Sei sulla pagina 1di 18

LESSON 1: INTRODUCTION TO ICT

ICT– Information and Communication-


 It deals with the use of different communication technologies such as mobile phones,
telephone, Internet to locate, save, send and edit information
 Is a study of computers as data processing tools. It introduces students to the fundamental
of using computer systems in an internet environment.

ICT in the Philippines


 Philippines is dub as the ‘’ICT Hub of Asia” because of huge growth of ICT-related jobs,
one of which is BPO, Business Process Outsourcing, or call centers.
 ICT Department in the Philippines is responsible for the planning, development and
promotion of the country’s information and communications technology (ICT) agenda in
support of national development.

Computer– an electronic device for storing and processing data, typically in binary form,
according to instructions given to it in a variable program.

Internet– is the global system of interconnected computer networks that use the internet
protocol suite (TCIP/IP) to link billions of devices worldwide.
 Means of connecting a computer to any other computer anywhere in the world via
dedicated routers and servers.
 Sometimes called simply ‘’the Net’’, is a worldwide system of computer networks- a
network of networks in which the users at any one computer can get information from
any other computer.

World Wide
 An information system on the internet that
allows documents to be connected to other documents by hypertext links, enabling the
user to search for information by moving from one document to another.
 Is an information space where documents and other web resources are identified by
URLs, interlinked by hypertext links, and can be accessed via the Internet.
 Invented by Tim-Berners Lee

Web Pages
 Web page is a hypertext document connected to the World Wide Web. It is a document
that is suitable for the World Wide Web.

The different online platforms of World Wide Web:


1. Web 1.0 – refers to the first stage in the World Wide Web, which was entirely made up of the
Web pages connected by hyperlinks.

2. Web 2.0 – is the evolution of Web 1.0 by adding dynamic pages. The user is able to see a
website differently than others.
o Allows users to interact with the page; instead of just reading the page, the user may be
able to comment or create user account.

3. Web 3.0 – this platform is all about semantic web.


o Aims to have machines (or servers) understand the user’s preferences to be able to deliver
web content.

Static Web Page- is known as a flat page or stationary age in the sense that the page is ‘’as is’’
and cannot be manipulated by the user. The content is also the same for all users that is referred
to as Web 1.0

Dynamic Web Pages– web 2.0 is the evolution of web 1.0 by adding dynamic web pages. The
user is able to see website differently than others e.g. social networking sites, wikis, video
sharing sites.

FEATURES OF WEB 2.0


1. Folksonomy- allows user to categorize and classify information using freely chosen keywords
e.g. tagging by FB, Twitter, use tags that start with the sign #, referred to as hashtag.

2. Rich User Experience – content is dynamic and is responsive to user’s input

3. User Participation- The owner of the website is not the only one who is able to put content.
Others are able to place a content of their own by means of comments, reviews and evaluation
e.g. Lazada, Amazon.

4. Long Tail– services that are offered on demand rather than on a one-time purchase. This is
synonymous to subscribing to a data plan that charges you for the amount of time you spent in
the internet.

5. Software as a service - users will be subscribe to a software only when needed rather than
purchasing them e.g. Google docs used to create and edit word processing and spread sheet.

6. Mass Participation– diverse information sharing through universal web access. Web 2.0’s
content is based on people from various cultures.

TRENDS IN ICT
1) Convergence– is the synergy of technological advancements to work on a similar goal or
task. For example, besides using your personal computer to create word documents, you
can now use your smartphone.

2) Social Media– is a website, application, or online channel that enables web users to
create, co-create, discuss modify, and exchange user generated content.

Six Types of Social Media:

a) Social Networks – These are sites that allows you to connect with other people with the
same interests or background. Once the user creates his/her
account, he/she can set up a profile, add people, share content,
etc

Example: Facebook and Google+

b) Bookmarking Sites – Sites that allow you to store and


manage links to various website and resources. Most of the sites
allow you to create a tag to others.

Ex. Stumble Upon, Pinterest


c) Social News – Sites that allow users to post their own news items or links to other news
sources. The users can also comment on the post and comments
may also be rank.

Ex. Reddit and Digg

d) Media Sharing – sites that allow you to upload and share media
content like images, music and video.

Ex. Flickr, YouTube and Instagram

e) Microblogging – focus on short updates from the user. Those that


subscribed to the user will be able to receive these updates.

Ex. Twitter and Plurk

f) Blogs and Forums – allow user to post their content. Other users are
able to comment on the said topic.

Ex. Blogger, WordPress and Tumblr

3. Mobile Technologies– The popularity of smartphones and tablets has taken


a major rise over the years. This is largely because of the devices capability to do the tasks that
were originally found in PCs. Several of these devices are capable of using a high-speed internet.
Today the latest model devices use 4G Networking (LTE), which is currently the fastest.

MOBILE OS
o iOS – use in apple devices such
as iPhone and iPad
o Android – an open source OS developed by Google. Being open source means mobile
phone companies use this OS for free.
o Blackberry OS – use in blackberry devices
o Windows phone OS – A closed source and proprietary operating system developed by
Microsoft.
o Symbian – the original smartphone OS. Used by Nokia devices
o WebOS- originally used in smartphone; now in smart TVs.
o Windows Mobile – developed by Microsoft for smartphones and pocket PCs
4. Assistive Media– is a non- profit service designed to help people who have visual and reading
impairments. A database of audio recordings is used to read to the user.

5. e.g. Yahoo!, Gmail, Hotmail Cloud computing -


distributed computing on internet or delivery of computing
service over the internet.
 Instead of running an e-mail program on your computer,
you log in to a Web e-mail account remotely. The
software and storage for your account doesn’t exist on
your computer – it’s on the service’s computer cloud.

It has three components


1) Client computers – clients are the device that the end user interacts with cloud.
2) Distributed Servers – Often servers are in geographically different places, but server
acts as if they are working next to each other.
3) Datacenters – It is collection of servers where application is placed and is accessed via
Internet.

TYPES OF CLOUDS

o PUBLIC CLOUD allows systems and services to be easily accessible to the general
public. Public cloud may be less secured because of its openness, e.g. e-mail.

o PRIVATE CLOUD allows systems and services to be accessible within an organization.


It offers increased security because of its private nature.

o COMMUNITY CLOUD allows systems and services to be accessible by group of


organizations.

o HYBRID CLOUD is a mixture of public and private cloud. However, the critical
activities are performed using private cloud while the non-critical activities are performed
using public cloud.
LESSON 2: ONLINE SAFETY, SECURITY
AND RULES OF NETIQUETTE

INTERNET SAFETY- it refers to the online security or safety of people and their information
when using internet.

NETIQUETTE- is network etiquette, the do’s and don’ts of online communication.

TEN RULES OF NETIQUETTE


Rule No. 1: Remember the human
 You need to remember that you are talking to a real person when you are online.
 The internet brings people together who would otherwise never meet.
 Remember this saying when sending an email: Would I say this to the person’s face.

Rule No. 2: Adhere to the same standards online that you follow in real life.
 You need to behave the same way online that you do in real life.
 You need to remember that you can get caught doing things you should not be doing
online just like you can in real life.
 You are still talking to a real person with feelings even though you can’t see them.

Rule no. 3: Know where you are in cyberspace.


 Always take a look around when you enter a new domain when surfing the web.
 Get a sense of what the discussion group is about before you join it.

Rule no. 4: Respect another people’s time and bandwidth.


 Remember people have other things to do besides read your email. You are not the center
of their world.
 Keep your post and emails to minimum by saying what you want to say.
 Remember everyone won’t answer your questions.

Rule no. 5: Make yourself look good online.


 Be polite and pleasant to everyone.
 Always check your spelling and grammar before posting.
 Know what you are talking about and make sense saying it.

Rule no. 6: Share expert knowledge


 Ask questions online
 Share what you know online.
 Post the answers to your questions online because someone may have the same question
you do.

Rule no. 7: Help keep flame wars under control


 Netiquette does not forgive flaming.
 Netiquette does however forbid people who are flaming to hurt discussion groups by
putting the group down.

Rule no. 8: Respect other people’s privacy.


 Do not read other people’s mail without their permission.
 Going through other people’s things could cost you, your job or you could even go to jail.
 Not respecting other people’s privacy is a bad netiquette.

Rule no. 9: Don’t abuse your power.


 Do not take advantage of other people just because you have more knowledge or power
than them.
 Treat others as you would want them to treat you if the roles were reversed.

Rule no. 10: Be forgiving of other people’s mistake.


 Do not point out mistakes to people online.
 Remember that you were once the new kid on the block.
 You still need to have a good manner even though you are online and cannot see the
person face to face.

Internet Security
Security Requirement Triad
o Confidentiality
 Data Confidentiality Privacy
o Integrity
 Data Integrity
 System Integrity
o Availability

Threat Consequence Threat Action (Attack)


Intrusion: Exposure: Sensitive data are directly released to an
an unauthorized entity gains access unauthorized entity.
to sensitive data by circumventing a
system's security protections. Interception: An unauthorized entity directly accesses
sensitive data traveling between authorized sources and
destinations.

Inference: A threat action whereby an


unauthorized entity indirectly accesses sensitive data by
reasoning from characteristics or byproducts of
communications.

Intrusion: an unauthorized entity gains access to sensitive data


by circumventing a system's security protections.
Disruption Incapacitation: prevents or interrupts system operation by
A circumstance or even that disabling a system component.
interrupts or prevents the correct
operation of system services and Corruption: Undesirably alters system operation by adversely
functions. modifying system functions or data.

Deception Obstruction: A threat action that interrupts delivery of system


A circumstance or event that may services by hindering system operation.
result in an authorized entity
receiving false data and believing it Masquerade: An unauthorized entity gains access to a system
to be true. or performs a malicious act by posing as an authorized entity.

Falsification: False data deceive an authorized entity.

Repudiation: An entity deceives another by falsely denying


responsibility for an act.
Usurpation Misappropriation: An entity assumes unauthorized logical or
A circumstances or event that results physical control of a system resource.
in control of system services or
functions by an unauthorized entity. Misuse: Causes a system component to perform a function or
service that is detrimental to system security.

Types of System Intruders


o Masquerader
o Hackers
o Clandestine user

Parts of Virus
o Infection mechanism
o Trigger
o Payload

Virus stages
o Dormant phase
 Virus is idle.

o Propagation phase
 Virus places an identical copy of itself into other programs or into certain system
areas on the disk.

o Triggering phase
 Virus is activated to perform the function for which it was intended. Caused by a
variety of system events.

o Execution phase
 Function is performed
Key Terms

Cyber crime - a crime committed or assisted through the use of the Internet.
Privacy Policy/Terms of Services (ToS) - tells the user how the website will handle its data.
Malware - stands for malicious software.
Virus - a malicious program designed to transfer from one computer to another in any means possible.
Worms - a malicious program designed to replicate itself and transfer from one file folder to another and
also transfer to other computers.
Trojan -a malicious program designed that is disguised as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hacker to get your information.
Spyware - a program that runs in the background without you knowing it. It has the ability to monitor
what you are currently doing and typing through key logging.
Adware - a program designed to send you advertisement, mostly pop-ups.
Spam - unwanted email mostly from bots or advertisers.
Phishing - acquires sensitive personal information like passwords and credits card details.
Pharming - a more complicated way of phishing where it exploits the DNS system.
Copyright - a part of law, wherein you have the rights to work, anyone who uses it w/o your consent is
punishable by law.
Fair Use - means that an intellectual property may be used w/o consent as long as it is
used in commentaries, criticism, parodies, research and etc.
Keyloggers - used to record the keystrokes done by user. This is done to steal passwords
or any other sensitive information.
Rogue security software- is a form of malicious software and internet fraud that
misleads users into believing there is a virus on their computer, and manipulates them into paying money
for a fake malware removal tool.

Four search strategies

o Keyword searching
Enter terms to search
Use quotation marks to search as a phrase and keep the words linked together
Common words are ignored (That, to, which, a, the ...)
+ and – can be used to include or exclude a word

o Boolean

AND - enter words connect with AND- it will include sites where both words and found
Uses: joining different topics (i.e. global warming AND California)

OR - requires at least one of the terms is found.


Uses: join similar or synonymous topics (i.e. global warming OR greenhouse effect)

NOT - searches for the first term and excludes sites that have the second term. (i.e. Washington
NOT school)

o Question
a question may be entered in the search field of search engine

o Advanced
Features are offered on many engines by going to an "Advanced search" page and making
selections. Effective in narrowing search returns to a specific topic or phrase.

LESSON 3: Advanced Word Processing Skills


Lesson Discussion
In the professional world, sending out information to convey important information is vital.
Because of ICT, things are now sent much faster than the traditional newsletters or postal mail.
You can now send much faster than the traditional newsletters or postal mail. You can now use
the Internet to send out information you need to share. What if we could still do things much
faster – an automated way of creating and sending uniform letters with different recipients?
Would that not be more convenient?

I. Mail Merge and Label Generation

One of the important reasons in using computers per se is its ability to do recurring tasks
automatically. But this ability has to be honed by learning the characteristics and features of the
software you use with your
computer. After all, no matter
how good or advance your
computer and software may be, it
can only be as good as the person
using it.

In this particular part of


our lesson, we will learn one of
the most powerful and
commonly used features of
Microsoft Word called Mail
Merge. As the name suggests,
this feature allows you to create
documents and combine or
merge them with another
document or data file. It is
commonly used when sending
out advertising materials to
various recipients.

The simplest solution for


the scenario above is to create a
document and just copy and
paste it several times then just
replace the details depending on
whom you send it to. But what if you have hundreds or thousands of recipients? Would not that
take too many hours? What if you have a small database of information where you can
automatically generate those letters?

Two Components of Mail Merge

1. Form Document

The first component of our mail merged document is the form document. It is generally
the document that contains the main body of the message we want to convey or send. The main
body of the message is the part of the form document that remains the same no matter whom you
send it to from among your list.

Also included in the form document is what we call place holders, also referred to as data
fields or merge fields. This marks the position on your form document where individual data or
information will be inserted. From our sample document, the place holders are denoted or
marked by the text with double-headed arrows (<< >>) on each side and with a gray background.
On a printed standard form, this will be the underlined spaces that you will see and use as a guide
to where you need to write the information that you need to fill out. In its simplest form, a form
document is literally a “form” that you fill out with individual information. A common example
of a form document is your regular tax form or application form.

2. List or Data File

The second component of our mail merged document is the list or data file. This is where
the individual information or data that needs to be plugged in (merged) to the form document is
placed and maintained. One of the best things about the mail merge feature is that it allows data
file to be created from within the Microsoft Word application itself, or it gets data from a file
created in Microsoft Excel or other data formats. In this way, fields that needed to be filled up on
the form document can easily be maintained without accidentally altering the form or main
document. You can also easily add, remove, modify, or extract your data more efficiently by
using other data management applications like Excel or Access and import them in Word during
the mail merge process.

B. Label Generation

Included in the mail merge


feature on Microsoft Word is the
Label Generator. It just makes sense
that after you print out your form
letters, you will need to send it to
individual recipients in an envelope
with the matching address printed
directly on the envelope or on a
mailing label to stick on. By using
virtually, the same process as a
standard mail merge, Microsoft
Word will print individual addresses
to a standard form that it has
already pre-formatted. Simply put,
it creates a blank form document
that simulates either a blank label or
envelope of pre-defined size and
will use the data file that you
selected to print the information,
typically individual addresses. So even in generating labels, the two essential components of
creating a merged document are present: the form document and the data file. Only in this case,
you did not have to type or create the form document yourself because it was already created and
pre-formatted in Microsoft Word. All you need to do is select the correct or appropriate size for
the label or envelope and select the data file that contains the addresses (data) to be printed. You
can also preview your merged labels before printing if you want to.

II. Integrating Images and External Materials

Integrating or inserting pictures in your document is fun and it improves the impression
of your document. A common use of inserting a picture on a document is when you are creating
your resume. Though seemingly simple to do, your knowledge on the different kinds of materials
that you can insert or integrate in a Word document and its characteristics can help you create a
more efficient, richer document not only in content but also in physical form. A better
understanding of the physical form of your document as well as the different materials you
would integrate in it would allow you to be more efficient and versatile in using Microsoft Word.

A. Kinds of Materials

There are various kinds of materials Microsoft Word is capable of integrating to make the
documents richer, more impressive, and more informative.

1. Pictures
Generally, these are electronic or digital pictures or photographs you have saved in any
local storage device. There are three commonly used types of picture files. You can identify
them by the extension on their file names.

a. .JPG/JPEG

This is pronounced as “jay-peg “and is the short form of .jpeg or Joint Photographic
Experts Group. Like all the rest of the image file extensions, it identifies the kind of data
compression process that it uses to make it more compatible and portable through the Internet.
This type of image file can support 16.7 million colors that is why it is suitable for use when
working with full color photographic images. Unfortunately, it does not support transparency and
therefore, images of this file type can be difficult to integrate in terms of blending with other
materials or elements in your document. But if you are looking for the best quality image to
integrate with your document then this is the image file type for you. .JPG does not work well on
lettering, line drawings, or simple graphics. .JPG images are relatively small in file size.

b. .GIF
This stands for Graphics Interchange
Format. This type of image file is capable of
displaying transparencies. Therefore, it is
good for blending with other materials or
elements in your document. It is also capable
of displaying simple animation. Apparently,
this may not be too useful on a printed
document but if you are sending documents
electronically or through email, or even post
documents into a website, then this could be
quite impressive. The downside is that it can
only support up to 256 colors so it is good
mostly on logos and art decors with very limited, and generally solid colors. .GIF is much better
for logos, drawings, small text, black and white images, or low-resolution files.

c. .PNG

This is pronounced as “ping“. It


stands for Portable Network Graphics. It
was built around the capabilities of .GIF. Its
development was basically for the purpose
of transporting images on the Internet at
faster rates. It is also good with
transparencies but unlike. GIFs, it does not
support animation but it can display up to
16 million colors, so image quality for this
image file type is also remarkably
improved. .PNG allows the control of the
transparency level or opacity of images.

2. Clip Art

This is generally a .GIF type; line


art drawings or images used as generic
representation for ideas and objects that
you might want to integrate in your
document. Microsoft Word has a library
of clip arts that is built in or can be
downloaded and used freely. There are
still other clip arts that you can either
purchase or freely download and use that
come from third-party providers.

3. Shapes

These are printable objects or


materials that you can integrate in
your document to enhance its
appearance or allow you to have
some tools to use for composing and
representing ideas or messages. If
you are designing the layout for a
poster or other graphic material for
advertising, you might find this
useful.
4. Smart Art

Generally, these are


predefined sets of different shapes
grouped together to form ideas that
are organizational or structural in
nature. If you want to graphically
represent an organization, process,
relationships, or flow for infographic
documents, then you will find this
easy and handy to use.

5. Chart
Another type of material that
you can integrate in your Word
document that allows you to represent
data characteristics and trends. This is
quite useful when you are preparing
reports that correlate and present data
in a graphical manner. You can create
charts that can be integrate in your
document either directly in Microsoft
Word or imported from external files
like Microsoft Excel.

6. Screenshot

Sometimes, creating reports or manuals for training or procedures will require the
integration of a more realistic image of what you are discussing on your report or manual.
Nothing can get you a more realistic image than a screenshot. Microsoft Word even provides a
snipping tool for your screen shots so you can select and display only the part that you exactly
like to capture on your screen.

III. Image Placement

A. In Line with Text


This is the default setting for images that are inserted or integrated in your document. It
treats your image like a text font with the bottom side totally aligned with the text line. This
setting is usually used when you need to place your image at the beginning of a paragraph. When
placed between texts in a paragraph or a sentence, it distorts the overall appearance and
arrangement of the texts in the paragraph because it will take up the space it needs vertically,
pushing whole lines of texts upward.

B. Square

This setting allows the image you inserted to be placed anywhere with the paragraph with
the text going around the image in a square pattern like frame.

C. Tight

This is almost the same as the Square setting, but here the text “hug” or conforms to the
general shape of the image. This allows you to get a more creative effect on your document. This
setting can mostly be achieved if you are using an image that supports transparency like a .GIF
or .PNG file.

D. Through

This setting allows the text on your document to flow even tighter taking the contours
and shape of the image. Again, this can be best used with .GIF or .PNG type of image.

E. Top and Bottom

This setting pushes the texts away vertically to the top and/or the bottom of the image so
that the image occupies a whole text line on its own.

F. Behind Text

This allows your image to be dragged and placed anywhere on your document but with
all the texts floating in front of it. It effectively makes your image look like a background.

G. In Front of Text

As it suggests, this setting allows your image to be placed right on top of the text as if
your image was dropped right on it. That means whatever part of the text you placed the image
on, it will be covered by the image.

IV. Key Terms

o Mail Merge – a feature that allows you to create documents and combine or merge them
with another document or data file.
o Form Document – the document that contains the main body of the message we want to
convey or send.
o Data File – includes the individual information or data or the recipient’s information.
o Merge Field/Place Holder – marks the position on your form document where
individual data or information will be inserted.
o .JPG – file extension for the Joint Photographic Experts Group picture file.
o .PNG – file extension for Portable Network Graphics image file.
o .GIF – file extension for the Graphics Interchange Format image file.
o Clipart – line art drawings or images used as a generic representation for ideas and
objects.
o Smart Art – predefined sets of different shapes grouped together to form ideas that are
organizational or structural in nature.
o Text Wrap – adjusts how the image behaves around other objects or text.

LESSON 4: Advanced Spreadsheet Skills


What is Spreadsheet Software?
 allows users to organize data in rows and columns and perform calculations on
the data
 These rows and columns collectively are called worksheet.

Examples of Spreadsheet Software:


o LireOffice Calc
o OpenOffice.org Calc
o Google Sheets
o Apple iWork Numbers
o Kingsoft Office Spreadsheets
o StarOffice Calc
o Microsoft Excel

MICROSOFT EXCEL

Insert Definition or background of


Key Terms in MS Excel:

o Row – horizontal line of entries in a table


o Column – vertical line of entries in a table
o Cell – the place where info is held in a spreadsheet
o Active Cell – the selected cell
o Column Heading – the box at the top of each column containing a letter
o Row Heading – the row number
o Cell Reference – the cell address of the cell usually combines letter and number (ex. A1,
B4, C2)
o Merge – combining or joining two or more cells
o Formula – is an expression which calculates the value of a cell.
o Functions – are predefined formulas and are already available in Excel
o Formula Bar – the bar that displays the contents of a cell

Basic Math Operations:


o =SUM(x,y) or =SUM(range) – returns the sum of x and y or (all the numbers within the
range)
o =PRODUCT(x,y) – returns the product of x and y
o =QUOTIENT(x,y) – returns the quotient of x divided by y
o =x-y – returns the difference of x subtracted by y
o =x+y – returns the sum of x and y
o =x*y – returns the product of x and y
o =x/y – returns the quotient of x divided by y
o =x-y – returns the difference of x subtracted by y

Other Functions:
o =ABS(x) – returns the absolute value of x
o =AVERAGE(x,y) – returns the average of x and y
o =CONCATENATE(x,y) – joins x and y
o =IF(Condition, x, y) – returns x if the condition is true, else it returns y
o =ISEVEN(x) – returns true if x is an even number
o =ISODD(x) – returns true if x is an odd number
o =COUNT(range) – counts the number of cell containing a number within a range
o =COUNTIF(range, criteria) – count the number of cell that fits with the criteria within
the range
o =ISNUMBER(x) – returns true if x is a number
o =ISTEXT(x) – returns true if x is a text
o =LEN(x) –returns the length of characters in x
o =PROPER(x) – returns the proper casing of x
o =LEFT(x,y) – returns the characters of x specified by y (from the left)
o =RIGHT(x,y) – returns the characters of x specified by y (from the right)
o =PI() – returns the value of pi
o =MIN(x,y) – returns the smallest number between x and y
o =MAX(x,y) – returns the largest number between x and y
o =MIN(range) – returns the smallest number within the range
o =MAX(range) returns the largest number within the range
o =POWER(x,y) – returns the value of x raised to the power of y
o =ROUND(x,y) – rounds x to a specified number of digits (y)
o =COLUMN(x) – returns the column number of x
o =ROW(x) – returns the row number of x
o =SQRT(x) – returns the square root of x
o =TRIM(x) – removes extra spaces in x
o =UPPER(x) – returns x in all capital form
o =LOWER(x) – returns x in non- capital form
o =TODAY() – returns the current date
o =NOW() – returns the current date and time

NAME MATH

EXERCISES

Potrebbero piacerti anche