ICT Reviewer Prelims
ICT Reviewer Prelims
hardware and software, that enable humans to communicate with one another.
1. Premechanical Period- can be defined as the time between 3 000 BCE and 1450 CE.
During this time, humans started communicating with one another using words and
pictograms carved in rocks. (Ex: Abacus)
2. Mechanical Period- this period serves as the bridge between our current period and
the premechanical period. This period also concentrated primarily on development of
machines that will enhance calculation speed.
It was first invented by Charles Babbage in 1837
3. Electromechanical Period- in this period, the use of electricity for information
handling and transfer bloomed (Ex: calculator, Morse code)
4. Electronic Period -The last period of ICT history.
The highlight of this period is focused on the advent of solid state devices or
electronic devices.
Scientist and engineers developed methods of connectivity for sharing
processed information stored in computers and processing devices.
ENIAC (Electronic Numerical Integrator and Computer)- The first electronic and general
purpose computer, marked a revolutionary period in computing.
The World Wide Web - is the system that enables you to access hypertext documents and
other files over the Internet.
Web 1.0 – read - only Web, wherein the information or hypertext file is accessed by the user.
(passive)
Web 2.0 – read - and - write Web, started with the need to interact with Web pages.
1. Folksonomy- hashtag
2. Rich User Experience- interaction
Web 3.0 and the Semantic Web- envisioned to be a smarter access of hypertext files and a
version that would enable a wider range of search in a fast manner.
1. Compatibility– HTML files and current web browsers could not support WEB 3.0
2. Security
Trends in ICT
4. Assistive Media- is a nonprofit service designed to help people who have visual and
reading impairments.
Promote business, gain new friends, and stay in touch with the old ones,
source of entertainment through games, online communities.
One of the dangerous places, especially if you do not know what you are
doing with it.
Defined as the information superhighway.
Information Superhighway- anyone has access, can place information, can grab the
information
1. Be mindful of what you share online and what site you share it to.
3. Check out the privacy policy page of a website to learn how the website handles the
information you share.
4. Know the security features of the social networking site you use.
12. If you have a Wi-Fi at home, make it a private network by adding a password.
Internet Threats
Listed are some of the threats you should be aware of when using the internet:
a. Virus- a malicious program designed to replicate itself and transfer from one
computer to another (Unwanted application from internet)
b. Worm- a malicious program that transfers from one computer to another by any
type of means; network or any removable device.
Rogue security software- it asks the user to pay to improve his/her security but in reality,
they are not protected at all.
d. Spyware- It has the ability to monitor what you are currently doing and typing
through key logging.
Pharming- it is a more complicated way of phishing where it exploit the DNS (Domain
Name Service) system.
Netiquette- is a set of ideal rules and conduct that a netizen should observe in
communicating and/or publishing information and materials over the WWW and in ICT in
general.
Netizen- refers to the person who is a member or a part of the online community.
Rules of Netiquette
1. Golden Rule- “Do unto others as you would have them do unto you”
2. “Think Before You Click”- Would you want your parents or grandparents to see it?
Would you want your future boss to see it?
Your friends depend on you to protect their reputation online. Talk to you
friends about this serious responsibility.
Set your post to “private.” In this way, search engines will be able to scan that
post.
Avoid using names. Names are easy for search engines to scan.
If you feel that a post can affect you or other’s reputation, ask the one who
posted it to pull it down or report it as inappropriate.
Cyberbullying- involves the use of technologies to display behavior that harms another.
Through email, instant messaging, text messaging and social networking sites,
hurtful messages can be posted and shared.
Types of cyberbullying:
Flaming- online fights using electronic messages with angry and vulgar
language
Harassment and stalking- repeatedly sending cruel, vicious and/or
threatening messages
Denigration- sending or posting gossip or rumors about a person to damage
his or her reputation or friendship.
Impersonation- breaking into someone's email account and using it to send
vicious or embarrassing material to others
Outing and trickery- engaging someone in instant messaging, tricking him or
her into revealing sensitive information, and forwarding that information to
others
Exclusion- intentionally excluding someone from an online group
Cyberstalking- repeated, intense harassment and denigration that includes
threats or creates significant fear
Cybercrime- the Cybercrime Prevention Act of 2012, officially recorded as Republic Act
No. 10175, is a law in the Philippines approved on September 12, 2012.
2. Cybersex- sexual arousal using computer technology, especially by wearing virtual reality
equipment or by exchanging messages with another person via the Internet.
3. Child pornography- is a form of child sexual exploitation. Federal law defines child
pornography as any visual depiction of sexually explicit conduct involving a minor (persons
less than 18 years old). Images of child pornography are also referred to as child sexual abuse
images.
4. Identity theft- the fraudulent acquisition and use of a person's private identifying
information, usually for financial gain.
Mail Merge- allows you to create documents and combine or merge them with another
document or data file.
Standard form
IMAGE PLACEMENT
Anatomy of a Formula:
= P1(1*A8^7-6+1)
Where:
• Perform specific calculations in a particular order based on the specified values, called
arguments, or parameters
• For example, instead of specifying each value to be summed like in the above formula,
you can use the SUM function to add up a range of cells: =SUM (A2:A4)
=SUM- function used to compute for the summation of the number range
=AVERAGE- function used to compute for the average of the number range
COUNT function – know how many cells in a given range contain numeric values
(numbers or dates)
- For example, to find out how many cells in column A contain numbers, use this
formula: =COUNT(A:A)
COUNTA function – counts all cells that are not blank, whether they contain
numbers, dates, times, text, logical values of TRUE and FALSE, errors or empty text
strings ("")
- To count all non-empty cells in column A, go with this one: • =COUNTA(A:A)
COUNTIF- function used to count the cells with a specified content within a range
- Using below date, the formula for getting the number yes for the criteria is
– =COUNTIF(C2:C11,"YES")
=IF- shows a series of calculations using the same formula, but a different value for each
calculation to determine whether the formula is true or false.
To test a certain condition and return one value or perform one calculation if the
condition is met, and another value or calculation if the condition is not met
For example, the following IF statement instructs Excel to check the value in A2 and
return "OK" if it's greater than or equal to 3, "Not OK" if it's less than 3:
- =IF(A2>=3, "OK", "Not OK")
MS PowerPoint: Hyperlinking and Embedding of Files
PowerPoint makes it easy to create, collaborate, and present your ideas in dynamic,
visually compelling ways.
Hyperlink- A text or object that contains a link to another file, web page, a place in a
document, a link to a new document, or an email address
Information in the file doesn't change if you modify the source file.
Embedded objects become part of the file and, after they are inserted, they are no
longer part of the source file.
• Click LINK
• Click OK.