0% found this document useful (0 votes)
36 views5 pages

E-TECH (Lesson)

The document provides information on various topics related to ICT, the evolution of the World Wide Web, types of social media, features of Web 2.0, cybercrimes, copyright, netiquette rules, and online threats. It also discusses tools like Microsoft Word, Excel, and PowerPoint. Specifically, it defines ICT as using communication technologies to locate, save, send and edit information. It describes Web 1.0 as static web pages that cannot be changed and Web 2.0 as dynamic pages where users can interact and change content.

Uploaded by

Jasken Mabini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views5 pages

E-TECH (Lesson)

The document provides information on various topics related to ICT, the evolution of the World Wide Web, types of social media, features of Web 2.0, cybercrimes, copyright, netiquette rules, and online threats. It also discusses tools like Microsoft Word, Excel, and PowerPoint. Specifically, it defines ICT as using communication technologies to locate, save, send and edit information. It describes Web 1.0 as static web pages that cannot be changed and Web 2.0 as dynamic pages where users can interact and change content.

Uploaded by

Jasken Mabini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 5

• ICT — Information and Communication Technology

– ICT deals with the use of different communication technologies such as mobile
phones, telephone, internet, etc. to locate, save, send and edit information.
– Study of computer as data processing tools
– Deals with the use of communication technology

*Types Of Social Media


a) Social networks - allows you to connect with others
b) Bookmarking – sites allows you to store and manage links allows you to create a
tag
c) Social news – allow users to post their own news items or links to others
d) Media sharing – allows you to upload and share media content (image, video and
music)
e) Microblogging – focus on short updates
f) Blogs Forums – allow users to post their content and topics

• WWW — World Wibe Web


– Public web pages accessible through the internet
– SIR TIM BERNERS-LEE

• Web 1.0
– Static Web page
– first paged used when the WWW was invented
– cannot be manipulated in the page is "as is"
– same for all users (can't be change)

• Static — (also known as flat page or stationary page)

• Web 2.0
– Evolution of web 1.0
– Dynamic Web page
– Users create content and interact with each other
– Can see the website differently (can be change)
– Ex. blog, wikis, video sharing sites, etc.

Features of Web 2.0

Folksonomy
– allows users to categorize and classify/arrange information using freely chosen
keywords/hashtags.

Software As A Service
–Users will subscribe to a software only when needed rather than purchasing them.
This is a cheaper option if you do not always need to use a software.
–When you need a software, like a Word Processor, you can purchase it for a one-
time huge amount and install it in your computer and it is yours forever. Software
as a service allows you to “rent” a software for a minimal time.

Mass Participation
– Diverse information sharing through universal web access. Since most users can
use the Internet, Web 2.0’s content is based on people from various cultures.

LongTail
– Services that are offered on demand rather than on a one-time purchase. In
certain cases, time-based pricing is better than file size-based pricing or vice
versa.
– Using marketing strategies

Rich User Participation


– content is dynamic and is responsive to user’s input. An example would be a
website that shows local content. In the case of social networking sites, when
logged on, your account is used to modify what you see in their website.

User Participation
– Allows the other user to participate
– The owner of the website is not the only one who is able to put content. Others
are able to place a content of their own by means of comments, reviews, and
evaluation.

• Web 3.0
– Semantic Web page - movement led by the World Wide Web Consortium (W3C). The W3C
standard encourages web developers to include semantic content in their web pages.
– If you search something it will be put on your history or your search history

Web 3.0 is yet to be fully realized because of several problems:

Compatibility
– HTML files and current web browsers could not support Web 3.0.
– The device won’t work correctly.
Security
– The user’s security is also in question since the machine is saving his or her
preferences.
– High privileges make drivers of interest to attackers.

• Copyright Infringement
Copyright
– Form of protection for an author's original piece of work (aka intellectual
Property Rights)
– This protection gives the owner of the copyright the "exclusive right to decide
who can sell or reproduct their work.
Copyright infringement
– Occurs when a copyrighted work is reproduced distributed performed publicly
displayed or made into a derivative work without the permission of the copyright
owner.

• Cybercrime
Cybercrimes
– Crime in which computer is used as object and tool in committing a crime such as
hacking phishing spamming child pornography, libel, hate crimes, identity thief and
others, or it is also can be an illegal acts done through the use of Internet
Cyber bullying
– It happens when someone intentionally abused harass and mistreated by other
person using electronic communication
Identity Theft
– Crime of stealing personal information for the purpose of assuming that person's
name or identity to make any form of transactions.
Cyber Stalking
– Criminal practice where electronic communication is used to stalk or harass
individual or group
Sexting
– Act of sending sexually explicit text messages Images and videos.
Blackmail / Extortion
– Act of using internet to threaten or damage Someone's reputation to extort money
or anything else of value
Child Pornography
– Refers to any content that depicts sexually explicit activities involving a child
or minor.

Fair Use
– Is the use of copyrighted material for comment teaching, criticism news
reporting, research scholarship, and other similar purpose is not an infringement
of copyright.
(Example of this is when you post a quote from a person in your Facebook wall
include the name of person who owns the quote in your post.)

• Rules Of Netiquette
* Internet – information superhighway.
– A worldwide computer network that uses standardized communication protocols to
connect networks and provide a range of information and communication Services

Rule No. 1: Remember the human


– From the word human, we must treat others online with the same empathy and
respect that we do in person.
Rule No. 2: Adhere to the same standards of behavior online that you follow in real
life.
– You should maintain your behavior and be polite as you would in real life. Just
like not being rude to the other person. Be kind when communicating on the
internet.
Rule No. 3: Know where you are in cyberspace.
– Be aware of what you're doing if it's already inappropriate, and you should adapt
your behavior accordingly. Think before you do or say something.
Rule No. 4: Respect other people's time and bandwidth.
– Be considerate of others' time, make sure that your message is clear and
important, and don't let them waste their time, especially when we know that they
are busy people.
Rule No. 5: Make yourself look good online.
– Make your content positive by using appropriate language, valuable content, being
clear about what you're saying, and, of course, maintaining a respectful image. Be
responsible.
Rule No. 6: Share expert knowledge.
– If you want to share something, share it with the proper information and credits.
You should be willing to share your knowledge with others.
Rule No. 7: Help keep flame wars under control.
– Avoid being in an argument or fight; instead of making it worse, try to keep calm
and respectful. It's about promoting peaceful discussion.
Rule No. 8: Respect other people's privacy.
– Be aware of what you are sharing; don't ask for too much information from others;
you should respect their privacy and know your limitations.
Rule No. 9: Don't abuse your power.
– Don't use your influence to get what you want; use it to be fair to others
without mistreating them.
Rule No. 10: Be forgiving of other people's mistakes.
– Everyone makes mistakes; be mindful of that, especially on the internet. Instead
of judging or criticizing them, learn to understand them and forgive.

*Online Safety
- Stalking
- Indentity Theft
- Privacy Violation
- Harassment

• Microsoft Word
– Microsoft Word is a widely used commercial word processor designed by Microsoft.
Microsoft Word is a component of the Microsoft Office suite of productivity
software, but can also be purchased as a stand-alone product.
• Mail Merge
– Allows you to create documents and combine them with another document or data
file.
– Commonly used when sending out advertisement / advertising materials to various
recipients.

Mail merging basically requires 2 components


• Main document – contains the body of the message.
• Data source – contains the names and addresses

Kind of Materials
1. Clipart
– Line art drawings or images used as generic representation for ideas and objects.
2. Shapes
– Enhance appearance
– Fools used for composing and representing ideas or messages.
3. Smart Art
– Predefined sets of different shapes grouped together
4. Chart
– Represent data characteristics and trends

• Online Threats
1) Phising
– Acquire sensitive personal information
– When an email is sent by a disguise
2) Pharming
– When you click a site, it will go to other site
– confidential information is stolen
3) Internet Scam
– Take advantage, typically financial state
4) Internet Robot
– Computer program that runs on a network. Bots are programmed to automatically do
certain actions, such as crawling webpages, chatting with users, or attempting to
break into user accounts.
– Used in bad ways
5) Spam
– Unsolicited messages
– Unwanted Email
6) Cyber Stalking
– Refers to the used of device to harass
7) Cyber Bullying
– bullying with the use of digital technologies.
8) Spoofing
– Happens when someone acting like someone/something else
9) Malware
– Harmful to the computer users
– Virus that runs in the background of your computer
• Types of Malware
a) Virus – transfer from one computer to another
b) Worm – transfer from one computer to another by any type of means.
c) Trojan – disguised as a useful program
d) Spyware runi in background without you knowing
* Keyloggers - record the keystroke
e) Adware – advertisements, mostly as pop-ups.

• Exel
Microsoft Excel – Provides an automated way of displaying any statistical data.
• Microsoft Excel Key Terms
Columns – Vertical; alphabetic headings
Rows – Horizontal; numeric headings
Cells – Intersection of rows and columns.
Cell reference – Cell address
Active cell – Currently selected cell
Functions – Pre-defined formulas.
* SUM IF – Summation of a range
* AVERAGE – Average of the number of a range
* COUNT IF – Specified content within a range
* AVERAGE IF – average of a range

• Presentation
Microsoft Powerpoint
– Highly Innovative
– The ease of use and ability to create. smooth presentation flow.

• Types of Presentation
Informative – an informative presentation
Instructional – an instructional presentation
Decision making – identify your goal and components
Persuasive – a goal of convincing the audience

• Creating an effective presentation


Minimize – counts to a minimum
Clarity – avoid being too fancy, make your presentation readable
Simplicity – 6 x 7 rule
Visual – use graphics to attract not to distract
Consistency – design uniform
Contrast – light font on dark background or vice versa

You might also like