Blackberry devices
d. Windows Phone OS – a close source and proprietary operating
system developed by Microsoft
e. Symbian – the original smartphone OS; used by Nokia devices
f. WebOs – originally used for smartphones; ow used for smart TVs
g. Windows Mobile – developed by Microsoft for smartphones and
pocket PCs

4. Assistive Media.
● a nonprofit service designed to help people who have visual and reading
impairments.
● A database of audio recordings is used to read to the user.

Five major features of Web 2.0


1. Free sorting of information, permits users to retrieve and classify the information
collectively.
2. Dynamic content that is responsive to user input.
3. Information flows between site owner and site users by means of evaluation & online
commenting.
4. Developed APIs to allow self-usage, such as by a software application.
5. Web access leads to concern different, from the traditional Internet user base to a
wider variety of users

Usage of Web 2.0


The social Web contains a number of online tools and platforms where people share
their perspectives, opinions, thoughts and experiences. Web 2.0 applications tend to
interact much more with the end user. As such, the end user is not only a user of the
application but also a participant by these 8 tools mentioned below:
1. Podcasting
2. Blogging
3. Tagging
4. Curating with RSS
5. Social bookmarking
6. Social networking
7. Social media
8. Web content voting

Web 3.0
● It refers the evolution of web utilization and interaction which includes
altering the Web into a database.
● It enables the upgradation of the back-end of the web, after a long time of focus on the
front-end.
Semantic Web (3.0)
● promises to establish “the world’s information” in more reasonable way than Google can
ever attain with their existing engine schema.
● This is particularly true from the perspective of machine conception as opposed to
human understanding.

Below are 5 main features that can help us define Web 3.0:
1. Semantic Web
● The succeeding evolution of the Web involves the Semantic Web.
● improves web technologies in demand to create, share and connect content
through search and analysis based on the capability to comprehend the meaning
of words, rather than on keywords or numbers.
2. Artificial Intelligence
● Combining this capability with natural language processing, in Web 3.0,
computers can distinguish information like humans in order to provide faster and
more relevant results.
● They become more intelligent to fulfill the requirements of users.
3. 3D Graphics
● The three-dimensional design is being used widely in websites and services in
Web 3.0.
● Museum guides, computer games, ecommerce, geospatial contexts, etc. are all
examples that use 3D graphics.
4. Connectivity
● With Web 3.0, information is more connected thanks to semantic metadata.
● As a result, the user experience evolves to another level of connectivity that
leverages all the available information.
5. Ubiquity
● Content is accessible by multiple applications, every device is connected to the
web, the services can be used everywhere.

SAMPLE QUESTIONS FOR WEEK 2 (PRE-TEST):

1.Web 1.0 - the early internet that only allows people to read from the internet.
2. Web 1.0 - is a user-generated content and the read-write content?
3. Web 2.0 concept allow for many types of content (audio, video, text, and images)
and interaction (one-to-one, one-to-many, many-to-many). What does RIA stand
for? Rich Internet Application
4. Semantic Web - web 2.0 tends to interact much more with the end user and making
the end user an Integral part.
5. Which of the following does not belong to the web 1.0?
A. Companies own or produce the content
B. Focused on communities
C. Sites are static
D. Sites are not interactive
6. Which of the following does not belong to web 2.0?
A. Focuses on Communities
B. Read and Write Web
C. Sharing Content
D. Static Pages
7. Web 3.0 - where all the application on web or mobile will be upgraded with more
features which will allow for a unique browsing experience for users
8. Semantic Web - is an exciting new evolution of the World Wide Web (WWW)
providing machine-readable and machine-comprehensible information far beyond
current capabilities
9. Web 2.0 - Read and Write, Web Interaction and collaborative communities
10. Web 1.0 - Read only web, Information sharing, and company focused

SAMPLE QUESTIONS #2:


1. Web 2.0 - Read and Write, Web Interaction and collaborative communities are
example of
2. Web 2.0 - user-generated content and the read-write content
3. Semantic Web - How web 2.0 tend to interact much more with the end user
and making the end user an Integral part.
4. Semantic Web - an exciting new evolution of the World Wide Web (WWW)
providing machine-readable and machine-comprehensible information far beyond
current capabilities
5. Web 2.0 - a user-generated content and the read-write content
6. Web 1.0 - the early internet that only allows people to read from the internet.
7. Which of the following does not belong to web 2.0
A. Focuses on Communities
B. Read and Write Web
C. Sharing Content
D. Static Pages
10. Which of the following does not belong to the web 1.0?
A. Companies own or produce the content
B. Focused on communities
C. Sites are static
D. Sites are not interactive

WEEK 3

ONLINE SAFETY OR INTERNET SAFETY

MOST COMMON INTERNET THREATS

Spam.
● The fact that most of our emails accounts come with a ‘Spam’ or ‘Junk’ folder
insinuates that spam emails are a huge issue, with more than 50% of emails being
syphoned into these folders.

Adware
● is a type of malware software that displays unwanted ads when a user is surfing
the internet.
● ads often redirect your searches to advertising websites and collect marketing-type data
about you, behind your back, which is considered malicious.

Trojans
● leave your computer completely unprotected, which can mean that hackers can steal
any data from your system.
● often present themselves as harmless computer programs so that hackers can penetrate
your computer without being detected.

Virus
● One of the most talked about internet threats
● usually attach themselves covertly to downloads as they are designed to spread at an
alarming rate
● Viruses are often attached to files for download, shared via CDs, DVDs, and USB sticks,
or loaded onto computers by opening infected email attachments.

Worms
● usually make their way on to a computer via a malicious email attachment or USB
stick.
● Once your computer has been infected by a worm, it will likely send itself to every
email address logged in your system.
● To the receiver, your email will appear harmless, until they open it and are infected by
the same worm.

Phishing
● is a form of fraudulent activity.
● More often than not, official-looking emails are sent impersonating a well-known
provider, such as a bank.
● These emails are sent to acquire people’s passwords and credit card details.

Spyware
● is an all-encompassing internet nasty and is usually attached to pop-ups of
downloadable files.
● can monitor your keystrokes, read and delete your files, reformat your hard drive, and
access your applications.
● Whoever is controlling the spyware has access to your personal details without you even
knowing.

Keyloggers
● are similar to a part of spyware, keyloggers record a user’s keyboard actions.
● Most keyloggers will be looking for distinguishable key entries, such as bank card details
and passwords.
● Keylogging is often linked to identity and intellectual property theft.

Pharming
● is a more complex version of phishing that exploits the DNS system.
● Pharmers often create web pages mimicking that of a trustworthy business, such as an
online banking log-in page.

Rogue Security Software


● Rogue security software will often ask you to pay for extra protection, which is a huge
con.
● The security software is completely useless and criminals have robbed you of your
money.
Emotet
● “an advanced, modular banking Trojan that primarily functions as a downloader or
dropper of other banking Trojans.
● Emotet continues to be among the most costly and destructive malware.”
Denial of Service
● A denial of service (DoS) is a type of cyber attack that floods a computer or network so it
can’t respond to requests. A distributed DoS (DDoS) does the same thing, but the attack
originates from a computer network. Cyber attackers often use a flood attack to disrupt the
“handshake” process and carry out a DoS.

Man in the Middle


● A man-in-the-middle (MITM) attack occurs when hackers insert themselves into a
two-party transaction. After interrupting the traffic, they can filter and steal data,
according to Cisco.
● MITM attacks often occur when a visitor uses an unsecured public Wi-Fi network.
Attackers insert themselves between the visitor and the network, and then use malware
to install software and use data maliciously

SQL Injection
● A Structured Query Language (SQL) injection is a type of cyber attack that results from
inserting malicious code into a server that uses SQL. When infected, the server releases
information. Submitting the malicious code can be as simple as entering it into a vulnerable
website search box.

Password Attacks
● With the right password, a cyber attacker has access to a wealth of information.
● Social engineering is a type of password attack that Data Insider defines as “a strategy
cyber attackers use that relies heavily on human interaction and often involves tricking
people into breaking standard security practices.”
● Other types of password attacks include accessing a password database or outright
guessing.

Evolution of Cyber Security


● Cyber security practices continue to evolve as the internet and digitally dependent
operations develop and change.

The Internet of Things


● Individual devices that connect to the internet or other networks offer an access point for
hackers. Cytelligence reports that in 2019, hackers increasingly targeted smart home and
internet of things (IoT) devices, such as smart TVs, voice assistants, connected baby
monitors and cellphones. Hackers who successfully compromise a connected home not only
gain access to users’ Wi-Fi credentials, but may also gain access to their data, such as
medical records, bank statements and website login information.
The Explosion of Data
● Data storage on devices such as laptops and cellphones makes it easier for cyber
attackers to find an entry point into a network through a personal device.

Netiquette
● is a combination of the words network and etiquette and is defined as a set of
rules for acceptable online behavior. Similarly, online ethics focuses on the acceptable use
of online resources in an online social environment.

10 rules of netiquette for students


● • Make sure identification is clear in all communications. ...
● • Review what you wrote and try to interpret it objectively. ...
● • If you wouldn't say it face to face, don't say it online. ...
● • Don't assume everyone understands where you're coming from. ...
● • Don't spam. ...
● • Use emoticons. ...
● • Respect others' privacy.

Core Rules of Netiquette


• Rule 1: Remember the Human. ...
• Rule 2: Adhere to the same standards of behavior online that you follow in real life.
...
• Rule 3: Know where you are in cyberspace. ...
• Rule 4: Respect other people's time and bandwidth. ...
• Rule 5: Make yourself look good online. ...
• Rule 6: Share expert knowledge.

Netiquette (Online Etiquette)


● is a set of rules that encourages appropriate and courteous online behavior. These rules
are important as they promote communication skills, prevent miscommunications, and
help you understand what is socially acceptable when working and collaborating online.

Netiquette is important as online communication is non-verbal.

Some Golden Rules


1. Don't give out personal information such as your address or phone number.
2. Don’t send pictures of yourself to anyone, especially indecent pictures.
3. Don't open emails or attachments from people you don't know.
4. Don't become online ‘friends’ with people you don't know.
5. Never arrange to meet someone in person who you've met online.
6. If anything you see or read online worries you, tell someone about it.

Social networking.
● Social networking websites and apps, such as Facebook, MySpace,
Instagram, Viber, Tumblr, SnapChat, Ask.fm and Twitter have become incredibly popular
in recent years. Most users are genuine, but because it is so easy to hide your real identity,
it is possible to come into contact with people you would normally avoid
The Risks (Privacy).
● The internet offers you a lot of freedom and this can lead some people
to behave in ways they would not behave in public.

Cyber bullying.
● Comments, images and videos about a person can be posted online causing the victim
to feel frightened and upset. It is even possible for cyber bullies to hack into the victim's
personal accounts and harass them from within their own user profile.

Cyber stalking.
● Harassment on the internet can be just as frightening as other forms of
stalking. Women and girls are usually the victims of this kind of behavior. They might be
harassed by an ex-boyfriend or girlfriend who is upset about the end of their relationship.

Identity Theft.
● The more information you make available online, the greater the risk of
identity theft. Personal information includes your: email address, phone number, postal address,
any banking information.

Sexting
● usually refers to sending and receiving rude messages or videos of naked
pictures,'underwear shots', any sexual texts, images or videos.

Online grooming.
● The internet is a highly interactive tool which can allow people to communicate with each
other very easily, through internet chat programs and social networking sites and even
mobile apps and games

1. Adware - a type of malware software that displays unwanted ads when a user is
surfing
the internet
2. Trojans - malicious programs that leave your computer completely unprotected, which
can mean that hackers can steal any data from your system
3. Viruses - programs are often attached to files for download
4. Worms - programs usually make their way on to a computer via a malicious email
attachment or USB stick
5. Phishing - This is a fraudulent activity using emails are sent to acquire people’s
passwords and
credit card details
6. Netiquette - combination of the words network and etiquette and is defined as
a set of rules for acceptable online behavior
7. Cyber Stalking - kind of harassment on the internet that can be just as frightening as
other
forms of stalking
8. Which is NOT belong to Rules of Netiquette for Students?
A. If you wouldn't say it face to face, don't say it online.
B. Make sure identification is clear in all communications. ...
C. Use emoticons
D. None of the above
9. Which of the following is NOT belong to, Stay Safe on Social Networking sites?
A. Always use a ‘strong’ password.
B. If anything happens online that you don't like, tell someone.
C. Use the strongest privacy setting when you set up your profile.
D. All of the above.
10.Which is Core Rules of Netiquette for the following?
A. Review what you wrote and try to interpret it objectively.
B. Never give out personal information.
C. Respect other people's time and bandwidth

1. QL Injection - type of cyber attack that results from inserting malicious code into a server
that uses SQL
2. Viruses - programs are often attached to files for download
3. Worms - programs usually make their way on to a computer via a malicious email
attachment or USB stick
4. Cyber Stalking - kind of harassment on the internet that can be just as frightening as other
forms of stalking
5. Adware - type of malware software that displays unwanted ads when a user is surfing
the internet
6. Sexting - activity that is usually refers to sending and receiving rude messages or videos
of naked pictures, 'underwear shots', any sexual texts, images, or videos
7. Denial of Service - kind of cyber threat floods a computer or network so it can’t respond to
requests
8. Pharming - kind of malicious program that is a more complex version of phishing that
exploits the DNS system
9. Man in the Middle - is a cyber threat that attack occurs when hackers insert themselves into
a two-party transaction
10.Which of the following is NOT belong to, Stay Safe on Social Networking sites?
A. Always use a ‘strong’ password.
B. If anything happens online that you don't like, tell someone.
C. Use the strongest privacy setting when you set up your profile.
D. All of the above
WEEK 4

MICROSOFT WORD
● a Graphical word processing program that users can type with
● a widely used commercial word processor
● purpose is to allow the users to type and save documents

Ribbon
● the strip of buttons and icons located above the work area in Word 2007.
● The Ribbon replaces the menus and toolbars found in earlier versions of Word.
● Each ribbon contains groups of command buttons with common purpose. Each ribbon
contains 7 tabs.
Office Button
● find a drop down menu containing options, such as: open, save, and print.
● Also shows previously opened files, which you may choose to “pin” them to make them
“permanent”choices
Rulers
● gives an idea of where you are on the page
Tab Selector Button
● easily set tab stops by clicking on the desired position on the ruler.
● allows you to determine which type of tab will be set left aligned , right aligned, center
aligned or decimal tab . Clicking on this button will allow you to change the tab style.
Document
● this is what you are typing/what will print out.
Status Bar
● This row can be customized by right-clicking and selecting desired options.
● Desired options may include page number/number of total page, word count,
insert/overtype mode, caps lock, and zoom slide
VIew Shortcuts
● These four buttons allow you to change the way you view your document on the screen.
● From left to right they are: print layout, full screen reading, web layout and draft.
● These can be added/removed by right clicking anywhere on the status bar and
checking/unchecking View shortcuts.
Task Bar
● shows open programs
Zoom Slide
● allow to increase/decrease the amount of the document you see on the screen
View Ruler Button
● allows you to view/hide the rulers
Screen Split Button
● the top of the vertical scroll bar is a new button. Just below the double arrow is a tiny
button that looks like a minus sign that lets you split your screen in two when
double-clicked. Double-clicking it a second time will unsplit your screen.
● Scroll Bars allow to view entire workbook by moving it up, down (vertical scroll bar), left
or right (horizontal scroll bar)
Scroll bar
● allow to view entire workbook by moving it up, down (vertical scroll bar), left or right
(horizontal scroll bar)
Right indent
● slide this triangle to the left of the margin to limit the right side of a paragraph to that
point.
● Move the triangle to the right of the margin to allow the right side of the paragraph to
extend beyond the margin.
● The triangle at the margin will keep the right side of the paragraph with the margin
Group
● command buttons with a common purpose are clustered together.
● Each ribbon contains several groups. Some groups, but not all, contain a quick launch
bar (dialogue box launcher) in the bottom right hand corner.
Title Bar
● shows name of program and open document. Also contains minimize, maximize and
close buttons.
Quick Access Toolbar
● allows you to add frequently used commands.
● Click on the down arrow at the end of the toolbar to add/remove command buttons – or –
right-click on any command button and choose Add to Quick Access Toolbar.
Tab
● the ribbon is broken down into 7 tabs.
● Each tab has a common purpose and consists of several groups.
● To select a tab, simply click on it and the appropriate groups will be displayed.
First Line Indent
● triangle controls where the first line of a paragraph begins.
● Moved to the left of the margin, will allow the first paragraph to be in the left margin.
● Can be moved to the right of the margin to indent your paragraph.
Hanging Indent
● the opposite of a first line indent. It is often moved to the right of the first line indent,
which allows the remaining lines of a paragraph to be indented according to placement
of the triangle

SAMPLE QUESTIONS FOR WEEK #4 (Pre-Test):


1. Ribbon - strip of buttons and icons located above the work area in Word 2007
2. Document - the typing area in Microsoft Word
3. Tab Selector Button - can easily set tab stops by clicking on the desired position on
the ruler
4. Task Bar - kind of bar shows open programs
5. Scroll Bar - view entire workbook by moving it up, down, left or right
6. First Line Indent - triangle controls where the first line of a paragraph begins
7. CTRL + SHIFT + F - short key command that opens the Font dialog box to change the
font
8. SHIFT + F3 - shortcut key command in changing the Case Of Letters
9. CTRL + SHIFT + N - shortcut key need to be pressed when applying the “Normal
Style”
10. CTRL + P - when deciding to print your documents, what is the shortcut key

SAMPLE QUESTIONS FOR WEEK #4 (Post-Test):


1. Microsoft Word - is a Graphical word processing program that users can type with
2. Tab Button - is the ribbon broken down into 7 sections and each has a common
purpose
3. Quick Access Toolbar - can customizable and allows you to add frequently used
commands
4. Title Bar - shows name of program and open document? Also contains minimize,
maximize and close buttons
5. CTRL+B - shortcut key for making a letter BOLD
6. CTRL+V - To paste the Text
7. Alt F4 - is for To close an Application
8. CTRL+S - to save your document
9. CTRL+J - Justify a paragraph
10. CTRL+A - when you want to select all in your document
WEEK 5

PRE - TEST

1. PICTURES - considered to be an electronic or digital photograph that can be saved in


any local storage devices
2. .JPG/.JPEG - is a type of image file that can support 16.7 million colors that is why it is
suitable for use when working with full color photographic images.
3. .GIF - is a type of image file that can display transparencies and is also capable of
displaying simple animation
4. SHAPES - are printable objects or materials that you can integrate in your document to
enhance its appearance or to allow you to have some tools to use for composing and
representing ideas or messages
5. SCREENSHOT - Other term for Microsoft Word that provides a snipping tool so you can
select and display only the part that you like to capture on your screen
6. SMART ART - are predefined sets of different shapes grouped together to form ideas
that are organizational or structural in nature
7. .PNG - allows the control of the transparency level or opacity of images
8. IN LINE WITH TEXT - is the default setting for images that are inserted or integrated in
your document and it treats the image like text font with the bottom side totally aligned
with the text line
9. THROUGH - allows the text on your document to flow even tighter, taking the contours
and the shape of the image
10. TOP and BOTTOM - pushes the text away vertically to the top and/or the bottom of the
image

PICTURES
- electronic or digital pictures or photographs you have saved in any local storage device.

extension on file names


a. .JPG/JPEG
- (Joint Photographic Experts Group)
- file can support 16.7 million colors that is why it is suitable for use when working
with full color photographic images.
- best quality image to integrate with your document
- images are relatively small in file size
b. GIF
- (Graphics Interchange Format)
- can display transparencies and simple animation.
- only support up to 256 colors
- good mostly on logos and art decors with very limited, and generally solid colors.

c. PNG
- (Portable Network Graphics)
- Built around the capabilities of .GIF. Its development was basically for the
purpose of transporting images on the Internet at faster rates
- good with transparencies but unlike. GIFs, it does not support animation
- can display up to 16 million colors
- allows the control of the transparency level or opacity of images

CLIP ART
- generally a .GIF type; line art drawings or images
- Generic representation for ideas and objects

SHAPES
- printable objects or materials
- enhance its appearance or allow you to have some tools to use for composing and
representing ideas or messages.

SMART ART
- predefined sets of different shapes grouped together to form ideas that are
organizational or structural in nature.

CHART
- represent data characteristics and trends

SCREENSHOT
- a snipping tool so you can select and display only the part that you like to capture on
your screen

IMAGE PLACEMENT
Layout of Text Wrapping Options.

A. IN LINE WITH TEXT


- It treats your image like a text font with the bottom side totally aligned with the text line.

B. SQUARE
- placed anywhere with the paragraph with the text going around the image in a square
pattern like frame.

C. TIGHT
- text “hug” or conforms to the general shape of the image.

D. THROUGH
- flow even tighter taking the contours and shape of the image.

E. TOP AND BOTTOM


- pushes the texts away vertically to the top and/or the bottom of the image

F. BEHIND TEXT
- image to be dragged and placed anywhere on your document but with all the texts
floating in front of it.

G. IN FRONT OF TEXT
- image to be placed right on top of the text as if your image was dropped right on it.

WEEK 6

Mail Merge
- allows you to create documents and combine or merge them with another
document or data file.
- word processing feature that allow you to easily create multiple letters, labels,
envelopes, nametags, or catalogue documents to a group of people as stored in
a list in a database or spreadsheet
-
Two Components of Mail Merge

1. Form Document
- contains the main body of the message we want to convey or send.

2. List or Data File


- individual information or data that needs to be plugged in (merged) to the form document
is placed and maintained.

Label Generation
- it creates a blank form document that simulates either a blank label or envelope of
predefined size and will use the data file that you selected to print the information,
typically individual addresses.
-
TWO FILES OF MAIL MERGE

1. Main Document
- the letter which contains the mail information for each of the merged documents that
can be letter, stationary or template
- It also contains the field names which contain the instructions for carrying out the merge.

2. Data Source
- It is also called a data file which comprises the information to be merged into a
document such as the list of names and addresses to be used in a mail merge.
- This must be connected to the data source before it can use the information in it.

ADVANTAGES OF MAIL MERGE

● Improves readership.
● Saves time.
● Controls the appearance.
● Allows for testing

DISADVANTAGES OF MAIL MERGE

● May require additional software


● Requires accuracy
● Risk of error

WEEK 7
PRE TEST

1. Together is an important aspect of collaboration is the ability to work


2. A positive attitude is needed to effectively collaborate
3. Digital collaboration is a concept.
4. Why do companies buy collaboration tools and platforms? To improve efficiency and
communication.
5. How is Collaboration used in our workplace/daily jobs? Use of instant messaging.
6. Collaboration is an act of working with one or more people in order to achieve
something
7. collaboration be best defined for: Both Communication & Problem Solving
8. Discussion is NOT Virtual Collaboration
9. Email is virtual collaboration
10. Conversation in physical collaboration

NEWSLETTER is a regularly distributed publication that is generally about a main topic of


interest to its subscribers.
Newspapers and leaflets are types of newsletters but today, a newsletter may be hosted in
different online platforms as follows:
1. Presentation/Visualization (e.g. Prezi, Mindmeister)
2. Cloud Computing (e.g. Google Drive, Dropbox)
3. Social Media (e.g. Facebook Pages, Tumblr)
4. Web Page (e.g. Wix, Weebly)
5. Blog Sites (e.g. Blogger, WordPress)

Collaboration is working together to achieve a goal

Online collaboration - on an online environment allows people to generate content,


reflection, review/modification, while making modifications visible to others.

Ways to develop ICT contents

1. Planning and conceptualizing the content.


2. Resources
3. Research for Content
4. Audience Profiling
5. Copywriting for ICT Projects
6. Designing the Layout
7. Developing and Constructing the ICT Project
8. Curating Content
TEAM STRUCTURE

PROJECT TEAM
- is a team whose members usually belong to different groups, functions and are
assigned to activities for the same project.

1. Team Manager
- or Content Strategist sets priorities, communicates with the executive team at the same
time contributes/creates content.

2. Editorial Manager
- implements the strategy. Maintains an editorial calendar and hires/guides content
writers and content producers (video and audio creators) and designers.
3. Content Curator
- inputs ideas into the organization by searching the Web for any interesting news,
developments and resources, regularly watching and listening for information and
filtering the best material.

4. Content Syndicator
- does the process of sharing out the content with third-party sites or in social media.

5. Analytics Expert
- constantly looking at data to determine what is working

6. Website Manager
- organizes and puts the contents onto the website, or uploads it to YouTube, or
syndicate podcasts on iTunes.
- Makes regular updates, monitoring, and assessment to ensure the website’s
functionality and performance.

The following positions may be combined with other positions:


● Writer – writes long or short form content. Maybe a staff or a hired copywriter.
● Editor – edits the work of the Writer. Maybe a freelancer or staff.
● Producer – creates video and audio. Maybe a freelance or staff.
● Designer – creates and lays out visual content. Maybe a freelance or staff.

ONLINE COLLABORATIVE TOOLS

- allow writers, editors, designers, and team managers to take part in collaborative
work in real time.

Examples of collaborative tools are:


1. Voicemail
– is a computer-based system that allows users and subscribers to exchange
personal voice messages
- to select and deliver voice information
- to process transactions relating to individuals, organizations, products and services, using an
ordinary telephone.

2. VoIP/Video Call
– is a methodology and group of technologies for the delivery of voice communications and
multimedia sessions over internet protocol (IP) networks such as the Internet.
3. Email
– is a method of exchanging digital messages between computer users.

4. Instant Messaging
– is a type of online chat which offers real-time text transmission over the Internet.

Social Chat
The team can collaborate and interact using online social chat. Examples are:

1. Google Chat
– allows you to send and receive instant messages with anyone in the group or team.

2. Google Hangouts
– allows you to talk face from your computer. Make free video calls with up to 10 people. Can
make free calls from your Android, iOS or desktop to other Hangout users.

3. Skype
– provides video chat and voice call services. Users may exchange digital documents such as
images, text, video and others. It may transmit both text and video messages. Skype also allows
the creation of video conference calls.

4. Viber
– is an instant messaging and Voice over IP (VoIP) app for smartphones. It can also exchange
images, video and audio media messages.

5. Kakao Talk
– is a free mobile instant messaging application for smartphones with free text and free call
features.

6. WeChat
– is a mobile text and voice messaging communication service. It is one of the largest
standalone messaging apps by monthly active users.

7. Line
– Windows Apps on Microsoft store. In Windows 10, you use free, high quality voice calls and
video calls whenever and wherever you are.

Social Media
Another way of collaborating with the team is with the use of social media. Examples are:
1. Facebook
– allows users to have access to messaging, connect with different pages and groups within the
site, respond to discussion, polls and interactive presentations. Outside information can be
linked for discussion, images, and videos can be embedded in the discussion.

2. Blog
– allows users to produce daily information quickly or developed as content managemen
system. Blogs are recognized for their reverse chronological entries with the ability to comment
on them.

3. Microblog
– allows users to make short, frequent posts, link videos, photographs, leave
comments and share posts.

Cloud-based Collaborative Tools:

1. Google Drive
– is a free collaborative tool that allows you to create and edit documents, spreadsheet, and
presentations online while collaborating with other users in real- time.

2. Zoho
– is a web-based free collaboration tool containing word processing, spreadsheets,
presentations, databases, note-taking, wikis, web-conferencing, customer relationship
management (CRM), project management, invoicing and others.

3. Prezi
– is a cloud-based presentation software based on a software as a service model.
The product employs a zooming user interface (ZUI), which allows users to zoom in
and out of their presentation media.

4. Microsoft Office Online


– presents a suite of applications that allows it to collaborate with others in Word,
Excel or Powerpoint as well as sharing files through SkyDrive, video chatting in
Skype. It may be used by subscribing to Office 365. Office 365 can store, access,
and share documents, photos, videos, and music.

5. Adobe Creative Cloud


– where all Adobe products like Photoshop, Dreamweaver, InDesign are available.
Adobe has introduced a collaborative other service like Story CC Plus which is a
collaborative screenwriting application.

Facebook groups to create a group page that will allow people in your group to communicate
your ideas.

WordPress also allows you to have multiple contributors for a single blog.

Google Drive and Microsoft Office Online allow multiple people to work on different office
files and even have their own group’s cloud storage.

Microsoft’s Yammer offers companies to have their own social network that allows
sharing and managing content.

Trello offer an online to-do checklist for your entire team.

You might also like