ICT in The Context of Global Communication
ICT in The Context of Global Communication
· Compare and contrast the nuances of varied online platforms, sites, and
content to best achieve specific class objectives or address situational challenges.
In the past few decades, information and communication technologies have provided
society with a vast array of new communication capabilities. For example, people
can communicate in real-time with others in different countries using technologies
such as instant messaging, voice over IP (VoIP), and video-conferencing. Social
networking websites like Facebook allow users from all over the world to remain in
contact and communicate on a regular basis.
Modern information and communication technologies have created a "global
village," in which people can communicate with others across the world as if they
were living next door. For this reason, ICT is often studied in the context of how
modern communication technologies affect society.
· Huge growth of ICT related jobs around the country, one of which is call center of
BPO (Business Process Outsourcing) centers.
· Time Magazine declare Makati City, Philippines rank-1 as the “Selfiest Cities”
around the world, and rank-9 is Cebu City.
Education
· Modern homes have computers for research and learning by students and the
family for school lessons. They are also used to learn about other people, places
current events, and recent technologies.
Computers in schools are used for fast, easy and effective instruction and learning in
Computer, Math, Science and English. Teachers use images, videos and Computer-
Based Training (CBT) programs to present topics visually to enhance learning.
· Courses on the internet called Online Instructions are available to learn various
lessons such as origami, cooking, and even earn a college degree.
· Libraries are now equipped with computers to organize books and to expand
the references available to the students through the internet.
. Schools use computers to keep the database of information about the school and
its students.
· Hypertext and the internet already existed at this point but no one had thought of a
way to use the internet to link one document directly to another. Three main
technologies. Tim suggested three main technologies that meant all computers could
understand each other (HTML, URL and HTTP). All of these remain in use today.
· He also made the world’s first web browser and web server.
· It connected the world in a way that was not possible before and made it much
easier for people to get information, share and communicate.
· It allowed people to share their work and thoughts through social networking sites,
blogs and video sharing.
Web 1.0
The transition between the end of Web 1.0 and beginning of Web 2.0 cannot exactly
be determined, since the change was gradual as the internet technology became
more and more interactive.
The term Web 2.0 was first used around the year 2004 to differentiate the current
internet technology with the past technology, Web 1.0. This was the beginning or the
wide use and popularity of the social media such as Twitter, Facebook, and YouTube.
The users can now interact, contribute and create their own internet space and
content resulting in the explosion of information available for everyone on the net.
The internet is now available to everyone whether you are an expert or not. The
internet is now a means to interact and communicate with people in a virtual
community, allowing social connection around the globe.
In Web 2.0, web pages are now written using web programs such as PHP, Python,
Ruby or Perl- all dynamic programming languages. It is now easy to share your
photos, videos, stories, and your opinions over the web. Web 2.0 is the advent of the
"read-write" web. As we look at Wikipedia (Information and Encyclopedia), YouTube
(video sharing), Flickr (photo sharing), and other sites that rely on the contribution of
the users for content, the potential of the WWW is becoming evident. There is
however another stage of this www technology, one that is described by the father of
the WWW Tim Berners-Lee and that is "read-write-execute" web. This stage is now
called the Web 3.0.
Web 3.0
Web 3.0 is named and referred to by web experts as semantic web experts or data
driven web content and response. As the user interacts or responds, Contributes and
collaborates on the web, the context of Web 3.0 the search of the user is processed
by a programming language to help the user by presenting options of what the
person is interested in. for example, if the user searches for hotels in a particular city,
the web posts adverts or hotels in that city from services, either from
TripAdvisor.com, Booking.com, Agoda.com, and other Web 3.0 will not make
obsolete or change Web 2.0, but it simply describes an additional use of data created
by the users and the use of the vast data available on the net, to assist or help the
users by presenting to them the best options available in the context of their search.
Some content sites such as Flickr (photo sharing website) now provide a web service,
wherein one can develop a program to interact with the website to search for desired
images. available on the site continues to grow in the billions of photos, a program
to automate the search becomes necessary.
Is Web 1.0 obsolete? Not necessarily. There are some websites that sell specialized
products that do not have Web 2.0 capabilities and may not have any business need
to interact with the users. In short, Web 1.0, Web 2.0, and Web 3.0 are simply
nomenclature to describe a current state of technology being employed on the
internet differentiating one from the other.
In Web 1.0, the user is limited to viewing the website. Web 2.0 is an internet
technology and application that allow user participation, collaboration, interaction,
content creation, and involvement in the virtual community. Websites were created
Using dynamic programming languages that make the users part of the creation,
expression, and development of their own digital space. Specifically, the users can
share videos and photos, create a blog site, participate in wikis, communicate with
others, react and comment to authors at the same time consume and view internet
content shared by others.
Web 3.0 is the next development on the web; with all the information, us generated
content, and contributions, it has created a vast resource to tap and u for the benefit
of the user. Web 3.0 utilizes the web content as created a contributed by the user
into useful information as needed by the user. Web 3.0 referred to as data driven or
semantic web that are used by web services to me the needs of the end user. For
example, if the user is searching for airlines to from Manila to New York, some sites
will send ads of the cheapest possible fare length of travel, the number of stops, and
other pertinent information for the benefit of the user.
Technological Convergence
However, while integrating functions in one device allow savings in cost, space, and
size, there is a trade-off in quality. For example, watching movies on a big screen is
still preferable than on a very small screen, or some professional photographers
prefer the quality of photos they get from dedicated professional camera.
Social Media
1. Facebook - is a popular free social networking site with more than a billion users
around the globe that allows its users to create profiles, upload photos and videos,
create and join groups, react to friends' posts, create events, send messages, keeping
in touch with close friends, and relatives.
2. Twitter - with more than 300 Million users in 2016, this social networking site
allows users to microblog or broadcast short messages called tweets". Registered
Twitter members can also read and follow tweets of other users.
3. Instagram- is another free social networking app that enables the user to share
mobile photo and video either publicly or privately, and through other networking
sites such as Flickr, Tumbler, Facebook, and Twitter
Mobile Media
With the growing Mobile media, the smartphone has dominated sales growth of the
digital world, outpacing laptops and personal computers. Smartphones is an
integration of various technologies rolled into one, such as the cellular phone, PDA
(portable digital assistant), photo, and video camera. The inherent portability reduced
size of the smartphone allows people to capture, write, share, and communicate to
anyone and anywhere as long as there is an Internet connectivity or cellular signal.
Smartphone has also been used as game console, in watching Videos, and in
listening to music. Applications for the smartphones, whose dominant platforms
include Android, i0s, and Windows are enormous to the point that work in the
personal computers are now performed using the smartphone. Books and other
reading materials are also accessed; and the user can even download them into the
smartphone, so one can read them anywhere and anytime. Using smartphones in
traveling (for directions), purchasing items online, investment, and mobile banking is
now the norm. Doing business on the smartphone has become a normal part of
one's lifestyle nowadays.
Assistive Media
"Assistive Media was the first internet-based audio reading service for persons with
print reading barriers thereby operating a unique avenue of accessibility for many
individuals with cognitive, physical, and communication disabilities previously
inaccessible reading materials leading to greater independence and integration into
the mainstream of society and community life"
Originally producing and distributing voice-recorded written materials on the
defunct audio cassettes to various libraries for the blind and physically handicapped,
their works are now accessible on demand through the Internet due to the advances
in audio technology. Donations and grants allowed Assistive Media to start recording
books for online books for online library to serve people with disability at a faster
pace and available online books for the visually impaired.
The key definition to platform is "programmed". "If you can program it, then it's a
platform. you can’t then it’s not,"- Marc Andreessen
Online platforms can be overwhelming due to the number of choices. They can be
categorized as follows.:
· Social Media
· Search Engines
· Communication Services
· Payment Systems
· Advertising Platform
The online platform in the use of ICT makes it easier for users to interact, to collect,
and use the data from the users' interactions for their own particular needs.
Following are some of the online platforms and applications that you can use to
create online presentation, web page, newsletter, infographics, music, video, and
other multimedia contents:
The Internet is a powerful tool for learning and communicating with people.
However, there are many dangers that you must watch out for.
Email spam
Also known as junk email, it is usually unsolicited commercial email sent from one
source with identical message sent to multiple recipients. Although some of them are
not harmful, deleting them one by one will eat up your time and can clog your email.
Dangerous spams carry virus like Trojan horse and other malicious software
(malware). Spammer is the term used to refer to a person who creates electronic
spam. advertising. In addition, many countries do not have laws to punish spammers.
Email spoofing
This refers to deceitful email practice in which the sender address is changed, so that
it would appear to have come from a different source usually someone you know.
Usually, the reply to address is the source of the email, and when you unknowingly
reply to it you would be replying to the one who spoofed you. Email spoofing is
usually used by spammers to hide the origin of the spam.
Phishing
Pharming
This is a dangerous hacker attack on a website which directs all traffic to that web
site to another fictitious website. The main object of pharming is to obtain username
and passwords, as well as credit card and financial information, and use these to steal
their money electronically or use the credit card of the victims. Pharming is a major
concern of many online banking and electronic commerce transactions, which would
compromise many of their client accounts as well as the business. Antivirus and anti-
spyware software cannot prevent and protect one from pharming.
Spyware
Computer worm
This is a dangerous computer program that replicates itself through a network. Some
worms delete files, others disrupt the network function and still, others send junk
mail from infected computer. Computer worm usually spreads by exploiting
weaknesses in operating system, and manufacturers of this software regularly send
free updates to clients to prevent the spread of the worms. They usually spread on
their own without attaching to a program or file. Users should not run attachments
or open emails from unknown or suspicious sources, delete them immediately. Anti-
virus, anti-spyware, and use of firewall helps to prevent worm attacks, but it must be
updated regularly to ensure current prevention and control.
Trojan Horse
This is a form of a malicious software (malware) fronting to perform a good task, but
Covertly performs undesirable function with the intention of entering the computer
without the user's consent. Once the malware is installed in the computer, the Trojan
horse can disable the computer's defenses opening it to unauthorized entry. It can
erase data, can allow access of the victim's computer, can corrupt files, and can be
used in Phishing for bank accounts. Regularly updated antivirus and anti- Spyware
programs can detect Trojan horse and can delete them.
Computer virus
This is a program that duplicates itself and then infects the computer. It spreads like
a real biological virus, wherein it attaches itself to a host program and infect other
computers if it is received by a computer through the internet. The virus can also
transfer by the use of removable storage media such as diskette, CD, flash drives,
memory cards, and others. Damage by the computer virus may be mild to severe.
Data loss and crippled functionality of the computer have created specialist to
combat deadly computer viruses. Many anti-virus programs are effective against the
threats, but should be regularly updated to remain successful is prevention and fight
against this computer viruses.
Hacker
This is a person who is able to enter and control other people’s computer without
authorization. A hacker is able to enter another’s computer, usually vandalizes the
victim’s website steals person information, obtains intellectual property, and
performs credit card fraud. Firewalls are able to prevent entry by hackers.
Windows Security
2. Limited account - has limited control and only have access to his/her
3. Guest - accounts created for transient users and do not have access to the
computer, installs programs, adds, and deletes users. particular account. other
computer accounts and their content.
Once you are in the account, you can pick any change that you like:
1. Change my account name - If you want to change your name displayed in your
account.
5. Change my picture - You can change your picture displayed beside your name. 6.
Change my account type Administrator or Limited.
Creating a new password requires you to have a user name first. Once that is created,
click on Create a password and a dialog box will appear and will require you to type
in a new password and retype it to confirm on the next line. You will be asked to type
a word or phrase to help you remember your password in case you forget it later on.
When creating a password, be aware that it is case sensitive, this means that letters
that are capital or small must be typed as they are when you enter them the first
time. Otherwise, you will not be able to open the computer using your account
name.
The password that you create should be at least eight characters which could be a
combination of uppercase and lowercase letters, symbols, and numbers. A secure
password ideally should not be a real word that anyone can easily guess. Make sure
to remember the password by writing it and keeping it in a safe place or creating a
password hint.
Changing Passwords
Click the User Account icon from the control panel (category view) and then
select Change an Account. You will be prompted to Pick an account to Change.
You can create or change a password on an existing account; otherwise, create a new
account and a password for that new account. Assuming you are the administrator
and want to change your password, click on your account. You will be asked what do
you want to change about your account? Select the Change my password to
change the existing password. A dialog box will appear and require you to enter the
current password and then the new password should be typed twice on the space
provided. Click Change Password, when you are done, otherwise, press Cancel if
you wish to discontinue.
There is a very big possibility that you will forget your password if you do not use
your account very often. In this situation, it is helpful that you create a password hint
that will be easily remembered and one that is meaningful to you. However, be aware
that your password hint will also be visible to others who will use your computer.
Most operating systems has a feature that allows you to lock the computer even
when the computer is in a screen saver mode. This means that, even if your computer
is open, no one will be able to access your computer account from screen saver
mode.
Security Center
The Security Center of Windows is the place where you can set additional protection
from threat to your computer, especially when using the Internet. There are three
important security settings available; Firewall, Automatic Updates, and Virus
Protection.
3. Virus Protection is usually about the current antivirus software installed in your
computer; this option is recommended to be turned on always. Antivirus software is
meant to locate, find, and remove virus threats that are already in your computer. It
also prevents other malware (malicious software) from gaining entry into your
computer. Antivirus program should be constantly updated to ensure that its Anti-
virus definition is current.
When you open the antivirus program, you will see settings and prompts that you
can adjust, activate, and fix. In the Antivirus window below, you will find the length of
subscription, protection status, last date it was updated, and the last time the
computer was scanned. There is also a summary report or logs for all security
activities. If you are always using the internet, it is recommended that you install the
Antivirus with Internet Security; it has lots of PC protection aside from the Antivirus
packed into it.
The Ten commandments of Computer Ethics were written by Dr. Ramon C. Barquin in
1992 for the Computer Ethics Institute. He wrote a paper entitled” In Pursuit of a 10
Commandments for Computer Ethics". Ramon C. Barquin state that it is a means to
create a set of standards to guide and instruct people on the ethical use of
computers. The Ten Commandments of Computer Ethics copies the style or the Ten
Commandments from the Bible which use "thou shalt" and thou shalt not style of
writing.
9. Thou shalt think about the social consequences of the program you write.
10. Thou shalt use a computer in ways that show consideration and respect.
This article describes how to use the Mail Merge feature in Microsoft Word to create
labels.
A mail merge involves merging a main document with a data source. A main
document contains the text and other items that remain the same in each label. A
data source contains the information that changes in each label, such as the name
and address of each recipient.
Merge fields that you insert into the main document instruct Word where to print
information from the data source. When you perform the mail merge, Word replaces
merge fields in the main document with information from the data source. Each row
(or record) in the data source produces an individual label.
Start a new document to create new labels, or open an existing document that you
used previously to merge labels.
1. Under Select document type, click Labels, and then click Next: Starting Document.
(way at the bottom right of the screen)
Select the type of printer (page printers), the label vendor, and the product number.
If you are using a custom label, click Details, and then type the size of the label.
Click OK after completing.
1. Under Select recipients, click Use an existing list, and then click Browse under
the Use an existing list heading. The Select Data Source dialog box appears.
Click the appropriate drive and folder, select the file that you want to use, and then
click Open. Your data is probably in Sheet 1, so click OK. (If you renamed your sheet,
it would have that name instead of Sheet1$.) Also make sure to have the box
checked if your first row contains headers.
Word displays the Mail Merge Recipients dialog box for you to select specific
recipients. When you finish, click OK.
Your labels are displayed. You will see <<Next Record>>. This is good!
If you want to see grid lines, look for the yellow Table Tools ribbon, and click
Design. Then click Borders and then click View Gridlines near the bottom.
click Next Arrange your Labels
i. Word displays the items that you can use to lay out your labels, such as Address
block. After clicking in the first label where you want to insert, click to select an item
to display there.
Note: Before clicking More items, click in the label where you want to insert the
merge fields that represent where Word will print the information from the data
source. Make sure that you type any spaces or punctuation that you want between
two merge fields or after a merge field, if needed.
iii. When you finish setting up one label, click Update all labels to replicate all labels.
5. Take time to edit your document. You can change fonts, spacing, etc. I would
advise editing the label to add more space at the left edge of your text. To do this:
a. Make sure you can see the ruler. Go to the View ribbon, and check the Ruler box
Save your document at this point. This will save a version with the general merged
fields, and will make it easier to update this document later. Maybe name it
something like “address label template” so you know it isn’t the finished product.
Tip In this saved version, you can click Preview Results (on the Mailings Ribbon) to
toggle back and forth to see the data fields.
In the Mail Merge task pane, verify that the Complete the merge step is displayed.
6.To merge on the screen, click Edit individual labels. The Merge to new document
dialog box appears, so that you can select which records to merge. Select All and
Click OK to merge the labels. You can view the labels before you print them.
After the merged document appears on the screen, you can save it as a separate
document. Maybe call it something like “address labels final.” Note that in this saved
version, you can’t toggle back and forth between the Preview Results and data
fields. You can edit further if you want, but remember that you will be editing the
final document, and not the label template.
Printing
1. Do a test print! This is a must, even if you think they will print fine. Print on regular
paper first, and hold it up to your labels to see if they will fit.
2. Insert the labels in your printer. Make sure you have the correct orientation (face
up/face down). Look for a picture on your printer.
3. Print the merged document by clicking File and then Print.
Hyperlinking in Presentations
4. Select the page where you want to go when the text with hyperlink is chicken.
5. Click OK.
If you add a link to a presentation, be sure to place the linked presentation to the
same folder as your main presentation.
1. Go to normal view, select the text or the object that you want to use as a
hyperlink.
2. On the insert tab, go to the links group and click hyperlink.
4. Locate the presentation that contains the slide that you want to link to.
5. Click Bookmark, and then click the title of the slide that you want to link.
Creating a hyperlink to an email address
1. Go to normal view, select the text or the object that you want to use as a
hyperlink.
4. In the E-mail address box, type the Email address that you want to Link.
5. In the Subject box, type the subject of the e-mail message.
1. Go to normal view, select the text or the object that you want to use as a
hyperlink.
3. Under Link to, click Existing File or Web Page, and then click Browse the
Web.
4. Locate and select the page or file that you want to Link, and click OK.
Inserting a Picture
You may insert pictures from your file or search for more pictures from internet
and place them in your document.
2. When the Insert Picture dialog box appears click the drop-down arrow in
the Look in box to change the directory where your picture is stored.
1. Open the document you want a file embedded and click on the location in the
document where you want the file to be embedded.
2. On the ribbon, click the Insert tab, go to the Text group, and select Object and
locate the file you want to embed.
3. On the Object dialog box that will appear, select Create from File tab and click
the Browse button.
4. On the Browse dialog box, select the picture on documents you want to embed
and click Open or Insert button and the file or picture will embed on your document.
A formula can also contain any or all of the following: functions, references,
operators, and constants. Always start the formula with an equal = sign.
IF Functions allows you to do analysis of various data where you can input various
scenarios to know the reaction of data based on different situations.
2. Click the formula tab, go to the Function Library group and click the AutoSum
drop-down button.
3. On the drop-down menu, click the More function and on the Insert Function
dialog box select the IF command.
4. On the function Argument box, fill the required information on the boxes.
5. Logical test is a statement that gives condition and can be evaluated by true or
false. For example, B15>=1000 (the value of the cell B15 is greater than or equal to
1000)
6. On the value IF_true, it is the value that returned if the logical test is TRUE. For
example, “Approval Required” (the text will appear on the selected cell if the value of
B15 satisfy the condition)
7. On the value IF_false, it is the value that is returned if the logical rest is FALSE.
For example, “No Need for Approval” (the text will appear on the selected cell if the
value of B15 does not satisfy the condition.)
8. If you had already filled in the function argument, click OK.
9. Another way is the only formula bar, type the following formula = IF(B15>=1000,
“APPROVAL REQUIRED” “NO NEED FOR APPROVAL”).
10. The formula should start with an equal sign (=) and separated by commas (,).
Excel has various lookup functions that can be used to look up values in tables such
as tax tables, discounts tables, parts tables, and grade tables. VLOOKUP looks for a
value in the leftmost column of the table, and then returns a value in the same row
from a column you specified. You define the value which is the look-up value for the
formula to look for.
Highlight Cells that Meet Certain Criteria
You can analyze data in your worksheet by using conditional formatting on a range
of cells where you want some data to stand out from the rest.
2. Click the home tab and on the styles group, click conditional formatting arrow.
5. On the dialog box, type the value you want to use for the condition and click OK.