0% found this document useful (0 votes)
145 views7 pages

Empowerment Technology (Lesson 1-7) Reviewer

Uploaded by

Angelica Lagatuz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
145 views7 pages

Empowerment Technology (Lesson 1-7) Reviewer

Uploaded by

Angelica Lagatuz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Empowerment Technologies 2.

Rich User Experience - content is


Lesson 1: ICT and Its Current State dynamic and is responsive to user’s
input (e.g. GPS)
Information and Communication From keyword → Multiple sources
Technologies (ICT) - deals with the use of 3. Long Tail - services are offered on
different communication technologies such as demand rather than on a one-time
mobile phones, telephones, Internet, etc. to purchase; time-based pricing is better
locate, save, send, and edit information. than file-size-based pricing or vice
ICT in the Philippines versa
- “ICT Hub of Asia” 4. User Participation - the owner of the
- 106.8 cellphones per 100 Filipinos in website is not the only one who is
the year 2012 able to put content; others are able to
- ICT industry shares 19.3% of the total place the content of their own by a
employment population in 2010 means of comments, reviews, and
- “The Selfiest Cities Around the evaluation
World” of 2013 Time Magazine 5. Software as a Service - users will
- 1st: Makati City and Pasig City subscribe to a software only when
- 9th: Cebu City needed rather than purchasing them;
software as a service allows you to
Web Types “rent” a minimal fee
Web 1.0 6. Mass Participation - a diverse
When the World Wide Web (WWW) was information sharing through universal
invented by Tim Berner Lee in 1989, most web access
web pages were static. Static (also known Web 3.0 (Semantic Web)
as flat page or stationary page) in the sense Movement led by the World Wide Web
that the page is “as is” and cannot be Consortium (W3C). The aim of Web 3.0 is to
manipulated by the user. The content is have machines (or servers) understand the
also the same for all users. This is referred to user’s preferences to be able to deliver web
as Web 1.0. content specifically targeting the user.
Web 2.0 (Dynamic Web Pages) Web 3.0 is like searching for movies and food
The evolution of Web 1.0 by adding dynamic faster and easier and it acts as personal
web pages - the user is able to see a website assistance (e.g. Siri, Google Assistant,
differently than others. Examples of Web 2.0 Cortana, and Alexa)
include social networking sites, blogs, wikis,
video-sharing sites, hosted services, and web Trends in ICT
applications.
Features of Web 2.0 1. Convergence - the synergy of
1. Folksonomy - allows users to technological advancements to work
categorize and classify/arrange on a similar goal or task
information using freely chosen 2. Social Media - a website,
keywords (e.g. tagging); tags start application, or online channels that
with the pound sign (#), also referred enable web users to create,
to as hashtag
co-create, discuss, modify, and 4. Assistive Media - non-profit service
exchange user-generated content designed to help people who have
Six Types of Social Media visual/reading and hearing
a. Social Networks impairments
Sites that allow users to 5. Paperless Society - transactions
connect with other people through online such as payment and
with the same interests or elections (voting)
background. 6. 3D Technology - used to produce 3D
b. Bookmarking Sites output (3D pens)
Sites that allow users to store 7. Wearable Technology - smartwatch
and manage links to various and headset or headphone
websites and resources.
c. Social News Lesson 2: Online Safety, Security, Ethics,
Sites that allow users to post and Etiquette
their own news items or links
to other news sources.
d. Media Sharing
Sites that allow users to
upload and share media
content like images, music,
and video.
e. Microblogging
Sites that focus on short
updates from the user.
f. Blogs and Forums
Sites that allow users to post
their content.
3. Mobile Technologies - the popularity
of smartphones and tablets has taken What information can I share?
a major rise over the years; this is Only first name, birthday (day and month),
mainly because of the devices’ and current and previous school.
capability to do tasks that were Digital Footprint - trail of information you
originally found in personal leave when using the Internet; cannot be
computers removed
Kinds of Operating Systems Two Types of Hacker
a. iOS - proprietary OS to Apple - Black-hat hacker (computer hacker
b. Android - invented by Google who violates laws or ethical
c. Blackberry OS - proprietary standards; unauthorized)
OS to BlackBerry - White-hat hacker (ethical security
d. Symbian - Nokia hacker, thus authorized; improves the
e. WebOS - smart TVs system and identifies any
f. Windows Mobile - Microsoft vulnerabilities)
Netiquette - a combination of the words, Internet Threats
“network” and “etiquette”; set of rules for
behaving properly online 1. Malware - stands for “malicious
Online Safety - the knowledge of maximizing software”; is any program or file that
the user’s personal safety and security risk to is harmful to a computer user
private information, and the self-protection - Virus is a malicious program that is
from computer in general designed to replicate itself and
10 Internet Safety Tips transfer from one computer to
1. Know the scams. Learn about different another either through the internet
kind of scams and what you can do to avoid and local network or data storage,
them can only be triggered when
2. Think before you click. Ask yourself interacted, such as when clicked
questions like, “Is it true? Is it helpful? Is it *Brain is the first PC virus, began
inspiring? Is it necessary? Is it kind?” infecting 5.2” floppy disks in 1986,
3. Safety peruse. These sites may have an created by Basit and Amjad Farooq
address that’s very similar to a legitimate site, Alvi
but the page can have misspellings, bad - Worm is a malicious program that
grammar, or low resolution images. transfers from one computer to
4. Shop safely. It must have “https” another by any type of means; often
(Hypertext Transfer Protocol Secure) and a uses a computer network to spread
padlock icon. itself; automatically spreads, has no
5. Kick-butt password. Use an extremely triggers
uncrackable password. *The first worm in the Philippines is
6. Protect your info and keep your guard the LOVEBUG or ILY by Onel de
up. Backup all of your data on your computer, Guzman
smartphone and tablet, theft or crash. - Trojan is a malicious program that
7. Watch your Wi-Fi connectivity. Protect is disguised as a useful program but
your network by changing your router’s once downloaded or installed, leaves
settings and making sure that you have the your PC unprotected and allows
connection password-protected. hackers to get your information
8. Install a firewall. A firewall is a great line - Adware (advertising-supported
of defense against cyber attacks (e.g. software) is unwanted software
McAfee) designed to throw advertisements up
9. Keep up to date. Use the manufacturer’s on your screen (e.g. pop-up ads and
latest security patches to make regular banner ads)
updates and make sure that you have the - Spyware is malware that secretly
software set to do routine scans. observes the computer user’s
10. Use your noggin. Use your common activities without permission and
sense while surfing the web. reports it to the software’s author
(e.g. keylogger)
2. Spam - unwanted email mostly from
bots or advertisers that may contain
malware
3. Phishing - goal is to acquire Online research - a research method that
sensitive personal information like involves the collection of information from the
internet.
passwords and credit card details if
you receive the malicious website
Tips in Conducting Online Research
through email
4. Pharming - if you directly typed or 1. Have a question in mind - focus on
visited the malicious website a question you want answered. If it is
a series of questions, start with one.
5. Vishing - scamming through phone
Never search everything in one go.
calls
2. Narrow it down - search engines like
6. Copyright Infringement - it Google, Bing, or Yahoo use several
describes the unauthorized use of filters to determine the most
copyrighted material, such as text, appropriate result for you.
photos, videos, music, software, and
Boolean Operators
other original content. In the
computer industry, copyright 1. AND → 2 concepts together
violations often refer to software and 2. OR → 1 concept or another
websites 3. NOT → filters out concept you don’t
need
*Fair Use - a legal concept that
allows the reproduction of
Asterisk / Star Symbol
copyrighted material for certain Using that star symbol to find different forms
purposes without obtaining of the same word.
permission and without paying a fee (e.g. Teen* , Canada*)
or royalty
Quotation Marks
Group words together in your search.
Searching the Web
1. Advanced Search - this will allow
Search engine - search engines are you to filter out information you do
not need.
websites used for retrieval of data,
2. Look for a credible source.
files, or documents from
3. Give Credit - name of the person or
databases. Some search organization (the author of the
engines we use today are: Google, Yahoo, information). Title of the home page
and Bing in italics. URL. Date last seen.

Lesson 3: Advanced Word Processing


Skills

Mail Merge - used to create multiple


documents at once; has identical layout,
formatting, text, and graphics, only specific
sections of each document varies and is
personalized
Two Components of Mail Merge - supports logical operators and
1. Form Document - the document that wildcard (*) for partial matching
contains the main body of the Syntax: =COUNTIFS(range1, criteria1,
message we want to convey or send [range2], [criteria2], ...)
2. List or Data File - where the 3. SUMIF Function
individual information or data that - it returns the sum of the cells that
needs to be plugged in (merged) to meet a single criterion
our form document is placed and - criteria can be applied to dates,
maintained numbers, and text using logical
operators and wildcard (*) for partial
Lesson 4: Advance and Complex matching
Calculations in Excel Syntax: =SUMIFS(range, criteria,
sum_range)
Complex Formula - a combination of more 4. SUMIFS Function
than two simple formulas; one of the key - it returns the sum of the cells that
features of excel is the ability to calculate meet multiple criteria
complex formulas - criteria can be applied to dates,
There are four basic computation uses in numbers, and text using logical
excel, namely: addition, subtraction, operators and wildcard (*) for partial
multiplication, and division. matching
Functions - predefined formula that performs Syntax: =SUMIFS(sum_range, range1,
calculations using specific values in a criteria1, [range2], [criteria2], …)
particular order 5. IF Function
- Parts of a function are: Syntax: =IF(logical_test, value_if_true,
=SUM(A1:A20) value_if_false)

Equal Sign Function Name Argument Lesson 5: Advanced Presentation Skill

1. COUNTIF Function 1. Minimize - keep slide counts to a


- a function to count cells that meet a minimum to maintain a clear
single criterion message and to keep the audience
- it can be used to count cells with attentive
dates, numbers, and text that match 2. Clarity - avoid being fancy by using a
specific criteria font style that is easy to read
- supports logical operators and 3. Simplicity - use bullets or short
wildcard (*) for partial computing sentences; summarize the
Syntax: =COUNTIF(range, criteria) information on the screen to have
2. COUNTIFS Function your audience focus on what the
- a function to count cells that meet speaker is saying; apply 6x7 rule (6
multiple criteria lines x 7 words)
- it can be used to count cells with 4. Visuals - use graphics to help in your
dates, numbers, and text that match presentation
specific criteria
5. Contrast - use light font on dark Lesson 7: Webpage Designing
background or vise versa
Webpage - it is a single document on the
Lesson 6: Basic Principles of Graphic web using a unique URL
Design Layout Website - it is a collection of multiple
webpages in which information on a related
1. Proportion - Efforts to regulate the topic or another subject is linked together
size between one part and another. under the same domain address
2. Balance - The visual weight of Hypertext Markup Language (HTML)
objects, texture, colors, and space is ● HTML is Easy to Learn and Use
evenly distributed on the screen. ● HTML is Free
3. Contrast - When visual elements ● HTML describes the structure of a
placed close together noticeably webpage
differ from each other. ● HTML consists of a series of
4. Rhythm - Rhythm is a pattern elements
created by elements repeatedly and ● HTML elements tell the browser how
varied. Repetition (repeating similar to display the content
elements consistently) and variation ● HTML elements are represented by
(changes in shape, size, position or TAGS
elements) are keys to visual rhythm. ● HTML TAGS label pieces of content
5. Unity - This principle is used to unify such as “heading”, “paragraph”,
layout elements such as typography, “table” and so on
illustrations, colors, etc. With this
unity, the elements in it will support Anatomy of a Website
and complement each other so that
the focus is obtained according to the
desired goal.
6. Harmony - Harmony or alignment is
the suitability of one part with another
in a design. Aspects in harmony can
be in the form of harmony in line and
shape or harmony in texture and
color.
7. Emphasis - The design needs to
have the principle of emphasis which
means something that becomes the
focus or gets attention first.
8. Layout - The layout in the design can Requirements in creating a webpage
basically be divided into several using the HTML
parts, it can be 4 parts, 3 parts, and 2 1. Editor - using the Notepad (source
parts depending on the design code) in text and extension name
needs. -.html or .htm
2. Browser - responsible for reading
HTML instructions and displaying the
webpage output (ex. Internet
Explorer, Mozilla Firefox, Google
Chrome)
Creating a Website Using Notepad
Step 1: Open Notepad / Notepad++
Step 2: Type the following HTML Tags
Step 3: Save the HTML Page
Step 4: View the HTML Page in your Browser

Web Page Design Using Templates and


Online WYSIWYG
● WYSIWYG - “What You See Is What
You Get”
● The tools offered in the WYSIWYG
process are tools on which the
content (text and graphics) can be
edited in a form closely resembling its
appearance when printed or
displayed as a finished product, such
as printed document, web page, or
slide presentation

You might also like