Introduction To ICT: Information and Communication Technologies

Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

Introduction to ICT Features of Web 2.

0
Friday, September 04, 2020 8:27 AM 1. Folksonomy. It allows users to categorize and
Information and Communication Technologies classify/arrange information using freely
• Information and Communication chosen keywords (e.g., tagging). Popular social
Technology (ICT) deals with the use of networking sites such as Twitter, Instagram,
different communication technologies Facebook, etc. use tags that start with the
such as mobile phones, telephone, pound sign (#). This is also referred to as
Internet, etc. to locate, save, send and hashtag.
edit information. 2. Rich User Experience. Content is dynamic and
is responsive to user’s input. An example would
Web 1.0:
be a website that shows local content. In the
• When the World Wide Web was invented, case of social networking sites, when logged on,
most web pages were static. Static (also your account is used to modify what you see in
known as flat page or stationary page) in their website.
the sense that the page is “as is” and 3. Long Tail. Services are offered on demand
cannot be manipulated by the user. The rather than on a one-time purchase. In certain
content is also the same for all users. cases, time-based pricing is better than file-
This is referred to as Web 1.0. size-based pricing or vice versa. This is
WEB 2.0: Dynamic Web Pages synonymous to subscribing to a data plan that
charges you for the amount of time you spent
• Web 2.0 is the evolution of Web 1.0 by in the Internet, or a data plan that charges
adding dynamic web pages—the user is you for the amount of bandwidth you used.
able to see a website differently than
4. User Participation. The owner of the website is
others. Examples of Web 2.0 include
not the only one who is able to put content.
social networking sites, blogs, wikis, video
Others are able to place a content of their
sharing sites, hosted services, and web
own by means of comment, reviews, and
applications. evaluation. Some websites allow readers to
• Web 2.0 allows users to interact with the comment on an article, participate in a poll, or
page: instead of just reading a page, the review a specific product (e.g., Amazon.com,
user may be able to comment or create a online stores).
user account. Web 2.0 also allows users to 5. Software as a Service. Users will subscribe to
use web browsers instead of just using a software only when needed rather than
their operating system. Browsers can now purchasing them. This is a cheaper option if
be used for their user interface, you do not always need to use a software. For
application software (or web applications), instance, Google Docs is a free web-based
and even for file storage. application that allows the user to create and
edit word processing and spreadsheet
• Most websites that we visit today are documents online. When you need a software,
Web 2.0. like a Word Processor, you can purchase it for
a one-time huge amount and install it in your
computer and it is yours forever. Software as
a service allows you to “rent” a software for a
minimal fee.

6. Mass Participation. It is a diverse information


sharing through universal web access. Since
most users can use the Internet, Web 2.0’s
content is based on people from various
cultures.

Introduction to ICT Page 1


Saturday, October 24, 2020 1:39 PM
Trends in ICT

Web 3.0 and the Semantic Web 1. Convergence

• The Semantic Web is a movement led by • Technological convergence is the


the World Wide Web Consortium (W3C). synergy of technological advancements
to work on a similar goal or task.
• The W3C standard encourages web
developers to include semantic content in 2. Social Media
their web pages.
• Social media is a website, application,
• According to the W3C, “The Semantic Web or online channels that enable web
provides a common framework that allows users to create, co-create, discuss,
data to be shared and reused across modify, and exchange user-generated
application, enterprise, and community content.
boundaries.”
Six Types of Social Media
• The aim of Web 3.0 is to have machines (or
1. Social Networks. These are sites that
servers) understand the user’s preferences
allow you to connect with other people with
to be able to deliver web content
the same interests or background.
specifically targeting the user.
Example: Facebook and Google.
Several problems of Web 3.0
2. Bookmarking Sites. These are sites that
1. Compatibility
allow you to store and manage links to
• HTML files and current web browsers could various websites and resources.
not support Web 3.0.
Example: StumbleUpon/Pinterest
2. Security
3. Social News. These are sites that allow
• The user’s security is also in question since users to post their own news items or links
the machine is saving his or her to other news sources.
preferences.
Example: Reddit and Digg
3. Vastness
4. Media Sharing. These are sites that
• The World Wide Web already contains allow you to upload and share media content
billions of web pages. like images, music, and video.

4. Vagueness Example: Flickr, Youtube and Instagram

• Certain words are imprecise. The words 5. Microblogging. These are sites that
“old” and “small” would depend on the user. focus on short updates from the user.

5. Logic Example: Twitter and Plurk

• Since machines use logic, there are certain 6. Blogs and Forums. These websites allow
limitations for a computer to be able to users to post their content.
predict what the user is referring to at a
Example: Blogger, WordPress, and Tumblr
given time.

Introduction to ICT Page 2


Saturday, October 24, 2020 1:43 PM

Mobile Technologies

The popularity of smartphones and tablets


has taken a major rise over the years. This is
largely because of the devices’ capability to
do tasks that were originally found in personal
computers.

Kinds of operating systems:

 iOS

 Android

 Blackberry OS

 Windows Phone OS

 Symbian

 WebOS

 Windows Mobile

Assistive Media

Assistive media is a nonprofit service


designed to help people who have visual and
reading impairments. A database of audio
recordings is used to read to the user.

Introduction to ICT Page 3


Contextualized online search and research

skills
Saturday, October 24, 2020 1:45 PM

LEARNING COMPETENCIES • Characteristics of libraries in terms of


reliability, accuracy and value:
• Use the Internet as a tool for credible
research and information gathering to best ○ Libraries of published books are
achieve specific class objectives or address often considered highly reliable,
situational. accurate, and valuable.

• Students will be better users of search engines. ○ Books and documents from
In particular, they can be more deeply aware of dominant sources are often peer
search techniques that will give results that are reviewed.
useful for their academic and chosen career.
○ ISSN or ISBN registration
MEDIA & INFORMATION SOURCE INDIGENOUS ensures that standards were
KNOWLEDGE, LIBRARY, INTERNET followed in producing these
materials.
INDIGENOUS KNOWLEDGE
INFORMATION ON THE INTERNET
• Local knowledge
• Information found on the Internet
• Knowledge that is unique to a given culture or
may be quite varied in form and
society.
content.
• IK contrasts with the international knowledge
• It is more difficult to determine its
system universities, research institutions and
reliability and accuracy.
private firms. (Warren
• Accessing information on the Internet
• Characteristics
is easy, but requires more discipline to
○ oral tradition of communication check and validate.

○ store information in memories • Factual & fictitious data are often


merge.
○ information exchange is face-to-face
• Information should be always validated.
○ information are contain within the border
of the community • ONLINE SEARCH AND RESEARCH

Example: Benguet Province (Municipality of ○ Also known as Internet Research.


Tublay)
○ More than just googling (typing a
LIBRARY word in Google and then clicking
the search button).
• Library are often classified in four groups
(these libraries may be either digital or physical ○ A skill needed to be improve to
in form ): get factual information.

○ Academic

○ Public

○ School

Special

Introduction to ICT Page 4


○ Special

Introduction to ICT Page 5


Saturday, October 24, 2020 1:56 PM

EVALUATING INFORMATION 23. RELEVANCE Content is relevant to your


topic or research.
 ACCURACY
SEARCH SKILLS
○ Content is grammatically correct,
SEARCH TOOLS
verifiable and cited when necessary
• SAFE SEARCH
 AUTHOR
○ Helps you block inappropriate or
○ Defines who created the content, the
explicit images from your Google
individual or group’s credential/expertise
Search results.
and provides contact information.
○ The Safe Search filter isn’t 100%
 DOMAIN TYPES
accurate, but it helps you avoid most
○ Domain types are: adult content.

 .com (commercial) • RESTRICTED MODE

 .org (organization) • .edu (education) ○ an opt-in setting available on the


computer and mobile site that helps
 .gov (government)
screen out potentially objectionable
 .net (network) content that you may prefer not to
see or don't want others in your
 .mil (military)
family to stumble across while
 .ph (country domain) This is used to enjoyingYouTube.
further evaluate a website.
○ A parental control setting
 CURRENCY forYouTube.

○ Information is current & updated • GOOGLE SCHOLAR


frequently.
○ Provides a simple way to broadly
 FAIRNESS search for scholarly literature. From
one place, you can search across
○ Content is balanced, presenting all sides
many disciplines and sources:
of an issue and multiple points of view.
articles, theses, books, abstracts and
 USE OF SEVERAL SEARCH ENGINES court opinions, from academic
publishers, professional societies,
○ Search Engines are programs that look
online repositories, universities and
for documents based from specified
other web sites.
keywords and return these documents
where the keyword were found. • Major • REVERSE IMAGE SEARCH
Search Engine:
○ use a picture as your search to find
○ Google related images from around the web.

○ Yahoo (uses google)

○ AltaVista

○ Bing

○ Lycos

Introduction to ICT Page 6


Saturday, October 24, 2020 2:06 PM

PLAGIARISM
SEARCH OPERATORS
• an act or instance of using or closely
• use search operators and other punctuation imitating the language and thoughts of
to get optimize search. another author without authorization;
○ AND & OR operator the representation of that author's work
as one's own, as by not crediting the
 For conditional searching original.
 Search result must agree on the • Using other people’s words and ideas
given condition without clearly acknowledging the source
 The operator AND narrows the of the information
search by retrieving only records HOW TO AVOID PLAGIARISM
contain both terms.
• You need to cite the things you copy on
 The operator OR broadens the the internet.
search to include records
containing either keyword, or • Put quotation marks around everything
both. that comes directly from the text and
cite the source.
• Plus (+)
• Paraphrase, but be sure that you are not
○ To indicate that the word after the simply rearranging or replacing a few
sign is a required word must be found in words and cite the source.
the search.
• Use the style manual in properly citing
○ Ex. +preventive sources.
• Minus (-)

○ To exclude a word from your search


that is not required on result

○ Ex: -personal

• Wildcard (*)

○ To find a variations of word, for an


instance measure* it will find entries
such as measures and measurement.

• Quotation Mark (“”)

○ Names or phrase should be enclosed


with quotation mark better result.

○ Ex: “precautionary measures”

Introduction to ICT Page 7


Online Safety and Security
Saturday, October 24, 2020 2:13 PM

Online Safety and Security What can I do?


• The Internet has become a part of our just like in the real world, you should
daily lives. The technology has become so always be careful of whom you tell your
advanced that the average person can now name to. In online, you can refrain from
access vast amounts of information and using your full name especially in apps and
communicate with people from all over the sites where they are not really required.
world using devices that can fit in his ○ Usernarne
pocket. In what is called the Information A username is an alias that
Age, the Internet has become not only a represents your online presence. It
privilege but also a necessity for many can be your real name or
people. combinations that totally depend on
Information Security your creativity. Some apps and
• We usually need to submit some personal websites address you by your
information in order to gain access to username instead of your full name.
online sites and services. These personal In many cases, your username, along
details are often required to secure our with your password are all that is
online activities and transactions. However, needed to log in to your account.
in the wrong hands, our personal
What's the risk?
information can be used to cause
In the Internet, your username
inconvenience, loss or even harm to us and
is as good as your actual name.
other people. Here are some of the most
Therefore, anyone who knows it
commonly shared personal details, how
can start looking for you or
they can be used in dishonest and malicious
sometimes even contact you.
ways and what you can do to secure them.
What can I do?
○ Full Name
Like your real name, do not
_Al most every app and website with
readily give out your username,
a log-in feature require your full
especially with people that you
name. Almost of the time, they just
don't trust. As a precaution,
ask for it to determine how to
you can select usernames that
properly address you in emails and
do not include your real name.
personal messages. Some sites, like
Facebook, use it to label your account
and online interactions. ○ Password
The password is one of the most
What's the risk?
important bits of information in the
Your name is probably the most
Internet. Basically, it is a group of
widely known detail about you
characters that, when paired with
but it can still be used in the
your username or email address, can
simplest forms of identity theft.
unlock your user account. For this
Anyone can use your full name to
reason, website and app owners have
sign up and create a fake
many ways to keep your password
account. This account can then
secure.
be used in ways that may put you
in trouble like posting malicious
content or leaving rude
comments.

Introduction to ICT Page 8


in trouble like posting malicious
content or leaving rude
comments.

Introduction to ICT Page 9


Tip: Web browsers commonly give you the option
to save your password when you first log in to
some vicebsites. This feature may be convenient
Saturday, October 24, 2020 2:23 PM
when using your own computer or mobile device
What's the risk? but it can be dangerous if you accidentally save
For obvious reasons, hackers take your password in someone else's computer or
special interest in people's device especially if it is in a public place like a
passwords. People tend to use library or a computer shop.
similar if not identical passwords • Birthdate
for their online accounts so Birth dates are mostly required to determine
figuring out the password to one if you are old enough to access certain
account may also compromise the contents and features in the Internet.
others. Sometimes, it is also used in security checks
What can I do? to determine if it is indeed the rightful
There are several steps that you owner who is accessing the account since
can do to keep your passwords birth dates are not usually widely known.
secure: What's the risk?
□ 1 Do not share your password The birth date, along with other
with ANYONE. personal details can be used to
□ Memorize your password. Do pass security checks and hack
not write it down anywhere. personal accounts.
□ Do not use obvious passwords What can 1 do?
like important dates or names For your own protection, observe
of you or your loved ones. the age restrictions of online
□ Use combinations of content. Websites are required by
uppercase letters, lowercase law to add warnings to age-
letters, numbers and special sensitive content but it is still up
characters. Some websites to the users to choose whether or
require this but it's a good notto view them.
practice to do so even if its • Home Address and Locations
not. Some online services ask for users' home
Tip: To pre-vent yourself from address. Some apps can automatically
forgetting your password, use phrases determine your current location using your
that are easy for you to remember but device's GPS (Global Positioning System)
hard for others to guess like lines from feature. They do this in order to give you
a song or movies or phrases that have location-specific contents and options. For
personal meaning to you. example, YouTube determines the user's
□ Do not use the same location and suggests videos that are
passwords for different relevant to that area.
accounts. What's the risk?
Tip: More specifically, do not use the same Carelessly sharing your location or home
passwords for apps that are used for leisure address can ultimately compromise your
(Facebook, Instagrami and apps that are physical security because it will tell
used for financial transactions (Paypal, eBay, potential criminals where you are. Also,
online banking) because it is usually required
 Change your passwords periodically information in online commerce like
 Do not save your password when online shopping, your home address can
using public computers or other be used in identity theft.
people's device.

Introduction to ICT Page 10


people's device.

Introduction to ICT Page 11


Saturday, October 24, 2020 2:29 PM

What can I do?


Always check if a website or app
requires you to submit your address or
allow them to automatically track you. If
it is required, then check the settings if
you can hide your address and current
location from other users. If it is not
required, then don't submit it at all.
• Phone Numbers
Phone numbers are usually required
by many online services in order to
have a direct line to their clients.

Introduction to ICT Page 12


Why Should You Use Productivity Tools?
Saturday, October 24, 2020 2:31 PM

Productivity tools (also known as productivity Word & Data OpenOffice,


software) have a purpose in our everyday lives, Processing Writer, AbiWord, KOffic
both at home and at work. Chances are, you’ve Software e, MS Word
used productivity tools and you weren’t even
Spreadsheet OpenOffice,
aware you were using them.
Software Calc, KOffice, MS Excel
“Productivity tools” refers to the software
Presentation OpenOffice,
that people use to create and produce
Software Impress, KOffice, MS
documents, presentations, databases, charts,
PowerPoint
and graphs. It’s not exactly the most exciting
and fun software out there, but for many Database OpenOffice
organizations, corporations, and individuals, it’s Software Base KOffice
a necessity! Graphic Design & OpenOffice,
Editing Software Draw, GIMP, Dia, FreeMi
So why should you use productivity tools?
nd, Photoshop
While there are a wide range of benefits, the
best reason is that it just makes essential, File Management PDF Creator
everyday computing tasks more efficient. Who Software
doesn’t want that? Publishing Scribus OpenOffice
Software Draw
Making Everyday Tasks More Efficient
Organization GTD-Free
Think back to the last time you used a
Software
computer, which was probably some time today.
What was the task you needed to accomplish Email Software SeaMonkey, Yahoo, Gmail
and what software did you use to do so? Most
likely, you used a productivity tool. Professional Quality Documents,
Presentations & Graphics
Most essential everyday computing tasks can
be tackled with productivity tools. Need to Productivity tools also help you create
write a letter? What about creating address professional quality documents,
labels, or a graph with data that you’ve presentations, graphics, and more. Sure, you
collected? All of these things and more are could probably create these same things
easy to do thanks to productivity software. freehand, but it just wouldn’t have that same
professional polish that will make your work
If you don’t have productivity software, it’s
stand out.
hard to imagine the steps you would need to go
through create these tasks on your own. It Say for example, you need to prepare a
would require a lot of coordination and extra business pitch. Use a word or data processing
leg work—certainly not the most efficient use software to polish up your raw content, and
of your already busy day! then use spreadsheet software to create
charts and graphs for visual appeal. Design a
Productivity tools come in a wide range of
logo with your graphics software, and create
software, sometimes bundled together or
assets for your business. Then put it all into a
offered separately. Productivity tools include:
presentation to nicely sum up your talking
points and give visual interest during your
presentation. Now that’s professional!

Introduction to ICT Page 13


Saturday, October 24, 2020 2:36 PM

It’s not all about the looks, either. Productivity A guide to productivity tools for researchers
tools often have built-in spelling and grammar
Digital tools give researchers great ways to be
checkers, calculators, and other tools to make
productive-min
sure that you are producing not only stellar-
looking products, but also accurate and Procrastination is the devil. And yet we often
statistically sound products as well. find ourselves ticking off minor tasks - or
scrolling through endless pictures of exotic
Cross-Application Integration
destinations we’re probably never going to
The biggest benefit to using a productivity suite, visit - on a regular basis instead of getting
like OpenOffice Suite or Microsoft Office, is stuck into the next important task. Tackling a
that all of the applications can be integrated research project may seem like a mountain
with each other, and your data and work is usable you’re not quite ready to climb, but with a
within the platform. little smart working and a few digital tools on-
side you’ll be done in no time.
What does this mean exactly? Let’s say you have
a database of names and addresses that you need Procrastination isn’t the only enemy of
to turn into address labels. This should be a research. Time restraints, barriers to
fairly easy task, unless your database is managed information and a lack of willingness from
by different software. A productivity suite would participants can all pose brick walls for any
allow you to import that database of names into research project, but overcoming them isn’t
your word or data processor into a simple impossible. If you’re suffering from a chronic
template. Then, presto! You’d have labels you lack of productivity you need some handy tips,
could print and send. tricks and tech to get you back on track, boost
your focus and put those endless distractions
Or, what about charts and graphs you created in
to bed. So if you’re spending more time on
your spreadsheet program that you need in your
Twitter than on market research, this article
presentation? Sure, you could save those images
is for you.
and insert them manually, but a productivity suite
would allow you to embed those charts and
graphs directly into the presentation software.
Here are some of the productivity tools for
Now, if there’s any change to the data in those
research which you could use:
charts and graphs, they would automatically
change in your presentation too.

Perhaps the biggest benefit that we have not yet Asana Logo
mentioned is for those who work from home.
Keeping track of who’s doing what, and when,
You’re used to having all the up-to-date, name-
will help keep you accountable for your part in
brand applications in an office setting, but it’s
the research project. That’s where Asana,
not always the same once you’re at your home
project management software and
office. Using our recommended productivity tools
ensures that you will have the compatibility to
work with your files at home, and then easily
transfer that work back to your office software.

Introduction to ICT Page 14


Mendeley_Logo_Vertical

Saturday, October 24, 2020 2:36 PM Often cited as the holy grail of research tools,
Mendeley helps ease the pain of many
tool, comes in. In Asana members of your researchers’ Achilles’ heel: referencing. This
research team can be assigned to subtasks handy software helps you cite and store your
within tasks, ticking off “small wins” as you go. references, building a library of work as you go.
This will help tasks seem much more Many researchers spend a lot of time reading -
manageable, while helping you stay on top of Mendeley helps you keep the important parts
what’s expected of you, and when. together and well organized.
Logo_dark_with_tagline-1 Procraster LogoProcraster
Boosting productivity isn’t all about avoiding The clue to this workflow tool is in the name:
distraction. It’s about making smart choices to Procraster is a procrastination-busting tool. It’s
streamline the time you spend on daily tasks. built on the notion that we delay important
Manually transcribing interviews and other tasks for a few simple reasons. We consider the
research materials is time-consuming and task too big, we think we’ve made an error, we
draining - let automation and artificial don’t know where to start, we need to finish
intelligence take the reins and create a something else or we need it to be perfect.
transcription for you to search and analyze in Procraster lets you flag and categorize these
no time at all. Trint is a productivity tool that tasks and then gives step-by-step advice to get
will take your qualitative interviews to a new you back on track. If you’re struggling with
level of efficiency. focus group questions and don’t know where to
Trello LogoTrello start, this one’s for you

Key for those that like visual tools, Trello is 750 Words Logo
the digital organization tool that helps you plan Writer’s block can send you running for your
out and conquer your research. It’s hard to procrastination go-to sites quicker than you can
ignore your workload when it’s laid out and say “qualitative research.” 750words aims to
labelled for you, so keeping Trello running when keep you on track by encouraging writers to pen
you’re working will keep you on track. You can at least three pages per day, which should be
set due dates, add notes and organize each manageable. Writing part of your research
task into itemized columns, so you’ll know the paper may seem like it’s too big to tackle, but
status of everything on sight. Once you taking things a day - and 750 words - at a time
experience the satisfaction of seeing your makes things so much easier. Small, daily
completed tasks pile up you’ll never look back. victories are very productive in the long run.
Wunderlist Logo

Life sometimes gets in the way of research, StayFocusd LogoStayFocusd


and vice versa. Keeping your life in sync and
carefully planning the time devoted to your If you really don’t trust yourself not to get
distracted by time-wasting sites, then this
project and to procrastination (or “other life
Google Chrome extension may be just what
stuff”) is essential to actually dialing in when
research calls. Wunderlist is a top digital tool you’re looking for. It allows you to limit time
for organizing your to-do list and generally allowed on certain sites, and once you’ve used up
managing your work-life balance, making sure your allowance it won’t let you visit that site
there’s time to tick off everything both again that day, pushing you back towards that
personal and professional to-do list and that transcript of last week’s
research interview.

Introduction to ICT Page 15

You might also like