You are on page 1of 3

EM TECH

1. CREATOR OF WEB 1.0


 Berners-Lee – 1990

2. CREATOR OF WEB 2.0


 Darcy DiNucci – 1999

3. CREATOR OD WEB 3.0


 Gavin Wood – 2014

 GIF - Graphic Interchange Format


-a lossless format for image files that supports both animated and static images.
 BMP – BitMaP
- is a type of image file format used to store digital images.
 JPG - Joint Photographic Experts Group
- JPEG is a digital image compression format, and a popular image type shown on the Internet
and used with digital cameras.
 PNG - Portable Network Graphics
- PNG is a compressed raster graphic file format that is a standard format for web graphics.

 CLIPART - clip art is a pre-made image or a collection of images, used to illustrate or support some
type of information electronically or printed.
 SMART ART - is a visual representation of your information and ideas. You create one by choosing a
layout that fits your message. Some layouts (such as organization charts and Venn diagrams) portray
specific kinds of information, while others simply enhance the appearance of a bulleted list.
 SHAPE - the quality of a distinct object or body in having an external surface or outline of specific form or
figure.
 CHARTS - a way of presenting information, usually by putting it into vertical rows and boxes on
a sheet of paper, so it can be easily understood:
The chart shows a top-down communication model.

 MAIL MERGE

Mail merge is a method of building personalized letters, documents, or emails with a bit of automation.
Components of mail merge include:
1. A template of a letter or an email with specific placeholders in the body, and

2. A spreadsheet with a set of data that should replace placeholders for each individual recipient.
These can be names, addresses, or any other custom data. Some tools even allow for sending
individual attachments with emails.

A mail merge functionality combines these two components into one piece – a personalized message
with data relevant to you and you are only.

 WHERE CAN YOU FIND THE MAIL MERGE START BUTON?


On the MAILINGS tab, click Start Mail Merge and Step-by-Step Mail Merge Wizard. Select the type
of document you want to add mail merge to and click Next. Here you can start a new document
from a template or existing document.
 WHAT FILE CONTAINS INFO YOU NEED TO MERGE INTO YOUR DOCUMENTS?
A Data Source is a file that contains the information to be merged with the Main Document, such as
names and addresses.

 Components of Mail Merge


1. Form Document is the first component of our mail merged document that contains the main
body of the message we want to convey or send.
• Place holders are data fields or merge fields which marks the position on your form document
where individual data or information will be inserted and are denoted by the text with double-
headed arrows (<< >>) on each side

Label Generator is a mail merge feature included on Microsoft Word. Microsoft Word will print
individual addresses to a standard form that it has already pre-formatted. It creates a blank form document
that simulates either a blank label or envelope of pre-defined size and will use the data file that you
selected to print the individual addresses.
 WHAT IS ICT?
Information and communication technologies (ICT) is defined as a diverse set of technological tools
and resources used to transmit, store, create, share, or exchange information.

 Online Safety, Security, Ethics, and Etiquette

 Tips on how to be safe online.


 Do not share your password with anyone.
 Add friends you know in real life.
 Do not visit untrusted websites.
 Add password to your WIFI at home to make it private.
 install and update antivirus in your computer.
 Do not give your personal information to anyone.
 Think before you click.
 Never post about your future vacation.

 Private information
-Sensitive personal information identity such as username passwords accounts. your and bank

 INTERNET THREATS
- Flaming The act of saying mean things online, usually in ALL CAPS, and often in a public forum
with the intention to humiliate.
- Online Predation Act of engaging an underage minor into inappropriate sexual relationships
through the internet. Online predators may attempt to initiate and seduce minors into
relationships using chat rooms or Internet forums.
- Cyberstalking Same as physical stalking by giving unwanted obsessive attention to specific
person like following, secret surveillance, persistent and manipulative calling and texting, and
other means of approaching the victim unexpectedly but cyber stalkers rely on online
technology to do it.
- Cyber Bullying it is bullying that takes place over digital devices like cell phones, computer, and
tablets.
- Hacker A clever or expert programmer who can gain unauthorized access to other computers.
He can "hack" his way through the security levels of a computer system or network
- Spyware It is software that "spies" on your computer where it captures information like Web
browsing habits, e mail usernames messages, and passwords, and credit card information.
- Email spoofing Creation of emails with a forged sender address the goal of email spoofing
recipients to open respond and engage with the email message.
- Phishing It is deceitful practice of getting your personal information using email or text
messages. Scammers may try to steal your passwords, account numbers, or Security numbers,
social media.
- Pop-ads Type of window that appears on top of (over) the browser window of a Web site that a
user has visited (Pop-up Ad n'd). It can also be used by hackers to steal your personal
information (such as your bank details).
- Computer viruses’ small programs or scripts that can negatively affect the health of your
computer These malicious little programs can create files. move files, erase files. consume your
computer's memory and cause your computer not to function correctly.

You might also like