Professional Documents
Culture Documents
Information refers to the ideas or concepts obtained from reading, investigation, study or research
which are transmitted through media such as telephone, television and radio. Information is necessary
to make decisions and to predict the future. For example, scientists can detect the formation of a
typhoon using the latest technology and warn the public to avoid disasters
in the affected areas.
Technology is the use of scientific knowledge, experience and resources to create processes and
products that fulfill human needs.
Information and Communications Technology or ICT deals with the use of different
communication tools such as telephone, mobile phones, Internet, etc. to locate, save, send, and edit
information. For instance, when we make a video call we use the internet
Philippines is considered as the ICT Hub of Asia because of the tremendous growth of ICT related
jobs like Business Process Outsourcing, or call centers. It started with Accenture in 1992 with Frank
Holz who was responsible for developing and marketing the first Global Resource Center in Mania.
Annual Survey of Philippines Business and Industries in 2010 revealed that the ICT industry shares
19.3% of the total employment population. Moreover, according to 2013 edition of Measuring the
Information Society by the International Telecommunication Union, in the year 2012 there were 106.8
cell phones per 100 Filipinos. While Time magazines declared Makati City, Philippines- Rank 1 as
the "Selfies Cities around the world, and Rank 9 is Cebu City. With these statistics, Philippines is
indeed the ICT hub of Asia.
Web 1.0 refers to the first generation of the Internet when most websites were read-only or static.
Webpages are usually just single files in Hypertext Markup Language (html or htm) format that are
displayed in a web browser when the URL is entered. Users are merely audiences or readers who
absorb information from websites.
Web 2.0 means the second generation of the Internet. It is dynamic and focuses on user participation.
There is a give-and-take relationship between a website and its users, in which the latter has the power
to share different types of information such as texts, images, sounds, and videos. This allows for the
creation of interactive application with more real-life uses like online banking, online shopping, and
media-sharing.
Web 3.0 the third version of the internet which is an upgrade of Web 2.0. It's main characteristics
include but are not limited to:
1. Real-time- Events and information are made available to users as they take place.
2. Everywhere- Internet can be accessed by users in all places.
3. Machine learning- Computers and mobile devices can create data and make decisions based
on the user's previous actions.
Trends in ICT
a) Social Networks - enables people to connect with other people with the same interests or
background (e.g. ‚Facebook and Twitter).
b) Bookmarking Sites - allow user to store, manage links or create a tag to various websites and
resources that allows you and others to easily search or share them (e.g. „StumbleUpon and
Pinterest).
c) Social news - sites that allow users to post their own news articles or links to other news
sources and comment to the post or vote on the news articles of the website (e.g. ‚Reddit,
Digg)
d) Media Sharing - sites that allow users to upload and share media content like music, images
and video (e.g. „Flicker, YouTube and Instagram)
e) Microblogging - sites that focus on short updates from the user wherein subscribers of this
user will be able to receive these updates. (e.g. „Twitter and Plurk)
f) Blogs and Forums - websites that allow users to post their content where users are able to
comment to the said topic. Some of the free blogging platforms are Blogger, Wordpress, and
Tumblr.
3. Mobile Technologies refer to devices ranging from basic mobile phones to tablet PCs, PDAs, MP3
players, memory sticks, e-readers, and smartphones. It is a combination of hardware, operating
systems, networking, and software, including content, learning platforms, and applications.
Mobile devices use different operating systems:
a. iOS - used in Apple devices like iPhone or iPad
b. Android - open source operating system developed by Google.
c. Blackberry OS- used in Blackberry devices
d. Symbian - an original smartphone OS used by Nokia devices.
e. WebOs - used for smartphones but now used for smart TVs
f. Windows Mobile developed by Microsoft for smartphones and pocket PCs.
Assistive Media- technology that includes assistive, adaptive, and rehabilitative devices for people
with disabilities and also includes the process used in selecting, locating, and using them. It enables
people to perform tasks that they can't accomplish or great difficulty of accomplishing it by changing
methods of interacting with the technology needed to accomplish such tasks.
Internet Threats
While the internet is an excellent source of communication and information, there are a lot of
dangerous risks to be aware of. When utilizing the Internet, here are some of the hazards you should
be aware of.
1. Spam- Most of our email accounts comes with a Spam or Junkfolder. Spam emails are a huge
issue, with more than 50% of emails being syphoned into these folders. Aside from being an
annoyance, spam emails are not a direct threat, but many can contain malware.
2. Adware- When a person surfs the internet, adware is a sort of virus that displays unwanted
advertisements. A valid technique of generating advertising money that help fund
development is frequently included in many shareware or freeware downloads. Some
websites, on the other hand, are tainted with dangerous adware that is downloaded to your
computer automatically.
3. Trojan- Leaves your computer vulnerable to hackers, allowing them to steal any data on your
computer. Trojans frequently disguise themselves as harmless computer programs in order for
hackers to gain access to your computer without being detected by you.
4. Virus- one of the most talked about internet threats. Because viruses are designed to
propagate at an alarming rate, they usually attach themselves discreetly to downloads.
Antivirus software is often attached to files for download, shares virus-infected email
attachments, or loaded onto computers via CDs, DVDs, and USB sticks.
5. Worms- Malicious email attachments or USB sticks are the most common ways for worms to
get onto a computer. When a worm infects your computer, it will most likely send itself to
every email account on your machine. Your email will appear innocent to the recipient until
they read it and find themselves infected by the same worm.
6. Phishing- Is a type of fraudulent behavior in its most basic form. Official-looking emails
impersonating a well-known source, such as a bank, are frequently sent. It is the purpose of
these emails to acquire people's passwords and credit card information.
7. Spyware- Is another type of malware. Known as spyware, it is an all-encompassing internet
ailment that is commonly associated with downloading file pop-ups. Spyware can monitor
your keystrokes, read, and destroy your files, reformat your hard drive, and access your apps
once it is installed on your computer. Without your knowledge, the individual in charge of the
spyware has access to your personal information.
8. Keyloggers- Which are similar to spyware, record a user's keyboard operations. The majority
of keyloggers will hunt for easily identifiable key entries, such as bank card numbers and
passwords. Identity and intellectual property theft are frequently tied to keylogging.
9. Pharming- Is a more sophisticated form of phishing that takes advantage of the DNS system.
Pharmers frequently construct web pages that look like those of a reputable company, such as
an online banking log-in page. Users will then submit their credentials, assuming they are
logging in to their regular service, and the pharmer will steal their credentials.
10. Rogue Security Software- This is a form of malicious software and internet fraud that
misleads users into believing there is a virus on their computer and aims to convince them to
pay for a fake malware removal tool that actually installs malware on their computer.
Netiquette- is a short for "Internet etiquette," and it is a code of appropriate online behavior that is
similar to politeness in society. Email, social media, online chat, web forums, website comments,
multiplayer gaming, and other forms of online communication are all examples of this. While there is
no official list of netiquette rules or guidelines, the general idea is to respect others online. Below are
ten examples of rules to follow for good netiquette:
Word processors- though a typical tool within the workplace, can be quickly tricky from time to time
especially if you are typing a letter or making simple invitations. By doing so, the number of features
that we utilize, particularly in Microsoft Word 2016, is merely superficial. In fact, even the most
common tasks you always do will be automated further making your work more efficient and
effective.
Word Processing- The act of utilizing a computer to produce, edit, save, and print documents is
known as word processing. Word processing requires specialist software (sometimes known as a
Word Processor). Microsoft Word is one example of a word processor, although other word
processing apps are also commonly used. Microsoft Works Word Processor, Open Office Writer,
Word Perfect, and Google Drive Document are just a few examples.
A word processor is a piece of software that allows you to create, store, and print typed texts. Word
processors are now one of the most widely used computer software products, with Microsoft Word
being the most popular.
Examples and Top Uses of a Word Processor
A word processor is one of the most used computer programs because of its versatility in creating a
document. Below is a list of the top examples of how you could use a word processor.
1. Book - Write a book.
2. Document - Any text document that requires formatting.
3. Help documentation - Support documentation for a product or service. Journal - Keep a
digital version of your daily, weekly, or monthly journal.
4. Letter - Write a letter to one or more people. Mail merge could also be used to automatically
fill in the name, address, and other fields of the letter.
5. Marketing plan - An overview of a plan to help market a new product or service.
6. Memo - Create a memo for employees.
7. Report - A status report or book report.
8. Résumé - Create or maintain your résumé.
Although Microsoft Word is the most popular word processor available, other options are available.
Below is a listing of some popular word processors in alphabetical order.
1. Abiword
2. Apple iWork - Pages.
3. Apple TextEdit - Apple macOS included word processor.
4. Corel WordPerfect.
5. 'Dropbox Paper (online and free).
6. Google Docs (online and free).
7. LibreOffice -> Writer (free).
8. Microsoft Office -> Microsoft Word
9. Microsoft WordPad.
10. Microsoft Works (discontinued).
11. SoftMaker FreeOffice -> TextMaker (free).
12. OpenOffice -> Writer (free).
13. SSuite -> WordGraph (free).
14. Sun StarOffice (discontinued).
15. Textilus (iPad and iPhone).
16. Kingsoft WPS Office -> Writer (free).
Microsoft Word- is a word processor developed by Microsoft. It was first released on October 25,
1983. It is also known as MS Word.
Adjust the layout - Capable of modifying the margins, size, and layout of a document.
AutoCorrect - corrects common spelling errors well as capitalization.
AutoFormat - applies formatting to text, e.g. number listing, bullet, hyperlinks.
Collaboration - More modern word processors help multiple people work on the same
document at the same time.
Copying, cutting, and pasting - Once text is entered into a document, it can be copied or cut
and pasted in the current document or another document.
Find - Word processors give you the ability to quickly find any word or text in any size of the
document.
Grammar Checker - proofreads documents for grammar, writing styles, sentence structure
errors and reading statistics.
Headers and footers - Being able to adjust and change text in the header and footer of a
document. The headers and footers of a document can be customized to contain page
numbers, dates, footnotes, or text for all pages or specific pages of the document.
Indentation and lists - Set and format tabs, bullet lists, and number lists.
Insert tables - Add tables to a document.
Import data - Import and format data from CS, database, or another source. Template a
document that contains the formatting necessary for a specific document type.
Text formatting - Changing the font, font size, font color, bold, italicizing, underline, etc.
Tables - organize information into rows and columns
Text Wrap - adjusts how the image behaves around other objects or text.
Thesaurus - Look up alternatives to a word without leaving the program.
Macros - Setup macros to perform common tasks.
Mail Merge - a feature that allows you to create document and merge the them with another
document or data file.
Mailers and labels - Create mailers or print labels.
Multimedia - Insert clip art, charts, images, pictures, and video into a document.
Multiple windows - While working on a document, you can have additional windows with
other documents for comparison or move text between documents.
Search and Replace - You can use the Search and Replace feature to replace any text
throughout a document.
Spelling and Grammar - Checks for spelling and grammar errors in a document.
Word wrap - Word processors can detect the edges of a page or container and automatically
wrap the text using word wrap.
Image Placement
1. In line with text - This is the default setting for images that are inserted or integrated in a
document.
2. Square - This setting allows you to insert a picture anywhere in the paragraph, with the text
wrapping around it in a square pattern, similar to a frame.
3. Tight - This is almost the same as the square setting, but here the text "hugs" to the general
shape of the image.
4. Through - This setting allows the text on your document to flow even tighter, taking the
contour and shape of the image
5. Top and Bottom - This setting pushes the text away vertically to the top and / or the bottom
of the image so that the image occupies a whole text line on its own.
6. Behind Text - This allows your image to be dragged and place anywhere on your document
but all text floating in front it.
7. In front of Text - This setting allows your image to be placed right on top of the text as if
your image was dropped right on it.
Mail Merge - Feature of MS word that allows you to efficiently create documents that have the same
general content but may have different recipients or purpose.
PNG or Portable Network Graphics file is a type of format used for photos and pictures that need a
transparent background or animations. The transparent part does not need to be the background
because you can make transparent almost everywhere in the picture. Using this format can be useful
especially when creating logos. Designing a website or even creating other images. Like GIF and
TIFF, PNG is a raster format, so it represents an image as a two-dimensional array of colored dots
(pixels).
TIFF or Tagged Image File Format is a computer file format that is a common format for
exchanging raster graphic images between Programs. This format is mainly used by photographers
and graphics artists because TIFF is supported by faxing, scanning and word processing.
JPEG or Joint Photographic Experts Group is a file format for a digital image and is perhaps the
most common format used for adjusting the image quality and file size. Using a JPEG format you can
actually control the compression of the file. The more compressed the image is, the lower quality
image and lower file size are, and vice versa. This format is often used in photos like painting and
realistic images that have a variety of tone and color. It is the format used by the majority of digital
cameras. This format works by removing tiny details and things that the human eye cannot see. This is
known as “lossy” compression. JPEG has some different types like Progressive JPEG which is a type
that shows a low quality image and improves it over a short amount of time. This is commonly used
for the internet to help the users that have a slow connection.