E Tech First Term Reviewer

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

EMPOWERMENT TECHNOLOGY

Information and Communication Technologies (ICT) • use of different communication technologies (mobile phones,
telephone, internet, etc.) to locate, save, send and edit information.
Is a study of computers as data processing tools. It introduces students to the fundamental of using computer systems in an
internet environment.
ICT in the Philippines
Philippines is dub as the ‘’ICT Hub of Asia” - huge growth of ICT-related jobs; BPO, Business Process Outsourcing, or
call centers.
HTML
 The HyperText Markup Language or HTML - standard markup language for documents designed to be displayed
in a web browser.
 meaning and structure of web content.
 assisted by technologies; Cascading Style Sheets and scripting languages such as JavaScript.
HTTP
• The Hypertext Transfer Protocol - application layer protocol in the Internet protocol suite model for distributed,
collaborative, hypermedia information systems.
Web Pages
Web page is a hypertext document connected to the World Wide Web. It is a document that is suitable for the World
Wide Web.

Web 1.0
 refers to the first stage in the World Wide Web - Web pages connected by hyperlinks.
Web 2.0
 evolution of Web 1.0 - dynamic pages. The user is able to see a website differently than others.
 Allows users to interact with the page; comment or create user account.
Web 3.0
 this platform is all about semantic web.
 Aims to have machines (or servers) understand the user’s preferences to be able to deliver web content.
Static Web Page • flat page or stationary age in the sense that the page is ‘’as is’’ and cannot be manipulated by the user.
Dynamic Web Pages • The user is able to see website differently than others e.g. social networking sites, wikis, video
sharing sites.

FEATURES OF WEB 2.0


1. Folksonomy • categorize and classify information using freely chosen keywords use tags that start with the sign
#, referred to as hashtag.
2. Rich User Experience • content is dynamic and is responsive to user’s input
3. User Participation • The owner of the website is not the only one who is able to put content. Others are able to
place a content of their own by means of comments, reviews and evaluation
4. Long Tail • services offered on demand rather than on a one-time purchase. Subscribing to a data plan that
charges you for the amount of time you spent in the internet.
5. Software as a service • subscribe to a software only when needed rather than purchasing them.
6. Mass Participation • diverse information sharing through universal web access. Web 2.0’s content is based on
people from various cultures.

TRENDS IN ICT
1. Convergence • synergy of technological advancements to work on a similar goal or task. For example, besides
using your personal computer to create word documents, you can now use your smartphone.
2. Social Media • is a website, application, or online channel that enables web users web users to create, co-create,
discuss modify, and exchange user generated content.
Six types of Social Media:
a. Social Networks – Connect with other people with the same interests or background. Once the user
creates his/her account, he/she can set up a profile, add people, share content, etc
b. Bookmarking Sites – Store and manage links to various website and resources.
c. Social News – Post their own news items or links to other news sources. The users can also comment on
the post and comments may also be rank.
d. Media Sharing – Upload and share media content like images, music and video.
e. Microblogging – Short updates from the user. Those that subscribed to the user will be able to receive
these updates.
f. Blogs and Forums – Post their content. Other users are able to comment on the said topic.
3. Mobile Technologies • Smartphone, tablets, PC power, capable of using a high-speed internet. Today the latest
model devices use 4G Networking (LTE), which is currently the fastest.
MOBILE OS
1. iOS – use in apple devices such as iPhone and iPad
2. Android – an open source OS developed by Google. Being open source means mobile phone companies use this OS
for free.
3. Blackberry OS – use in blackberry devices
4. Windows phone OS – A closed source and proprietary operating system developed by Microsoft.
5. Symbian – the original smartphone OS. Used by Nokia devices
6. WebOS- originally used in smartphone; now in smart TVs.
7. Windows Mobile – developed by Microsoft for smartphones and pocket PCs

4. Assistive Media • is a non- profit service designed to help people who have visual and reading impairments. A
database of audio recordings is used to read to the user.

ONLINE SAFETY, SECURITY AND RULES OF NETIQUETTE

INTERNET SAFETY- it refers to the online security or safety of people and their information when using internet.
NETIQUETTE- is network etiquette, the do’s and don’ts of online communication.
Internet threats
1. Malware-stands for malicious software.
a. Virus - replicate itself and transfer from one computer to another either through the Internet and local networks or
data storage like flash drives and CDs.
b. Worm - transfers from one computer to another by any type of means. Often, it uses a computer network to
spread itself. For example, the ILOVEYOU worm (Love Bug Worm) created by a Filipino.
c. Trojan - disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows
hackers to get your information.
*Rogue security software - tricks the user into posing that it is a security software. It asks the user to pay to
improve his/her security but in reality, they are not protected at all.
d. Spyware - a program that runs in the background without you knowing it (thus called "spy"). It has the ability to
monitor what you are currently doing and typing through keylogging.
*Keyloggers - used to record the keystroke done by the users. This is done to steal their password or any other
sensitive information.
e. Adware - send you advertisements, mostly as pop- ups.
2. Spam-unwanted email mostly from bots or advertisers. It can be used to send malware.
3. Phishing - Its goal is to acquire sensitive personal information like passwords and credit card details. This is done by
sending you an email that will direct the user to visit a website and be asked to update his/her username, password,
credit card, or personal information.
*Pharming - a more complicated way of phishing where it exploits the DNS (Domain Name Service) system.

ADVANCED WORD PROCESSING SKILLS


Mail Merge – use for making documents or letters.
TWO COMPONENTS OF MAIL MERGE
1. Form Document - main body, remains the same
2. List or Data File - where individual info data is plugged in (Merged) ~ Label Generation - Pre-formatted address

INTEGRATING IMAGES AND EXTERNAL MATERIALS: Used in making resumes


1) .JPG/JPEG (Joint Photographic Experts Group) - 16.7 million colors, non-transparent background
2) .GIF (Graphics Interchange Format) - good for blending, transparent background, simple animation
3) .PNG (Portable Network Graphics) - capabilities of .GIF, not animation, transparent bg, 16 million colors
4) Clip Art - .GIF type, line art
5) Shapes - printable, advertising layout for a poster
6) Smart Art - shapes for organization, structural in nature process, infographics
7) Chart - represent data characteristics and trends, statistics
8) Screenshot - screen capture
9) Image placement
1. Square – square shape
2. Tight – left & right sides are covered
3. Through – all sides an covered
4. Top & Bottom - middle not covered
5. Behind Text – element behind text
6. In front of text – element in front of text
7. In line with text – hugs the element
Starnotes

You might also like