We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7
Empowerment Technologies 2.
Rich User Experience - content is
Lesson 1: ICT and Its Current State dynamic and is responsive to user’s input (e.g. GPS) Information and Communication From keyword → Multiple sources Technologies (ICT) - deals with the use of 3. Long Tail - services are offered on different communication technologies such as demand rather than on a one-time mobile phones, telephones, Internet, etc. to purchase; time-based pricing is better locate, save, send, and edit information. than file-size-based pricing or vice ICT in the Philippines versa - “ICT Hub of Asia” 4. User Participation - the owner of the - 106.8 cellphones per 100 Filipinos in website is not the only one who is the year 2012 able to put content; others are able to - ICT industry shares 19.3% of the total place the content of their own by a employment population in 2010 means of comments, reviews, and - “The Selfiest Cities Around the evaluation World” of 2013 Time Magazine 5. Software as a Service - users will - 1st: Makati City and Pasig City subscribe to a software only when - 9th: Cebu City needed rather than purchasing them; software as a service allows you to Web Types “rent” a minimal fee Web 1.0 6. Mass Participation - a diverse When the World Wide Web (WWW) was information sharing through universal invented by Tim Berner Lee in 1989, most web access web pages were static. Static (also known Web 3.0 (Semantic Web) as flat page or stationary page) in the sense Movement led by the World Wide Web that the page is “as is” and cannot be Consortium (W3C). The aim of Web 3.0 is to manipulated by the user. The content is have machines (or servers) understand the also the same for all users. This is referred to user’s preferences to be able to deliver web as Web 1.0. content specifically targeting the user. Web 2.0 (Dynamic Web Pages) Web 3.0 is like searching for movies and food The evolution of Web 1.0 by adding dynamic faster and easier and it acts as personal web pages - the user is able to see a website assistance (e.g. Siri, Google Assistant, differently than others. Examples of Web 2.0 Cortana, and Alexa) include social networking sites, blogs, wikis, video-sharing sites, hosted services, and web Trends in ICT applications. Features of Web 2.0 1. Convergence - the synergy of 1. Folksonomy - allows users to technological advancements to work categorize and classify/arrange on a similar goal or task information using freely chosen 2. Social Media - a website, keywords (e.g. tagging); tags start application, or online channels that with the pound sign (#), also referred enable web users to create, to as hashtag co-create, discuss, modify, and 4. Assistive Media - non-profit service exchange user-generated content designed to help people who have Six Types of Social Media visual/reading and hearing a. Social Networks impairments Sites that allow users to 5. Paperless Society - transactions connect with other people through online such as payment and with the same interests or elections (voting) background. 6. 3D Technology - used to produce 3D b. Bookmarking Sites output (3D pens) Sites that allow users to store 7. Wearable Technology - smartwatch and manage links to various and headset or headphone websites and resources. c. Social News Lesson 2: Online Safety, Security, Ethics, Sites that allow users to post and Etiquette their own news items or links to other news sources. d. Media Sharing Sites that allow users to upload and share media content like images, music, and video. e. Microblogging Sites that focus on short updates from the user. f. Blogs and Forums Sites that allow users to post their content. 3. Mobile Technologies - the popularity of smartphones and tablets has taken What information can I share? a major rise over the years; this is Only first name, birthday (day and month), mainly because of the devices’ and current and previous school. capability to do tasks that were Digital Footprint - trail of information you originally found in personal leave when using the Internet; cannot be computers removed Kinds of Operating Systems Two Types of Hacker a. iOS - proprietary OS to Apple - Black-hat hacker (computer hacker b. Android - invented by Google who violates laws or ethical c. Blackberry OS - proprietary standards; unauthorized) OS to BlackBerry - White-hat hacker (ethical security d. Symbian - Nokia hacker, thus authorized; improves the e. WebOS - smart TVs system and identifies any f. Windows Mobile - Microsoft vulnerabilities) Netiquette - a combination of the words, Internet Threats “network” and “etiquette”; set of rules for behaving properly online 1. Malware - stands for “malicious Online Safety - the knowledge of maximizing software”; is any program or file that the user’s personal safety and security risk to is harmful to a computer user private information, and the self-protection - Virus is a malicious program that is from computer in general designed to replicate itself and 10 Internet Safety Tips transfer from one computer to 1. Know the scams. Learn about different another either through the internet kind of scams and what you can do to avoid and local network or data storage, them can only be triggered when 2. Think before you click. Ask yourself interacted, such as when clicked questions like, “Is it true? Is it helpful? Is it *Brain is the first PC virus, began inspiring? Is it necessary? Is it kind?” infecting 5.2” floppy disks in 1986, 3. Safety peruse. These sites may have an created by Basit and Amjad Farooq address that’s very similar to a legitimate site, Alvi but the page can have misspellings, bad - Worm is a malicious program that grammar, or low resolution images. transfers from one computer to 4. Shop safely. It must have “https” another by any type of means; often (Hypertext Transfer Protocol Secure) and a uses a computer network to spread padlock icon. itself; automatically spreads, has no 5. Kick-butt password. Use an extremely triggers uncrackable password. *The first worm in the Philippines is 6. Protect your info and keep your guard the LOVEBUG or ILY by Onel de up. Backup all of your data on your computer, Guzman smartphone and tablet, theft or crash. - Trojan is a malicious program that 7. Watch your Wi-Fi connectivity. Protect is disguised as a useful program but your network by changing your router’s once downloaded or installed, leaves settings and making sure that you have the your PC unprotected and allows connection password-protected. hackers to get your information 8. Install a firewall. A firewall is a great line - Adware (advertising-supported of defense against cyber attacks (e.g. software) is unwanted software McAfee) designed to throw advertisements up 9. Keep up to date. Use the manufacturer’s on your screen (e.g. pop-up ads and latest security patches to make regular banner ads) updates and make sure that you have the - Spyware is malware that secretly software set to do routine scans. observes the computer user’s 10. Use your noggin. Use your common activities without permission and sense while surfing the web. reports it to the software’s author (e.g. keylogger) 2. Spam - unwanted email mostly from bots or advertisers that may contain malware 3. Phishing - goal is to acquire Online research - a research method that sensitive personal information like involves the collection of information from the internet. passwords and credit card details if you receive the malicious website Tips in Conducting Online Research through email 4. Pharming - if you directly typed or 1. Have a question in mind - focus on visited the malicious website a question you want answered. If it is a series of questions, start with one. 5. Vishing - scamming through phone Never search everything in one go. calls 2. Narrow it down - search engines like 6. Copyright Infringement - it Google, Bing, or Yahoo use several describes the unauthorized use of filters to determine the most copyrighted material, such as text, appropriate result for you. photos, videos, music, software, and Boolean Operators other original content. In the computer industry, copyright 1. AND → 2 concepts together violations often refer to software and 2. OR → 1 concept or another websites 3. NOT → filters out concept you don’t need *Fair Use - a legal concept that allows the reproduction of Asterisk / Star Symbol copyrighted material for certain Using that star symbol to find different forms purposes without obtaining of the same word. permission and without paying a fee (e.g. Teen* , Canada*) or royalty Quotation Marks Group words together in your search. Searching the Web 1. Advanced Search - this will allow Search engine - search engines are you to filter out information you do not need. websites used for retrieval of data, 2. Look for a credible source. files, or documents from 3. Give Credit - name of the person or databases. Some search organization (the author of the engines we use today are: Google, Yahoo, information). Title of the home page and Bing in italics. URL. Date last seen.
Lesson 3: Advanced Word Processing
Skills
Mail Merge - used to create multiple
documents at once; has identical layout, formatting, text, and graphics, only specific sections of each document varies and is personalized Two Components of Mail Merge - supports logical operators and 1. Form Document - the document that wildcard (*) for partial matching contains the main body of the Syntax: =COUNTIFS(range1, criteria1, message we want to convey or send [range2], [criteria2], ...) 2. List or Data File - where the 3. SUMIF Function individual information or data that - it returns the sum of the cells that needs to be plugged in (merged) to meet a single criterion our form document is placed and - criteria can be applied to dates, maintained numbers, and text using logical operators and wildcard (*) for partial Lesson 4: Advance and Complex matching Calculations in Excel Syntax: =SUMIFS(range, criteria, sum_range) Complex Formula - a combination of more 4. SUMIFS Function than two simple formulas; one of the key - it returns the sum of the cells that features of excel is the ability to calculate meet multiple criteria complex formulas - criteria can be applied to dates, There are four basic computation uses in numbers, and text using logical excel, namely: addition, subtraction, operators and wildcard (*) for partial multiplication, and division. matching Functions - predefined formula that performs Syntax: =SUMIFS(sum_range, range1, calculations using specific values in a criteria1, [range2], [criteria2], …) particular order 5. IF Function - Parts of a function are: Syntax: =IF(logical_test, value_if_true, =SUM(A1:A20) value_if_false)
Equal Sign Function Name Argument Lesson 5: Advanced Presentation Skill
1. COUNTIF Function 1. Minimize - keep slide counts to a
- a function to count cells that meet a minimum to maintain a clear single criterion message and to keep the audience - it can be used to count cells with attentive dates, numbers, and text that match 2. Clarity - avoid being fancy by using a specific criteria font style that is easy to read - supports logical operators and 3. Simplicity - use bullets or short wildcard (*) for partial computing sentences; summarize the Syntax: =COUNTIF(range, criteria) information on the screen to have 2. COUNTIFS Function your audience focus on what the - a function to count cells that meet speaker is saying; apply 6x7 rule (6 multiple criteria lines x 7 words) - it can be used to count cells with 4. Visuals - use graphics to help in your dates, numbers, and text that match presentation specific criteria 5. Contrast - use light font on dark Lesson 7: Webpage Designing background or vise versa Webpage - it is a single document on the Lesson 6: Basic Principles of Graphic web using a unique URL Design Layout Website - it is a collection of multiple webpages in which information on a related 1. Proportion - Efforts to regulate the topic or another subject is linked together size between one part and another. under the same domain address 2. Balance - The visual weight of Hypertext Markup Language (HTML) objects, texture, colors, and space is ● HTML is Easy to Learn and Use evenly distributed on the screen. ● HTML is Free 3. Contrast - When visual elements ● HTML describes the structure of a placed close together noticeably webpage differ from each other. ● HTML consists of a series of 4. Rhythm - Rhythm is a pattern elements created by elements repeatedly and ● HTML elements tell the browser how varied. Repetition (repeating similar to display the content elements consistently) and variation ● HTML elements are represented by (changes in shape, size, position or TAGS elements) are keys to visual rhythm. ● HTML TAGS label pieces of content 5. Unity - This principle is used to unify such as “heading”, “paragraph”, layout elements such as typography, “table” and so on illustrations, colors, etc. With this unity, the elements in it will support Anatomy of a Website and complement each other so that the focus is obtained according to the desired goal. 6. Harmony - Harmony or alignment is the suitability of one part with another in a design. Aspects in harmony can be in the form of harmony in line and shape or harmony in texture and color. 7. Emphasis - The design needs to have the principle of emphasis which means something that becomes the focus or gets attention first. 8. Layout - The layout in the design can Requirements in creating a webpage basically be divided into several using the HTML parts, it can be 4 parts, 3 parts, and 2 1. Editor - using the Notepad (source parts depending on the design code) in text and extension name needs. -.html or .htm 2. Browser - responsible for reading HTML instructions and displaying the webpage output (ex. Internet Explorer, Mozilla Firefox, Google Chrome) Creating a Website Using Notepad Step 1: Open Notepad / Notepad++ Step 2: Type the following HTML Tags Step 3: Save the HTML Page Step 4: View the HTML Page in your Browser
Web Page Design Using Templates and
Online WYSIWYG ● WYSIWYG - “What You See Is What You Get” ● The tools offered in the WYSIWYG process are tools on which the content (text and graphics) can be edited in a form closely resembling its appearance when printed or displayed as a finished product, such as printed document, web page, or slide presentation