EmTech Module Week1-8
EmTech Module Week1-8
Department of E ducation
N at io n al C apit al Regio n
Sc h o o l s D ivisio n Offi c e o f Las Piñ as C it y
OBJECTIVES
1. Improve their knowledge on how ICT affects their everyday lives and the state of
our nation
2. Compare and contrast the differences between online platform, sites, and
content.
3. Understand the future of the World Wide Web through Web 3.0 and the different
trends in ICT.
Information and Communication Technology (ICT) deals with the use of different
communication technologies such as mobile phones, telephone, Internet, etc. to locate, save, send,
and edit information.
When we make a video call, we use the Internet. When we send a text or make a call, we use
cellular networks. When we run out of load or battery, we use payphones which use a telephone
network. Having a unified way to communicate is one of the goals of ICT. In terms of economics,
ICT has saved companies a lot of resources (time and money) with the kind of communication
technology they use.
Several international companies dub the Philippines as the “ICT Hub of Asia.” It is no secret
that there is a huge growth of ICT-related jobs around the country, one of which is the call center or
BPO (Business Process Outsourcing) centers.
According to the 2013 edition of Measuring the Information Society by the International
Telecommunication Union, there are 106.8 cellphones per 100 Filipinos in the year 2012. That
would mean that for every 100 Filipinos you meet, there is a high chance that they have a cellphone
and approximately for the seven of them, they have two.
Web 2.0 is a term coined by Darcy DiNucci on January 1999. In her article titled,
“Fragmented Future”.
Web 2.0 is the evolution of Web 1.0 by adding dynamic web pages – the user is able to see
a website differently than others, include social networking sites, blogs, wikis, video sharing sites
hosted services, and web application. Web 2.0 allows users to interact with the page, instead of just
reading a page, the user may be able to comment or create a user account. Also, use web browser
instead of just using their operating system. Browsers can now be used for their user interface,
application software, and even for file storage.
Folksonomy, Rich User Experience, User Participation, Long Tail, Software as a Service and Mass
Participation as among the features of Web 2.0
The Semantic Web provides a common framework that allows data to be shared and reused
across application, enterprise, and community boundaries. The aim of Web 3.0 is to have machines
(or servers) understand the user’s preferences to be able to deliver web content specifically
targeting the user.
Web 3.0 fully realized some several problems: Compatibility, Security, Vastness,
Vagueness, and Logic
Trends in ICT
2. Social Media. Social Media is a website, application, or online channel that enables web
users to create, co-create, discuss, modify, and exchange user-generated content.
3. Mobile Technologies. These devices are capable of using high-speed Internet using 4G
Networking (LTE).
4. Assistive Media. Assistive media is a nonprofit service designed to help people who have
visual and reading impairments. A database of audio recordings is used to read to the user.
OBJECTIVES
Differentiate web 1.0, 2.0 and 3.0
Identify the advantages and disadvantages of 3 webs
Web 1.0, Web 2.0 and Web 3.0 with their difference
Web 1.0 refers to the first stage of the World Wide Web evolution. Earlier, there were only
few content creators in Web 1.0 with the huge majority of users who are consumers of
content. Personal web pages were common, consisting mainly of static pages hosted on
ISP-run web servers, or on free web hosting services.
In Web 1.0 advertisements on websites while surfing the internet is banned. Also, in Web
1.0, Ofoto is an online digital photography website, on which user could store, share, view
and print digital pictures. Web 1.0 is a content delivery network (CDN) which enables to
showcase the piece of information on the websites. It can be used as personal websites. It
costs to user as per pages viewed. It has directories which enable user to retrieve a
particular piece of information.
Four design essentials of a Web 1.0 site include:
1. Static pages.
2. Content is served from the server’s file-system.
3. Pages built using Server Side Includes or Common Gateway Interface (CGI).
4. Frames and Tables used to position and align the elements on a page.
Web 2.0 refers to world wide website which highlight user-generated content, usability and
interoperability for end users. Web 2.0 is also called participative social web. It does not
refer to a modification to any technical specification, but to modify in the way Web pages
are designed and used. The transition is beneficial but it does not seem that when the
changes are occurred. An interaction and collaboration with each other is allowed by Web
2.0 in a social media dialogue as creator of user-generated content in a virtual community.
Web 1.0 is enhanced version of Web 2.0.
The web browser technologies are used in Web 2.0 development and it includes AJAX and
JavaScript frameworks. Recently, AJAX and JavaScript frameworks have become a very
popular means of creating web 2.0 sites.
Five major features of Web 2.0 –
1. Free sorting of information, permits users to retrieve and classify the information
collectively.
2. Dynamic content that is responsive to user input.
3. Information flows between site owner and site users by means of evaluation & online
commenting.
4. Developed APIs to allow self-usage, such as by a software application.
5. Web access leads to concern different, from the traditional Internet user base to a
wider variety of users.
Usage of Web 2.0
The social Web contains a number of online tools and platforms where people share their
perspectives, opinions, thoughts and experiences. Web 2.0 applications tend to interact
much more with the end user. As such, the end user is not only a user of the application but
also a participant by these 8 tools mentioned below:
1. Podcasting 5. Social bookmarking
2. Blogging 6. Social networking
3. Tagging 7. Social media
4. Curating with RSS 8. Web content voting
Web 3.0 It refers the evolution of web utilization and interaction which includes altering the
Web into a database. In enables the upgradation of back-end of the web, after a long time
of focus on the front-end (Web 2.0 has mainly been about AJAX, tagging, and another front-
end user-experience innovation). Web 3.0 is a term which is used to describe many
evolutions of web usage and interaction among several paths. In this, data isn’t owned but
instead shared, where services show different views for the same web / the same data.
The Semantic Web (3.0) promises to establish “the world’s information” in more reasonable
way than Google can ever attain with their existing engine schema. This is particularly true
from the perspective of machine conception as opposed to human understanding. The
Semantic Web necessitates the use of a declarative ontological language like OWL to
produce domain-specific ontologies that machines can use to reason about information and
make new conclusions, not simply match keywords.
Below are 5 main features that can help us define Web 3.0:
1. Semantic Web
The succeeding evolution of the Web involves the Semantic Web. The semantic web
improves web technologies in demand to create, share and connect content through
search and analysis based on the capability to comprehend the meaning of words,
rather than on keywords or numbers.
2. Artificial Intelligence
Combining this capability with natural language processing, in Web 3.0, computers
can distinguish information like humans in order to provide faster and more relevant
results. They become more intelligent to fulfil the requirements of users.
3. 3D Graphics
The three-dimensional design is being used widely in websites and services in Web
3.0. Museum guides, computer games, ecommerce, geospatial contexts, etc. are all
examples that use 3D graphics.
4. Connectivity
With Web 3.0, information is more connected thanks to semantic metadata. As a
result, the user experience evolves to another level of connectivity that leverages all
the available information.
5. Ubiquity
Content is accessible by multiple applications, every device is connected to the web,
the services can be used everywhere.
OBJECTIVES
Identify the online safety measures
Define online ethics and netiquette
Apply online safety, security, ethics and etiquette standards and practice in the sue of ICTs.
The Internet has radically changed the way that people interact with the world. They have
accounts on different online platforms; some have unlimited Internet access; and some are active
users of the web. Yet along with this opportunity are the new risks or threats that Internet may bring.
Hence, online safety or Internet safety is an emergent concern for children.
Online safety or Internet safety refers to the practices and precautions that should be
observed when using the Internet to ensure that the users as well as their computers and personal
information are safe from crimes associated with using the Internet. There are worries concerning
safety on the internet such as malicious users, websites and software and committed on the Internet
like stalking, identity theft, privacy violations, even harassment and more. With there, almost all
social networking and chat sites.
Whilst the internet is a fantastic place for communication and information, there are many malicious
threats you need to dodge along the way.
1. Spam
The fact that most of our emails accounts come with a ‘Spam’ or ‘Junk’ folder insinuates that spam
emails are a huge issue, with more than 50% of emails being syphoned into these folders. Aside
from being an annoyance, spam emails are not a direct threat. However, many can contain
malware.
Adware
Adware is a type of malware software that displays unwanted ads when a user is surfing the
internet. The ads often redirect your searches to advertising websites and collect marketing-type
data about you, behind your back, which is considered malicious.
Trojan
Trojans leave your computer completely unprotected, which can mean that hackers can steal any
data from your system. Trojans often present themselves as harmless computer programmes so
that hackers can penetrate your computer without being detected.
Virus
One of the most talked about internet threats is a virus. Viruses usually attach themselves covertly
to downloads as they are designed to spread at an alarming rate. Viruses are often attached to files
for download, shared via CDs, DVDs, and USB sticks, or loaded on to computers by opening
infected email attachments.
Worms
Worms usually make their way on to a computer via a malicious email attachment or USB stick.
Once your computer has been infected by a worm, it will likely send itself to every email address
logged in your system. To the receiver, your email will appear harmless, until they open it and are
infected by the same worm.
Phishing
In its simplest terms, phishing is a form of fraudulent activity. More often than not, official-looking
emails are sent impersonating a well-known provider, such as a bank. These emails are sent to
acquire people’s passwords and credit card details.
Spyware
Another form of malware is spyware. Spyware is an all-encompassing internet nasty and is usually
attached to pop-ups of downloadable files. Once installed on your computer, spyware can monitor
your keystrokes, read and delete your files, reformat your hard drive, and access your applications.
Whoever is controlling the spyware has access to your personal details without you even knowing.
Keyloggers
Similar to a part of spyware, keyloggers record a user’s keyboard actions. Most keyloggers will be
looking for distinguishable key entries, such as bank card details and passwords. Keylogging is
often linked to identity and intellectual property theft.
Pharming
Pharming is a more complex version of phishing that exploits the DNS system. Pharmers often
create web pages mimicking that of a trustworthy business, such as an online banking log-in page.
Users will then enter their details, thinking they are logging in to their usual service, and their details
will be stolen by the pharmer.
OBJECTIVES
identify the parts of word processing and its functions
insert and format pictures, clip art, shape, SmartART, charts and screen clippings
Discuss the concept of Mail Merge
Create and link a main document, a data source
Microsoft Word or MS-WORD (often called Word) is a Graphical word processing program that
users can type with. It is made by the computer company Microsoft. Its purpose is to allow users to
type and save documents. Similar to other word processors, it has helpful tools to make documents .
(https://simple.wikipedia.org › wiki › Microsoft_Word)
DIFFERENT SHORTCUT KEYS IN MICROSOFT WORD
Republicof theP hilippines
Department of E ducation
N at io n al C apit al Regio n
Sc h o o l s D ivisio n Offi c e o f Las Piñ as C it y
OBJECTIVE
Insert pictures, clip art, shape, SmartART, charts and screen clippings
Format pictures, clip art, shape, SmartART, charts and screen clippings
Images are a great way to liven up a document, and Word offers a few methods to insert
them. There are built-in clip art images for just about every topic, so you may be able to find a
perfect clip art image for your document. If you have a more specific image in mind, you can insert a
picture from a file.
The Insert Tab is used to insert different features such as tables, pictures, clip art, shapes,
charts, page numbers, word art, headers, and footers into a document. The table below describes
each of the groups and buttons available on this tab.
ILLUSTRATIONS GROUP
1. Picture – To insert a picture from a file on the computer into the document, click the button.
The Insert Picture dialog box will appear. This dialog box is used to select the picture that is
to be inserted into the document.
2. Online Pictures – Click the button to find and insert pictures from the Bing Image Search
site. It is also possible to lob into a Microsoft Account to insert pictures
3. Clipart - are graphic elements used to create a design. In other words, this is raster or
vector picture that may have any graphic format. For instance, a raster clipart comprises of
photographs, drawings, which are composed of pixels, the scanned images can be also
used here.
4. Shapes -This button is used to insert ready-made shapes such as circles, squares, arrows,
and triangles into a document. When the button is clicked, a gallery of different shapes will
appear. To insert a shape, click the desired shape and then draw the shape in the
document.
5. SmartArt – To insert a SmartArt graphic into the document, click this button. SmartArt
graphics are objects such as Venn Diagram and organizational charts. When the button is
clicked, a gallery of different categories and shapes will be displayed.
6. Chart – Use this feature to insert a bar, area or line chart. When the button is clicked the
Insert Chart dialog box will display. In this dialog box, it is possible to specify the type of
chart.
7. Screenshot – This feature can be used to insert a picture of any window that is available on
the desktop. When the buttons is clicked, a gallery of the available windows will display.
Click any of the windows icons. An image of that window will appear in the Word Document.
When you insert clip art or a picture from a file, you may notice that it's difficult to move it
exactly where you want. This is because the text wrapping for the image is set to In Line with
Text. You'll need to change the text wrapping setting if you want to move the image freely, or if
you just want the text to wrap around the image in a more natural way.
5. Move the image around to see how the text wraps for each setting.
NOTE: If you can’t get your text to wrap the way you want, click the Wrap Text command, then
select More Layout Options from the menu. You can make more precise changes in the Advanced
Layout dialog box that appears.
Republicof theP hilippines
Department of E ducation
N at io n al C apit al Regio n
Sc h o o l s D ivisio n Offi c e o f Las Piñ as C it y
OBJECTIVE
Discuss the concept of Mail Merge
Create a main document, a data source
Link the main document with the data source
Mail merge lets you create a batch of documents that are personalized for each recipient.
For example, a form letter might be personalized to address each recipient by name. A data source,
like a list, spreadsheet, or database, is associated with the document. Placeholders--called merge
fields--tell Word where in the document to include information from the data source.
You work on the main document in Word, inserting merge fields for the personalized content you
want to include. When the mail merge is complete, the merge document will generate a
personalized version of itself for each name in the data source.
DOCUMENT TYPES
Word provides tools for incorporating your data into the following kinds of documents. Follow the
links for details about each type:
1. Letters that include a personalized greeting. Each letter prints on a separate sheet of paper.
Create and print a batch of personalized letters
2. Email where each recipient's address is the only address on the To line. You'll be sending
the email directly from Word.
4. Envelopes or Labels where names and addresses come from your data source. Create and
print a batch of envelopes for mailing Create and print sheets of mailing labels
5. Directory that lists a batch of information for each item in your data source. Use it to print out
your contact list, or to list groups of information, like all of the students in each class. This
type of document is also called a catalog merge.
CHALLENGE QUESTIONS
Did you know that you can use a Website for several purposes? And did you
know that Websites can be considered as platforms for productivity?
Individual Activity: Instruct the students to research at least 5 different types of applications that
can be used for collaborating using the power of the Internet.
Note: messenger applications can also be used for collaboration.
Each application should answer the following question:
1. What does this application do?
2. How do you manipulate this application? How do you make this application work?
3. How can this application be helpful in collaborating online?