Lecture: ICT in The Context of Global Communication For Specific Professional Track
Lecture: ICT in The Context of Global Communication For Specific Professional Track
Communication for Specific Professional Track ICT nowadays has also widened its horizon in developing
new tools or emerging technologies. Mobile devices can
communicate through the following communication tools:
Information and Communication Technology
>Wireless Fidelity (Wi-Fi) – a type of wireless local area
>Refers to technologies that provide access to information networking technology that provides users with wireless
through telecommunications. It also includes broadcast high-speed internet and network connections.
media, management systems, and network-based control. Telecommunication companies provide wi-fi services such
>It deals with the use of different communication as PLDT, Globe and Converge.
technologies such as mobile phones, telephones, Internet
to locate, save, send and edit information. >Bluetooth – uses packet-based transmission over short
>Convergence of several technologies including internet range radio signals and is the predecessor of infrared
and wireless medium, but the primary focus is on the connection. Nowadays, Bluetooth is widely use not only in
access and sharing of information and communication. mobile phones but also in accessories such as wireless
headphones, wireless charging, and other smart devices at
home or offices.
Read pages 1-2 of your textbook
>Third Generation (3G), Fourth Generation (4G), Fifth
ICT in the Philippines Generation (5G), Global System for Mobile
Communications (GSM), and General Packet Radio Service
(GPRS).
>Philippines is dub as the ‘’ICT Hub of Asia” because of
the huge growth of ICT-related jobs, one of which is BPO,
>Data Services – data networking services for mobile
Business Process Outsourcing, or call centers.
phones which are provided by network carriers. Major of
>ICT Department in the Philippines is responsible for the
mobile network users in the Philippines relies on prepaid
planning, development, and promotion of the country’s
loading for their network carriers rather than using a
information and communications technology (ICT) agenda
postpaid plan as it is more economical. On contrary, in
in support of national development.
United States, there is a very minimal user of prepaid
network and mostly uses postpaid plans.
World Wide Web
>Dial Up Services – data networking services using
>An information system on the internet that allows modems and telephone lines. In today’s settings, there is
documents to be connected to other documents by minimal to no user of this service anymore. Mostly uses
hypertext links, enabling the user to search for information Wi-Fi or Data services as it is more reliable in terms of
by moving from one document to another. internet speed and more convenient since you can carry
>Is an information space where documents and other web your network service using your phone while dial up
resources are identified by URLs, interlinked by hypertext requires an actual line from modem or telephone lines.
links, and can be accessed via the Internet.
>Invented by Tim-Berners Lee. >Virtual Private Networks (VPN) – secure access to a
private network. This type of network is usually used by
OFWs in the Middle East or U.A.E. who wants to use video
Web Pages - a hypertext document connected to the
calling features of applications such as Facebook or Skype
World Wide Web. It is a document that is suitable for the
since in these countries, it is prohibited to use such
World Wide Web.
application feature. By connecting to VPN, they can access
restricted sites.
The different online platforms of World Wide Web:
Read page 2 of your textbook to know more about
>Web 1.0 – refers to the first stage in the World Wide communication tools in ICT.
Web, which was entirely made up of the Web pages
connected by hyperlinks. Emerging Technologies in ICT
>Web 2.0 – is the evolution of Web 1.0 by adding
dynamic pages. The user is able to see a website >Artificial Intelligence (AI) – branch of computer science
differently than others. Allows users to interact with the focused with making computers work and act like humans.
page; instead of just reading the page, the user may be Examples of this are Alexa by Amazon Prime, Siri by Apple,
able to comment or create a user account. Google Talk by Google.
>Web 3.0 – this platform is all about semantic web. Aims
to have machines (or servers) understand the user’s >Robotics – field of computer science and engineering
preferences to be able to deliver web content. concerned with creating devices that can move and react
to sensory input. One of the most known robotics
Static Web Page - is known as a flat page or stationary developments today is Sophia by Hanson Robotics who
age in the sense that the page is ‘’as is’’ and cannot be has become somewhat of a media personality and have
manipulated by the user. The content is also the same for spoken at the United Nations and even appeared on The
all users that is referred to as Web 1.0. Jimmy Fallon Show. Robotics is widely use in industries
such as agriculture, production, and even in medical field.
Dynamic Web Pages– web 2.0 is the evolution of web
1.0 by adding dynamic web pages. The user is able to see >Biometrics - a technology used to analyze human body
website differently than others e.g. social networking sites, characteristics such as DNA, fingerprints, eye retinas and
wikis, video sharing sites irises, voice patterns, facial patterns mainly for
authentication purposes. BCAS is using a biometric system
Communication tools in ICT for its employee’s attendance where staffs should scan
their fingerprints to confirm their attendance of the day.
E-Commerce Platform – It is a collections of software
>Quantum Cryptography – science of encoding and technologies that allows merchant to sell products over the
decoding information or messages which depends on internet. Shopee, Lazada, and Zalaro are the most
physics, not mathematics. Its main purpose is for commonly used E-commerce platform in the country.
information privacy and security. Atm cards or banks uses
such system to secure depositors’ information. Mobile Technologies– The popularity of smartphones
and tablets has taken a major rise over the years. This is
>Computer-assisted Translation (CAT) – use of computers largely because of the devices capability to do the tasks
to assist in the translation of one or more natural that were originally found in PCs. Several of these devices
languages into another or others, and vice versa. Google are capable of using a high-speed internet. Today the
translate is the most common example of this technology. latest model devices use 4G Networking (LTE), which is
currently the fastest.
>3D Imaging and Holography – a photographic technique
that uses light to project objects in a way that appears >iOS – use in apple devices such as iPhone and iPad
three-dimensional. A classic example of such are those >Android – an open source OS developed by Google.
holograms that you can see in credit or debit cards. Aside Being open source means mobile phone companies use
from design, it holds security system as well. 3D imaging this OS for free.
and holography is also used in education, entertainment >Blackberry OS – use in blackberry devices
and others. >Windows phone OS – A closed source and proprietary
operating system developed by Microsoft.
>Virtual Reality – a three-dimensional, computer- >Symbian – the original smartphone OS. Used by Nokia
generated environment that can be explored and devices
interacted with by a person. Example of such is VR games >WebOS- originally used in smartphone; now in smart
such as Beat Saber by Beat Games and Star Trek: Bridge TVs.
Crew by Ubisoft. >Windows Mobile – developed by Microsoft for
smartphones and pocket PCs
Read pages 3-4 of your textbook to know more about
emerging technologies in ICT. Online Learning Platform – an interactive online service
that provides the teachers, learners, parents, and others
Online Systems: Functions and Platforms involved in education sector with a wide range of tools and
resources to support and enhance the delivery and
The concept online is described as the state of being management of education through internet. Vibal LMS,
connected to the cyberspace through a medium of internet Ziteboard, and Google Classroom are the examples of
or simply to a computer network even without internet. online learning platforms. In the Philippines, online
learning platforms is widely use to implement education
Platform – defined as a group of technologies that are while under community quarantine due to the pandemic.
used as base upon which other applications, process, or
technologies are developed. There are lot of online Online Video Platform - service providing end-to-end tools
platform available today. The most common online used to create, customize, publish, and manage videos
platforms are: online. The most popular online video platform today is
Youtube and Tiktok.
Social Media Platform - web-based technology that
allows the development, deployment, and management of
social media solutions and services. Facebook, Twitter,
Instagram are the most common online social media Read pages 4 – 5 of your textbook to know more about
platform and is widely used to communicate and be online system functions and platforms.
updated to the surroundings in the convenience of smart
devices. There are six types of social media.
>Social Networks – These are sites that allows you to Lecture: Online systems, functions, and platforms and
connect with other people with the same interests or Contextualized online search and research skills
background. Once the user creates his/her account, Online Ethics and Netiquette
he/she can set up a profile, add people, share content,
etc. Example: Facebook and Google+ Online Ethics focuses on the acceptable use of online resources in
>Bookmarking Sites – Sites that allow you to store and an online environment.
manage links to various website and resources. Most of
Internet Safety refers to the online security or safety of people and
the sites allow you to create a tag to others. Stumble their information when using internet.
Upon, Pinterest
>Social News – Sites that allow users to post their own Netiquette is a combination of the words “net” (internet) and
news items or links to other news sources. The users can “etiquette”. According to Virginia Shea in her book Netiquette, there
are 10 Core Rules of Netiquette:
also comment on the post and comments may also be
rank. Ex. Reddit and Digg TEN RULES OF NETIQUETTE
>Media Sharing – sites that allow you to upload and
share media content like images, music and video. Ex. Rule No. 1: Remember the human
>You need to remember that you are talking to a real person when
Flickr, YouTube and Instagram you are online.
>Microblogging – focus on short updates from the user. >The internet brings people together who would otherwise never
Those that subscribed to the user will be able to receive meet.
these updates. >Remember this saying when sending an email: Would I say this to
the person’s face.
Ex. Twitter and Plurk. Ex. Twitter and Plurk
>Blogs and Forums – allow user to post their content. Rule No. 2: Adhere to the same standards online that you follow
Other users are able to comment on the said topic. in real life.
Ex. Blogger, WordPress and Tumblr >You need to behave the same way online that you do in real life.
>You need to remember that you can get caught doing things you
should not be doing online just like you can in real life.
>You are still talking to a real person with feelings even though you Trojan-a malicious program designed that is disguised as a
can’t see them. useful program but once downloaded or installed, leaves your
PC unprotected and allows hacker to get your information.
Rule no. 3: Know where you are in cyberspace. Spyware– a program that runs in the background without you
>Always take a look around when you enter a new domain when knowing it. It has the ability to monitor what you are currently
surfing the web. doing and typing through key logging.
>Get a sense of what the discussion group is about before you join it. Adware- a program designed to send you advertisement, mostly
pop-ups.
Rule no. 4: Respect other people’s time and bandwidth. Spam– unwanted email mostly from bots or advertisers.
>Remember people have other things to do besides reading your Phishing- acquires sensitive personal information like passwords
email. You are not the center of their world. and credits card details.
>Keep your post and emails to minimum by saying what you want to Pharming- a more complicated way of phishing where it exploits
say. the DNS system.
>Remember everyone won’t answer your questions. Copyright- a part of law, wherein you have the rights to work,
anyone who uses it w/o your consent is punishable by law.
Rule no. 5: Make yourself look good online.
Fair Use- means that an intellectual property may be used w/o
>Be polite and pleasant to everyone.
consent as long as it is used in commentaries, criticism,
>Always check your spelling and grammar before posting.
parodies, research and etc.
>Know what you are talking about and make sense of saying it.
Keyloggers- used to record the keystrokes done by user. This is
done to steal passwords or any other sensitive information.
Rule no. 6: Share expert knowledge.
>Ask questions online. Rogue security software– is a form of malicious software and
>Share what you know online. internet fraud that misleads users into believing there is a virus
>Post the answers to your questions online because someone may on their computer, and manipulates them into paying money for
have the same question a fake malware removal tool.
Rule no. 7: Help keep flame wars under control Online Search and Research Skills
>Netiquette does not forgive flaming.
>Netiquette does however forbid people who are flaming to hurt Search engines become a very important tool in doing
discussion groups by putting the group down. researches. It helps students, teachers, office workers and other in
finding answers to every single question they have in mind. Whether
Rule no. 8: Respect other people’s privacy. it is for an assignment or project, for work related searches, up to
>Do not read other people’s mail without their permission. looking for a recipe or even lyrics of a song that is stuck in your mind,
>Going through other people’s things could cost you, your job or you search engines are there to answer your inquiries. Most common
could even go to jail. search engines are Google and Bing.
>Not respecting other people’s privacy is a bad thing.
In using Google, you can use advance techniques in
Rule no. 9: Don’t abuse your power. information gathering such as the following:
>Do not take advantage of other people just because you have more Choose your web browser based on the best search engine for
knowledge or power than them. you.
>Treat others as you would want them to treat you if the roles were Use punctuation and Boolean Operators.
reversed. Filter results by setting the range of time it was searched.
Use truncations.
Rule no. 10: Be forgiving of other people’s mistake. Limit your search to specifics.
>Do not point out mistakes to people online. Use quotation marks for specific phrases.
>Remember that you were once the new kid on the block. Use the advance search button to refine search results.
>You still need to have good manners even though you are online Use browser history.
and cannot see the person face to face. Read and spell-check.
Common Issues and Crimes on the Internet Improving Your Research Skills Online
Know your sources.
>cyberbullying Use your web browser properly.
>hacking Organize your bookmarks.Learn to use advanced search
>masqueraderssiri techniques.
>clandestine user Follow the web.
>identity theft
>plagiarism
>intellectual property rights and copyright issues
Parts of Virus
Lecture: Applied productivity tools with advanced
>Infection mechanism application techniques
> Trigger
>Payload
Productivity Tools or Software
Virus stages Freeware – is a copyrighted, which can be used for free and for
an unlimited time. Example, Adobe Reader and Skype.
>Dormant phase - Virus is idle. Shareware – commercial software that is copyrighted, which can
>Propagation phase - Virus places an identical copy of itself into be copied for trial but needs to be purchased for continued use.
other programs or into certain system areas on the disk
>Triggering phase - Virus is activated to perform the function for Microsoft Office – one of the most popular productivity suites
which it was intended. Caused by a variety of system events. developed by Microsoft. This includes word processing software
>Execution phase - Function is performed.nett (Microsoft Word), electronic spreadsheet (Excel), and presentation
software (PowerPoint). Some Microsoft programs include Access
and Publisher and desktop publishing programs.
Cybercrime- a crime committed or assisted through the use of Advance Techniques Using Microsoft Word: Hyperlinks
the Internet. 1. Click your mouse on the location in the document where you
Privacy Policy/Terms of Services (ToS) – tells the user how the want to insert the hyperlink.
website will handle its data. 2. On the Insert Tab, click the Hyperlink button on the Links group.
Malware- stands for malicious software. 3. On the Insert Hyperlink dialog box, click Existing File or Web
Virus- a malicious program designed to transfer from one Page and then select the File name where the source file is
computer to another in any means possible. located and then hyperlink will be created on your document.
Worms– a malicious program designed to replicate itself and 4. Press Ctrl + click on the hyperlink to open the linked office.
transfer from one file folder to another and also transfer to other
computers. Advance Techniques Using Microsoft Word: Mail Merge
1. Open the word document that you want to Mail Merge. 2. Click the Insert Tab, go to the link group, and click the Hyperlink
2. On the Ribbon, click the Mailing tabs, go to the Start Mail Merge button.
group and click Start Mail Merge and select Step by Step Mail 3. On the Hyperlink Dialog Box, select Place in this Document.
Merge Wizard. 4. Select the page where you want to go when the text with the
3. The Task Pane will show the Mail Merge steps 1 to 6. hyperlink is clicked.
5. Click Ok.
Step 1: Select document type.
Choose from the options such as Letters, E-mail messages, Adding Action Button
Envelope, Labels or Directory.
Click Next. Action Button allows you to play sounds, animate, or run a
program. It also allows you to move from one slide to another without
Step 2: Select starting document. using the usual next button in a slide show. Here’s how we can add
Choose from the options such as Use the current document, action button in PowerPoint.
Start from a template, or Start from existing documents.
Click Next. 1. On the Insert Tab, click Shapes arrow and on the list, select the
icon from the Action Buttons category.
Step 3: Select recipients. 2. Select the Action Button: Home icon and click it on the slide.
If you have not created yet a recipient list, choose the Type a 3. When the Action Settings dialog box appears, click Hyperlink to
new list and click Create, and the New Address List dialog box and set it to the slide you want the action to move.
will appear where you can type in the names and data of your 4. Click Ok.
recipients.
Click New Entry to add additional names and after typing, click Lecture: Advanced Tools and Techniques Advances
Cancel to close the dialog box. Techniques Using MS Excel: Formulas and Functions
After you have entered your list, the Save Address List dialog
box will open. Microsoft Excel – used to simulate a paper worksheet. This
Type your file name and click Save. spreadsheet program is used to create grids or texts, numbers
and formulas specifying calculations. This software is extremely
Step 4: Write your letter. valuable specially for business enterprises which can be used to
Click the Address block to specify the Address elements. record expenditures and incomes, plan budgeting, chart data
Click the Greeting line to set the greeting line format. and other business computation process.
Click Next.
Advanced Techniques Using Microsoft Excel: Formulas and
Step 5: Preview your letters. Functions
The name, address, and greeting line will show in the document.
Formulas are used to calculate values. The equal sign
You can click the Forward and Back arrows to view other
typed in a cell signifies that a formula is created or the AutoSum
recipients in the list.
function is used to build a formula. An Excel formula always begins
You can also edit Edit recipient list. with an equal sign. Here are some formulas used and some
examples.
Step 6: Complete the merge.
To print directly, select Print. Benefits of Online Software
If you want to make adjustments on individual recipients, select
Edit individual letter. Convenience
Scalability
Microsoft PowerPoint – allows you to create slide show
Safety
presentations wherein you can format text and images. It
Sustainability
creates a professional and consistent format of your
presentation. Read page 30 of your textbook for further discussion of benefits of online software.