Reviewer ICT

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

Information and Communication

5. Software as a Service – Users will subscribe


Technologies (ICT)
to a software only when needed rather than
- Deals with the use of different
purchasing them. This is a cheaper option if you
communication technologies such as
do not always need to use a software. For
mobile phones, telephone, Internet, etc.
instance, Google Docs is a free web-based
to locate, save, send and edit
application that allows the user to create and edit
information.
word processing and spreadsheet documents
Example: when we make a video call, we use
online. When you need a software, like a Word
the internet
Processor, you can purchase it for a one-time
huge amount and install it in your computer and
Web 1.0 (Static Website) – A read – only
it is yours forever. Software as a service allows
webpages wherein there is no interaction
you to “rent” a software for a minimal fee.
between the webpage and the user.
6. Mass Participation – It is a diverse
Web 2.0 (Dynamic Website) - is the evolution
information sharing through universal web
of Web 1.0 by adding dynamic web pages—the
access. Since most users can use the Internet,
user is able to see a website differently than
Web 2.0’s content is based on people from
others. Examples of Web 2.0 include social
various cultures.
networking sites, blogs, wikis, video sharing
sites, hosted services, and web applications.
Web 3.0 (Semantic Website) - provides a
common framework that allows data to be
Features of Web 2.0
shared and reused across application, enterprise,
1. Folksonomy – It allows users to categorize
and community boundaries.” The aim of Web
and classify/arrange information using freely
3.0 is to have machines (or servers) understand
chosen keywords (e.g., tagging). Popular social
the user’s preferences to be able to deliver web
networking sites such as Twitter, Instagram,
content specifically targeting the user.
Facebook, etc. use tags that start with the pound
sign (#). This is also referred to as hashtag.
Several problems of Web 3.0
1. Compatibility – HTML files and current web
2. Rich User Experience – Content is dynamic
browsers could not support Web 3.0.
and is responsive to user’s input. An example
would be a website that shows local content. In
2. Security – The user’s security is also in
the case of social networking sites, when logged
question since the machine is saving his or her
on, your account is used to modify what you see
preferences.
in their website. (Can enlarge image.)
3. Vastness – The World Wide Web already
3. Long Tail – Services are offered on demand
contains billions of web pages.
rather than on a one-time purchase. In certain
cases, time-based pricing is better than file-size-
4. Vagueness – Certain words are imprecise.
based pricing or vice versa. This is synonymous
The words “old” and “small” would depend on
to subscribing to a data plan that charges you for
the user.
the amount of time you spent in the Internet, or a
data plan that charges you for the amount of
5. Logic – Since machines use logic, there are
bandwidth you used.
certain limitations for a computer to be able to
predict what the user is referring to at a given
4. User Participation – The owner of the
time.
website is not the only one who is able to put
content. Others are able to place a content of
Trends in ICT
their own by means of comment, reviews, and
1. Convergence – Technological convergence is
evaluation. Some websites allow readers to
the synergy of technological advancements to
comment on an article, participate in a poll, or
work on a similar goal or task.
review a specific product (e.g., Amazon.com,
online stores).

Please avoid CHEATING! Learn to study and answer all your questions alone! Remember, at the end of
the day, you are going home ALONE.
For the wages of sin is DEATH (Romans 6:23)
2. Social Media – Social media is a website, applications processes or technologies
application, or online channels that enable web are developed
users to create, co-create, discuss, modify, and
exchange user-generated content. 7 Different Types of Online Platform

Six types of social media: 1. Presentation / Visualization – communicates


a. Social Networks – These are sites that allow information clearly and efficiently via statistical
you to connect with other people with the same graphics, plots and information graphics.
interests or background.
Example of Presentation/Visualization:
b. Bookmarking Sites – These are sites that  Prezi – helping to reinvent the art of
allow you to store and manage links to various presentation.
websites and resources.  Zoho – an online project management
app that helps you plan your work and
c. Social News – These are sites that allow users keep track of your progress
to post their own news items or links to other  SlideShare – to build quickly from
news sources. concise, well- presented content from
top experts
d. Media Sharing – These are sites that allow  MindMeister – an online mind-mapping
you to upload and share media content like tool that lets you capture, develop and
images, music, and video. share ideas visually

e. Microblogging – These are sites that focus on 2. Cloud Computing – the practice of using a
short updates from the user. network of remote servers hosted on the internet
to store, manage, and process data, rather than a
f. Blogs and Forums – These websites allow local server or a personal computer
users to post their content.
Examples of Cloud Computing:
3. Mobile Technologies  Google Drive – keep all work in one
The popularity of smartphones and tablets has secure place with online file storage.
taken a major rise over the years. This is largely  Dropbox – keeps your files safe, synced,
because of the devices’ capability to do tasks and easy to share
that were originally found in personal
computers. 3. Social Media - are computer-mediated tools
that allow people, companies and other
Kinds of operating systems: organizations to create, share, or exchange
a. iOS information, career interests, ideas, and
b. Android pictures/videos in virtual communities and
c. Blackberry OS networks.
d. Windows Phone OS
e. Symbian Examples of Social Media Sites:
f. WebOS  Instagram – used to share photos and
g. Windows Mobile videos to other people.
 Facebook – is for-profit corporation and
4. Assistive Media – Assistive media is a
online social networking service.
nonprofit service designed to help people who
have visual and reading impairments. A database
4. Web Page Creation – encompasses a number
of audio recordings is used to read to the user.
of important elements including color, layout,
and overall graphical appearance.
ONLINE PLATFORM
What is an online platform?
Examples of Web Page Creation:
- are technologies that are grouped to be
• Wix – a cloud-based web development
used as a base upon which other
platform that allows users to create

Please avoid CHEATING! Learn to study and answer all your questions alone! Remember, at the end of
the day, you are going home ALONE.
For the wages of sin is DEATH (Romans 6:23)
HTML5 websites and mobile sites perhaps because people sometimes forget that
through the use of their online drag and there's a human being on the other side of the
drop tools computer, some people think that a lower
• Weebly – a web-hosting service standard of ethics or personal behaviour is
featuring a drag- and-drop website acceptable in cyberspace.
builder.
Rule 3: Know where you are in cyberspace -
5. File Management – is the storing, naming, Netiquette varies from domain to domain.
sorting and handling computer files. What's perfectly acceptable in one area may be
dreadfully rude in another.
Examples of File Management
• Zamzar – web application to convert Rule 4: Respect other people's time and
files. bandwidth - When you send email or post to a
• word2pdf – convert Word files to PDF discussion group, you're taking up other people's
(Portable Document Format) with this time (or hoping to). It's your responsibility to
online tool ensure that the time they spend reading your
posting isn't wasted.
6. Mapping – a transformation taking the points
of one space into the points of the same or Rule 5: Make yourself look good online - The
another space impression that the net is a cold, cruel place full
of people who just can't wait to insult each other.
Examples of Mapping: As in the world at large, most people who
Google Maps – a desktop web mapping service communicate online just want to be liked.
developed by Google. Networks -- particularly discussion groups -- let
you reach out to people you'd otherwise never
7. Blogging – is a discussion or informational meet. And none of them can see you. You won't
website published on the web consisting of be judged by the color of your skin, eyes, or
discrete, often informal diary-style text entries hair, your weight, your age, or your clothing.
("posts"). Posts are typically displayed in reverse
chronological order, so that the most recent post Rule 6: Share expert knowledge - The strength
appears first, at the top of the web page. of cyberspace is in its numbers. The reason
asking questions online works is that a lot of
Examples of Blogging Sites: knowledgeable people are reading the questions.
• WordPress (wordpress.com) And if even a few of them offer intelligent
• Blogger (blogger.com or blogspot.com) answers, the sum total of world knowledge
• Blog.com increases. The Internet itself was founded and
• Medium.com grew because scientists wanted to share
• Squarespace.com information. Gradually, the rest of us got in on
the act.
10 Rules of Netiquette
Rule 7: Help keep flame wars under control -
Rule 1: Remember the human - When you
"Flaming" is what people do when they express
communicate electronically, all you see is a
a strongly held opinion without holding back
computer screen. You don't have the opportunity
any emotion. It's the kind of message that makes
to use facial expressions, gestures, and tone of
people respond, "Oh come on, tell us how you
voice to communicate your meaning; words --
really feel."
lonely written words -- are all you've got. And
that goes for your correspondent as well.
Rule 8: Respect other people's privacy -
Failing to respect other people's privacy is not
Rule 2: Adhere to the same standards of
just bad Netiquette. It could also cost you your
behaviour online that you follow in real life -
job.
In real life, most people are fairly law-abiding,
either by disposition or because we're afraid of
Rule 9: Don't abuse your power - Knowing
getting caught. In cyberspace, the chances of
more than others, or having more power than
getting caught sometimes seem slim. And,
Please avoid CHEATING! Learn to study and answer all your questions alone! Remember, at the end of
the day, you are going home ALONE.
For the wages of sin is DEATH (Romans 6:23)
they do, does not give you the right to take 4 Types of Malware
advantage of them. a. Virus – a malicious program designed to
Rule 10: Be forgiving of other people's replicate itself and transfer from one computer to
mistakes - When someone makes a mistake -- another.
whether it's a spelling error or a spelling flame, a - Most people have heard of computer
stupid question or an unnecessarily long answer viruses, but not many know exactly what they
-- be kind about it. If it's a minor error, you may are or what they do.
not need to say anything. Even if you feel What they are:
strongly about it, think twice before reacting. Malicious computer programs that are often sent
Having good manners yourself doesn't give you as an email attachment or a download with the
license to correct everyone else. intent of infecting your computer, as well as the
computers of everyone in your contact list. Just
Tips to Stay Safe Online visiting a site can start an automatic download of
Here are some tips to help you stay safe when a virus.
using the Internet.
1. Be mindful of what you share and what b. Worm – a malicious program that transfers
site you share it to. from one computer to another by any type of
2. Do not just accept terms and conditions; means.
read it. - Worms are a common threat to
3. Check out the privacy policy page of a computers and the Internet as a whole.
website. What they are:
4. Know the security features of the social A worm, unlike a virus, goes to work on its own
networking site you use. without attaching itself to files or programs. It
5. Do not share password with anyone. lives in your computer memory, doesn't damage
6. Avoid logging in to public networks/Wi- or alter the hard drive and propagates by sending
Fi. itself to other computers in a network – whether
7. Do not talk to strangers whether online within a company or the Internet itself.
or face-to-face.
8. Never post anything about future c. Trojan - a malicious program that is
vacation. disguised as a useful program but once
9. Add friends you know in real life. downloaded or installed, leaves your PC
10. Avoid visiting untrusted websites. unprotected and allows hacker to get you
11. Install and update an antivirus software information.
on your computer. - may not be a term you're familiar with,
12. If you have a Wi-Fi at home, make it a but there's a good chance you or someone you
private network by adding password. know has been affected by one.
13. Avoid downloading anything from What it is:
untrusted websites. A malicious program that is disguised as, or
14. Buy the software; do not use pirated embedded within, legitimate software. It is an
ones. executable file that will install itself and run
15. Do not reply or click links from automatically once it's downloaded.
suspicious emails.
d. Spyware - a program that runs in the
background without you knowing it.
Internet Threats - are often used by third parties to
1. Malware – stands for Malicious infiltrate your computer.
Software. What it is:
- it is one of the more common ways to infiltrate Software that collects personal information
or damage your computer. about you without you knowing. They often
What it is: come in the form of a ‘free' download and are
Malicious software that infects your computer, installed automatically with or without your
such as computer viruses, worms, Trojan horses, consent. These are difficult to remove and can
spyware, and adware. infect your computer with viruses.

Please avoid CHEATING! Learn to study and answer all your questions alone! Remember, at the end of
the day, you are going home ALONE.
For the wages of sin is DEATH (Romans 6:23)
2. Spam – unwanted email mostly from bots or the human intellect, and primarily
advertisers. encompasses copyrights, patents,
- it is one of the more common methods and trademarks. It also includes other types of
of both sending information out and collecting it rights, such as trade secrets, publicity rights,
from unsuspecting people. moral rights, and rights against unfair
What it is: competition.
The mass distribution of unsolicited messages,
advertising or pornography to addresses which Copyright law - is intended to encourage the
can be easily found on the Internet creation of art and culture by rewarding authors
through things like social networking and artists with a set of exclusive rights.
sites, company websites and personal Copyright law grants authors and artists the
blogs. exclusive right to make and sell copies of their
works, the right to create derivative works, and
3. Phishing – its goal is to acquire sensitive the right to perform or display their works
personal information like passwords and credit publicly.
card details.
- used most often by cyber criminals Online Research
because it's easy to execute and can produce the 1. Have a question in mind. Focus on a
results they're looking for with very little effort. question you want answered.
What it is: 2. Narrow it down. Search engines like
Fake emails, text messages and websites created Google, Bing, or Yahoo use several
to look like they're from authentic companies. filters to determine the most appropriate
They're sent by criminals to steal personal and result for you.
financial Information from you. This is also 3. Advanced Search. The best way to
known as “spoofing”. filter information you get from search
engines is by using the advanced search.
Keyloggers – used to record the keystroke done 4. Look for a credible sources. Some
by the user. wikis, filled with updated information,
are not a credible source. When using
Copyright Infringement (colloquially referred wikis, check out the link of the cited
to as piracy) is the use of works protected text.
by copyright law without permission, infringing 5. Give credit. Give credit to the original
certain exclusive rights granted to the copyright author of the page or information. To
holder, such as the right to reproduce, distribute, properly site a reference, you may use
display or perform the protected work, or to the format below.
make derivative works.
7 Different Text Wrapping
Tips to Avoid Copyright Infringement 1. In Line with Text
1. Understand. Copyright protect literary 2. Square
works, photographs paintings, drawings, 3. Through
films, music (and lyrics), choreography, 4. Tight
and sculptures. 5. Top and Bottom
2. Be responsible. Even if a material does 6. Behind Text
not say that it is copyrighted, it is not a 7. In Front of Text
valid defense against copyright.
3. Be creative. Ask yourself whether what Two Components of Mail Merge:
you are making is something that came 1. Form Document - The document that
from you or something made from contains the main body of the message we want
somebody else’s creativity. to convey or send.
4. Know the law. There are some
limitations to copyright laws. 2. List or Data File - This is where the
individual information or data that needs to be
Intellectual property (IP) - is a category plugged in (merged) to our form document is
of property that includes intangible creations of placed and maintained.
Please avoid CHEATING! Learn to study and answer all your questions alone! Remember, at the end of
the day, you are going home ALONE.
For the wages of sin is DEATH (Romans 6:23)
amount of data that can be transmitted in a fixed
Label Generation - It creates a blank form amount of time. Usually expressed in bits per
document that simulates either a blank label or second (bps) or bytes per second.
envelope of pre-defined size and will use the
data file that you selected to print the
Recall the Conversion of
information, typically, individual addresses.
Whole number to Binary and
Integrating Images and External Vice Versa
Materials
Kinds of Materials:
1. Pictures. Generally, these are electronic
or digital pictures or photographs you
have saved in any local storage device.

2. Clip Art. This is generally a .GIF type;


line art drawings or images used as
generic representation for ideas and
objects that you might want to integrate
in your document.

3. Shapes. These are printable objects or


materials that you can integrate in your
document to enhance its appearance or
to allow you to have some tools to use
for composing and representing ideas or
messages.

4. Smart Art. Generally, these are


predefined sets of different shapes
grouped together to form ideas that are
organizational or structural in nature.

5. Chart. Another type of material that


you can integrate in your Word
document that allows you to represent
data characteristics and trends.

6. Screenshot. Sometimes, creating reports


or manuals for training or procedure will
require the integration of a more
realistic image of what you are
discussing on your report or manual.

3 File Types of Images


JPEG – Joint Photographic Experts Group
PNG – Portable Network Graphics
GIF – Graphic Interchange Format

Other Important Details:


HTML – Hypertext Markup Language
URL – Uniform/Universal Resource Locator
Bandwidth - Defined as a range within a band
of frequencies or wavelengths. It is also the

Please avoid CHEATING! Learn to study and answer all your questions alone! Remember, at the end of
the day, you are going home ALONE.
For the wages of sin is DEATH (Romans 6:23)

You might also like