Professional Documents
Culture Documents
Empowerment Techonologies: Introduction To Ict
Empowerment Techonologies: Introduction To Ict
4. Assistive Media – nonprofit service designed to help 2. Spam – unwanted email mostly from bots and
people who have visual & reading impairments. A advertisers
database of audio recordings is used to read the user.
3. Phishing – its goal is to acquire sensitive personal
TYPES OF SOCIAL MEDIA information like passwords and credit card details. This is
done by sending an email that will direct the user to visit a
Social Network – sites that allow you to connect with website
people with same interest (Ex. Facebook)
Social News – sites that allows users to post their own - Pharming – it exploits the DNS
news (Ex. Reddit and Digg) (Domain Name Service) system
Bookmarking Sites – sites that allow you to store &
ADVANCED WORD PROCESSING SKILLS
manage links to various websites (Ex. Pinterest)
Media Sharing – sites that allow you to upload & share MAIL MERGE AND LABEL GENERATION
media content like images, music & video
(Ex. Youtube, Instagram & Flicker) MAIL MERGE
Microblogging – sites that focus on short updates from the
user. (Ex. Twitter & Pkurk) Create documents and combine or merge them
Blogs & Forums – sites that allow you to post their Commonly used when sending out advertising materials to
content. Other users are able to comment on the said various recipients
topic. (Ex. Tumblr, WordPress, Blogger) Two Components of Mail Merge
1. Form Document
RULES OF NETIQUETTE - Contains the body of the message
- The main body of the message is the part of the
Internet – information superhighway form document that remains the same no
Intellectual property - If you create something, you have matter whom you send it to
the right as to how it should be used by others. - Place Holders
Fair Use – an intellectual property may be used without - Data fields or merge fields
consent as long as it is used in commentaries, criticisms, - Marks the position on your form
search engines, etc. document where individual data or
Cybercrime – crime committed through the use of internet information will be inserted
Privacy Policy – tells the used how the website handle its 2. List or Data File
data - Two essential components of creating a merged
Copyright – part of the law; those who use your work document are present: the form document and
without your consent is punishable by law the data file
IMAGE PLACEMENT
TEXT WRAPPING