You are on page 1of 11

Module The Current State of ICT Technologies

1
ICT in the Philippines
The use of communication technology spread in the entire country now a day even in rural areas. According to
Rappler blog site there are 119 million mobile phone subscriptions from a total population of 101 million and 47
million active Facebook accounts. The Philippines is the fastest growing app market in Southeast Asia and the
highest digital population in the world. The top online activities are social media, videos, online mobile games,
location-based search and online shopping. Staying connected with loved ones, friends, and relatives is a
fundamental need for Filipinos.

World Wide Web


It is also known as WWW or W3 introduce by Tim Berners-Lee. It consists of different pages that are formatted in a
markup language called HTML (Hypertext Markup Language) and linked to each other that contain text, graphics,
multimedia files, hyperlinks and etc.

Web 3.0 The Semantic Web


Web 1.0 A new paradigm in web interaction
Web 2.0
The first development of World Wide extension of led by World Wide Web
It is a dynamic web page where user can Consortium (W3C) where it provides
Web where web pages are static. It also
interact with page like creating a user framework that allows data to be
known as flat or stationary page and it
account, posting comments, uploading shared and reuse.
cannot be manipulated by users.
files and images, and others.
Example: Blog sites, Facebook, Twitter,
Instagram, YouTube
Features of Web 2.0
1. Folksonomy – users can classify and arrange information by adding tag or label. Pound sign (#) is used in
Facebook, Twitter, Instagram and other social networking sites.
Example in tagging on Facebook: #TeamKawayan, #Single
2. Rich User Experience – user can have high interaction with the content of the page and can achieve level of
expertise.
3. User Participation – user can put content on their own in web page like comment, evaluation, and etc.
4. Long Tail – A site that offers services and brings individual and businesses into selling different goods and
commodities such as shopping site like OLX, Lazada, Shopee, Zalora and others.
5. Software as a service – users can subscribe to a software when they need it instead of purchasing them.
6. Mass Participation – sharing of diverse information through universal web access.

Trends in ICT
1. Convergence – it refers to fusing of technological advancement to work on a similar task.
Example. Using smartphone as camera in taking pictures instead of DSLR camera.

2. Social Media – an application and website where user can communicate, create and share content, and
participate in online communities.
TYPES OF SOCIAL MEDIA
A. Social Network – A website where people with the same come together to share information.
Examples: Twitter, Instagram, Facebook
B. Social News – A website where user can post stories and are ranked based on the popularity through voting.
Examples: Digg, Reddit, Propeller, Slashdot, Fark
C. Bookmarking Sites – A website that allows you to share and store internet bookmarks, articles, posts, blogs,
images and others. Examples: Pinterest, StumbleUpon, Dribble
D. Media Sharing – A website that allows you to share and store multimedia files such as video, photos and music.
Examples: Instagram, YouTube, Flickr
E. Microblogging – a website that allows you to broadcast short message. Examples: Twitter, Tumblr, Meetme
F. Blogs and Forums – a discussion website that allows user to ask questions and comments on a journal posted by
an individual or group. Examples: Wordpress, Blogger

3. Mobile Technologies – a technology used in cellular and other devices such netbook, laptop, tablet,
smartphones and etc.

4. Assistive Media - A platform that assist people with disability. It will guide the individual like a blind person by
using an audio recording.
Module Online Safety, Security, Ethics and Etiquette

2
Online Safety
The importance of internet plays a crucial part in human development. Life becomes easy and comfortable because
of this technology. Most of us are connected to the internet via laptop, mobile phone, tablet, personal computer and
other electronic gadgets. Behind this technology there is a risk that everyone should be aware of. You could be at
risk on scam, bullying, and illegal activities if you will not take precautions in using internet. We need to keep
ourselves safe and secure whenever we use the internet. That is why it is very important to know and learn the ways
on how to be safe and secured online

Tips on how to be safe online


Netiquette ➢ Do not share your password with anyone.
It is a word that came from the two words “net” and ➢ Add friends you know in real life.
“etiquette”. It is an etiquette applied online that shows ➢ Do not visit untrusted websites.
proper manner and behavior. If you are a member of an ➢ Add password to your WIFI at home to make it
online society through social media you are called netizen. private.
And in interacting with other netizen online, we need to ➢ Install and update antivirus in your computer.
maintain good behavior which is acceptable to others in ➢ Do not give your personal information to anyone
online community. ➢ Think before you click.
➢ Never post about your future vacation.
Internet Risk
Cyberbullying
It happens when someone intentionally abused, harass, and mistreated by other person using electronic
communication.
Identity Theft
It is a crime of stealing personal information for the purpose of assuming that person’s name or identity to make any
form of transactions.
Cyber Stalking
A criminal practice where electronic communication is used to stalk or harass individual or group.
Sexting
The act of sending sexually explicit text messages, images, and videos.

Internet Threats
Malware – also known as Malicious Software.
Types of Malware :
1. Virus – a malicious program that replicate itself by copying itself to another program.
2. Trojan Horse – a malicious program that disguised as legitimate program that user will accept and use but take
control of your computer.
3. Worm – malicious program that copy’s itself and spreads to other computers.
4. Spyware – A malicious program that gathers information from victim’s computer and send it back to the hacker.
5. Adware – An unwanted advertisement that will pop-up several times on victim’s computer then behave
abnormally and tedious to close them.
6. Keylogger – A program that runs in the background and steals user credentials and confidential information
and send back to hack by recording every keystroke that a user makes on their computer or device.
7. Botnet – A collection of infected internet–connected devices such as PC and mobile phone that are controlled
by a common type of malware.
8. Rootkit – A software tools used by hackers to gain control over a computer on a network without being
exposed.
9. Ransomware – A ransom virus that block the user from accessing the programs or files and demands to pay the
ransom through online method for the removal of the virus

Spam - Also known as junk email or unwanted email send by advertiser or bot. It can be used to send malware.

Phishing - A cyberattack method using deceptive emails and websites to acquiring sensitive personal information.

Cybercrime - A crime in which computer is used as object and tool in committing a crime such hacking, phishing,
spamming, child pornography, libel, hate crimes, identity thief and others.
Internet Threats
Cybercrime Law - A law that deals with all forms of cybercrime.

The Core Rules of Netiquette by Seth T. Ross


1. Remember the human.
2. Adhere to the same standards of behavior online that you follow in real life.
3. Know where you are in cyberspace.
4. Respect other people's time and bandwidth.
5. Make yourself look good online.
6. Share expert knowledge.
7. Help keep flame wars under control.
8. Respect other people's privacy.
9. Don't abuse your power.
10. Be forgiving of other people's mistakes.
Module Contextualized Online Searchand Research
Skills
3
Internet Research
is a research method in collecting and gathering information via internet by using search engine such as google.

Search Engine
is a program that allows users to search for content on internet.
Examples of Search Engine :
Google, Aol Search, Wow, Baidu, Web Crawler, Yahoo! Search, MyWebSearch, Wolframalpha Bing, Info, Dogpile,
DuckDuckGo, Ask, Infospace, Contenko, Internet Archive.

Searching the Web


Getting the correct and reliable information is our goal in internet research. We may rely on the capability of search
engine but sometimes it may not give us the correct information because of the keywords we entered into a search
engine. There are techniques in searching information that can be applied in search engine in order to get a better
result. Some search engines allow combination of words and logic connectors of AND, OR, and NOT.

Tips for Effective Internet Research by Online Research Skills by Hannah


George Mathews Trierweiler Hudson
1. Know what kind of research you want to do. 1. Check Your Sources
2. Make a list of keywords you will use in your search. 2. Ask Good Questions
3. Enclose keywords in quotation marks. 3. Go Beyond the Surface
4. Use the minus sign (-). 4. Be Patient
5. Try specialized search engines. 5. Respect Ownership
6. Skim through search results web pages. 6. Use Your Networks
7. Bookmark
8. Review your bookmarks.

Copyright Issues
There are millions of information that we can get from the internet. Some of this information are free but others are
not. They are protected by a copyright law.

What is Copyright?
Copyright is a protection given to the owner of the rights in an original work such as books, musical works, films,
paintings, and other works, and computer programs. This original work is called intellectual property which is
protected under Republic Act 8293 known as the “Intellectual Property Code of the Philippines”.

Copyright Infringement
This happens when the copyrighted work is use by other person without permission of the author or copyright
holder. Any person who is infringing the right protected work would be liable under the law. An example of this is
the case of M.Y. Intercontinental Trading Corporation (MITC), Tedwin T. Uy, Allianz Marketing and Publishing Corp.
(Allianz), and Fujian New Technology Color Making and Printing Company, LTD (Fujian) against St. Mary’s Publishing
Corporation (SMPC). Manila regional trial court ordered Fujian and its partners to pay P24.7 million for the damages
and cost of litigation for copyright infringement to SMPC. Fujian and its three local partners was guilty of printing,
copying, reproducing, importing, distributing and selling of original and revised textbooks that they have illegally
sold to Department of Education in Zamboanga, Municipality of Cabuyao in Laguna and Municipality of Matnog in
Sorsogon without the approval of SMPC, the copyright owner of the textbooks.
Fair Use
Research is important to the students and other people. Most of them rely on the information that they can get
online. Although this information is protected by a copyright law but we can still use this information without
permission in a limited way under certain condition and purpose. Fair use is the use of copyrighted material for
comment, teaching, criticism, news reporting, research, scholarship, and other similar purpose is not an
infringement of copyright. Example of this is when you post a quote from a person in your Facebook wall. Include
the name of person who owns the quote in your post. Another example is when you copy image from internet, give
credit to the creator of image. The copied image should be use for educational purpose not for commercial use. In
fair use, 5% of the content of reference can only be copied. If 20% or less of reference copied, there must be a
secondary use agreement and fee. And if 20% or more of reference copied, it requires purchasing of creative work.

Guidelines for Fair Use


1. Majority of the contents created must be yours.
2. Give credit to the owner.
3. Don’t make profit of the copyrighted work.
Module Developing ICT content for specific
purposes
4
Lesson 4
FWA TECHNOLOGY
Ways to access the Internet
1. Fixed and Mobile Wireless Access
Fixed wireless access, or FWA, is a type of 5G or 4G LTE wireless technology
that enables fixed broadband access using radio frequencies instead of
cables.
2. Fixed/Wired Broadband Internet
Fixed/Wired Broadband Internet requires transmission of data through cables.

TYPES OF WBI
Difference between CABLE, DSL and FIBER?
2.DSL
1. Cable In the case of DSL, for instance, you attach your
Cable internet is a form of broadband that transmits modem to the phone line in your wall and receive
a wide variety of signals quickly and efficiently packets of internet data through copper wires. The
through the same coaxial cable network as Cable speed of your DSL connection will depend on how
television to provide your home with internet. close the phone company’s nearest facility is, as well
as the integrity of their phone lines

3.Fiber Ethernet vs Internet


With fiber-optic internet, your internet service provider runs Ethernet is a Internet is the
the cable all the way to your house, or to a location nearby, collective term for name used to
in which case you tap in via phone line running to a switching technologies that refer to a global
box (or “cabinet”) interconnect local network (WAN)
computers (LAN) of interconnected
computers.
MODEM vs ROUTER
A modem is often A router acts as
provided by your ISP the “traffic
(Internet Service director” of a Internet Service Providers
ISP is a business that has a permanent Internet connection
Provider) which enables network.
and provides temporary Internet connections to individual
a network access to the
and companies using one or more access method: Dial-
internet.
up, HighSpeed Dial Up, broadband, or wireless.

Web Browser vs. Search Engine


Web browser is Search engine
software program is the tool used
installed in our within a web
devices. browser.

Example of Web
Browser
chrome
Example of Search
Engine
google
Web Page vs. Website
A document which can be displayed in a web browser A collection of web pages which are grouped together
such as Firefox, Google Chrome, Opera, Microsoft and usually connected in various ways. Often called a
Internet Explorer or Edge, or Apple's Safari. These are "web site" or a "site."
also often called just "pages."

ICANN
The Internet Corporation for Assigned Names and Numbers is an American multistakeholder group and nonprofit
organization responsible for coordinating the maintenance and procedures of several databases related to the
namespaces and numerical spaces of the Internet, ensuring the network's stable and secure operation.

DNS Server
The Domain Name System (DNS) is the
phonebook of the Internet. When users type
domain names such as ‘google.com’ or
‘nytimes.com’ into web browsers, DNS is
responsible for finding the correct IP address
for those sites.

IP Address
•An identifier for a computer or device on a
TCP/IP network.
•Networks route messages based on the IP
address of the destination.
DATA CENTER •The format of an IP address separated by
a data center is a physical facility that organizations use to house periods.
their critical applications and data
Inside of the Data Center contains the
SERVER.
A server is a computer designed to process requests and deliver data to another computer over the internet or a
local network. A well-known type of server is a web server where web pages can be accessed over the internet
through a client like a web browser.

The Server contains the SSD


(Solid State Drive).
A solid-state drive (SSD) is a new generation of
storage device used in computers. SSDs store data
using flash-based memory, which is much faster
than the traditional hard disks they've come to
replace. SSDs also have no moving parts, and
upgrading to one is a great way to speed up your
computer and make it more resilient.
Module Developing ICT content for specific
purposes
4
Lesson 4.1
Productivity Tools
It refers to the software that people use to create and produce documents, presentations, databases, charts, and
graphs. Productivity tools helps you create professional quality documents, presentation, graphics, and more.

MICROSOFT WORD
Microsoft Word window is a word processing program that lets you make letters, resumes, and many other types of
documents.
The Ribbon is a visually oriented menu that runs across the top of Microsoft Word and other Office applications.
The Ribbon contains multiple tabs, which you can find near the top of the MS Word window.
The Ribbon contains all of the commands you will need to perform common tasks in Word.
Tabs 
These appear across the top of the Ribbon and contain groups of related commands. 
The File tab is where you can click to see the back stage view. This is where you go to open or save a file, make a
new document, print a document, or do anything else that has to do with files.
Groups
They organize related commands; each group name appears below the group on the Ribbon. For example, group of
commands related to fonts or group of commands related to alignment, etc.
Commands
Commands appear within each group as mentioned above. Some groups also have a small arrow in the bottom-
right corner that you can click for even more options.
A dialog box launcher is a button in the Ribbon of Microsoft Word, Excel, Outlook, and PowerPoint used to reveal
additional tools available for use in that section of the Ribbon.
Quick Access Toolbar
It is also at the top left corner of the screen, right above the File Tab. It is where the commands you use most often
are kept. By default, it includes the Save, Undo, and Redo commands.
Title Bar of MS Word
It is situated at the top and middle of the document window and displays the program or document’s name.
Word has two rulers: one horizontal and one vertical. The horizontal ruler, which appears just below the Ribbon,
is used to set margins and tab stops.
The  vertical ruler,  which can be found on the left edge of the  Word window, is used to determine the vertical
position of elements on the page.
The zoom control consists of a slider that you can slide left or right to zoom in or out; you can increase or decrease
the zoom factor by clicking the + buttons. Zooming in allows you to get a better look at your text.
View Buttons
Word View Buttons gives you a number of ways to change how your document is shown. Further, this part of the
window allows you to choose and view your document in Read Mode, Print Layout, or Web Layout. You can use
these views for different tasks, especially if you want to print the document.
Read Mode
This view opens the document to a full screen. This view is great for reading large amounts of text or simply
reviewing your work.
Print Layout view 
This Print Layout view displays pages exactly as they will appear when printed. This is the default document view
in Word. It shows what the document will look like on the printed page.
Web Layout view
This Web Layout view shows how a document appears when viewed by a Web browser, such as Internet Explorer.
This view displays the document as a webpage, which can be helpful if you’re using Word to publish content online.
Status Bar
This  Status Bar  is a part of the window that displays the document information as well as the insertion point
location. From left to right, this bar contains the total number of pages and words in the document, language, etc.
The document area is the blank section of a Word processor or other document program that allows the user to
create content.

A scroll bar is a bar that lets you move the viewing area of a window in a direction (up, down, left, or right) to see
different parts of the content

Control Bar
Part of the Microsoft Word window where you can minimize, maximize and close/exit the window.
Module Developing ICT content for specific
purposes
4
Lesson 4.2
A process to create personalize letters and pre-addressed envelopes or mailing labels
for mass mailings from a form letter.
MAIL A software tool kit that is used to produce multiple documents with a given template.
It is a Word’s way of generating mass mailings. It involves combining a list of names
MERGE and addresses to individually address to each person / receiver on the list. You can
use Mail Merge to create envelopes or address labels, as well as form letters.

COMPONENTS OF MAIL MERGE


Main Document
Mailing List
Merged Document

1. Main Document
Also known as form document
this document contains text and graphics
It is generally the document that contains the main body of the message we want to convey or send.

Parts of Main Document


MAIN BODY PLACE HOLDERS
It is the part of the form document that remains This marks the position on your form document where
the same no matter whom you send it to from individual data or information will be inserted.
among your list. Place holders are denoted or marked by (<< >>)

2. List or Data File or Mailing List


This is where the individual information or data that needs to be plugged in (merged) to the form document is
placed and maintained.
this is your data source that is used to populate information in the letter. It contains names and address of the
recipients

3. Merged Document
this document the combination of the main document

TYPES OF DOCUMENT
LETTERS
This will allow you to sent letters to a group of people and personalize, the result of the letter that each person
receives.
E-MAIL MESSAGES
Send e-mail messages to a group of people.
ENVELOPES
Print addressed envelopes for a group mailing.
LABELS
Print address labels for a group mailing.
DIRECTORY
Create a single document containing a catalog or printed list of addresses
STEPS IN CREATING A MAIL MERGE
LETTERS
1. Opening Microsoft Word Program. (Click Start button, type Word and click OK.
2. Select what type of document are you working on?
On the Mailings tab, click Start Mail Merge, and then select Letters.
3. In the document area, type your that you want to send to everyone.
4. Set Mailing List - The mailing list is your data source. It can be an Excel spreadsheet, a directory of Outlook
contacts, and Access database, or an Office address list. It contains the record that Word uses to pull
information from to build your letter.
5. Link your mailing list to your main document.
On the Mailings tab, in the Start Mail Merge group, choose Select recipients, and then click Type New List
and create new list (input at least 10 recipients) and click OK and Save.
In the Mail Merge Recipients dialog box, you can make any changes if needed, and then click OK
Click the Customize Columns button on the dialog box to modify the fields in the address list that the
Microsoft Word has pre-determined.
6. Adding personalized content to letter.
Click Mailings tab, in the Write & Fields group, click Address Block.
In the Insert Address Block dialog box, select a format for the recipient’s name that you want to will appear in
the letter and choose OK.
7. Start inserting Merge Fields.
Select a field placeholder identified by << >> on your form document by highlighting the words.
Click the Insert Merge Field command button and choose the field you’ll insert into your text.
The field is now inserted on your form document replacing the text identified by your place holders << >>.
Then delete your placeholder symbols << >> to avoid getting included on your form document.
8. Check the result of label placements.
To view how the inserted fields will appear in the letter, under Preview Results group in the Mailings tab, click
Preview Results. Choose Next or Previous record button to move through records in your data source.
In the Write & Insert group, click Greeting Line > select format that you want to use and click OK.
NOTE:
To edit the content of your mailing list/data base, under Start Mail Merge group, click Edit Recipient List.
A dialog box will appear namely Mail Merge Recipients, then under Data Source click the name of your
mailing list data base, then click edit.
9. Complete the Mail Merge
Mail Merge is ready to produce your letters.
To personalize your letter, click Edit Individual Letters. This will open a new document with your merged
letters.
To make changes to all the letters, switch back to the Main Document.

ENVELOPE
1. Opening Microsoft Word Program. (Click Start button, type Word and click OK. Select what type of document
are you working on?
2. On the Mailings tab, click Start Mail Merge, and then select Envelope.
3. Change the document layout
A dialog box will appear, under Envelope Options you can customize the your envelope.
4. Follow the same steps creating Letters, step 4 up to step 9.

You might also like