Professional Documents
Culture Documents
lumabas (sana)
DIAGNOSTIC TEST: source: lumi quiz eme ni sir noong nag diagnostic test tau
If you receive a test or email from someone you don’t know, leave it in your inbox until you
figure out who it is
If you feel you are being cyber bullied, tell a trusted adult like a parent or teacher
If you get an embarrassing picture from someone, never discourage the person forms
ending persons like that
The following that best explains why knowledge and understanding of netiquette are useful:
1. Help you create a positive impression on those you meet in cyberspace
2. Explains the conventions already being used by millions of cybernauts
3. Explains some of the technical limitations of online communications
If you have been sent a virus warning, Go to a security Web site to learn if it is a real virus
WHO WANTS TO BE A MILLIONAIRE qs ft. Aya Paulino, our millionaire (based sa notes ni
kitchie)
Twitter - microblogging
Marc (tahimik lang, charz) Prensky - claims that DIGITAL IMMIGRANTS always have an
accent or a foot in the past
Long tail - refers to a business strategy that allows companies to realize significant profits by
selling low volumes of hard-to-find items to many customers, instead of only selling large
volumes of a reduced number of a popular item
Convergence - ICT trend involves the erosion of boundaries between previously separate ICT
services, networks and business practices
The author of Digital natives Digital immigrants classify teaching content by:
1. Legacy
2. Future
Rich User Experience - web 2.0 features the content being dynamic and is responsive to
user’s input
ICT - deals with use of different technologies to locate, save, send and edit information
Static website - contains web pages with fixed content. Each page is coded in HTML and
displays the same info to every visitor
Semantic web - proposed development of Web 3.0 in which data in web pages is structured
and tagged in such a way that it can be read directly from by computers
Assistive media is a nonprofit service designed to help people who have visual and reading
impairments
Assistive - designed to help people who have visual and reading impairments
Folksonomy - feature where users are able to categorize and classify arrange information
Social media - computer-mediated tools that allow people or companies to create, share or
exchange information, career interests, ideas and pictures in virtual communities and networks
Web 3.0 - a phrase coined by John Markoff of the Ner YOrk Times in 2006 which refers to a
supposed third generation of internet-based services that collectively comprise what might be
called the intelligent web
Online system - online versions of information system which is the process of and tools for
storing, managing, using and gathering of data and communications in an organization
Mobile media - media devices such as mobile phones and PDAs were the primary source of
portable media from which we could obtain information and communicate with one another
ICT - umbrella term that includes communication device or application (ang haba nito basta
paulit ulit na toh sa reviewer na toh huhu)
Web 2.0 - describes www sites that emphasize user generated content, usability and
interoperability
Week 1
FUNCTIONALITIES OF A COMPUTER
Any digital computer carries out five functions in gross terms:
• Takes data as input
• Stores the data/instructions in its memory and use them when required.
• Processes the data and converts it into useful information.
• Generates the output.
• Controls all the above four steps.
Computer Components:
- Hardware
- Software
Hardware:
● the collection of physical elements that constitutes a computer system.
● refers to the physical parts or components of a computer such as the monitor, mouse,
keyboard, computer data storage, hard drive disk (HDD), system unit (graphic cards,
sound cards, memory, motherboard and chips), etc. all of which are physical objects that
can be touched.
INPUT DEVICES
● any peripheral (piece of computer hardware equipment to provide data and control
signals to an information processing system such as a computer or other information
appliance.
● Translate data from a form that humans understand to one that the computer can work
with. Most common are keyboard and mouse.
Central Processing Unit (CPU)
● A CPU is the brain of a computer.
● responsible for all functions and processes.
● Regarding computing power, the CPU is the most important element of a
computer system.
PRIMARY MEMORY
1. RAM: Random Access Memory (RAM)
● is a memory scheme within the computer system responsible for storing data on
a temporary basis so that it can be promptly accessed by the processor as and
when needed.
● It is volatile in nature (data will be erased once supply to the storage device is
turned off)
● stores data randomly and the processor accesses these data randomly from the
RAM storage.
● considered "random access" because you can access any memory cell directly if
you know the row and column that intersect at that cell.
2. ROM (Read Only Memory):
● a permanent form of storage.
● stays active regardless of whether the power supply to it is turned on or off.
● devices do not allow data stored on them to be modified.
SECONDARY MEMORY
Stores data and programs permanently: it's retained after the power is turned off.
1. Hard drive (HD):
● hard disk is part of a unit, often called a "disk drive," "hard drive,"
or "hard disk drive,"
● store and provide relatively quick access to large amounts of data on an
electromagnetically charged surface or set of surfaces.
2. Optical Disk:
● Optical Disc Drive (ODD) - is a disk drive that uses laser light as part
of the process of reading or writing data to or from optical discs.
● Some drives can only read from discs, but recent drives are commonly both
readers and recorders, also called burners or writers. Compact discs, DVDs,
and Blu-ray discs are common types of optical media which can be read and
recorded by such drives.
● Optical drive is the generic name; drives are usually described as "CD" "DVD", or
"Bluray", followed by "drive", "writer", etc.
● There are three main types of optical media: CD, DVD, and Blu-ray disc.
● CDs can store up to 700 megabytes (MB) of data
● DVDs can store up to 8.4 GB of data
● Blu-ray discs, which are the newest type of optical media, can store up to 50 GB
of data. This storage capacity is a clear advantage over the floppy disk storage
media (a magnetic media), which only has a capacity of 1.44 MB.
3. Flash Disk:
● A storage module made of flash memory chips.
● have no mechanical platters or access arms, but the term "disk" is used because
the data are accessed as if they were on a hard drive.
● The disk storage structure is emulated.
OUTPUT DEVICES
● any piece of computer hardware equipment used to communicate the results of data
processing carried out by an information processing system (such as a computer)
● converts the electronically generated information into human readable form
SOFTWARE TYPES
A. System software
● is responsible for controlling, integrating, and managing the individual
hardware components of a computer system
● consists of an operating system and some fundamental utilities such as disk
formatters, file managers, display managers, text editors, user authentication
(login) and management tools, and networking and device control software.
B. Application software
● is used to accomplish specific tasks other than just running the computer
system.
● consist of a single program, such as an image viewer
● a small collection of programs (often called a software package) that work closely
together to accomplish a task, such as a spreadsheet or text processing system
● a larger collection (often called a software suite) of related but independent
programs and packages that have a common user interface or shared data
format, such as Microsoft Office, which consists of closely integrated word
processor, spreadsheet, database, etc.;
UNIT OF MEASUREMENTS
Storage measurements
● The basic unit used in computer data storage is called a bit (binary digit).
● Computers use these little bits, which are composed of ones and zeros, to do things and
talk to other computers.
● All your files, for instance, are kept in the computer as binary files and translated into
words and pictures by the software (which is also ones and zeros).
● This two number system is called a “binary number system” since it has only two
numbers in it.
● The decimal number system in contrast has ten unique digits, zero through nine.
Size example
● 1 bit - answer to an yes/no question
● 1 byte - a number from 0 to 255.
● 90 bytes: enough to store a typical line of text from a book.
● 4 KB: about one page of text.
● 120 KB: the text of a typical pocket book.
● 3 MB - a three minute song (128k bitrate)
● 650-900 MB - an CD-ROM
● 1 GB -114 minutes of uncompressed CD-quality audio at 1.4 Mbit/s
● 8-16 GB - size of a normal flash drive
COMPUTERS CLASSIFICATION
Computers can be generally classified by size and power as follows, though there is
Considerable overlap:
● Personal computer: A small, single-user computer based on a microprocessor.
In addition to the microprocessor, a personal computer has a keyboard for
entering data, a monitor for displaying information, and a storage device for
saving data.
● Workstation: A powerful, single-user computer. A workstation is like a personal
● computer, but it has a more powerful microprocessor and a higher-quality
monitor.
● Minicomputer: A multi-user computer capable of supporting from 10 to hundreds
of users simultaneously.
● Mainframe: A powerful multi-user computer capable of supporting many
hundreds or thousands of users simultaneously.
● Supercomputer: An extremely fast computer that can perform hundreds of
● millions of instructions per second.
Netbook:
● a type of laptop that is designed to be even more portable.
● are often cheaper than laptops or desktops.
● are generally less powerful than other types of computers, but they provide enough
power for email and internet access, which is where the name "netbook" comes from.
Mobile Device:
● is basically any handheld computer.
● designed to be extremely portable, often fitting in the palm of your hand or in your
pocket.
● allow you to do many of the same things you can do with a desktop or laptop computer.
● Ex: tablet computers, e-readers, and smartphones.
Tablet Computers:
● The most obvious difference is that tablet computers don't have keyboards or touchpads.
● the entire screen is touch-sensitive, allowing you to type on a virtual keyboard and use
your finger as a mouse pointer.
● Tablet computers are mostly designed for consuming media, and they are optimized for
tasks like web browsing, watching videos, reading e-books, and playing games.
SAMPLE QUESTIONS FOR WEEK #1: (oo di na sya naka-question type kasi inedit ko)
Week 2
Web 1.0, Web 2.0 and Web 3.0 with their difference
Web 1.0
● refers to the first stage of the World Wide Web evolution
● advertisements on websites while surfing the internet is banned
● Ofoto is an online digital photography website, on which user could store, share,
view and print digital pictures.
● Web 1.0 is a content delivery network (CDN) which enables to showcase the piece of
information on the websites.
● it can be used as personal websites.
● It costs to use as per pages viewed.
● It has directories which enable user to retrieve a particular piece of information.
1. Converge.
● Technological convergence is the synergy of technological advancement to work
on a similar goal or task
2. Social Media.
● Social Media is a website, application, or online channel that enables web users
to create, co-create, discuss, modify, and exchange user-generated content.
Types of Social Media:
a. Social Network
b. Bookmarking Sites
c. Social News
d. Media Sharing
e. Microblogging
f. Blogs and Forums
3. Mobile Technologies.
● These devices are capable of using high-speed Internet using 4G Networking
(LTE).
4. Assistive Media.
● a nonprofit service designed to help people who have visual and reading
impairments.
● A database of audio recordings is used to read to the user.
Web 3.0
● It refers the evolution of web utilization and interaction which includes
altering the Web into a database.
● It enables the upgradation of the back-end of the web, after a long time of focus on the
front-end.
Semantic Web (3.0)
● promises to establish “the world’s information” in more reasonable way than Google can
ever attain with their existing engine schema.
● This is particularly true from the perspective of machine conception as opposed to
human understanding.
Below are 5 main features that can help us define Web 3.0:
1. Semantic Web
● The succeeding evolution of the Web involves the Semantic Web.
● improves web technologies in demand to create, share and connect content
through search and analysis based on the capability to comprehend the meaning
of words, rather than on keywords or numbers.
2. Artificial Intelligence
● Combining this capability with natural language processing, in Web 3.0,
computers can distinguish information like humans in order to provide faster and
more relevant results.
● They become more intelligent to fulfill the requirements of users.
3. 3D Graphics
● The three-dimensional design is being used widely in websites and services in
Web 3.0.
● Museum guides, computer games, ecommerce, geospatial contexts, etc. are all
examples that use 3D graphics.
4. Connectivity
● With Web 3.0, information is more connected thanks to semantic metadata.
● As a result, the user experience evolves to another level of connectivity that
leverages all the available information.
5. Ubiquity
● Content is accessible by multiple applications, every device is connected to the
web, the services can be used everywhere.
1.Web 1.0 - the early internet that only allows people to read from the internet.
2. Web 1.0 - is a user-generated content and the read-write content?
3. Web 2.0 concept allow for many types of content (audio, video, text, and images)
and interaction (one-to-one, one-to-many, many-to-many). What does RIA stand
for? Rich Internet Application
4. Semantic Web - web 2.0 tends to interact much more with the end user and making
the end user an Integral part.
5. Which of the following does not belong to the web 1.0?
A. Companies own or produce the content
B. Focused on communities
C. Sites are static
D. Sites are not interactive
6. Which of the following does not belong to web 2.0?
A. Focuses on Communities
B. Read and Write Web
C. Sharing Content
D. Static Pages
7. Web 3.0 - where all the application on web or mobile will be upgraded with more
features which will allow for a unique browsing experience for users
8. Semantic Web - is an exciting new evolution of the World Wide Web (WWW)
providing machine-readable and machine-comprehensible information far beyond
current capabilities
9. Web 2.0 - Read and Write, Web Interaction and collaborative communities
10. Web 1.0 - Read only web, Information sharing, and company focused
WEEK 3
Spam.
● The fact that most of our emails accounts come with a ‘Spam’ or ‘Junk’ folder
insinuates that spam emails are a huge issue, with more than 50% of emails being
syphoned into these folders.
Adware
● is a type of malware software that displays unwanted ads when a user is surfing
the internet.
● ads often redirect your searches to advertising websites and collect marketing-type data
about you, behind your back, which is considered malicious.
Trojans
● leave your computer completely unprotected, which can mean that hackers can steal
any data from your system.
● often present themselves as harmless computer programs so that hackers can penetrate
your computer without being detected.
Virus
● One of the most talked about internet threats
● usually attach themselves covertly to downloads as they are designed to spread at an
alarming rate
● Viruses are often attached to files for download, shared via CDs, DVDs, and USB sticks,
or loaded onto computers by opening infected email attachments.
Worms
● usually make their way on to a computer via a malicious email attachment or USB
stick.
● Once your computer has been infected by a worm, it will likely send itself to every
email address logged in your system.
● To the receiver, your email will appear harmless, until they open it and are infected by
the same worm.
Phishing
● is a form of fraudulent activity.
● More often than not, official-looking emails are sent impersonating a well-known
provider, such as a bank.
● These emails are sent to acquire people’s passwords and credit card details.
Spyware
● is an all-encompassing internet nasty and is usually attached to pop-ups of
downloadable files.
● can monitor your keystrokes, read and delete your files, reformat your hard drive, and
access your applications.
● Whoever is controlling the spyware has access to your personal details without you even
knowing.
Keyloggers
● are similar to a part of spyware, keyloggers record a user’s keyboard actions.
● Most keyloggers will be looking for distinguishable key entries, such as bank card details
and passwords.
● Keylogging is often linked to identity and intellectual property theft.
Pharming
● is a more complex version of phishing that exploits the DNS system.
● Pharmers often create web pages mimicking that of a trustworthy business, such as an
online banking log-in page.
SQL Injection
● A Structured Query Language (SQL) injection is a type of cyber attack that results from
inserting malicious code into a server that uses SQL. When infected, the server releases
information. Submitting the malicious code can be as simple as entering it into a vulnerable
website search box.
Password Attacks
● With the right password, a cyber attacker has access to a wealth of information.
● Social engineering is a type of password attack that Data Insider defines as “a strategy
cyber attackers use that relies heavily on human interaction and often involves tricking
people into breaking standard security practices.”
● Other types of password attacks include accessing a password database or outright
guessing.
Netiquette
● is a combination of the words network and etiquette and is defined as a set of
rules for acceptable online behavior. Similarly, online ethics focuses on the acceptable use
of online resources in an online social environment.
Social networking.
● Social networking websites and apps, such as Facebook, MySpace,
Instagram, Viber, Tumblr, SnapChat, Ask.fm and Twitter have become incredibly popular
in recent years. Most users are genuine, but because it is so easy to hide your real identity,
it is possible to come into contact with people you would normally avoid
The Risks (Privacy).
● The internet offers you a lot of freedom and this can lead some people
to behave in ways they would not behave in public.
Cyber bullying.
● Comments, images and videos about a person can be posted online causing the victim
to feel frightened and upset. It is even possible for cyber bullies to hack into the victim's
personal accounts and harass them from within their own user profile.
Cyber stalking.
● Harassment on the internet can be just as frightening as other forms of
stalking. Women and girls are usually the victims of this kind of behavior. They might be
harassed by an ex-boyfriend or girlfriend who is upset about the end of their relationship.
Identity Theft.
● The more information you make available online, the greater the risk of
identity theft. Personal information includes your: email address, phone number, postal address,
any banking information.
Sexting
● usually refers to sending and receiving rude messages or videos of naked
pictures,'underwear shots', any sexual texts, images or videos.
Online grooming.
● The internet is a highly interactive tool which can allow people to communicate with each
other very easily, through internet chat programs and social networking sites and even
mobile apps and games
1. Adware - a type of malware software that displays unwanted ads when a user is
surfing
the internet
2. Trojans - malicious programs that leave your computer completely unprotected, which
can mean that hackers can steal any data from your system
3. Viruses - programs are often attached to files for download
4. Worms - programs usually make their way on to a computer via a malicious email
attachment or USB stick
5. Phishing - This is a fraudulent activity using emails are sent to acquire people’s
passwords and
credit card details
6. Netiquette - combination of the words network and etiquette and is defined as
a set of rules for acceptable online behavior
7. Cyber Stalking - kind of harassment on the internet that can be just as frightening as
other
forms of stalking
8. Which is NOT belong to Rules of Netiquette for Students?
A. If you wouldn't say it face to face, don't say it online.
B. Make sure identification is clear in all communications. ...
C. Use emoticons
D. None of the above
9. Which of the following is NOT belong to, Stay Safe on Social Networking sites?
A. Always use a ‘strong’ password.
B. If anything happens online that you don't like, tell someone.
C. Use the strongest privacy setting when you set up your profile.
D. All of the above.
10.Which is Core Rules of Netiquette for the following?
A. Review what you wrote and try to interpret it objectively.
B. Never give out personal information.
C. Respect other people's time and bandwidth
1. QL Injection - type of cyber attack that results from inserting malicious code into a server
that uses SQL
2. Viruses - programs are often attached to files for download
3. Worms - programs usually make their way on to a computer via a malicious email
attachment or USB stick
4. Cyber Stalking - kind of harassment on the internet that can be just as frightening as other
forms of stalking
5. Adware - type of malware software that displays unwanted ads when a user is surfing
the internet
6. Sexting - activity that is usually refers to sending and receiving rude messages or videos
of naked pictures, 'underwear shots', any sexual texts, images, or videos
7. Denial of Service - kind of cyber threat floods a computer or network so it can’t respond to
requests
8. Pharming - kind of malicious program that is a more complex version of phishing that
exploits the DNS system
9. Man in the Middle - is a cyber threat that attack occurs when hackers insert themselves into
a two-party transaction
10.Which of the following is NOT belong to, Stay Safe on Social Networking sites?
A. Always use a ‘strong’ password.
B. If anything happens online that you don't like, tell someone.
C. Use the strongest privacy setting when you set up your profile.
D. All of the above
WEEK 4
MICROSOFT WORD
● a Graphical word processing program that users can type with
● a widely used commercial word processor
● purpose is to allow the users to type and save documents
Ribbon
● the strip of buttons and icons located above the work area in Word 2007.
● The Ribbon replaces the menus and toolbars found in earlier versions of Word.
● Each ribbon contains groups of command buttons with common purpose. Each ribbon
contains 7 tabs.
Office Button
● find a drop down menu containing options, such as: open, save, and print.
● Also shows previously opened files, which you may choose to “pin” them to make them
“permanent”choices
Rulers
● gives an idea of where you are on the page
Tab Selector Button
● easily set tab stops by clicking on the desired position on the ruler.
● allows you to determine which type of tab will be set left aligned , right aligned, center
aligned or decimal tab . Clicking on this button will allow you to change the tab style.
Document
● this is what you are typing/what will print out.
Status Bar
● This row can be customized by right-clicking and selecting desired options.
● Desired options may include page number/number of total page, word count,
insert/overtype mode, caps lock, and zoom slide
VIew Shortcuts
● These four buttons allow you to change the way you view your document on the screen.
● From left to right they are: print layout, full screen reading, web layout and draft.
● These can be added/removed by right clicking anywhere on the status bar and
checking/unchecking View shortcuts.
Task Bar
● shows open programs
Zoom Slide
● allow to increase/decrease the amount of the document you see on the screen
View Ruler Button
● allows you to view/hide the rulers
Screen Split Button
● the top of the vertical scroll bar is a new button. Just below the double arrow is a tiny
button that looks like a minus sign that lets you split your screen in two when
double-clicked. Double-clicking it a second time will unsplit your screen.
● Scroll Bars allow to view entire workbook by moving it up, down (vertical scroll bar), left
or right (horizontal scroll bar)
Scroll bar
● allow to view entire workbook by moving it up, down (vertical scroll bar), left or right
(horizontal scroll bar)
Right indent
● slide this triangle to the left of the margin to limit the right side of a paragraph to that
point.
● Move the triangle to the right of the margin to allow the right side of the paragraph to
extend beyond the margin.
● The triangle at the margin will keep the right side of the paragraph with the margin
Group
● command buttons with a common purpose are clustered together.
● Each ribbon contains several groups. Some groups, but not all, contain a quick launch
bar (dialogue box launcher) in the bottom right hand corner.
Title Bar
● shows name of program and open document. Also contains minimize, maximize and
close buttons.
Quick Access Toolbar
● allows you to add frequently used commands.
● Click on the down arrow at the end of the toolbar to add/remove command buttons – or –
right-click on any command button and choose Add to Quick Access Toolbar.
Tab
● the ribbon is broken down into 7 tabs.
● Each tab has a common purpose and consists of several groups.
● To select a tab, simply click on it and the appropriate groups will be displayed.
First Line Indent
● triangle controls where the first line of a paragraph begins.
● Moved to the left of the margin, will allow the first paragraph to be in the left margin.
● Can be moved to the right of the margin to indent your paragraph.
Hanging Indent
● the opposite of a first line indent. It is often moved to the right of the first line indent,
which allows the remaining lines of a paragraph to be indented according to placement
of the triangle
PRE - TEST
PICTURES
- electronic or digital pictures or photographs you have saved in any local storage device.
c. PNG
- (Portable Network Graphics)
- Built around the capabilities of .GIF. Its development was basically for the
purpose of transporting images on the Internet at faster rates
- good with transparencies but unlike. GIFs, it does not support animation
- can display up to 16 million colors
- allows the control of the transparency level or opacity of images
CLIP ART
- generally a .GIF type; line art drawings or images
- Generic representation for ideas and objects
SHAPES
- printable objects or materials
- enhance its appearance or allow you to have some tools to use for composing and
representing ideas or messages.
SMART ART
- predefined sets of different shapes grouped together to form ideas that are
organizational or structural in nature.
CHART
- represent data characteristics and trends
SCREENSHOT
- a snipping tool so you can select and display only the part that you like to capture on
your screen
IMAGE PLACEMENT
Layout of Text Wrapping Options.
B. SQUARE
- placed anywhere with the paragraph with the text going around the image in a square
pattern like frame.
C. TIGHT
- text “hug” or conforms to the general shape of the image.
D. THROUGH
- flow even tighter taking the contours and shape of the image.
F. BEHIND TEXT
- image to be dragged and placed anywhere on your document but with all the texts
floating in front of it.
G. IN FRONT OF TEXT
- image to be placed right on top of the text as if your image was dropped right on it.
WEEK 6
Mail Merge
- allows you to create documents and combine or merge them with another
document or data file.
- word processing feature that allow you to easily create multiple letters, labels,
envelopes, nametags, or catalogue documents to a group of people as stored in
a list in a database or spreadsheet
-
Two Components of Mail Merge
1. Form Document
- contains the main body of the message we want to convey or send.
Label Generation
- it creates a blank form document that simulates either a blank label or envelope of
predefined size and will use the data file that you selected to print the information,
typically individual addresses.
-
TWO FILES OF MAIL MERGE
1. Main Document
- the letter which contains the mail information for each of the merged documents that
can be letter, stationary or template
- It also contains the field names which contain the instructions for carrying out the merge.
2. Data Source
- It is also called a data file which comprises the information to be merged into a
document such as the list of names and addresses to be used in a mail merge.
- This must be connected to the data source before it can use the information in it.
● Improves readership.
● Saves time.
● Controls the appearance.
● Allows for testing
WEEK 7
PRE TEST
PROJECT TEAM
- is a team whose members usually belong to different groups, functions and are
assigned to activities for the same project.
1. Team Manager
- or Content Strategist sets priorities, communicates with the executive team at the same
time contributes/creates content.
2. Editorial Manager
- implements the strategy. Maintains an editorial calendar and hires/guides content
writers and content producers (video and audio creators) and designers.
3. Content Curator
- inputs ideas into the organization by searching the Web for any interesting news,
developments and resources, regularly watching and listening for information and
filtering the best material.
4. Content Syndicator
- does the process of sharing out the content with third-party sites or in social media.
5. Analytics Expert
- constantly looking at data to determine what is working
6. Website Manager
- organizes and puts the contents onto the website, or uploads it to YouTube, or
syndicate podcasts on iTunes.
- Makes regular updates, monitoring, and assessment to ensure the website’s
functionality and performance.
- allow writers, editors, designers, and team managers to take part in collaborative
work in real time.
2. VoIP/Video Call
– is a methodology and group of technologies for the delivery of voice communications and
multimedia sessions over internet protocol (IP) networks such as the Internet.
3. Email
– is a method of exchanging digital messages between computer users.
4. Instant Messaging
– is a type of online chat which offers real-time text transmission over the Internet.
Social Chat
The team can collaborate and interact using online social chat. Examples are:
1. Google Chat
– allows you to send and receive instant messages with anyone in the group or team.
2. Google Hangouts
– allows you to talk face from your computer. Make free video calls with up to 10 people. Can
make free calls from your Android, iOS or desktop to other Hangout users.
3. Skype
– provides video chat and voice call services. Users may exchange digital documents such as
images, text, video and others. It may transmit both text and video messages. Skype also allows
the creation of video conference calls.
4. Viber
– is an instant messaging and Voice over IP (VoIP) app for smartphones. It can also exchange
images, video and audio media messages.
5. Kakao Talk
– is a free mobile instant messaging application for smartphones with free text and free call
features.
6. WeChat
– is a mobile text and voice messaging communication service. It is one of the largest
standalone messaging apps by monthly active users.
7. Line
– Windows Apps on Microsoft store. In Windows 10, you use free, high quality voice calls and
video calls whenever and wherever you are.
Social Media
Another way of collaborating with the team is with the use of social media. Examples are:
1. Facebook
– allows users to have access to messaging, connect with different pages and groups within the
site, respond to discussion, polls and interactive presentations. Outside information can be
linked for discussion, images, and videos can be embedded in the discussion.
2. Blog
– allows users to produce daily information quickly or developed as content managemen
system. Blogs are recognized for their reverse chronological entries with the ability to comment
on them.
3. Microblog
– allows users to make short, frequent posts, link videos, photographs, leave
comments and share posts.
1. Google Drive
– is a free collaborative tool that allows you to create and edit documents, spreadsheet, and
presentations online while collaborating with other users in real- time.
2. Zoho
– is a web-based free collaboration tool containing word processing, spreadsheets,
presentations, databases, note-taking, wikis, web-conferencing, customer relationship
management (CRM), project management, invoicing and others.
3. Prezi
– is a cloud-based presentation software based on a software as a service model.
The product employs a zooming user interface (ZUI), which allows users to zoom in
and out of their presentation media.
Facebook groups to create a group page that will allow people in your group to communicate
your ideas.
WordPress also allows you to have multiple contributors for a single blog.
Google Drive and Microsoft Office Online allow multiple people to work on different office
files and even have their own group’s cloud storage.
Microsoft’s Yammer offers companies to have their own social network that allows
sharing and managing content.