Professional Documents
Culture Documents
3rd Reporters Handout
3rd Reporters Handout
Lesson 1:
Introduction to Information and Communication Technologies
What is Information and Communications Technology?
Trends in ICT
1. Convergence - is the synergy of technological advancements to work on a similar goal or task.
2. Social media - a website, application, or online channel that enables web users to create,
a) Social Networks - these are sites that allow you to connect with other people with the same interests
b) Bookmarking Sites - these are sites that allow you to store and manage links to various websites,
c) Social News - these are sites that allow users to post their own news items or links to other news,
d) Media Sharing - These are sites that allow you to upload and share media content
e) Microblogging - these are sites that focus on short updates from the user.
f) Blogs and Forums - these websites allow users to post their content.
3. Mobile Technologies
➢ Smartphones and tablets - devices with capability to do tasks that were originally found in
personal computers.
Different mobile devices Operating Systems:
a) iOS - used in Apple devices such as the iPhone and iPad.
b) Android — an open source operating system developed by Google.
c) Blackberry OS - used in Blackberry devices
d) Windows Phone OS - a closed source and proprietary operating system,
e) Symbian - the original smartphone OS; used by Nokia devices
f) WebOS - originally used for smartphones; now used for smart TVs
g) Windows Mobile - developed by Microsoft for smartphones and pocket PCs
Open Source - means several mobile phone companies use this OS for free.
4. Assistive Media - a service to help people who have visual and reading impairments.
Internet Threats
1. Malware - stands for malicious software.
a) Virus - program designed to replicate itself and transfer from one computer to another
b) Worm - a malicious program that transfers from one computer to another by any type of means.
c) Trojan - a program that is disguised as a useful but once downloaded leaves your PC unprotected.
*Rogue security software - tricks the user into posing that it is a security software,
d) Spyware - a program that runs in the background without you knowing it,
*Keyloggers - used to record the keystroke done by the users.
e) Adware - a program designed to send you advertisements, mostly as pop-ups.
2. Spam - unwanted email mostly from bots or advertisers.
3. Phishing - Its goal is to acquire sensitive personal information,
*Pharming - it exploits the DNS (Domain Name Service) system.
Copyright Infringement
Intellectual property - If you create something: an idea, an invention,
Here are some tips that could help you avoid copyright infringement:
1. Understand.
2. Be responsible.
4. Know the law.
Online Research
1. Have a question in mind.
2. Narrow it down.
3. Advanced Search.
+ contain all the terms that are preceded by the + symbol
“ ” Finds the exact words in a phrase.
( ) Finds or excludes web pages that contain a group of words.
AND or & Finds web pages that contain all the terms or phrases
NOT or - Excludes web pages that contain a term or phrase
OR or | Finds web pages that contain either of the terms or phrases
Kinds of Materials
1. Pictures - are electronic or digital pictures or photographs you have saved
JPG - this type of image file can support 16.7 million colors
GIF - this type of image file is capable of displaying transparencies.
PNG - this type of image file is for transporting images on the Internet at faster rates.
2. Clip Art - this is generally a .
3. Smart Art - predefined sets of different shapes grouped together to form ideas,
4. Chart - allows you to represent data characteristics and trends.
Image Placement
➢ Text Wrap - adjusts how the image behaves around other objects or text.
In Line with Text Square Tight Through Top and Bottom Behind Text
-Prepared by Group 3