0% found this document useful (0 votes)
27 views7 pages

Hand Outs Lesson 1 5 Sir Nil

The document discusses information and communication technologies (ICT). It covers topics like the internet, world wide web, web 1.0, web 2.0, web 3.0, trends in ICT like social media and mobile technologies. It also discusses online safety, security and threats like malware.

Uploaded by

Jayczar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views7 pages

Hand Outs Lesson 1 5 Sir Nil

The document discusses information and communication technologies (ICT). It covers topics like the internet, world wide web, web 1.0, web 2.0, web 3.0, trends in ICT like social media and mobile technologies. It also discusses online safety, security and threats like malware.

Uploaded by

Jayczar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

KNCHS-SHS HAND-OUTS EMPOWERMENT TECHNOLOGY

TEACHER: MR. LORNILO S. ALIMPUANGON Page 1

ICT in Our Everyday Lives:


• Online platforms, Sites, and Content
• Web 2.0 and Web 3.0
• The World Wide Web
• Trends in ICT

LESSON 1 - Introduction to Information and Communication Technologies


• The state of ICT technologies
• Online systems, functions, and platforms

Information and Communication Technologies


Information and Communication Technology (ICT) deals with the use of different communication technologies such as
mobile phones, telephone, Internet, etc. to locate, save, send and edit information.

It deals with the use of different communication technologies such as mobile phones, telephone, Internet to locate, save,
send and edit information.

Internet
– is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link billions of
devices worldwide.
– means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers.
– sometimes called simply "the Net," is a worldwide system of computer networks - a network of networks in which users at
any one computer can get information from any other computer

World Wide Web


– an information system on the Internet that allows documents to be connected to other documents by hypertext links,
enabling the user to search for information by moving from one document to another.
– is an information space where documents and other web resources are identified by URLs, interlinked by hypertext links,
and can be accessed via the Internet.
– Invented by Tim-Berners Lee

Web Pages
– Web page is a hypertext document connected to the World Wide Web.
– It is a document that is suitable for the World Wide Web

Websites
– a location connected to the Internet that maintains one or more pages on the World Wide Web.
– It is a related collection of World Wide Web (WWW) files that includes a beginning file called a home page.

Web browser
– It displays a web page on a monitor or mobile device
– is a software application for retrieving, presenting, and traversing information resources on the World Wide Web.

Web 1.0:
When the World Wide Web was invented, most web pages were static. Static (also known as flat page or stationary page) in the sense
that the page is “as is” and cannot be manipulated by the user. The content is also the same for all users. This is referred to as Web
1.0.

WEB 2.0: Dynamic Web Pages


Web 2.0 is the evolution of Web 1.0 by adding dynamic web pages—the user is able to see a website differently than others.
Examples of Web 2.0 include social networking sites, blogs, wikis, video sharing sites, hosted services, and web applications.

Web 2.0 allows users to interact with the page: instead of just reading a page, the user may be able to comment or create a
user account. Web 2.0 also allows users to use web browsers instead of just using their operating system. Browsers can now be used
for their user interface, application software (or web applications), and even for file storage.
Most websites that we visit today are Web 2.0.

Features of Web 2.0


1. Folksonomy. It allows users to categorize and classify/arrange information using freely chosen keywords (e.g., tagging).
Popular social networking sites such as Twitter, Instagram, Facebook, etc. use tags that start with the pound sign (#). This is
also referred to as hashtag.
2. Rich User Experience. Content is dynamic and is responsive to user’s input. An example would be a website that shows local
content. In the case of social networking sites, when logged on, your account is used to modify what you see in their website.
3. Long Tail. Services are offered on demand rather than on a one-time purchase. In certain cases, time-based pricing is better
than file-size-based pricing or vice versa. This is synonymous to subscribing to a data plan that charges you for the amount of
time you spent in the Internet, or a data plan that charges you for the amount of bandwidth you used.
4. User Participation. The owner of the website is not the only one who is able to put content. Others are able to place a content
of their own by means of comment, reviews, and evaluation. Some websites allow readers to comment on an article,
participate in a poll, or review a specific product (e.g., Amazon.com, online stores).
KNCHS-SHS HAND-OUTS EMPOWERMENT TECHNOLOGY
TEACHER: MR. LORNILO S. ALIMPUANGON Page 2

5. Software as a Service. Users will subscribe to a software only when needed rather than purchasing them. This is a cheaper
option if you do not always need to use a software. For instance, Google Docs is a free web-based application that allows the
user to create and edit word processing and spreadsheet documents online. When you need a software, like a Word
Processor, you can purchase it for a one-time huge amount and install it in your computer and it is yours forever. Software as
a service allows you to “rent” a software for a minimal fee.
6. Mass Participation. It is a diverse information sharing through universal web access. Since most users can use the Internet,
Web 2.0’s content is based on people from various cultures.

Web 3.0 and the Semantic Web


The Semantic Web is a movement led by the World Wide Web Consortium (W3C).
The W3C standard encourages web developers to include semantic content in their web pages.
According to the W3C, “The Semantic Web provides a common framework that allows data to be shared and reused across
application, enterprise, and community boundaries.”
The aim of Web 3.0 is to have machines (or servers) understand the user’s preferences to be able to deliver web content
specifically targeting the user.

Several problems of Web 3.0


1. Compatibility. HTML files and current web browsers could not support Web 3.0.
2. Security. The user’s security is also in question since the machine is saving his or her preferences.
3. Vastness. The World Wide Web already contains billions of web pages.
4. Vagueness. Certain words are imprecise. The words “old” and “small” would depend on the user.
5. Logic. Since machines use logic, there are certain limitations for a computer to be able to predict what the user is referring to at
a given time.

Trends in ICT
1. Convergence
Technological convergence is the synergy of technological advancements to work on a similar goal or task.

2. Social Media
Social media is a website, application, or online channels that enable web users to create, co-create, discuss, modify, and
exchange user-generated content.

Six Types of Social Media:


a. Social Networks. These are sites that allow you to connect with other people with the same interests or background.
b. Bookmarking Sites. These are sites that allow you to store and manage links to various websites and resources.
c. Social News. These are sites that allow users to post their own news items or links to other news sources.
d. Media Sharing. These are sites that allow you to upload and share media content like images, music, and video.
e. Microblogging. These are sites that focus on short updates from the user.
f. Blogs and Forums. These websites allow users to post their content.

3. Mobile Technologies
The popularity of smartphones and tablets has taken a major rise over the years. This is largely because of the devices’ capability
to do tasks that were originally found in personal computers.
Kinds of operating systems:
a. iOS
b. Android
c. Blackberry OS
d. Windows Phone OS
e. Symbian
f. WebOS
g. Windows Mobile

4. Assistive Media
Assistive media is a nonprofit service designed to help people who have visual and reading impairments. A database of audio
recordings is used to read to the user.

LESSON 2 - Rules of Netiquette


• Online security, safety, and ethics
• Internet threats
• Protecting reputations online
• Copyright
• Contextualized online search and research skills

Online Safety and Security


The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with the old
ones. It is also a source of entertainment. But like most things in this world, there is always “another side of the coin.” The Internet
is one of the most dangerous places, especially if you do not know what you are doing.
KNCHS-SHS HAND-OUTS EMPOWERMENT TECHNOLOGY
TEACHER: MR. LORNILO S. ALIMPUANGON Page 3

Internet Threats:
1. Malware – stands for malicious software
Types: Virus, Worm, Trojan, Spyware, Adware
a. Computer Virus
A software program capable of reproducing itself and usually capable of causing great harm to files or other programs
on the same computer
b. Worm
A software program capable of reproducing itself that can spread from one computer to the next over a network
c. Trojan
A program that appears desirable but actually contains something harmful
"the contents of a trojan can be a virus or a worm"; "when he downloaded the free game it turned out to be a trojan
horse“
Ex. Rogue Security Software – It ask user to pay to improve his/her security but in reality, they are not protected at
all.
d. Spyware
Computer software that obtains information from a user's computer without the user's knowledge or consent
EX. Keyloggers – use to record the keystroke done by the users. This is done to steal their password or any other
sensitive information. It can record, email, messages, or any information you type using keyboard.
e. Adware
Software that is notionally free, but which contains paid advertising. It is designed to send you advertisements, mostly
as pop-ups.
2. Spam – unwanted email mostly from bots or advertisers. It can be used to send malware.
3. Phishing – Its goal is to acquire sensitive personal information like passwords and credit card details.

Think Before You Click


1. Before you post something on the web, ask these questions to yourself: Would you want your parents or grandparents to see
it? Would you want your future boss to see it? Once you post something on the web, you have no control of who sees your
posts.
2. Your friends depend on you to protect their reputation online. Talk to your friends about this serious responsibility.
3. Set your post to “private.” In this way, search engines will not be able to scan that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it down or report it as
inappropriate.

Tips to Stay Safe Online


1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn how the website handles the information you share.
4. Know the security features of the Social Networking site you use. By keeping your profile private, search engines will not
be able to scan your profile.
5. Do not share your password with anyone.
6. Avoid logging in to public networks/WIFI. Browsing in “incognito (or private) mode,” a feature of the browser, will not
protect you from hackers.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about your future vacation. It is similar to posting, “Rob my house at this date”.
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update Anti-virus software on your computer. Use only one antivirus to avoid conflict.
12. If you have a WI-FI at home, make it private network by adding a password.
13. Avoid downloading from untrusted websites.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails.

Copyright Infringement
If you create something—an idea, an invention, a form of literary work, or a research, you have the right of how it should be used
by others. This is called intellectual property.

Computer Ethics
❖ Computer ethics is a system of moral standards or values used as a guideline for computer users. It is needed to stop the
current technology products from being exploited.
❖ Ethics is a moral philosophy where a person makes a specific moral choice and sticks to it. Code of ethics in computing means
moral guidelines to refer to when using the computer and the Internet.
Intellectual Property
❖ Intellectual property refers to any product of human intellect that is unique and has value in the market place. This covers
ideas, inventions, unique name, computer program codes and many more.
Privacy
KNCHS-SHS HAND-OUTS EMPOWERMENT TECHNOLOGY
TEACHER: MR. LORNILO S. ALIMPUANGON Page 4

❖ Privacy in IT refers to data and information privacy. In general, data include texts, numbers, sounds, images and video.
Information privacy is described as the rights of individuals and companies to deny or restrict the collection and use of
information about them.

Privacy Policy
❖ Tells the user how the websites will handle its data.
Copyright
❖ A part of the law wherein you have the rights to your work, and anyone who uses it without your consent is punishable by law.
Cyber Law
❖ Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Fair Use
❖ Fair use means you can use copyrighted material without a license only for certain purposes.
❖ An intellectual property may be used without a consent as long as it is used in commentaries, criticisms, search engines,
parodies, news reports, research, library archiving, teaching and education.
Plagiarism
❖ The act of using another person’s words or ideas without giving credit to that person.
❖ The practice of taking someone else’s works or ideas and passing them off as one’s own.
Cybercrime
❖ A crime committed or assisted using the Internet.

LESSON 3 – Online Search and Research

What is online research


• are ways in which researchers can collect data via the internet
• is the practice of using Internet information, especially free information on the World Wide Web, in research.
Tips in conducting online research
• Have a question in mind
• Narrow it down
• Advance Search
• Give credit
• Use unique, specific terms
• Use quotation marks for exact phrases
• Don't use common words and punctuation
• Capitalization - Most search engines do not distinguish between uppercase and lowercase, even within quotation marks.
The following are all equivalent:
• Use browser history
• Set a time limit — then change tactics

Advance Search symbols


Symbol Function Order of
Precedence
+ Finds web pages that contain all the terms that are preceded by the + symbol; 3 NOT, + ,
and -
“” Finds the exact words in phrase. 2
() Finds or excludes web pages that contain a group of words. 1
AND or Finds webpages that contains all the terms or phrase. 4
&
OR or | Finds webpages that contain either of the terms or phrases. 5

LESSON 4 - Advanced Word Processing Skills


• Mail merge and label generation
• Integrating images and external materials

Two Components of Mail Merge:


1. Form Document
The document that contains the main body of the message we want to convey or send.
2. List or Data File
This is where the individual information or data that needs to be plugged in (merged) to our form document is placed and
maintained.
Label Generation
It creates a blank form document that simulates either a blank label or envelope of pre-defined size and will use the data file that you
selected to print the information, typically, individual addresses.

Integrating Images and External Materials


Kinds of Materials:
1. Pictures. Generally, these are electronic or digital pictures or photographs you have saved in any local storage device.
KNCHS-SHS HAND-OUTS EMPOWERMENT TECHNOLOGY
TEACHER: MR. LORNILO S. ALIMPUANGON Page 5

2. Clip Art. This is generally a .GIF type; line art drawings or images used as generic representation for ideas and objects that
you might want to integrate in your document.
3. Shapes. These are printable objects or materials that you can integrate in your document to enhance its appearance or to
allow you to have some tools to use for composing and representing ideas or messages.
4. Smart Art. Generally, these are predefined sets of different shapes grouped together to form ideas that are organizational or
structural in nature.
5. Chart. Another type of material that you can integrate in your Word document that allows you to represent data characteristics
and trends.
6. Screenshot. Sometimes, creating reports or manuals for training or procedure will require the integration of a more realistic
image of what you are discussing on your report or manual.

Types of Pictures
GIF (Graphics Interchange Format) .gif A slide as a graphic for use on Web pages. The GIF file format is limited to supporting 256
colors, and therefore it is more effective for scanned images such as illustrations rather than color photographs. GIF can also be good
for line drawings, black and white images, and small text that is only a few pixels high. GIF supports animation and transparent
backgrounds.
JPEG (Joint Photographic Experts Group) FileFormat .jpg A slide as a graphic for use on Web pages. The JPEG file format
supports 16 million colors and is best suited for photographs and complex graphics.
PNG (Portable Network Graphics) Format .png A slide as a graphic for use on Web pages. PNG was approved as a standard by the
World Wide Web Consortium (W3C) to replace GIF. PNG does not support animation as GIF does, and some older browsers do not
support this file format.
TIFF (Tag Image File Format) .tif A slide as a graphic for use on Web pages. TIFF is the best file format for storing bit-mapped images
on personal computers. TIFF graphics can be any resolution, and they can be black and white, gray-scaled, or color.
Device Independent Bitmap .bmp A slide as a graphic for use on Web pages. A bitmap is a representation, consisting of rows and
columns of dots, of a graphics image in computer memory. The value of each dot (whether it is filled in or not) is stored in one or more
bits of data.

LESSON 5 - Advanced Spreadsheet Skills


• Commonly used Microsoft Excel functions
• Conditional functions
• Use of Microsoft Excel in market research

Spreadsheet
• A program that allows you to use data to forecast, manage, predict, and present information.
Uses of Spreadsheet
School: Student grades, payroll
Sports: individual and team statistics
Personal: checkbook, household expenses
Business: payroll, investments

Spreadsheets are made up of the following :


• columns – identified with alphabetic headings
• rows - identified with numeric headings
• and their intersections are called cells
• (Cell references: B4, A20)
• text (labels)
• number data (constants)
• formulas (mathematical equations that do all the
work)

Microsoft Excel provides an automated way of displaying any statistical data. It can be used to automatically compute for several
factors that are not easy to notice especially when faced by a large data. Microsoft Excel includes several arithmetic and basic functions
that help you compute faster.

Basic Excel Formulas:


Addition (+)
Subtraction (-)
Multiplication (*)
Division (/)
*type <=> before the formula, thus: =a1+a2 <then, hit the ENTER key>

Excel Formulas
• A formula is a set of mathematical instructions that can be used in Excel to perform calculations.
KNCHS-SHS HAND-OUTS EMPOWERMENT TECHNOLOGY
TEACHER: MR. LORNILO S. ALIMPUANGON Page 6

• Formulas are started in the formula box with an = (equal) sign and follows the order of operations (parentheses, exponents,
multiplication & division, addition & subtraction)
• Ex. formula multiplies 2 by 3 and then adds 5 to the result.
=5+2*3
• There are many elements to an excel formula.
– References: The cell or range of cells that you want to use in your calculation
– Operators: Symbols (+, -, *, /, etc.) that specify the calculation to be performed
– Constants: Numbers or text values that do not change
– Functions: Predefined formulas in Excel is a set
Excel Function
• Is a pre set formula.
• A Function is a built-in formula in Excel.
• A function has a name and arguments (the mathematical function) in parentheses.
Syntax: function_name( )
• It begin with an equal sign (=) followed by the function’s name and its arguments. The sum( ) function is written as
= SUM(A1:A6)
Common Functions in Excel
• Sum: Adds all cells in the argument
• Average: Calculates the average of the cells in the argument
• Min: Finds the minimum value
• Max: Finds the maximum value
• Count: Finds the number of cells that contain a numerical value within a range of the argument
Spreadsheet Uses
• School: Student grades, payroll
• Sports: individual and team statistics
• Personal: checkbook, household expenses
• Business: payroll, investments
• AVERAGE – a function used to compute for the average of the number of a range.
• COUNTIF – a function used to count the cells with a specified content within a range.
• SUMIF – a function used to compute for the summation of a range if a certain condition is met
• AVERAGEIF – a function used to compute for the average of a range if a certain condition is met

Conditional Formatting
• applies one or more rules to any cells you want
• An example of a rule might be If the value is greater
than 5000, color the cell yellow.

Creating a conditional formatting rule:


 Select the cells you want to add formatting to.
 In the Home tab, click the Conditional
Formatting command. A drop-down menu will appear.
 Select Highlight Cells Rules or Top/Bottom Rules.
 Select the desired rule (Greater Than, for example).

 From the dialog box, enter a value in the space provided, if applicable. In this example, we want to format cells
that are greater than 5000, so we'll enter 5000 as our value. If you want, you can enter a cell reference instead
of a number.
 Select a formatting style from the drop-down menu

Conditi
onal
formatting
presets
KNCHS-SHS HAND-OUTS EMPOWERMENT TECHNOLOGY
TEACHER: MR. LORNILO S. ALIMPUANGON Page 7

 Excel has several presets you can use to quickly apply


conditional formatting to your cells. They are grouped
into three categories:
 Data bars are horizontal bars added to each cell, much
like a bar graph.

 Color scales change the color of each cell based on its


value. Each color scale uses a two- or three-color
gradient. For example, in the Green-Yellow-Red color
scale, the highest values are green, the average values
are yellow, and the lowest values are red.

 Icon sets add a specific icon to each cell based on its


value.

LESSON 6 - Advanced Presentation Skills


• Hyperlinks
• Embedding files and data

Creating Effective Presentation


1. Minimize. Keep slide counts to a minimum to maintain a clear message and to keep the audience attentive
2. Clarity. Use a font style that is easy to read
3. Simplicity. Use bullets or short sentences
4. Visuals. Use graphics to help in your presentation but not too many to distract the audience
5. Consistency. Make your design uniform
6. Contrast. Use light font on dark background or vice versa

Using Hyperlinks in Microsoft PowerPoint:

1. Select an object or highlight a text.

2. Go to Insert > Hyperlinks (under links category) or


use the shortcut key Ctrl + K. The insert Hyperlink
dialog box would appear.

Link to Options:
a. Existing File or Web Page – creates a hyperlink to website
or a local file saved in your hard drive. Just browse your file in
the dialog box or type the web address.
b. Place in This Document – creates a hyperlink that allows
you to jump to a specific slide in your presentation.
c. Create a New Document – creates a hyperlink that once
clicked, creates a new document on your specified location.
d. E-mail Address – creates a hyperlink that opens Microsoft
Outlook that automatically adds your specified recipient on a new email.

3. When done, click OK to apply your hyperlink.

Embedding Objects in Microsoft PowerPoint

Embedding objects is easy using PowerPoint


Presentation. With this option, you can insert an Excel file
that would look like a table to a PowerPoint Presentation.
1. Go to the Insert tab.
2. On the Text group, click on Object.
3. The Insert Object dialog box would appear:

4. Once you are done, click OK.

Options:
a. Create New – creates a new file from scratch. You can
select on a wide variety of files listed.
b. Create from File – creates a file from an existing file saved on your hard drive; simply browse the file to use it. Putting a check on
the “link” option will allow you to modify the Excel file inside your PowerPoint Presentation.

You might also like