Eyeseetea Revyouwhere
Eyeseetea Revyouwhere
0
-Diverse set of technological tools and resources used to a) FOLKSONOMY
communicate, create, disseminate, store, and manage -It allows users to categorize and
information classify/arrange information using freely chosen
ICT IN THE PHILIPPINES keywords
Philippines as the “ICT Hub of Asia”. b) RICH USER EXPERIENCE
Huge growth of ICT related jobs around the -Content is dynamic and is responsive to user’s
country, one of which is call center or BPO input. An example would be a website that
(Business Process Outsourcing) centers. shows local content. In the case of social
In a data gathered by the Annual Survey of networking sites, when logged on, your account
Philippines Business and Industries in 2010, the is used to modify what you see in their website.
ICT industry shares 19.3% of the total c) LONG TAIL
employment population. -Services are offered on demand rather than on
Time magazines declared Makati City, a one-time purchase. In certain cases, time-
Philippines Rank 1 as the “Selfiest Cities around based pricing is better than file-size-based
the world, and Rank 9 is Cebu City. pricing or vice versa. This is synonymous to
43.5% of Filipinos accessed the Internet (2016). subscribing to a data plan that charges you for
Ranked 74th out of 77 countries in terms of 4G the amount of time you spent in the Internet, or
speed a data plan that charges you for the amount of
Download speed of just 8.24 Mbps (CNN Phils, bandwidth you used.
Nov. 2017) d) USER PARTICIPATION
WEB -The owner of the website is not the only one
-An information system on the internet that allows who is able to put content. Others are able to
documents to be connected to other documents by place a content of their own by means of
hypertext links, enabling the user to search for comment, reviews, and evaluation. Some
information by moving from one document to another. websites allow readers to comment on an
-Is an information space where documents and other article, participate in a poll, or review a specific
web resources are identified by URLs, interlinked by product
hypertext links, and can be accessed via the Internet. e) SOFTWARE AS A SERVICE (SaaS)
TECHNOLOGY USED FOR COMMUNICATING -Users will subscribe to a software only when
INFORMATION needed rather than purchasing them. This is a
WEB 1.0 cheaper option if you do not always need to use
-Around when the World Wide Web was a software.
invented f) MASS PARTICIPATION
-Static / Flat Page / Stationary Page -It is a diverse information sharing through
-“As is” Cannot be manipulated by the user universal web access. Since most users can use
-Content is same for all users the Internet, Web 2.0’s content is based on
WEB 2.0 people from various cultures.
-the user is able to see a website differently WEB 3.0
than others -provides a common framework that allows
-allows users to interact with the page data to be shared and reused across
-the user may be able to comment or create a application, enterprise, and community
user account boundaries
-The aim of Web 3.0 is to have machines (or
servers) understand the user’s preferences to
be able to deliver web content specifically TYPES OF SOCIAL MEDIA
targeting the user. 1. Social Networks. These are sites that allow you to
PROBLEMS WITH WEB 3.0 connect with other people with the same interests or
a) COMPATIBILITY background.
-HTML files and current web browsers could not 2. Bookmarking Sites. These are sites that allow you to
support Web 3.0. store and manage links to various websites and
b) SECURITY resources.
-The user’s security is also in question since the 3. Social News. These are sites that allow users to post
machine is saving his or her preferences. their own news items or links to other news sources.
c) VASTNESS 4. Media Sharing. These are sites that allow you to
-The World Wide Web already contains billions upload and share media content like images, music, and
of web pages. video.
d) VAGUENESS 5. Microblogging. These are sites that focus on short
-Certain words are imprecise. The words “old” updates from the user
and “small” would depend on the user. 6. Blogs and Forums. These websites allow users to post
e) LOGIC their content
-Since machines use logic, there are certain
limitations for a computer to be able to predict TIPS TO STAY SAFE ONLINE
what the user is referring to at a given time. 1. Be mindful of what you share online and what site
TRENDS IN ICT you share it to.
1. ASSISTIVE MEDIA 2. Do not just accept terms and conditions; read it.
-Assistive media is a nonprofit service designed 3. Check out the privacy policy page of a website to
to help people who have visual and reading learn how the website handles the information.
impairments. 4. Know the security features of the social networking
2. COLLABORATIVE PLATFORMS site you use. By keeping your profile private.
- virtual workplace that centralizes resources 5. Do not share your password with anyone.
and technologies to facilitate communication 6. Avoid logging in to public networks/Wi-Fi.
and human contact in corporate project work. 7. Do not talk to strangers whether online or face-to-
3. CONVERGENT RECHNOLOGIES face.
-Technological convergence is the synergy of 8. Never post anything about a future vacation. It is
technological advancements to work on a similar to posting, “Rob my house at this date”
similar goal or task. 9. Add friends you know in real life.
4. MOBILE TECHNOLOGIES 10. Avoid visiting untrusted websites
-The popularity of smartphones and tablets has 11. Install and update an antivirus software on your
taken a major rise over the years. This is largely computer.
because of the devices’ capability to do tasks 12. Avoid downloading anything from untrusted
that were originally found in personal websites
computers. 13. Buy the software; do not use pirated ones.
5. SOCIAL MEDIA 14. Do not reply or click links from suspicious emails.
-Social media is a website, application, or online 15. Do not just believe on what is posted in social
channels that enable web users to create, co- network sites. Check and verify.
create, discuss, modify, and exchange user-
generated content.
DANGERS ON THE INTERNET TROJAN HORSE
EMAIL SPAM • A malware fronting to perform a good task,
• AKA Junk mail but covertly performs undesirable function with
• Usually unsolicited commercial email sent the intention of entering the computer without
from an unknown source with identical message the user’s consent.
sent to multiple recipients. • It can disable the computer’s defenses,
• Usually not dangerous but can be time and opening it to unauthorized entry. It can erase
space consuming. data, can corrupt files, allow access to
• Dangerous ones can carry viruses and other computer, and
malicious software (Malware) COMPUTER WORM
EMAIL SPOOFING • It is a dangerous computer program that
• It is a deceitful email practice in which the replicates itself through a network.
sender address is changed, so that it would • Some worms delete files, others disrupt the
appear to have come from a different source network function.
which is usually someone you know. • It is usually spread through email and running
• Email spoofing is usually used by spammers to of attachments from suspicious sources.
hide the origin of the spam. • It spreads by exploiting weaknesses in
Phishing operating systems
• It is a deceitful practice of trying to get COMPUTER VIRUS
confidential information such as passwords and • It is a program that duplicates itself and then
usernames, and credit card details by making it infects the computer. It spreads like a biological
appear as if it comes from a trustworthy source. virus.
• It is usually done through emails or using • It can be transferred by the use of removable
popular entity such as Microsoft, Yahoo, storage media devices.
Google, Amazon, and financial institutions. • Damages may be mild to severe
PHARMING HACKER
• This is a dangerous hacker attack on a website • This is a person who is able to enter and
which directs all traffic to that website to control other people’s computer without
another fictitious website. authorization.
• The main objective is to obtain username and • Usually vandalizes the victims’ website, steals
passwords, as well as credit cards ad financial personal information, obtains intellectual
information, and use these to steal their money property, and performs credit card fraud.
electronically or use the credit cards of the • Firewalls are able to prevent entry by hackers
victims. COPYRIGHT
• It is a major concern of many online banking -A type of intellectual property wherein the author has
and electronic commerce transactions. the absolute right of an original work for a specific
SPYWARE period of time; afterwards, the creation is now
• A computer program that is installed covertly considered public domain.
on a personal computer to collect information INTELLECTUAL PROPERTY RIGHTS
or even take control over the computer without -Intellectual property (IP) is a category of property that
the knowledge of the user. includes intangible creations of the human intellect.
• It can monitor and collect information about There are many types of intellectual property, and some
the user’s internet habits and practices. countries recognize more than others. The most
• It can also affect the performance and setting wellknown types are copyrights, patents, trademarks,
of the computer. and trade secrets.
COPYRIGHT INFINGEMENT PARTS OF MICROSOFT INTERFACE
-Includes the unauthorized or unlicensed copying of a
work subject to copyright. Title Bar
PLAGIARISM - it refers to the area to the area where the
-using someone else's work or ideas without giving filename of the current document can be
proper credit. displayed
FAIR USE Menu Tab
-Refers to the author’s sole right and the author’s - it is recently called a ribbon this area is where
limitation – which was given by copyright law – to an all the commands can be found
original work. This may include criticism, researching, Toolbars
commentary, news broadcasting, scholarship, search - it is the area which contains a stack of icon
engines, and library archiving. commands that can be run
EVALUATING INFORMATION Minimize, Restore and Close
ACCURACY - it is used to adjust the viewing of windows
-content is grammatically correct, verifiable and Vertical Ruler
cited when necessary - this is used to measure pages, text and
AUTHOR paragraphs in their vertical position
-defines who created the content, the individual Horizontal Ruler
or groups credential/expertise and provides - this is used to measure pages, text and
contact information paragraphs in their horizontal position
CURRENCY Document area
-information is current and updated frequently - this is the area where text and images are
FAIRNESS placed
-content is balanced, presenting all sides of an Vertical Scrollbar
issue and multiple points of view - this is used to navigate the document
RELEVANCE vertically by scrolling the button or by clicking
-content is relevant to your topic or research the up or
SEARCH ENGINE
-are programs that look for documents based Most Commonly used Icons in MSWord
from specified keywords and return these SAVE
documents where the keyword were found - This icon command is used to save or store the
current file
LESSON 3: Advanced Word Processing Skills UNDO
- This icon command is used to undo the
INTRODUCTION TO WORD PROCESSOR current activity and return the previous action
- The advent of technology involves the use of word REDO
processors that have multiple function from creating - This icon command is used for redo the
templates, to web-based documents. Numerous word current activity that was done after the current
processor include the following features: action
ability to modify font properties
adjust paragraphs THE HOME TAB – is a menu bar that compromises of
modify the size and orientation of documents ribbon link of Clipboard, Font, Paragraph, Styles and
insert images Editing
employ the template-based document editor CLIPBOARD
One common word processor is Microsoft Word Paste
- This icon command is used to paste the text or - This icon command is used to change the case
object to the current location of the cursor from uppercase to lower case or vice versa
CUT TEXT AND HIGHLIGHT COLORS
- This icon command is used to cut or remove a - This icon command highlights selected text for
text or object emphasis
COPY FONT COLOR
- This icon command is used to paste the text or - This icon command changes the colors of the
object to the target destination text
FORMAT PAINTER PARAGRAPH
- This icon command is used to apply the format CLEAR FORMATTING
to a text - This icon command removes the previously
FONT applied text format
FONT FACE BULLET
- This icon command is used to select and apply - This icon command is used to add sequence of
a font face bullets to selected items
FONT SIZE NUMBERING
- This icon command is used to change the size - This icon command is used add number in
of the text chronological sequence to items
BOLD MULTI LEVEL LIST
- This icon command is used to format the text - This icon commands is used add multi level list
to boldfaced with different hierarchy
ITALIC ALIGN LEFT ALIGN
- This icon command is used to format text - This icon command formats the selected text
italicized to the left
UNDERLINE CENTER
- This icon command is used to format the text - This icon command formats the line text
to underlined selected to the center position
STRIKE THROUGH ALIGN RIGHT ALIGN
- This icon command is used to strike a line - This icon command format the line text
through the text selected to the right alignment
SUBSCRIPT JUSTIFY
- This icon command changes the text to - This icon command format justifies of the line
subscript text selected or paragraph
SUPERSCRIPT
- This icon command changes the text to THE INSERT TAB
superscript - lets you insert
GROW FONT BLANK PAGE
- This icon command increases the size of the - This icon command inserts a new blank page
text TABLE
SHRINK FONT - This icon command creates a series of row and
- This icon command decreases the size of the column similar to a matrix of table
text PICTURES
TEXT EFFECT - This icon command is used inserts a picture in
- This icon command changes the text effects the document
CASE CHANGE CLIP ARTS
- This icon command is used to insert graphics - This command use to insert style of border in
from the clip art gallery the document
SHAPES WRAP TEXT
- This icon command is used to insert shape - This icon command use to wrap text to object
CHARTS or picture
- This icon command is used to insert a chart BRING FORWARD
THE INSERT TAB - contains various items that you may - This icon command is used to place the image
want to insert into a document forward
HEADER SEND BACKWARD
- This icon command is used to add header to - This icon command is used to place the image
the document backwards
PAGE NUMBER REVIEW
- This icon command is used to insert a page - This menu command give emphasis on text meaning,
number spelling and grammars
TEXT BOX SPELL AND CHECK GRAMMAR
- This icon command is used to insert a text box - This icon command is used to check the
WORD ART spelling and grammar
- This icon command is used to insert text with RESEARCH
preformatted styles - This icon command is used to search for the
SYMBOLS meaning of a word via online
- This icon command is used to insert symbols THESAURUS
- This icon command is used to search for the
PAGE meaning via the dictionary
- This menu is composing of command for page layout VIEW
specially for users viewing and printing needs - This menu command gives option for viewing the
MARGIN document
- This icon command is used to insert margins PRINT LAYOUT
from top, bottom, left and right of the - This icon command is used to modify the
document display of the current document
ORIENTATION ZOOM
- - This command is used to adjust or modify the - This icon command is used to enlarge of the
angle of a text current page
SIZES 100%
- This icon command is used to select the paper - This icon command is used to display the page
size of the current document 100%
COLUMNS FORMAT
- This icon command is used set up the - This menu command is used to format or modify the
document by numbers of colums figure or image selected
WATERMARKS REMOVE BACKGROUND
- This icon command is used to put a watermark - This icon command is used to remove the
style to image in the background background that was selected
PAGE COLORS CORRECTION
- This color command is used to fill the page - This icon command is used to adjust the image
with color either brightness and contrast
PAGE BOARDER COLOR
- This icon command is used to adjust the color - This refers to the cluster of cells in vertical
tone and saturation of an image position indicated by letters
CROP ROW
- This icon command is used to crop the - This refers to the cluster of cells in horizontal
selected edges of an image position indicated by numbers
SAVE AS THE TOOLS
- This icon command is used to save a life base
on the destination folder selected ORIENTATION
PRINT - This command is used to adjust or modify the
- This icon command is used to print the current angle of a text
document WRAP TEXT
THE FORMAT MENU - This command is used to wrap the text within
OPEN the cell
- This icon command is used to open the folder MERGE AND CENTER
where a file is located for used - This icon command is used to merge cells into
CLOSE one single unit
- This icon command is used to exit the word PERCENT
processor - This command is used to add a percentage
LESSON 4: ADVANCE SPREADSHEET symbol
COMMA
MICROSOFT EXCEL - This command is used to add commas to
- is the most widely used software in the world currency type entries
INCREASE DECIMAL
MICROSOFT EXCEL ENVIRONMENT - This command is used to increase the decimal
places
TITLE BAR DECREASE DECIMAL
- This refers to the area where the filename of - This command is used to decrease the decimal
the current document is displayes places
MENU TAB AUTO SUM
- This area is where all the commands can be - This icon command is used to get the sum of
displayes and run all numeric data selected
TOOLS COLUMNS
- This area holds a stack of icon commands that - This command is used to compare values
can be run across categories
CELL ADDRESS LINE
- This displayes the current position in row and - This command is used to display a chart that
column of the cell pointer shows trends overtime
FORMULA BAR PIE
- This displays the formula used for a particular - This command is used to display chart
cell contribution of each value and a total
CELL BAR
- This refers to an individual cell - This command is used to display a chart to
CELL POINTER compares values
- This refers to the current position in the INSERT FUNCTION
worksheet where date entries can be entered - This command is used to insert functions or
COLUMN formulas
MENU BAR directly below the Title Bar
FORMULAS ACCESS - you can use the menu to give instructions
- This command is used to insert Microsoft to the software
Access data DESCRIPTION OF SHEETS COMPONENTS
SORT A TO Z ACTIVE CELL
- This command is used to arrange the data - is the cell in which you are currently
alphabetically from a to z working
SORT Z TO A FORMULA BAR
- This command is used to arrange the data - displays the contents of the active cell.
from z to a COLUMN HEADINGS
SORT - list the columns in the worksheet
- This command is used to arrange data based CELL NAME
on the criteria - displays the location of the currently active
cell in the workbook window
LESSON 5: MICROSOFT EXCEL ROW HEADINGS
- list the rows in the worksheet. Rows are
What is MS EXCEL? numbers form 1 up to 65,536
- is a spreadsheet that is commonly used for variety of SHEET TABS
uses - it identifies the sheet name
- Excel is a table consisting of rows, columns, and uses a ADD SHEET
spreadsheet to display data - it is where you add another sheet on your
worksheet
Getting Started with Google Sheet
1. Create a Spreadsheet and Fill it with Data BASIC FORMULA IN SHEETS
- Ways to create a new spreadsheet in Google SUM
Sheet - adds up a range cells
2. Format Data for Easy Viewing AVEARAGE
- Basic formatting options in Google Sheet - finds the average of a range of cells
3. Add, Average and Filter Data with Formulas COUNT
- Calculating some sums, averages, and more - counts the values in a range of cells
from your data MAX
4. Share, Protect and Move your Data - finds the highest value in a range of cell
- Learn how to upload, share and move your MIN
homework - finds the lowest value in a range of cells
Interface of MS EXCEL BASIC ARITHMETIC
- By default, Sheet will open a blank workbook that - you can also perform functions like
contains three worksheets ( spreadsheet) addition, subtraction, and multiplication
TOOL BARS directly below the Menu Bar directly in a cell without calling a formula
- this area hold a stack of icon commands
that can be run
Interface of Google Sheets
TITLE BAR is located at the very of the screen
- displays the name of your workbook you
are currently using. At the top of your
screen, you should see the default name “
BOOK1” or a similar namr