REVIEWER IN E-TECH
ICT deals with the use of different communication technologies such as mobile phones, telephone,
internet, etc. to locate, save, send and edit information.
Online System
Online system is a set of principles or procedures according to which something is done, an organized
scheme or method. Ex. Online Shopping System
Platform
A platform is a group of technologies that are used as a base upon which other applications, processes
or technologies are developed.
Search Engines- It is a software system that is designed to search for information on the World Wide
Web (WWW)
Communication Services These are outsourced enterprise communications solutions that can be leased
from a single vendor or provider
Payment System- It is any system used to settle financial transactions through transfer of monetary
value, and includes the institutions, instruments, people, rules, procedures, standards, and technologies.
Advertising Platforms- It allows users to create and manage advertising campaigns, generate reports,
and retrieve information about the ads, campaigns, and organizations that are associated with an
account
Social Media- are forms of electronic communication (as Websites for social networking and
microblogging) through which users create online communities to share information, ideas, personal
messages, and other content (as videos)
Following are some of the online platforms and applications that you can use to create online
presentation, web paage, newsletter, infographics, music, video, and other multimedia contents:
1. Presentation Tools – Prezi, Zoho Shows, MS PowerPoint.
2. Newsletter, ICT Content Platforms – Dropbox, Tumblr, Wix
3. Photo Editing Tools – Picasa, Adobe Photoshop, GIMP 4. Video Editing Tools – Sony Vegas Pro,
Windows Movie Maker, Adobe Premier Pro
5. Photo uploading and hosting Tools – Dropbox, Flickr
6. Online Collaborative Tools – Google Drive, Viber, Facebook
7. Cloud Computing – Dropbox, Google Drive, Microsoft One Drive
8. Blog Tools – Blogger, WordPress, LiveJournal
9. Mapping Tools – Google Maps, Waze, Wikimapia
10. Music Production – Sony Vegas Pro, Audacity, Virtual DJ
11. Survey and Forms – Google Forms
12. ICT Projects and Content Publishing and Uploading Platforms – WordPress, MS Office Project Server,
File Manager
13. Web Design Platforms – Wix, Weebly, Adobe Dreamweaver
14. Web Management Platforms – Drupal, WordPress, Joomla
15. Curating tools – Pinterest, Storify, Trapit
ONLINE SAFETY:
Online Safety refers to the practices and precautions that should be observed when using the internet to
ensure that the users as well as their computers and personal information are safe from crimes
associated with using the internet.
Numerous delinquencies that can be committed on the internet:
Stalking
Identity theft
Privacy violation
Harassment
Online Safety Measures:
Never give any information about yourself over the internet.
Do not give any banking or sensitive information unless you are sure that it is a verified, reputable
business having a secured service. The website address should begin with https:// as opposed to [Link]
Never access your accounts by following an email link, instead type the URL yourself, to be sure.
Never open messages and/or attachments from someone you don’t know.
Regularly review your privacy setting. And make sure not to share important personal information.
When using a public computer, make sure to log out your accounts and delete your browsing data
before leaving. (It can also be useful to use the “incognito” feature if you’re using google chrome, so
your activities won’t be listed).
Keep your software updated to avoid security holes.
Do not download or install software or anything on your computer or cellphone that is unknown to you.
E-mail: E-mail is a great way to communicate with your friends and family. Sometimes you may receive
messages trying to sell you something or encouraging you to visit a Website. It is probably best not to
respond to e-mail from people or groups you don’t know. These sites might be a scam to sell you
something you don’t want. Remember, the sender might not be who he or she seems to be. If you
respond you are confirming that you have a valid e-mail address. That information can encourage the
sender to forward inappropriate e-mail or put your address on even more lists.
Here are a few reminders for safe browsing on the World Wide Web (www):
Never give out your name, address, telephone number, password, school name, parent’s name, pictures
of yourself, credit cards, or any other personal information to other’s online.
Never agree to meet face to face with someone you’ve met online without discussing it with your
parents. Only if your parents decide that it’s okay to meet your ‘cyber-friend’, arrange to meet in a
familiar public place, and take an adult with you.
Never respond to messages from unfamiliar persons.
Never enter an area that charges for services without getting your parent’s permission first.
If you receive threatening e-mail, save the offensive material, tell anyone in authority. And contact that
user’s internet service provider and your local law enforcement agent
Cybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing,
spamming) or is used as a tool to commit an offense (child pornography, hate crimes).
MALICIOUS THREATS PRESENT ON THE INTERNET:
Whilst the internet is a fantastic place for communication and information, there are many
malicious threats you need to avoid:
SPAM – the fact that most of our email accounts come with a “Spam” or “Junk” folder insinuates that
spam emails is a huge issue. Aside from being an annoyance, spam emails are not a direct threat.
However, many can contain malware.
Unwanted email mostly from bots or advertisers. An internet bot, also known as web robot or simply
bot, is a software application that runs automated tasks (scripts) over the internet.
ADWARE – adware is a type of malware software that displays unwanted ads when a user is surfing the
internet. The ds often redirect your searches to advertising websites and collect marketing – type data
about you, behind your back, which is considered malicious adware that is automatically downloaded to
your computer, when this has been completed Trojans can be used.
TROJAN - Trojans leave your computer completely unprotected which can mean that hackers can steal
any data from your system. Trojans often present themselves as harmless computer programs so that
hackers can penetrate your computer without being detected.
VIRUS – viruses usually attach themselves covertly to downloads as they are designed to spread at an
alarming rate viruses are often attached to files for download, shared via CDs, DVDs, and USB sticks or
loaded on to computers by opening infected email attachments.
PHISHING – in its simplest terms, phishing is a form of fraudulent activity. Often, official looking emails
are sent impersonating a well-known provider, such as a bank.
The attempt to obtain personal information.
SPYWARE – it is usually attached to pop-ups of downloadable files. Whoever is controlling the spyware
has access to your personal details without you even knowing.
KEYLOGGER – similar to a part of spyware, keyloggers record a user’s keyboard action.
PHARMING – Pharmers often create web pages mimicking that of a trustworthy business, such as an
online banking log-in page. Users will then enter their details, thinking they are logging into their usual
service, and their details will be stolen by the pharmer.
ROGUE SECURITY SOFTWARE – if you are ever downloading antivirus or anti-spyware programs, make
sure you have purchased it from a legitimate source. Rogue Security Software will often ask you to pay
for extra protection, which is huge. The security software is completely useless, and criminals have
robbed you of your money.
INTERNET ETHICS AND NETIQUETTE:
Netiquette: Comes from the word Network and Etiquette. This is a set of rules and norms for acceptable
conduct or behavior online.
Computer Ethics: Concerned with how computing professionals should make decisions regarding
professional and social conduct.
Privacy: Refers to the right of individuals to deny or restrict the collection and use of information about
them.
TEN CORE RULES OF NETIQUTTE by VIRGINIA SHEA
Remember the human
Adhere to the same standards of behavior online that you follow in real life.
Know where you are in cyberspace.
Respect other people’s time and bandwidth.
Make yourself look good online.
Share expert knowledge
Help keep flame wars under control.
Respect other people’s privacy
Don’t abuse your power.
Be forgiving of other people’s mistakes.
Remember the human
Remember the quotation from Confucious, “do not do unto others, what you don’t want to do unto
you”. While you’re interacting online, always be mindful to be vigilant and to be cautious of who you
interact with.
Adhere to the same standards of behavior online that you follow in real life.
How you talk in real life, should also be how you do it online. Don’t pretend to be somebody you are not
just because you are behind your computer desks. Be professional.
Know where you are in cyberspace.
Always bear in mind that there are many threats online so you must know where to go and always check
your activities to make sure that what you are doing is still safe and will not endanger your life or your
work.
Respect other people’s time and bandwidth.
Not because you’re online, you can do anything anytime you want. Respect your clients’ time and
privacy. Contact during reasonable hours and never use their information and disclose it to someone
unauthorized, even for your own sake.
Make yourself look good online.
Try to be formal and as presentable as you can online. It won’t harm you to get a nice and good first
impression from possible clients.
Share expert knowledge
Don’t spread unreliable news. Never be part of fake news perpetrators and to the rampant mis and
disinformation of netizens.
Help keep flame wars under control.
Don’t engage in online wars. As long as you can don’t involve your work with your personal agendas.
Respect other people’s privacy
Don’t take your client’s information for granted. They trusted you enough to give it to you, and so you
must hold and keep that trust to create a good customer - service provider relationship.
Don’t abuse your power.
Just like how the Spiderman movie states, “with great power, comes great responsibility.” Use your
authority wisely.
Be forgiving of other people’s mistakes.
Nobody’s perfect. Learn how to manage whenever a colleague creates a mistake. Teach them, don’t
flaunt their flaws.
Environment of Microsoft Word
Microsoft Word is the word processing application in the Microsoft Office suite. Create professional-
looking, formatted text documents with this powerful word processing software.
Title bar - This displays the document name followed by a program name.
Menu bar - This contains a list of options to manage and customize documents.
Standard toolbar - This contains shortcut buttons for the most popular commands.
Formatting toolbar - This contains buttons used for formatting.
Ruler - This is used to set margins, indents, and tabs.
Insertion point - This is the location where the next character appears.
Help - This provides quick access to Help topics.
Scroll bars - These are used to view parts of the document.
Status bar - This displays the position of the insertion point and working mode buttons.
View buttons - These change the layout view of the document to normal, web layout, print layout, and
outline view.
Advanced Word Processing Skills
In the professional world, sending out information to convey important information is vital. Because of
ICT, things are now sent much faster than the traditional newsletters or postal mail. You can now send
much faster than the traditional newsletters or postal mail. You can now use the Internet to send out
information you need to share.
Mail Merge and Label Generation
A mail merge is a word processing feature that allows you to easily create multiple letters, labels,
envelopes, nametags, or catalogue documents to group of people as stored in a list in a database or
spreadsheets.
When making Mail Merge, you will need a document using MS Word and a recipient list which is
typically done using MS Excel. But you can also use various sources including MS Outlook contact list, MS
Access database, or a Notepad Text document.
Two Components of Mail Merge
Form Document - the first component of our mail merged document is the form document. It is
generally the document that contains the main body of the message we want to convey or send. The
main body of the message is the part of the form document that remains the same no matter whom you
send it to from among your lists. Also included in the form document is what we call place holders, also
referred to as data fields or merge fields. This marks the position on your form document where
individual data or information will be inserted.
List or Data File - this is where the individual information or data that needs to be plugged in (merged)
to the form document is placed and maintained. One of the best things about the mail merge feature is
that it allows data file to be created for within the Microsoft Word application itself, or it gets data from
a file created in Microsoft Excel or other data formats. In this way, fields that needed to be filled up on
the form document can easily be maintained without accidentally altering the form or main document.
You can also easily add, remove, modify, or extract your data more efficiently by using other data
management applications like Excel or Access and import them in Word during the mail merge process.
Label Generation
Included in the mail merge feature on Microsoft Word is the Label Generator. It just makes sense that
after you print out your form letters, you will need to send it to individual recipients in an envelope with
the matching address printed directly on the envelope or on a mailing label to stick on. By using
virtually, the same process as a standard mail merge, Microsoft Word will print individual addresses to a
standard form that it has already pre-formatted. Simply put, it creates a blank form document that
simulates either a blank label or envelope of pre-defined size and will use the data file that you selected
to print the information, typically individual addresses. So even in generating labels, the two essential
components of creating a merged document are present: the form document and the data file. Only in
this case, you did not have to type or create the form document yourself because it was already created
and pre-formatted in Microsoft Word. All you need to do is select the correct or appropriate size for the
label or envelope and select the data file that contains the addresses (data) to be printed. You can also
preview your merged labels before printing if you want to.
Microsoft Word
Microsoft Word is a word processing program that
was first developed by Microsoft in 1983. Since
that time, Microsoft has released an abundance of
updated versions, each offering more features
and incorporating better technology than the one
before it.
Microsoft Office 365
Office 365 is a Software as a Service (SaaS)
product from Microsoft that provides subscribers
with the Microsoft Office desktop apps for
Windows and macOS, and online business
services like Microsoft Teams, SharePoint,
OneDrive for Business, and Exchange Online.
What is the standalone version of
Microsoft Office?
The standalone version of Office (also referred to
as the "on-premises" or "perpetual" version)
allows you to install and update the apps on one
computer. However, you cannot upgrade to the
following version.
COMMANDS
• CTRL + C = Copy
• CTRL + V = Paste
• CTRL + X = Cut
• CTRL + A = Highlight
• CTRL + N = New Document
• CTRL + S = Save
• CTRL + P = Print
• CTRL + L = Left align
• CTRL + R= Right Align
• CTRL + E =Center Align
• CTRL + J = Justified
• CTRL + Z = Undo
Mail Merge
Mail Merge is a useful tool that allows
you to produce multiple letters, labels, envelopes
Name tags and more using information stored
In a list database, or spreadsheet. When
performing a Mail merge, you will need a Word
Document and recipient list which is typically
An Excel workbook.
Microsoft Excel
Excel is the most widely used spreadsheet
program and is part of Microsoft Office Suite.
It can handle various types of data and is very
good for the purpose of calculations. Excel has
been rightly called a word processor for numbers
Work Book
An excel document is referred to as workbook.
A workbook holds one or more worksheets
(Spreadsheets). In other words, a workbook is a
collection of worksheets stored in a single file. A
work book is useful for grouping the worksheets
of a project together.
Worksheet
A worksheet is a table like document containing
rows and columns that holds data and formula.
There are 16,384 columns and 1, 048,756 rows in
each worksheet. The columns are named A, B,
C…. Up to Z then AA, AB, AC…. Up to ZZ and then
AAA, AAB, AAC… up to XFD.