0% found this document useful (0 votes)
147 views10 pages

ICT Reviewer Prelims

ICT refers to technologies that enable communication between humans, including hardware and software. There have been four periods of ICT development: premechanical using words and pictograms, mechanical focusing on machines to enhance calculation, electromechanical using electricity for information handling, and electronic using solid state devices. Important developments include the ENIAC computer, integrated circuits, the World Wide Web created by Tim Berners-Lee, and the evolution from the passive Web 1.0 to the interactive Web 2.0. Current trends in ICT include convergence across devices, the rise of social media, mobile technologies, and assistive media to help those with impairments.

Uploaded by

Ethan Del Fierro
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
147 views10 pages

ICT Reviewer Prelims

ICT refers to technologies that enable communication between humans, including hardware and software. There have been four periods of ICT development: premechanical using words and pictograms, mechanical focusing on machines to enhance calculation, electromechanical using electricity for information handling, and electronic using solid state devices. Important developments include the ENIAC computer, integrated circuits, the World Wide Web created by Tim Berners-Lee, and the evolution from the passive Web 1.0 to the interactive Web 2.0. Current trends in ICT include convergence across devices, the rise of social media, mobile technologies, and assistive media to help those with impairments.

Uploaded by

Ethan Del Fierro
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

ICT (Information and Communication Technologies)- refers to the technologies, both

hardware and software, that enable humans to communicate with one another.

 It is any form of technology, tools or devices that enables you to communicate.

Periods of ICT Development

1. Premechanical Period- can be defined as the time between 3 000 BCE and 1450 CE.
During this time, humans started communicating with one another using words and
pictograms carved in rocks. (Ex: Abacus)
2. Mechanical Period- this period serves as the bridge between our current period and
the premechanical period. This period also concentrated primarily on development of
machines that will enhance calculation speed.
 It was first invented by Charles Babbage in 1837
3. Electromechanical Period- in this period, the use of electricity for information
handling and transfer bloomed (Ex: calculator, Morse code)
4. Electronic Period -The last period of ICT history.
 The highlight of this period is focused on the advent of solid state devices or
electronic devices.
 Scientist and engineers developed methods of connectivity for sharing
processed information stored in computers and processing devices.

ENIAC (Electronic Numerical Integrator and Computer)- The first electronic and general
purpose computer, marked a revolutionary period in computing.

 It was a big machine that occupied an area of 167 square meters.

IC (Integrated Circuit)- is a device that is composed of a group of transistors and circuit


elements compressed in a single package.

The World Wide Web - is the system that enables you to access hypertext documents and
other files over the Internet.

Tim Berners-Lee- the world-wide-web was developed by British scientist

Web 1.0 – read - only Web, wherein the information or hypertext file is accessed by the user.
(passive)

Web 2.0 – read - and - write Web, started with the need to interact with Web pages.

 It helps you categorized


 give and take

Features of Web 2.0

1. Folksonomy- hashtag
2. Rich User Experience- interaction

3. User Participation- share

4. Long Tail- specific

5. Software as a Service- third party application

6. Mass Participation- diverse

Web 3.0 and the Semantic Web- envisioned to be a smarter access of hypertext files and a
version that would enable a wider range of search in a fast manner.

Problems of Web 3.0

1. Compatibility– HTML files and current web browsers could not support WEB 3.0

2. Security

3. Vastness– World Wide Web contains billions of web pages

4. Vagueness– words are imprecise

5. Logic – Limitations of computers

Trends in ICT

1. Convergence– is the synergy of technological advancements to work on a similar


goal or task.
 Example: Word Document via personal computer and smartphone
 Cloud technologies to sync files
2. Social Media– is a website, application or online channel that enables web users to
create, co-create, discuss modify, and exchange user-generated content.
 Example: Advertisers use social media to promote their product

Six Types of Social Media


1. Social Networks- these are sites that allow you to connect with other people with
the same interests or background.
2. Bookmarking Sites- these are sites that allow you to store and manage links to
various websites and resources. (Example: Pinterest)
3. Social News- these are sites that allow users to post their own news items or links
to other news sources.
4. Media Sharing- these are sites that allow you to upload and share media content
like images, music, and video. (Ex: Flickr)
5. Microblogging- these are sites that focus on short updates from the user. (Ex:
Twitter)
6. Blogs and Forums- these websites allow users to post their content. Other users
are able (Ex: Tsikot.com)
3. Mobile Technologies
a. iOS- developed by apple
b. Android- made by google
c. Blackberry OS- developed by blackberry
d. Windows Phone OS –closed source and proprietary OS developed by Microsoft
e. Symbian –original smartphone OS; used by Nokia device
f. WebOS
g. Windows Mobile – for smartphones and pocket PCs

4. Assistive Media- is a nonprofit service designed to help people who have visual and
reading impairments.

 Database of audio recordings is used to read to the user.

Online Safety and Security

Internet- it is a powerful tool

 Promote business, gain new friends, and stay in touch with the old ones,
source of entertainment through games, online communities.
 One of the dangerous places, especially if you do not know what you are
doing with it.
 Defined as the information superhighway.

Information Superhighway- anyone has access, can place information, can grab the
information

Tips to stay safe online

1. Be mindful of what you share online and what site you share it to.

2. Do not just accept terms and condition; read it.

3. Check out the privacy policy page of a website to learn how the website handles the
information you share.

4. Know the security features of the social networking site you use.

5. Do not share your password with anyone.

6. Avoid logging in to public networks/Wi-Fi.

7. Do not talk to strangers whether online or face-to-face.

8. Never post anything about a future vacation.

9. Add friends you know in real life.

10. Avoid visiting untrusted websites.


11. Install and update an antivirus software on your computer.

12. If you have a Wi-Fi at home, make it a private network by adding a password.

13. Avoid downloading anything from untrusted websites.

14. Buy the software; do not use the pirated ones.

15. Do not reply or click links from suspicious emails.

Internet Threats

Listed are some of the threats you should be aware of when using the internet:

1. Malware- stands for malicious software

a. Virus- a malicious program designed to replicate itself and transfer from one
computer to another (Unwanted application from internet)

b. Worm- a malicious program that transfers from one computer to another by any
type of means; network or any removable device.

c. Trojan- a malicious program that is disguised as a useful program but once


downloaded or installed, leaves your PC unprotected and allows hackers to get your
information from backdoor security)

Rogue security software- it asks the user to pay to improve his/her security but in reality,
they are not protected at all.

d. Spyware- It has the ability to monitor what you are currently doing and typing
through key logging.

e. Adware- a program designed to send you advertisements.

2. Spam- unwanted email and it can be used to send malware

3. Phishing- Its goal is to acquire sensitive personal information.

Pharming- it is a more complicated way of phishing where it exploit the DNS (Domain
Name Service) system.

Netiquette- is a set of ideal rules and conduct that a netizen should observe in
communicating and/or publishing information and materials over the WWW and in ICT in
general.

Netizen- refers to the person who is a member or a part of the online community.

Rules of Netiquette

1. Golden Rule- “Do unto others as you would have them do unto you”
2. “Think Before You Click”- Would you want your parents or grandparents to see it?
Would you want your future boss to see it?
 Your friends depend on you to protect their reputation online. Talk to you
friends about this serious responsibility.
 Set your post to “private.” In this way, search engines will be able to scan that
post.
 Avoid using names. Names are easy for search engines to scan.
 If you feel that a post can affect you or other’s reputation, ask the one who
posted it to pull it down or report it as inappropriate.

FLAME – is a personal insult communicated through the internet.

 watch your posts or comments


3. Don’t Type in ALL CAPS.
4. Don’t talk with people you do not know- do not arrange to met anyone you meet
online
5. Obey Copyright Laws- don’t steal someone else’s idea, property, and rights.
Copyright Infringement- Intellectual property- a work or invention that is the result
of creativity, such as a manuscript or a design, to which one has rights and for which
one may apply for a patent, copyright, trademark, etc.
Copyright Infringement
1. Understand
2. Be responsible
3. Be creative
4. Know the law
6. Use Proper Grammar and Spelling- errors diminish the credibility of the message
7. Be HONEST / Be Yourself - tell the truth
 do not pretend to be someone else.
8. Follow the TOS (Terms of Service) rules and policy of the sites

Cyberbullying- involves the use of technologies to display behavior that harms another.

 Through email, instant messaging, text messaging and social networking sites,
hurtful messages can be posted and shared.

Types of cyberbullying:

 Flaming- online fights using electronic messages with angry and vulgar
language
 Harassment and stalking- repeatedly sending cruel, vicious and/or
threatening messages
 Denigration- sending or posting gossip or rumors about a person to damage
his or her reputation or friendship.
 Impersonation- breaking into someone's email account and using it to send
vicious or embarrassing material to others
 Outing and trickery- engaging someone in instant messaging, tricking him or
her into revealing sensitive information, and forwarding that information to
others
 Exclusion- intentionally excluding someone from an online group
 Cyberstalking- repeated, intense harassment and denigration that includes
threats or creates significant fear

Cybercrime- the Cybercrime Prevention Act of 2012, officially recorded as Republic Act
No. 10175, is a law in the Philippines approved on September 12, 2012.

Cybercrime Among the cybercrime offenses included in the bill are:

1. Cybersquatting- the practice of registering names, especially wellknown company or


brand names, as Internet domains, in the hope of reselling them at a profit.

2. Cybersex- sexual arousal using computer technology, especially by wearing virtual reality
equipment or by exchanging messages with another person via the Internet.

3. Child pornography- is a form of child sexual exploitation. Federal law defines child
pornography as any visual depiction of sexually explicit conduct involving a minor (persons
less than 18 years old). Images of child pornography are also referred to as child sexual abuse
images.

4. Identity theft- the fraudulent acquisition and use of a person's private identifying
information, usually for financial gain.

5. Illegal access to data and libel –

 Illegal Interception – The interception made by technical means without right of


any non-public transmission of computer data to, from, or within a computer system
including electromagnetic emissions from a computer system carrying such computer
data.
 Libel and slander- known broadly as defamation, are untrue statements made by
someone that are harmful to someone else's reputation.

Mail Merge- allows you to create documents and combine or merge them with another
document or data file.

•Commonly used when sending out advertising materials to various recipients

Two Components of Mail Merging

1. Form Document- the document that contains the message


• Main Body of the Document
2. List or Data File- the document or file that generally contains the list of names and
addresses
• Individual information
Label Generation- Individual recipients in an envelope with matching address printed
directly on the envelope

 Standard form

IMAGE PLACEMENT

1. In Line With Text- Images are inserted or integrated in your document


• Aligned with the text
2. Square- Inserted to be places anywhere with the paragraph with the text going around
the image in a square patter like a frame
3. Tight- Almost the same as the Square setting
• “hugs” or conforms to the general shape image
4. Through- Flow even tighter, taking the contours and shape of the image
5. Top and Bottom- Pushes the texts away vertically to the top and/or the bottom of the
image
• Occupies a whole text line on its own
6. Behind Text- Image can be dragged and placed anywhere on the document but with
all the text floating in front of it.
• Image looks like a background
7. In Front of Text- Images to be places right on top of the text

Microsoft Excel: Advanced and Complex Formulas and Computations

Microsoft Excel- is a software program produced by Microsoft that allows users to


organize, format and calculate data with formulas using a spreadsheet system.

Formula: An expression that calculates the value of a cell

• For example, =A2+A2+A3+A4 is a formula that adds up the values in cells A2 to A4

Anatomy of a Formula:

= P1(1*A8^7-6+1)

Where:

Operator Asterisk (*) = Multiplication

Operator Caret (^) = Raises Number to a Power

Operator Minus (-) = Subtraction

Operator Plus (+) = Addition

Functions Built – in Formula- (=)

Reference Name of specific cell to use- A

Constants Values entered directly into a formula- numbers (7, 6, 1, 8)


Function- predefined formula already available in Excel

• Perform specific calculations in a particular order based on the specified values, called
arguments, or parameters

• For example, instead of specifying each value to be summed like in the above formula,
you can use the SUM function to add up a range of cells: =SUM (A2:A4)

Basic Excel Formula

=SUM- function used to compute for the summation of the number range

• Reminder: Reference to a cell or a range of cells

- =SUM(A2:A6) - adds up values in cells A2 through A6.


- =SUM(A2, A6) - adds up values in cells A2 and A6.
- =SUM(A2:A6)/5 - adds up values in cells A2 through A6, and then divides the
sum by 5.

=AVERAGE- function used to compute for the average of the number range

 instead of typing =SUM(A2:A6)/5, you can simply put =AVERAGE (A2:A6)

=COUNT- function used to count the cell with content

 COUNT function – know how many cells in a given range contain numeric values
(numbers or dates)
- For example, to find out how many cells in column A contain numbers, use this
formula: =COUNT(A:A)
 COUNTA function – counts all cells that are not blank, whether they contain
numbers, dates, times, text, logical values of TRUE and FALSE, errors or empty text
strings ("")
- To count all non-empty cells in column A, go with this one: • =COUNTA(A:A)
 COUNTIF- function used to count the cells with a specified content within a range
- Using below date, the formula for getting the number yes for the criteria is
– =COUNTIF(C2:C11,"YES")

=IF- shows a series of calculations using the same formula, but a different value for each
calculation to determine whether the formula is true or false.

 To test a certain condition and return one value or perform one calculation if the
condition is met, and another value or calculation if the condition is not met
 For example, the following IF statement instructs Excel to check the value in A2 and
return "OK" if it's greater than or equal to 3, "Not OK" if it's less than 3:
- =IF(A2>=3, "OK", "Not OK")
MS PowerPoint: Hyperlinking and Embedding of Files

PowerPoint- is a slideshow presentation program

 PowerPoint makes it easy to create, collaborate, and present your ideas in dynamic,
visually compelling ways.

CREATING AN EFFECTIVE PRESENTATION

• Minimize – keep slide counts to a minimum

• Clarity – making sure the font is readable

• Simplicity- 0 using bullets or short sentences; applying the 6x7 rule

• Visuals – using graphics that attract; not distract

• Consistency – making you designs uniform

• Contrast – using light font on dark background or vice versa

Advance Functions of PPT

Hyperlink- A text or object that contains a link to another file, web page, a place in a
document, a link to a new document, or an email address

 Information can be updated if the source file is modified


 It displays a representation of the linked data

Embedding of Files- the act of placing objects within the presentation

 Information in the file doesn't change if you modify the source file.
 Embedded objects become part of the file and, after they are inserted, they are no
longer part of the source file.

HOW TO CREATE HYPERLINK

• Start by writing your texts in the presentation.

• Highlight the word that you are targeting to set-up a link.

• Right-click on the highlighted in to open the options pop-up box.

• Left-click on the Hyperlink option.

HOW TO EMBED PICTURES OR FILES

1. Click the INSERT TAB

2. Select the OBJECT Command

• Click CREATE FROM FILE


• Click BROWSE and locate the file you want to embed

• Click LINK

• Click OK.

You might also like