ETECH
ETECH
deals with use of different communications technologies such as mobile phones, telephone,
internet, etc. to locate, save, send and edit information.
Web 2.0
Term coined by Darcy DiNucci on Jan 1999. In her article titled, FRAGMENTED FUTURE, she
wrote:
“the Web we know now, which loads into a browser window in essentially static screenfuls, is
only an embryo of the Web to come. The first glimmerings of Web 2.0 are beginning to appear,
and we are just starting to see how that embryo might develop…”
Evolution of Web 2.0 by adding dynamic web pages – the user is able to see a website
differently than others.
FOLKSONOMY
● a user-generated system of classifying and organizing online content into different
categories by the use of metadata allows user to categorize and classify/arrange
information using freely chosen keywords
USER PARTICIPATION
● the owner of the website is not the only one who is able to put content
● allows others to place a content of their own by means of comments, reviews and
evaluation
LONG TAIL
● services that are offered on demand rather than on a one-time purchase
● allows availing to time-based pricing over file sized-based pricing
Software as a Service
● licensing and delivery model in which software is licensed on a subscription basis and is
centrally hosted
● allows users to subscribe to a software only when needed rather than purchasing them
MASS PARTICIPATION
● since most content is based on people from various cultures
● allows users to share diverse information through universal web access
Web 3.0
Semantic Web – a movement led by the World Wide Web Consortium (W3C) which
encourages web developers to include semantic content in their web pages.
provides common framework that allows data to be shared and reused across application,
enterprise and community boundaries.
aim is to have machines (or servers) understand the user’s preferences to abe able to deliver
web content specifically targeting the user.
yet to be fully realized because of several problems that includes:
COMPATIBILITY
HTML files and current web browsers could not support Web 3.0
SECURITY
in question due to machine saving the user’s preferences
VASTNESS
the world wide web already contains billions of web pages
VAGUENESS
certain words are imprecise. The words “old” and “small” would depend on the user
LOGIC
since machine use logic, there are certain limitations for a computer to be able to predict what
the user is referring to a given time
TRENDS in ICT
CONVERGENCE
MOBILE TECHNOLOGIES
Has taken a major rse over the years due to devices' capability to do tasks that were originally
found in personal computers.
ASSISTIVE MEDIA
Nonprofit service designed to help people who have visual and reading impairments. A
database of audio recordings is used to read to the user.
SOCIAL MEDIA
● Social networks. Sites that allows connecting people with the same interests or
background, once a user creates his or her account he or she can set up a profile, add
people, create groups and share content. Eg: Facebook, Google+
● Bookmarking sites. Site that allows storing and managing links to various websites and
resources. Most of the sites allow users to create a tag for others to easily search and
share. Eg: Pinterest, StumbleUpon
● Social news. Site that allows users to post their own news items or links to other news
sources. Users can also comment on the post and comments may also be ranked. They
are also capable of voting on these news articles of the website. Those who get the most
amount of votes are shown most prominently. Eg: Reddit and Digg
● Media sharing. Sites that allows users to upload and share media content like images,
music and video. Eg: Flicker, Youtube and Instagram
● Microblogging. Sites that focus on short updates from the user with subscribers that
are able to receive these updates. Eg: Twitter and Plurk
● Blogs and forums. Sites that allow users to post content. Other users are able to
comment on the said topic. There are several free blogging platforms like Blogger,
WordPress, and Tumblr. On the other hand, forums are typically part of a certain website
or web service.
TIPS
● Be mindful of what you share online and what site you share it to
● Do not just accept terms and conditions; read it
● Check out the privacy policy page of a website to learn how the website handles the
information you share.
● Know the security features of the social networking site you use. By keeping your profile
private, search engines will not be able to scan your profile.
● Do not share your password with anyone
● Avoid logging in to public networks/WIFI. Browsing in “incognito (or private) mode” will
not protect you from hacker.
● Do not talk to strangers whether online or face-to-face.
● Never post anything about a future vacation. It is similar to posting, “rob my house at this
date”
● Add friends you know in real life
● Avoid visiting untrusted websites
● Install and update an antivirus software on your computer. Use only one antivirus
software to avoid conflicts
● If you have a WIFI at home, make it a private network by adding password
● Avoid downloading from untrusted websites
● Buy software and not use pirated ones
● Do not reply or click links from suspicious emails
Internet Threats
VIRUS
a malicious program that replicate itself and transfer from one computer to another either
through the Internet and local networks or data storage like flash drives and CDs
WORM
a malicious program that transfers form one computer to another by any type of means. Often it
uses a computer network to spread itself. (LOVE BUG WORM)
TROJAN
a malicious program that is disguised as a useful program but once downloaded or installed,
leaves your PC unprotected and allows hackers to get your information
Rogue security software – tricks the user into posing that it is a security software. It asks the
user to pay to improve his/her security but in reality they are not protected at all
SPYWARE
a program that runs in the background without your knowledge. Has the ability to monitor what
you are currently doing and typing through keylogging
ADWARE
a program designed to send you advertisements, mostly as pop-ups
SPAM
unwanted email mostly from bots or advertisers. It can be used to send malware
PHISHING
its goal is to acquire sensitive personal information like password and credit card details. This is
done by sending you an email that will direct the user to visit a website and be asked ti update
his/her username, password, credit card or personal information
Embarrassing moments are captured using any device and can be posted on the internet.
Considerations
Copyright Infringement
Not everything out there is free to use.
UNDERSTAND
copyright protects literary works, photographs, paintings, drawings, films, music (and lyrics),
choreography, and sculptures but does not generally does NOT protect underlying ideas and
facts.
BE RESPONSIBLE
even if a material does not say that it is copyrighted, it is not a valid defense against copyright.
BE CREATIVE
ask yourself whether what you are making is something that came from you or something made
from somebody else’s creativity.
Information that we need is more likely already in the Internet. It is just a matter of how to look.
Narrow it down
Use filters to determine the most appropriate result.
Advance Search
The best way to filter information is by using advance search.
Credible Source
Look for a credible source.
Give Credit
Name of person or organization. Title of the homepage in italics. URL. Date last seen
MICROSOFT WORD
a word processor developed by Microsoft. It was first released on October 25, 1983.
Mail Merge
One important reasons in using a computer is its ability to do recurring tasks automatically.
This ability has to be honed by learning the characteristics and features of the software you use
with your computer.
What is it?
allows you to create documents and combine or merge them with another document of data file.
commonly used when sending out advertising materials to various recipients.
it allows data to be created from within the application itself or it gets data from a file created in
Excel or Access and import them in Word during the process.
Requirements
Components
Form Document
the document that contains the main body of the message we want to convey or send. the main
body of the message is the part of the form document that remains the same no matter whom
you send it to from among your list.
place holders (data fields or merge fields) - marks the position on your form document where
individual data or information will be inserted. Denoted by the text with double-headed arrows
(<<>>) on each side.
Label Generation
included in the mail merge feature
you need to send out letters to its individual recipients in an enelope with the matching address
printed directly on the envelope or on a mailing label to stick on.
it creates a blank form document that simulates either a blank label or envelope of pre-defined
size and will use the data file that you selected to print the information, typically individual
addresses.
Image Placement
Inserting an image or any other material in your document is quite easy especially if the material
already exists in your local storage device.
Square
Setting allows the image you inserted to be placed anywhere within the paragraph with the text
going around the image in a square pattern like a frame
Tight
almost the same as the Square setting, but here the text "hugs" or conforms to the general
shape of the image.
allows to get a more creative effect on your document. this setting can mostly be achieved if you
are using an image that supports transparency
Through
this setting allows the text on your document to flow even tighter, taking the contours and shape
of the image.
Behind Text
allows your image to be dragged and placed anywhere on your document but with all the texts
floating in front of it.
In Front of Text
this settings allows your image to be placed right on the top of the text as if your image was
dropped right on it;
Online search is the process of interactively searching for and retrieving requested information
via a computer from databases that are online. Interactive searches became possible in the
1980s with the advent of faster databases and smart terminals.
Advantages
DIsAdvantages
Kinds of Materials
1. Pictures
generally, these are electronic or digital pictures or photographs you have saved in any local
storage device.
● .JPG
pronounced as "jay-peg" and is the short form for .jpeg of Joint Photographic Experts
Group.uses and makes it more compatible and portable through the Internet this type of
image file can support 16.7 million colors that is why it is suitable for use when working
with full color photographic images
the best quality image to integrate with your document does not work well on lettering,
line drawings, or simple graphics relatively small in size
● .GIF
this stands for Graphics Interchange Format. This type of image file is capable of
displaying transparencies.
it is good for blending with other materials or elements it is capable of displaying simple
animation it can support up to 256 colors so it is good mostly in logos and art decors with
very limited, and generally solid colors.GIF is much better for logos, drawings, small
texts, black and white images, or low- resolution files
● .PNG
this is pronounced as "ping". It stands for Portable Network Graphics. was basically for
the purpose of transporting images on the internet at faster rates it does not support
animation but it can display up to about 16 million colors it allows the control of the
transparency level or opacity of images
2. Clip Art
this is generally a .GIF type; line art drawing or images used as generic representation for ideas
and objects that you might want to integrate in your document.
3. Shapes
printable objects or materials that you integrate in your documents to enhance its appearance or
to allow you to have some tools to use for composing and representing ideas or messages.
if you are designing the layout for a poster or other graphic materials for advertising, you might
find this useful.
4. Smart Art
predefined sets of different shapes grouped together to form ideas that are organizational or
structural in nature.
if you want to graphically represent an organization , process, relationships, or flow for
infographic documents, then you will find this easy and handy to use.
5. Chart
quite useful when you are preparing reports that correlate and present data in a graphical
manner.
you can create charts that can be integrated in your document either directly in Microsoft Word
or imported from external files like Microsoft Excel.
6. Screenshot
sometimes, creating reports or manuals for training or procedures will require the integration of
a more realistic image of what you are discussing on your report or manual.
nothing can get you a more realistic image than a screenshot.
Square
this setting allows the image you inserted to be placed anywhere within the paragraph with the
text going around the image in a square pattern like a frame.
Tight
this is almost the same the Square setting, but here the text "hugs" or conforms to the general
shape of the image.
Through
this setting allows the text on your document to flow even tighter, taking the contours and shape
of the image.
Behind Text
this allow your image to be dragged and placed anywhere on your document but with all the
texts floating in front of it. It effectively makes your image look like a background.
In Front of Text
this setting allows your image to be placed right on top of the text as if your image was dropped
right on it. Text will be covered by the image.
…
Online Platform
are technologies that are grouped to be used as a base upon which other applications
processes or technologies are developed.
Presentation/Visualization
communicates information clearly and efficiently via statistical graphics, plots and information
graphics.
ex.
Cloud Computing
the practice of using a network of remote servers hosted on the internet to store, manage, and
process data, rather than a local server or a personal computer.
ex.
● Google Drive – keep all work in one secure place with online file storage
● Dropbox – keeps your files safe, synced, and easy to share
Social Media
are computer-mediated tools that allow people, companies and other organizations to create,
share, or exchange information, career interests, ideas, and pictures/videos in virtual
communities and networks.
ex.
● Twitter – online social networking service that enables users to send and read short 140-
character messages called “tweets”
● Facebook – is for-profit corporation and online social networking service
● Tumblr – a micro-blogging platform and social networking website
Web Page Creation
encompasses a number of important elements including color, layout, and overall graphical
appearance.
ex.
● Wix – a cloud-based web development platform that allows users to create HTML5
websites and mobile sites through the use of their online drag and drop tools
● Weebly – a web-hosting service featuring a drag- and-drop website builder
File Management
is the storing, naming, sorting and handling computer files.
ex.
Mapping
a transformation taking the points of one space into the points of the same or another space.
ex.