Sei sulla pagina 1di 6

Lesson 1: Introduction to Information and Communication Web 2.

0 Features web-based application that allows the user to create


Technologies and edit word processing and spreadsheet
1. Folksonomy documents online. When you need a software, like a
Information and Communication Technologies (ICT) Word Processor, you can purchase it for a one-time
 allows users to categorize and classify/arrange
 deals with the use of different communication information using freely chosen keywords (e.g., huge amount and install it in your computer and it is
technologies such as mobile phones, telephone, Internet, tagging). yours forever.
etc. to locate, save, send and edit information.  Hashtag - popular social networking sites such as  Software as a service allows you to “rent” a software
Twitter, Instagram, Facebook, etc. use tags that start for a minimal fee.
ICT in the Philippines with the pound sign (#). 6. Mass Participation
• “ICT Hub of Asia” 2. Rich User Experience  It is a diverse information sharing through universal
• 106.8 cellphones per 100 Filipinos in the year 2012 web access since most users can use the Internet
 Content is dynamic and is responsive to user’s input.
 An example would be a website that shows local  Since most users can use the Internet, Web 2.0’s
• ICT Industry shares 19.3% of the total employment
content content is based on people from various cultures.
population in 2010.
 In the case of social networking sites, when logged
• “The Selfiest Cities around the World” of 2013 on, your account is used to modify what you see in Web 3.0: Semantic Web Pages
their website
 a movement led by the World Wide Web Consortium
Web 1.0: Static Web Pages 3. Long Tail (W3C).
 Services are offered on demand rather than on a  The W3C standard encourages web developers to
 Static (flat page or stationary page) in the sense that
one-time purchase. include semantic content in their web pages.
the page is “as is” and cannot be manipulated by the
 In certain cases, time-based pricing is better than file-  Aim: to have machines (or servers) understand the user’s
user.
size-based pricing or vice versa. preferences to be able to deliver web content
 The content is also the same for all users.
 This is synonymous to subscribing to a data plan that specifically targeting the user.
charges you for the amount of time you spent in the  Like searching for movies and food faster and easier and
Internet, or a data plan that charges you for the it act as a personal assistance
WEB 2.0: Dynamic Web Pages  Can easily be processed by machines instead of human
amount of bandwidth you used.
operators.
 the evolution of Web 1.0 by adding dynamic web
4. User Participation  Ex. Virtual Assistant – Siri,
pages—the user is able to see a website differently than
Google Assistant/ Search
others.  The owner of the website is not the only one who is Online Shop’s Display search result
 Examples: social networking sites, blogs, wikis, video able to put content.
sharing sites, hosted services, and web applications.  Others are able to place a content of their own by
means of comment, reviews, and evaluation. Several problems of Web 3.0:
 Some websites allow readers to comment on an 1. Compatibility
article, participate in a poll, or review a specific  HTML files and current web browsers could not
 allows users to interact with the page: instead of just
product support Web 3.0.
reading a page, the user may be able to comment or
 Ex. Amazon, online stores 2. Security
create a user account  The user’s security is also in question since the
 also allows users to use web browsers instead of just machine is saving his or her preferences.
5. Software as a Service
using their operating system. Browsers can now be used 3. Vastness
for their user interface, application software (or web  Users will subscribe to a software only when needed  The World Wide Web already contains billions of
applications), and even for file storage. rather than purchasing them. web pages.
 Most websites that we visit today are Web 2.0.  This is a cheaper option if you do not always need to 4. Vagueness
use a software. For instance, Google Docs is a free
 Certain words are imprecise. The words “old” and f. Blogs and Forums  document that contains the main body of
“small” would depend on the user. the message we want to convey or send
5. Logic  These websites allow users to post their content.  also included here is what we call place
 Since machines use logic, there are certain  Ex. WordPress, Tumblr, Blogger, Blogspot, Jimdo holders, also referred to as data fields or
limitations for a computer to be able to predict merge fields
what the user is referring to at a given time. 3. Mobile Technologies  this marks the position on your form
document where individual data or
 The popularity of smartphones and tablets has taken a
Trends in ICT information will be inserted
major rise over the years.
1. Convergence  This is largely because of the devices’ capability to do
 the synergy of technological advancements to work tasks that were originally found in personal computers.
on a similar goal or task.
Kinds of operating systems:
2. Social Media a. iOS – used in Apple devices such as the iPhone
and iPad
 a website, application, or online channels that enable b. Android – an open source operating system
web users to create, co-create, discuss, modify, and developed by Google. Being open source
exchange user-generated content. means several mobile phone companies use
this OS for free. 2. List or Data File
Six types of social media: c. Blackberry OS – used in Blackberry devices  This is where the individual information or
d. Windows Phone OS – a closed source and data that needs to be plugged in (merged)
a. Social Networks proprietary operating system developed by to our form document is placed and
Microsoft maintained.
 These are sites that allow you to connect with other
e. Symbian – the original smartphone OS; used by
people with the same interests or background. Nokia devices
 Ex. Facebook, Google, Friendster f. WebOS – originally used by smartphones; now
used for smart TVs
b. Bookmarking Sites.
g. Windows Mobile – developed by Microsoft for
 These are sites that allow you to store and manage smartphones and pocket PCs
links to various websites and resources. 4. Assistive Media
 Ex. StumbleUpon, Pinterest  a nonprofit service designed to help people who have
c. Social News. visual and reading impairments.
 A database of audio recordings is used to read to the
Label Generation
 These are sites that allow users to post their own user.  Creates a blank form document that simulates
news items or links to other news sources. either a blank label or envelope of pre-defined
 Ex. Reddit, Digg size and will use the data file that you selected
LESSON 2: ADVANCED WORD PROCESSING SKILLS
to print the information, typically, individual
d. Media Sharing addresses.
Mail Merge
 These are sites that allow you to upload and share  allows you to create documents and combine or
media content like images, music, and video. merge them with another document or data file Integrating images and external materials
 Ex. Flickr, Youtube, Spotify, Soundcloud  It is used to create multiple documents at once.
 These documents have identical layout, formatting, Kinds of Materials:
e. Microblogging text, and graphics. Only specific sections of each 1. Pictures – electronic or digital pictures or photographs
document varies and is personalized. you have saved in any local storage device
 These are sites that focus on short updates from the  .JPG – short term for .jpeg or Joint Photographic
user. 2 Components of Mail Merge: Experts Group; identifies data compression for the
 Ex. Twitter, Plurk 1. Form Document internet; 16.7 million colors; isn’t transparent; best
quality; doesn’t work well on lettering, line drawings  Template – a document that contains the  Page Layout Tab – refers to the arrangement of text,
or simple graphics; small file size formatting necessary for a specific document type images, and other objects on a page
 .GIF – Graphics Interchange Format; displays  Thesaurus – provides synonyms for a word in a  Page Sizes: Short (Letter) – 8.5” by 11”, Long
transparencies; 256 colors; simple animation; logos, document (Folio) – 8.5” by 13”, A4 - 8.27” by 11.69"
drawings, small text, black and white images, or  Tables – organize information into rows and columns  Page Orientation: Portrait, Landscape
low-resolution files  Mail Merge – a feature that allows you to create a  Image Placement:
 .PNG – “ping”; Portable Network Graphics; document and merge them with another  In Line with Text – default setting for images
transparencies; 16 million colors; doesn’t support document or data file that are inserted or integrated in a
animation; allows control of transparency level or  Text Wrap – adjusts how the image behaves around document.
opacity other objects or text  Square – allows the image you inserted to
2. Clip Art – a .GIF type; line art drawings or images used be placed anywhere within the paragraph
as generic representation for ideas and objects  Keyboard Shortcuts in Word Processing Software: with the text going around the image in a
3. Shapes – printable objects or materials that you can  Ctrl + A – Select All square pattern like a frame.
integrate in your document to enhance its appearance  Ctrl + B – Bold Text  Tight – almost the same as the square
or to allow you to have some tools to use for composing  Ctrl + C – Copy Text setting, but here the text “hugs” to the
and representing ideas or messages  Ctrl + D – Show Font Dialog Box general shape of the image.
4. Smart Art – predefined sets of different shapes grouped  Ctrl + E – Align Text to Center  Through – allows the text on your document
together to form ideas that are organizational or  Ctrl + F – Display Find Dialog Box to flow even tighter, taking the contour and
structural in nature  Ctrl + G – Display Go To Dialog Box shape of the image
5. Chart – allows you to represent data characteristics and  Ctrl + H – Display Replace Dialog Box  Top and Bottom – pushes the text away
trends  Ctrl + I - Italicize Text vertically to the top and/or the bottom of
6. Screenshot – Sometimes, creating reports or manuals for  Ctrl + J – Justify Text the image so that the image occupies a
training or procedure will require the integration of a  Ctrl + K – Create a hyperlink whole text line on its own.
more realistic image of what you are discussing on your  Ctrl + L – Align Text to Left  Behind Text – allows your image to be
report or manual  Ctrl + M – Tab dragged and placed anywhere on your
 Ctrl + N – Create a new document document but with all text floating in front
Word Processor  Ctrl + O – Open a document of it.
 is an electronic device or computer software  Ctrl + P – Display Print dialog box In Front of Text – allows your image to be placed right on top
application that performs the task of composing,  Ctrl + R – Align Text to Right of the text as if your image was dropped right on it.
editing, formatting, and printing of documents  Ctrl + S – Save a document
 Examples: OpenOffice Writer, LibreOffice Writer,  Ctrl + U – Underline Text LESSON 3: ADVANCED SPREADSHEET SKILLS
Polaris Office, Kingsoft Writer, Wordperfect,  Ctrl + V – Paste a copied text
Wordpad, Microsoft Word  Ctrl + X – Cut a selected Text Microsoft Excel
 Ctrl + Y – Redo the last undone action  provides an automated way of displaying any
Microsoft Word  Ctrl + Z – Undo the last action statistical data
 is a word processor developed by Microsoft  It can be used to automatically compute for several
 It was first released on October 25, 1983  Customizing a Word Document factors that are not easy to notice especially when
 It is also known as MS Word. faced by a large data
 Press “Windows Logo” + R then type “winword” then  Microsoft Excel includes several arithmetic and
enter.  Home Tab – allows you to change document basic functions that help you compute faster.
 Features of MS Word: settings, such as the font properties, adding bullets
 AutoCorrect – corrects common spelling errors as or a numbered list, adjusting styles, and other Basic Excel Formulas:
well as capitalization mistakes common features (Text Alignment: Left, Right, Addition (+)
 AutoFormat – applies formatting to text, e.g. Center, Justified) Subtraction (-)
number listing, bullet, hyperlinks  Insert Tab – is used to insert different features such as Multiplication (*)
 Grammar Checker – proofreads documents for tables, pictures, clip art, shapes, charts, page Division (/)
grammar, writing style, sentence structure errors and numbers, word art, headers, and footers into a
reading statistics document. *type <=> before the formula, thus: =a1+a2 <then, hit the
ENTER key>
COUNTIF FUNCTION 10. Use your Noggin
 A function to count cells that meet a single criteria. • Use you COMMON SENSE while surfing the web
 It can be used to count cells with dates, numbers,
and text that match specific criteria. LESSON 5: RULES OF NETIQUETTE Internet threats
 Supports logical operators and wildcard for partial 1. Malware
matching Netiquette  malicious software
Syntax:  network etiquette, the do’s and don’ts of online  set of instructions that run on your computer and
=COUNTIF(range, criteria) communication make your system do something that an attacker
wants it to do
COUNTIFS FUNCTION What is ONLINE SAFETY?  good for stealing personal information, deleting files,
 A function to count cells that meet a multiple  Is the knowledge of maximizing the user’s clicking fraud, stealing software serial numbers and
criteria. personal safety and security risk to private using your computer as relay
 It can be used to count cells with dates, numbers, information, and the self – protection from  kinds of malware:
and text that match specific criteria. computer crime in general.  Virus
 Supports logical operators and wildcard for partial  malicious program designed to replicate
matching 10 Internet Safety Tips: itself and transfer from one computer to
Syntax: 1. Know the Scams another either through the internet and
=COUNTIFS (range1, criteria1, [range2], [criteria2], ...) • Learn about the different kinds of scams and local networks or data storage like flash
what you can do to avoid them. drives and CDs
2. Think Before you Click  a computer virus is a piece of malicious
SUMIF FUNCTION
• Think twice, thrice and a zillion times before you computer code that attaches itself to a
 It returns the sum of cells that meet a single criteria.
click any links or buttons software program, email or computer file
 Criteria can be applied to dates, numbers, and text
3. Safety Peruse without your permission
using logical operators and wildcard for partial
• These sites may have an address that’s very similar  can transfer through the internet and local
matching.
to a legitimate site, but the page can have networks or data storage like flash drives
Syntax:
misspellings, bad grammar or low resolution and CD’s
=SUMIF(range, criteria, sum_range)
image.  Worm
4. Shop Safely  A malicious program that transfers from one
SUMIFS FUNCTION
• Don’t shop on a site unless it has the “https” and a computer to another by any type of means
 It returns the sum of cells that meet multiple criteria.
padlock icon to the left or right of the URL.  uses computer network to spread itself
 Criteria can be applied to dates, numbers, and text
5. Kick-butt Passwords  Example: ILOVEYOU worm, Love Bug Worm
using logical operators and wildcard for partial
• Use an extremely uncrackable one like created by Filipino
matching.
“9&4iw2pyqx#”  Trojan
Syntax:
6. Protect your Info. Keep your Guard Up  A malicious program that is disguised as a
=SUMIFS(sum_range, range1, criteria1, [range2],[criteria2]…)
• Backup all of your data on your computer, useful program but once downloaded or
smartphone or tablet, theft or a cash. installed, leaves your PC unprotected and
IF FUNCTION
7. Watch your WiFi Connectivity allows hackers to get your information
 perform a logical test and return one value
• Protect your network by changing your router’s  Rogue security software – tricks the user
for a TRUE result, and another for a FALSE
settings and make sure that you have the into posting that it is a security software. It
result.
connection password-protected, asks the user to pay to improve his/her
Syntax:
8. Install a Firewall security but in reality they are not protected
=IF (logical_test, [value_if_true], [value_if_false])
• A firewall is a great line of defense against cyber- at all
attacks. (Both Trojan and Worm spread to other computers.)
Example:
9. Keep Up To Date
• The best security updates automatically to  Spyware
protect your computer.  program that runs in the background
• Use the manufacturer’s latest security patches to without you knowing it
make regular updates and make that you have
the software set to do routine scans.
 has the ability to monitor what you are • Search engines like Google, Bing, or Yahoo use o Asymmetrical (un-evenly balance)
currently doing and typing through several filters to determine the most appropriate
keylogging result for you.
 Keyloggers – used to record the keystroke
done by the user. This is done to steal their Boolean Operators
password or any other sensitive information. 1. AND – 2 concepts together
It can also record email, messages or any 2. OR – 1 concept or another
information you type using your keyboard 3. NOT – filters out concept you don’t need
 Adware 2. Contrast
 program designed to send your Asterisk/Star symbol • The elements are opposing one another
advertisement, mostly as pop-ups  Using that star symbol to find different forms of Example:
the same word.  Big against small
2. Spam – transmission of unsolicited messages from  (e.g. Teen* , Canad*)  Light against dark
various origins using electric messaging systems;
unwanted email mostly from bots or advertisers Quotation Marks 3. Emphasis
3. Phishing  Group words together in your search. • Is used to make certain parts of their artwork stand
 software or a program used by an attacker to out to grab your attention.
obtain personal information 3. Advanced Search
 targets the passwords to hack and take control of a • This will allow you to filter out information you do
user account not need.
 goal is to acquire sensitive personal information like 4. Look for a credible source
passwords and credit card details 5. Give Credit
Name of the person or organization (the author of
 Pharming the information). Title of the home page in italics.
 more complicated way of phishing where it URL. Date last seen. 4. Proportion
exploits the DNS (Domain Name Service) system • Describe the size, location or amount of one thing
LESSON 6: IMAGING AND DESIGN FOR ONLINE ENVIRONMENT compared to another.
Copyright Infringement
- It describes the unauthorized use of copyrighted Online Image File Format
material, such as text, photos, videos, music,
software, and other original content.
- In the computer industry, copyright violations often
refer to software and websites
Fair Use 5. Pattern
- A legal concept that allows the reproduction of • Is created by repeating an element (line, shape, or
copyrighted material for certain purposes without color) over and over again.
obtaining permission and without paying a fee or
royalty.

Online Research
• a research method that involves the collection of Principles of Design and Layout 6. Rhythm
information from the internet.  Suggest pleasing ways of arranging the elements of • Rhythm is like pattern
Tips in Conducting Online Research: design on a page/canvass. • Is the same elements in a pattern vary in size or
1. Have a question in mind. 1. Balance direction.
• Focus on a question you want answered. If it is a • Balance is a feeling of visual equality in shape,
series of questions, start with one. form, value, color, etc.
2. Narrow it down • Balance can be:
o Symmetrical (evenly balanced)
7. Gradation
• Gradation of size and direction produce linear
perspective
• Gradation from dark to light will cause the eye to
move along the shape

8. Variety
• Elements are different in size, color, and shape

INFOGRAPHICS
 Information graphics or infographics are used to
represent information, statistical data, or knowledge
in a graphical manner usually done in a creative
way to attract the viewer’s attention.
 Is basically an artistic representation of data and
information using different elements such as:
 Graphs  Pictures
 Diagrams  Timelines
 Checklist  Narrative
 ATBP

Potrebbero piacerti anche