You are on page 1of 8

E-Tech Reviewer

Information and Communications Technology

Information refers to the ideas or concepts obtained from reading, investigation, study or research
which are transmitted through media such as telephone, television and radio. Information is necessary
to make decisions and to predict the future. For example, scientists can detect the formation of a
typhoon using the latest technology and warn the public to avoid disasters
in the affected areas.

Communication is a means of transmitting messages or sending and receiving information between


individuals using symbols, signs or verbal interactions. Before, people transmit messages through
signs or symbols and performing drama and poetry. However, these older' forms of communication
are less utilized due to the advent of technology like the use of the Internet,
e-mail or video conferencing.

Technology is the use of scientific knowledge, experience and resources to create processes and
products that fulfill human needs.

Information and Communications Technology or ICT deals with the use of different
communication tools such as telephone, mobile phones, Internet, etc. to locate, save, send, and edit
information. For instance, when we make a video call we use the internet

ICT in the Philippines

Philippines is considered as the ICT Hub of Asia because of the tremendous growth of ICT related
jobs like Business Process Outsourcing, or call centers. It started with Accenture in 1992 with Frank
Holz who was responsible for developing and marketing the first Global Resource Center in Mania.
Annual Survey of Philippines Business and Industries in 2010 revealed that the ICT industry shares
19.3% of the total employment population. Moreover, according to 2013 edition of Measuring the
Information Society by the International Telecommunication Union, in the year 2012 there were 106.8
cell phones per 100 Filipinos. While Time magazines declared Makati City, Philippines- Rank 1 as
the "Selfies Cities around the world, and Rank 9 is Cebu City. With these statistics, Philippines is
indeed the ICT hub of Asia.

World Wide Web


The World Wide Web, commonly referred to as WWW, W3, or web is an interconnected system of
public web pages accessible through the internet. invented by Tim Berners-Lee in 1989.

Web 1.0 refers to the first generation of the Internet when most websites were read-only or static.
Webpages are usually just single files in Hypertext Markup Language (html or htm) format that are
displayed in a web browser when the URL is entered. Users are merely audiences or readers who
absorb information from websites.

Web 2.0 means the second generation of the Internet. It is dynamic and focuses on user participation.
There is a give-and-take relationship between a website and its users, in which the latter has the power
to share different types of information such as texts, images, sounds, and videos. This allows for the
creation of interactive application with more real-life uses like online banking, online shopping, and
media-sharing.

Features of Web 2.0


1. Folksonomy: It is a way to classily and to link information. It enables users to find
information in an organized way, like tagging photos, websites, or links.Some social
networking sites use tags that start with a pound sign (# which is termed as hashtag)
2. Rich user experience: it has a dynamic and interactive content. For instance, a user can click
on an image of a lower to get more information about that tower like its growth conditions,
nutrient requirements, and more.
3. User participation: It helps with the flow of information between the user and the owner of a
certain website. For instance, a user can interact by liking, commenting, or sending reviews to
a certain post or site.
4. Mass participation: Allows universal web access from a traditional internet user to a wider
variety of users of various cultures that leads to differentiation o concerns.
5. Long Tail: Services that are offered on demand rather than on a one-time purchase. This
means user can either subscribe to a data plan that charges users for the amount of time spent
in the Internet or a data plan that charges for the amount only of bandwidth used.
6. Software as a Service (Saas): Allows the user to subscribe to a software rather than
purchasing them subscribing and using Google Docs, a free web-based application, to create
or edit word documents online.

Web 3.0 the third version of the internet which is an upgrade of Web 2.0. It's main characteristics
include but are not limited to:

1. Real-time- Events and information are made available to users as they take place.
2. Everywhere- Internet can be accessed by users in all places.
3. Machine learning- Computers and mobile devices can create data and make decisions based
on the user's previous actions.

Trends in ICT

1. Technological Convergence is an evolution of technological developments that integrate different


types of applications and media to form a new system. For example, a system can be used for calling
and texting, browsing the internet or creating a word document using the smartphone.
Social Media is a collection of internet-based communication tools and computer-assisted channels
dedicated to allow users to collaborate, communicate, and share information or content in a virtual
community and network.

2. Social Media is a collection of internet-based communication tools and computer-assisted channels


dedicated to allow users to collaborate, communicate, and share information or content in a virtual
community and network.

There are six types of social media:

a) Social Networks - enables people to connect with other people with the same interests or
background (e.g. ‚Facebook and Twitter).
b) Bookmarking Sites - allow user to store, manage links or create a tag to various websites and
resources that allows you and others to easily search or share them (e.g. „StumbleUpon and
Pinterest).
c) Social news - sites that allow users to post their own news articles or links to other news
sources and comment to the post or vote on the news articles of the website (e.g. ‚Reddit,
Digg)
d) Media Sharing - sites that allow users to upload and share media content like music, images
and video (e.g. „Flicker, YouTube and Instagram)
e) Microblogging - sites that focus on short updates from the user wherein subscribers of this
user will be able to receive these updates. (e.g. „Twitter and Plurk)
f) Blogs and Forums - websites that allow users to post their content where users are able to
comment to the said topic. Some of the free blogging platforms are Blogger, Wordpress, and
Tumblr.
3. Mobile Technologies refer to devices ranging from basic mobile phones to tablet PCs, PDAs, MP3
players, memory sticks, e-readers, and smartphones. It is a combination of hardware, operating
systems, networking, and software, including content, learning platforms, and applications.
Mobile devices use different operating systems:
a. iOS - used in Apple devices like iPhone or iPad
b. Android - open source operating system developed by Google.
c. Blackberry OS- used in Blackberry devices
d. Symbian - an original smartphone OS used by Nokia devices.
e. WebOs - used for smartphones but now used for smart TVs
f. Windows Mobile developed by Microsoft for smartphones and pocket PCs.

Assistive Media- technology that includes assistive, adaptive, and rehabilitative devices for people
with disabilities and also includes the process used in selecting, locating, and using them. It enables
people to perform tasks that they can't accomplish or great difficulty of accomplishing it by changing
methods of interacting with the technology needed to accomplish such tasks.

Examples of Assistive Media:


 Mobility impairments- Wheelchairs, transfer devices, walkers, prosthesis
 Visual impairments- Screen readers, braille and braille embossers, desktop video magnifier,
screen magnification software, large-print and tactile keyboards
 Hearing impairments- Hearing aids, assistive listening devices, amplified telephone
equipment

Online Safety, Security, and Etiquette Standards


The Internet is defined as the information superhighway. This means that everyone with access to this
highway has the ability to place and retrieve information. The larger the risk, the more information
you share online. Identity theft, phishing, malware infestations, and other threats are all possible. As a
result, Facebook is constantly improving its security features.

Internet Threats
While the internet is an excellent source of communication and information, there are a lot of
dangerous risks to be aware of. When utilizing the Internet, here are some of the hazards you should
be aware of.

1. Spam- Most of our email accounts comes with a Spam or Junkfolder. Spam emails are a huge
issue, with more than 50% of emails being syphoned into these folders. Aside from being an
annoyance, spam emails are not a direct threat, but many can contain malware.
2. Adware- When a person surfs the internet, adware is a sort of virus that displays unwanted
advertisements. A valid technique of generating advertising money that help fund
development is frequently included in many shareware or freeware downloads. Some
websites, on the other hand, are tainted with dangerous adware that is downloaded to your
computer automatically.
3. Trojan- Leaves your computer vulnerable to hackers, allowing them to steal any data on your
computer. Trojans frequently disguise themselves as harmless computer programs in order for
hackers to gain access to your computer without being detected by you.
4. Virus- one of the most talked about internet threats. Because viruses are designed to
propagate at an alarming rate, they usually attach themselves discreetly to downloads.
Antivirus software is often attached to files for download, shares virus-infected email
attachments, or loaded onto computers via CDs, DVDs, and USB sticks.
5. Worms- Malicious email attachments or USB sticks are the most common ways for worms to
get onto a computer. When a worm infects your computer, it will most likely send itself to
every email account on your machine. Your email will appear innocent to the recipient until
they read it and find themselves infected by the same worm.
6. Phishing- Is a type of fraudulent behavior in its most basic form. Official-looking emails
impersonating a well-known source, such as a bank, are frequently sent. It is the purpose of
these emails to acquire people's passwords and credit card information.
7. Spyware- Is another type of malware. Known as spyware, it is an all-encompassing internet
ailment that is commonly associated with downloading file pop-ups. Spyware can monitor
your keystrokes, read, and destroy your files, reformat your hard drive, and access your apps
once it is installed on your computer. Without your knowledge, the individual in charge of the
spyware has access to your personal information.
8. Keyloggers- Which are similar to spyware, record a user's keyboard operations. The majority
of keyloggers will hunt for easily identifiable key entries, such as bank card numbers and
passwords. Identity and intellectual property theft are frequently tied to keylogging.
9. Pharming- Is a more sophisticated form of phishing that takes advantage of the DNS system.
Pharmers frequently construct web pages that look like those of a reputable company, such as
an online banking log-in page. Users will then submit their credentials, assuming they are
logging in to their regular service, and the pharmer will steal their credentials.
10. Rogue Security Software- This is a form of malicious software and internet fraud that
misleads users into believing there is a virus on their computer and aims to convince them to
pay for a fake malware removal tool that actually installs malware on their computer.

Netiquette- is a short for "Internet etiquette," and it is a code of appropriate online behavior that is
similar to politeness in society. Email, social media, online chat, web forums, website comments,
multiplayer gaming, and other forms of online communication are all examples of this. While there is
no official list of netiquette rules or guidelines, the general idea is to respect others online. Below are
ten examples of rules to follow for good netiquette:

1. Avoid posting inflammatory or offensive comments online (aka flaming).


2. Respect others' privacy by not sharing personal information, photos, or videos that another
person may not want published online.
3. Never spam others by sending large amounts of unsolicited email.
4. Show good sportsmanship when playing online games, whether you win or lose.
5. Don't troll people in web forums or website comments by repeatedly nagging or annoying
them.
6. Stick to the topic when posting in online forums or when commenting on photos or videos,
such as YouTube or Facebook comments.
7. Don't swear or use offensive language.
8. Avoid replying to negative comments with more negative comments. Instead, break the cycle
with a positive post.
9. If someone asks a question and you know the answer, offer to help.
10. Thank others who help you online.

Word processors- though a typical tool within the workplace, can be quickly tricky from time to time
especially if you are typing a letter or making simple invitations. By doing so, the number of features
that we utilize, particularly in Microsoft Word 2016, is merely superficial. In fact, even the most
common tasks you always do will be automated further making your work more efficient and
effective.

Word Processing- The act of utilizing a computer to produce, edit, save, and print documents is
known as word processing. Word processing requires specialist software (sometimes known as a
Word Processor). Microsoft Word is one example of a word processor, although other word
processing apps are also commonly used. Microsoft Works Word Processor, Open Office Writer,
Word Perfect, and Google Drive Document are just a few examples.

A word processor is a piece of software that allows you to create, store, and print typed texts. Word
processors are now one of the most widely used computer software products, with Microsoft Word
being the most popular.
Examples and Top Uses of a Word Processor

A word processor is one of the most used computer programs because of its versatility in creating a
document. Below is a list of the top examples of how you could use a word processor.
1. Book - Write a book.
2. Document - Any text document that requires formatting.
3. Help documentation - Support documentation for a product or service. Journal - Keep a
digital version of your daily, weekly, or monthly journal.
4. Letter - Write a letter to one or more people. Mail merge could also be used to automatically
fill in the name, address, and other fields of the letter.
5. Marketing plan - An overview of a plan to help market a new product or service.
6. Memo - Create a memo for employees.
7. Report - A status report or book report.
8. Résumé - Create or maintain your résumé.

Example of Word Processor Programs

Although Microsoft Word is the most popular word processor available, other options are available.
Below is a listing of some popular word processors in alphabetical order.
1. Abiword
2. Apple iWork - Pages.
3. Apple TextEdit - Apple macOS included word processor.
4. Corel WordPerfect.
5. 'Dropbox Paper (online and free).
6. Google Docs (online and free).
7. LibreOffice -> Writer (free).
8. Microsoft Office -> Microsoft Word
9. Microsoft WordPad.
10. Microsoft Works (discontinued).
11. SoftMaker FreeOffice -> TextMaker (free).
12. OpenOffice -> Writer (free).
13. SSuite -> WordGraph (free).
14. Sun StarOffice (discontinued).
15. Textilus (iPad and iPhone).
16. Kingsoft WPS Office -> Writer (free).

Microsoft Word- is a word processor developed by Microsoft. It was first released on October 25,
1983. It is also known as MS Word.

How to open MS Word using shortcut keys?


Press "Windows Logo" + R then type "winword" then enter.

Features of a word processor


A word processor unlike a basic plaintext editor, has various additional tools that can help your
document or other content look more professional. A list of some of the most common features of a
word processor is provided below.

 Adjust the layout - Capable of modifying the margins, size, and layout of a document.
 AutoCorrect - corrects common spelling errors well as capitalization.
 AutoFormat - applies formatting to text, e.g. number listing, bullet, hyperlinks.
 Collaboration - More modern word processors help multiple people work on the same
document at the same time.
 Copying, cutting, and pasting - Once text is entered into a document, it can be copied or cut
and pasted in the current document or another document.
 Find - Word processors give you the ability to quickly find any word or text in any size of the
document.
 Grammar Checker - proofreads documents for grammar, writing styles, sentence structure
errors and reading statistics.
 Headers and footers - Being able to adjust and change text in the header and footer of a
document. The headers and footers of a document can be customized to contain page
numbers, dates, footnotes, or text for all pages or specific pages of the document.
 Indentation and lists - Set and format tabs, bullet lists, and number lists.
 Insert tables - Add tables to a document.
 Import data - Import and format data from CS, database, or another source. Template a
document that contains the formatting necessary for a specific document type.
 Text formatting - Changing the font, font size, font color, bold, italicizing, underline, etc.
 Tables - organize information into rows and columns
 Text Wrap - adjusts how the image behaves around other objects or text.
 Thesaurus - Look up alternatives to a word without leaving the program.
 Macros - Setup macros to perform common tasks.
 Mail Merge - a feature that allows you to create document and merge the them with another
document or data file.
 Mailers and labels - Create mailers or print labels.
 Multimedia - Insert clip art, charts, images, pictures, and video into a document.
 Multiple windows - While working on a document, you can have additional windows with
other documents for comparison or move text between documents.
 Search and Replace - You can use the Search and Replace feature to replace any text
throughout a document.
 Spelling and Grammar - Checks for spelling and grammar errors in a document.
 Word wrap - Word processors can detect the edges of a page or container and automatically
wrap the text using word wrap.

Keyboard Shortcuts and Functions

Ctrl + A - Select All


Ctrl + B - Bold Text
Ctrl + C - Copy Text
Ctrl + D - Show Font Dialog Box
Ctrl + F - Align Text to Center
Ctrl + E - Display Find Dialog Box
Ctrl + G - Display Go to Dialog Box
Ctrl + H - Display Replace Dialog Box
Ctrl + I - Italize Text
Ctrl + J - Justify Text
Ctrl + L - Align Text Left
Ctrl + M - Tab
Ctrl + N - Create a new document
Ctrl + O - Open a document
Ctrl + P - Display Print dialog box
Ctrl + R - Align Text to Right
Ctrl + S - Save a document
Ctrl + U - Underline Text
Ctrl + V - Paste a copied text
Ctrl + X - Cut a selected Text
Ctrl + Y - Redo the last undone action
Ctrl + Z - Undo the last action
 Home Tab - allows you to change document settings, such as the font properties, add bullets
or numbered list, adjust styles, and other common features.
 Text Alignment - Left, Right, Center and Justify
 Insert Tab - is used to insert different features such as tables, pictures, clip art, shapes, charts,
page numbers, word art, headers, and footers into a document.
 Page Layout - refers to the arrangement of text, images, and other objects on a page.
 Pages sizes are Short (letter) - 8.5" by 11" ; Long(Folio) - 8.5" by 13"; A4 - 8.27 by 11.69"
 Page Orientation - Portrait and Landscape

Image Placement
1. In line with text - This is the default setting for images that are inserted or integrated in a
document.
2. Square - This setting allows you to insert a picture anywhere in the paragraph, with the text
wrapping around it in a square pattern, similar to a frame.
3. Tight - This is almost the same as the square setting, but here the text "hugs" to the general
shape of the image.
4. Through - This setting allows the text on your document to flow even tighter, taking the
contour and shape of the image
5. Top and Bottom - This setting pushes the text away vertically to the top and / or the bottom
of the image so that the image occupies a whole text line on its own.
6. Behind Text - This allows your image to be dragged and place anywhere on your document
but all text floating in front it.
7. In front of Text - This setting allows your image to be placed right on top of the text as if
your image was dropped right on it.

Mail Merge - Feature of MS word that allows you to efficiently create documents that have the same
general content but may have different recipients or purpose.

Three Components of Mail Merge:


1. Main Document - the letter that contains the email information for each of the merged
document that can be letter, stationery, or template. It also contains the field names which
contains the instructions for merging.
2. Data Source - is a collection of data that will be merged into a document, such as a list of
names and addresses for a mail merge. Before it can use the data in it. it must be connected to
the data source.
3. Merge Document – this is also a word processing document that is the generated output after
executing the merge process.

PNG or Portable Network Graphics file is a type of format used for photos and pictures that need a
transparent background or animations. The transparent part does not need to be the background
because you can make transparent almost everywhere in the picture. Using this format can be useful
especially when creating logos. Designing a website or even creating other images. Like GIF and
TIFF, PNG is a raster format, so it represents an image as a two-dimensional array of colored dots
(pixels).

G IF or Graphics Interchange Format is a digital file format developed in 1987 by CompuServe.


GIF works by reducing the size of the images and some short animations. And because no data and
information is lost, this format became popular. As the time this file format was created, it supports
256 colors and during this time, it was considered by many as a breakthrough. The method used to
keep file at a minimum size is a compression algorithm commonly used or referred to as LZW name
after the inventors who made GIF, Abraham Lempel and Jacob Ziv of Israel and Terry Welch of the
United States. GIF was so popular back then but now it is used repeatedly over the internet to post
videos and memes on websites such as Reddit, Tumblr, Pinterest and others.
BMP also known as bitmap image file and Device Independent Bitmap or simply Bitmap, is raster
image format used to keep digital images. And the BMP file format is able to store two dimensional
digital images, both monochrome and colored. Since BMP format can support a wide range of colors
and tones, it is used at photographs for shaded drawings and other detailed images. Detailed images
usually are large but can be compressed so that the images can be detailed but not that hungry on
storage. But if you want an image that is detailed, compression would be an option.

TIFF or Tagged Image File Format is a computer file format that is a common format for
exchanging raster graphic images between Programs. This format is mainly used by photographers
and graphics artists because TIFF is supported by faxing, scanning and word processing.

JPEG or Joint Photographic Experts Group is a file format for a digital image and is perhaps the
most common format used for adjusting the image quality and file size. Using a JPEG format you can
actually control the compression of the file. The more compressed the image is, the lower quality
image and lower file size are, and vice versa. This format is often used in photos like painting and
realistic images that have a variety of tone and color. It is the format used by the majority of digital
cameras. This format works by removing tiny details and things that the human eye cannot see. This is
known as “lossy” compression. JPEG has some different types like Progressive JPEG which is a type
that shows a low quality image and improves it over a short amount of time. This is commonly used
for the internet to help the users that have a slow connection.

You might also like