0% found this document useful (0 votes)
195 views6 pages

Empowerment Technology Midterm Reviewer

Uploaded by

Patrick Ramirez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
195 views6 pages

Empowerment Technology Midterm Reviewer

Uploaded by

Patrick Ramirez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

EMPOWERMENT TECHNOLOGIES REVIEWER

Introduction to ICT
Information and Communications Technology
 It deals with the use of different communication technologies such as mobile phones, telephones, and
the internet to locate, save, send, and edit information.
 It is a study of computers as data processing tools. It introduces students to the fundamentals of using
computer systems in an internet environment.

ICT in the Philippines


 The Philippines is dubbed as the "ICT Hub of Asia" because of its huge growth of ICT-related jobs, one
of which is BPO (Business Process Outsourcing) or call centers.
 The Department of ICT is responsible for the planning, development, and promotion of the country's
information and communication technology (ICT) agenda in support of national development.
 The Philippine ICT industry is still expected to improve and become more profitable due to the overall
growth of different sectors like telecommunications, Business Process Management, and financial and
health IT sectors.
 In a data gathered by Information Technology and Business Processing Association of the Philippines,
the IT industry size is worth $22.9 billion.
Computers A computer is an electronic device for storing and processing data,
typically in binary form, according to instructions given to it invariable
program.
The Internet It is the global system of interconnected computer networks that use the
internet protocol suite (TCIP/IP) to link billions of device worldwide.
World Wide Web It is an information system on the internet that allows documents
to be connected to other documents via hypertext links, enabling the user
to search for information by moving from one document to another.
Webpages A webpage is a hypertext document connected to the World Wide Web. It
is a document that is suitable for the World Wide Web.

Different Online Platforms of World Wide Web


Web 1.0 It refers to the first stage in the World Wide Web, which was entirely
made up of Web pages connected by hyperlinks.
Web 2.0 It is the evolution of Web 1.0 by adding the dynamic pages. The user is
able to see a website differently from others.
Web 3.0 This platform is all about semantic web. It aims to have machines (or
servers) understand the user's preferences to be able to deliver web
content.

Static Webpages Dynamic Webpages


 A static webpage is known as a flat page or  Web 2.0 is the evolution of web 1.0 by
a stationary page in the sense that the page is adding dynamic webpages.
"as is" and cannot be manipulated by the user.  The user is able to see the website
 The content is also the same for all users differently than others (e.g., social networking
that is referred to as Web 1.0. sites, wikis, video-sharing sites).

Features of Web 2.0


Folksonomy Allows the user to categorize and classify information using freely
chosen keywords (e.g., tagging by FB, Twitter) by using tags that
start with the sign #, referred to as hashtag.
Rich User Experience Content is dynamic and is responsive to a user's input. An
example would be a website that shows local content. In the case
of social networking sites when logged in, your account is used to
modify what you see in their website.
User Participation The owner of the website is not the only one who is able to put
content. Others are able to place a content of their own by means
of comments, reviews, and evaluation. Some websites allow
readers to comment on an article, participate in a poll, or review a
specific product (e.g., Lazada, Amazon).
Long Tail Services that are offered on demand rather than on a one-time
purchase. This is synonymous to subscribing to a data plan that
charges you for the amount of time you spend on the internet.
Software as Services Users will subscribe to a software only when needed rather than
purchasing them. This is a cheaper option if you do not always
need to use a software (e.g., Google Docs — used to create and
edit word processing and spread sheet).
Mass Participation Diverse information sharing through universal web access. Web
2.0's content is based on people from various cultures.
Problems of Web 3.0
Compatibility HTML files and current web browsers could not support Web 3.0.
Security The user's security is also in question since the machine is saving their
preferences.
Vastness The World Wide Web already contains billions of webpages.
Vagueness Certain words are imprecise. The words "old" and "small" would depend
on the user.
Logic Since machines use logic, there are certain limitations for a computer to
be able to predict what the user is referring to at a given time.

Trends in ICT
Convergence
o It is the synergy of technological advancements to work on a similar goal or task.
o For example, besides using your personal computer to create word documents, you can now use your
smartphone.
Social Media
o It is a website, application, or online channel that enables web users to create, co-create, discuss
modify, and exchange user-generated content.
o According to Nielsen, internet users spend more time in social media than in any other type of site.

Six Types of Social Media


Social Network These are sites that allow you to connect with other people with the
same Interests or background. Once the user creates their account, they
set up a profile, add people, share content, etc.
Bookmarking Sites Sites that allow you to store and manage links to previous websites and
resources. Most Sites allow you to create a tag to others.
Social News Sites that allow users to post their own news item or links to other news
sources. The users can so comment on posts and comments may also be

ranked.
Media Sharing These are sites that allow you to upload and share media content like
images, music, and videos.
Microblogging It focuses on short updates from the user. Those that subscribed to the
user will be able to receive these updates.
Blogs and Forums It allows users to post their content. Other users are able to comment on
the said topic.

Mobile Technologies
o The popularity of smartphones and tablets has taken a major rise over the years.
o This is largely because of the devices' capability to do the tasks that were originally found in PCs.
Several of these devices are capable of using high-speed internet.
o Today, the latest model devices use 4G Networking (LTE), which is currently the fastest.

Mobile Operating Systems


IOS It is used in Apple devices such as iPhone and iPad.
Android It is an open source OS developed by Google. Being open source means mobile
phone companies use this for OS for free.
Blackberry OS It is used in blackberry devices.
Windows Phone A close source and proprietary operating system developed by Microsoft.
Symbian It is the original smartphone OS; used by Nokia devices.
Web OS It is originally used in smartphones; now in smart TVs.

Assistive media
o It is a non-profit service designed to help people who have visual and reading impairments.
o A database of audio recording is used to read to the user.
Cloud Computing
o It is a disrupted computing on internet or delivery of computing service over the internet.
o Instead of running e-mail programs on your computer, you log in to a Web e-mail account remotely.
The software and storage for your account doesn't exist on your computer — it's on the service's
computer cloud.

Rules of Netiquette
 Online safety refers to the online security or safety of people and their information when using the internet.

The Internet
 It is defined as the information superhighway.
 Anyone can place information and can grab that information.

How Safe are You?


Information Risks
A hacker may already know plenty of stuff about you even if you only give out your
First Name first name. Likewise, you cannot just walk in a room and start introducing yourself to
everyone. You do not know whom you can come across with.
Having both your first and last name is more risky. You will be vulnerable to being
Last Name searched for using search engines, which include image searching. Matching a
name with a face is a modus to several cyber crimes like identity theft.
Sharing your middle name alone is probably not the most risky of these shared
Middle Name
information, but sharing your full name would be.
Current and Previous
Most people who steal identities study their subject. They can use this information
School
for verification purposes.
Your cellphone number should never be posted on the internet. The internet is a
public space. It is the same as posting your number on a billboard. You would not
Cellphone Number
want random strangers to text or call you, or worse, pretend that they were
someone else.
Risky, yet not as risky as posting their full names, especially your mother's maiden
Name of your Mother name. In fact, you may have already encountered many websites that require your
and Father mother's maiden name as an answer to a secret question whenever you lose your
password.
Name of your
Disclosing this is a huge risk. Strangers may pretend or use their identity to dupe
Siblings
you
Giving the internet your number is one thing, giving them your address is a whole
Address
other level, it would be much easier for criminals to find you.
This shared information is more risky than sharing your personal phone number.
Home Phone Number Scams usually use this information to deceive you, one of which is when a stranger
pretends to know your parents or pretends to be you.
Letting people you know your birthday is probably a must if you want to get as
Birthday many gifts as possible. But having it in your profile makes you vulnerable to identity
theft.
Tips to Stay Safe Online
9. Be mindful on what you share online and what 1. Never post anything about a future vacation.
site you share it to. It is similar to saying: "Rob my house at this
10. Do not just accept terms and conditions; date.
read them. 2. Add friends you know in real life and refrain
11. Check out the privacy policy page of a from adding strangers.
website to learn how the website handles the 3. Avoid using untrusted websites.
information you share. 4. Install and update antivirus software on your
12. Know the security features of the social computer. Use only one antivirus software to
networking site you use. By keeping your profile avoid conflicts.
private, search engines will not be able to scan 5. If you have WIFI at home, make it a private
your profile. network by creating a password.
13. Do not share any of your passwords with 6. Avoid from downloading anything from
anyone. untrusted websites. You are more vulnerable in
14. Avoid logging in to public networks/ WIFI. peer-to-peer downloads as the downloads are
Browsing in "incognito" (or private) mode, a more likely not monitored by the site owner.
feature of the browser, will not protect you from 7. Buy software, do not use pirated ones.
hackers. 8. Do not reply or click links from suspicious
15. Do not talk to strangers whether online or emails.
face-to-face.
Rules of Netiquette
 Netiquette stands for "network etiquette" — the do's and don'ts of online communication.
1. Remember the human. 6. Share experts' knowledge.
2. Adhere to the same standards online that you 7. Help keep flame wars under control.
follow in real life. 8. Respect other people's privacy.
3. Know where you are in cyberspace. 9. Don't abuse your power.
4. Respect other people's time and bandwidth. 10. Be forgiving of other people's mistakes.
5. Make yourself look good online.

Types of Intruders
Masqueraders Unauthorized user who penetrates a system and exploiting the legitimate user's account.
Hackers Computer hackers are unauthorized users who break into computer systems in order to
steal, change, or destroy information, often by installing dangerous malware without your
knowledge or consent.
Clandestine Users Seizes supervisory control to evade auditing access controls or suppress audit collection

Malware
 Malware stands for "malicious software."
Virus It is a malicious program designed to transfer from one computer to another in any means
possible.
Worm It is a malicious program designed to replicate itself and transfer from one file folder to another
and also transfer to other computers.
Spam It is unwanted email mostly from bots or advertisers.
Adware It is a program designed to send you advertisements, mostly pop-ups.
Spyware It is a program that runs in the background without you knowing it.
Keyloggers – It is used to record the keystrokes done by a user. This is done to steal passwords or any
other sensitive information.
Phishing It acquires sensitive personal information like passwords and credit card details.
Pharming – It is a more complicated way of phishing where it exploits the DNS system.

Protecting Reputations Online


 Think before you click.
Here are some things you might want to consider before posting something on the internet.
1. Before you post something on the web, ask these questions to yourself: Would you want your parents
or grandparents to see it? Would you want your future boss to see it? Once you post something on the
web, you have no control of who can see your post.
2. Your friends depend on you to protect their reputation online. Talk to your friends about this serious
responsibility.
3. Set your post to "private". In this way, search engines won't be able to scan your posts.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other's reputation, ask the one who posted it to take it down or
report it as inappropriate.

Copyright Infringement
 If you create something: an idea, invention, a form of literary work, or a research, you have the right as
to how it should be used by others because it is considered as your intellectual property.
 The copyright law includes your rights over your work, and anyone who uses it without your consent is
punishable by law.

Tips to Avoid Copyright Infringement


Understand Copyright Protects literary works, photographs, paintings, drawings, film, music (and
lyrics), choreography, and sculptures, but it generally does NOT protect underlying ideas

and facts.
Be Responsible Even if a material does not say that it is copyrighted, it is not a valid defense against
copyright. Be responsible enough to know if something has a copyright.
Be Creative Ask yourself whether what you are making is something that came from your own work
or something made out of somebody else's creativity.
Know the Law There are some limitations to copyright laws. For instance, in the Philippines, copyright
only lasts a lifetime (of the author) plus 50 years. There are also provisions for "fair use,"
which means that an intellectual property may be used without consent as long as it is
used in commentaries, criticisms, search engines, parodies, news reports, research,
library archiving, and teaching and education.

Tips on Online Research

Have a Question in Mind Focus on a question you want to be answered. If it is a series of


questions, start with only one. Never search everything on one go.

Narrow It Down Search engines like Google™, Bing™, or Yahoo!™ use several filters to
determine the most appropriate results for you. These search
engines
use your previous search history and your geographical location and send

you results that are most relevant for you.


Advanced Search The best way to filter the information you get from search engines is by
using the advanced search.
Look for a Credible Source The most credible sources are scientific journals, established news and
magazine websites, online encyclopedias, and scholarly databases.
Give Credit If you are going to use pieces of information from a source for educational
purposes, give credit to the original author of the page or information.

Advanced Word Processing Skills

Mail Merge
 This feature allows you to create documents that have the same general content but my have different
recipients or purposes. It is commonly used when sending out advertising materials to various
recipients.

Components of Mail Merge


Form Document
o It is generally the document that contains the main body of the message we want to convey or send.
o The main body of the message is part of the form document that remains the same no matter whom
you send it to from among your list.
o A form that you fill out with individual information.
Place Holder
o This marks the position on your form document where individual data or information will be inserted.
o Place holders are denoted or marked by text with double-headed arrows (<< >>) on each side and with
a gray background.
o On a printed standard form, this will be the underlined spaces that you will see and use as a guide to
where you need to write the information that you need to fill out.
Data File
o It contains information that you need to merge with your main document.
Label Generation
o It creates a blank form document that simulates either a blank label or envelope of pre-defined size and
will use the data file that you selected to print the information.

Integrating Images and External Materials


Kinds of Materials
Pictures These are electronic digital pictures saved in any local storage device.
Clip Art These are line art drawings or images used as generic representations for ideas and
objects that can be integrated in a Word document.
Shapes These are printable objects or materials that you can integrate in your document to
enhance its appearance or allow you to have some tools to use for composing and
representing ideas and messages.
Smart Art These are pre-defined sets of different shapes grounded together to form ideas that are
organizational or structural in nature.
Chart Allows you to represent data characteristics and trends in your Word documents.
Screenshots Creating reports, manuals for training, or procedures will require the integration of a
more realistic image of what you are discussing on your report or manual.
Picture File Types
JPG
o Also known as Joint Photographic Experts Group
o This type of image file can support 16.7 million colors which is suitable for use when working with full-
color photographic images.
GIF
o GIF stands for Graphics Interchange Format
o This type of image is capable of displaying transparencies. Therefore, it is good for blending with other
materials or elements in your document.
o It is also capable of displaying simple animation.
o The downside is that it can only support 256 colors so it is good mostly on logos and art decors with
very limited and generally solid colors.
o GIF is much better for logos, drawings, small text, black and white images, or low-resolution files.
PNG
o PNG stands for Portable Network Graphics
o It was built around the capabilities of GIF. Its development was basically for the purpose of transporting
images on the Internet at faster rates.
o It is also good with transparencies but unlike GIFs, it does not support animation but can display up to
16 million colors, so image quality for this image file type is remarkably improved.
o .PNG allows the control of the transparency level or opacity of images.

Image Placement
In Line with Text Tight
o This is the default setting for images that are o This is almost the same as the square setting,
inserted or integrated in your document. but here, the text "hugs" or conforms to the
o It treats your image like a text font with the general shape of the image.
bottom side totally aligned with the text line. o This allows you to get more creative effects on
o This setting is usually used when you need to your document.
place your image at the beginning of a o This setting can mostly be achieved if you are
paragraph. using an image that supports transparency like a
.GIF or .PNG file

Square Top and Bottom


o Allows the image you inserted to be placed o This setting pushes the text away vertically to
anywhere with the paragraph with the text going the top and/or bottom of the images so that the
around the image in a square pattern-like frame. image occupies a whole text line of its own.

Through Behind Text


o This setting allows the text on your document to o Allows your image to be dragged and placed
flow even tighter taking the contours and shape anywhere on your document but with all the
of the image. texts floating in front of it.
o Can be best used with .GIF or .PNG images. o It effectively makes your image look like a
background.
In Front of Text
o This setting allows your image to be placed right
in front of the text as if your image was dropped
right on it.
o That means whatever part of the text you placed
the image on will be covered by the image.

Additional Information

Tim Berners-Lee He created the World Wide Web.

Cyber Crime Crime committed or assisted through the use of the internet.

You might also like