Professional Documents
Culture Documents
Reviewer ICT
Reviewer ICT
Reviewer ICT
Please avoid CHEATING! Learn to study and answer all your questions alone! Remember, at the end of
the day, you are going home ALONE.
For the wages of sin is DEATH (Romans 6:23)
2. Social Media – Social media is a website, applications processes or technologies
application, or online channels that enable web are developed
users to create, co-create, discuss, modify, and
exchange user-generated content. 7 Different Types of Online Platform
e. Microblogging – These are sites that focus on 2. Cloud Computing – the practice of using a
short updates from the user. network of remote servers hosted on the internet
to store, manage, and process data, rather than a
f. Blogs and Forums – These websites allow local server or a personal computer
users to post their content.
Examples of Cloud Computing:
3. Mobile Technologies Google Drive – keep all work in one
The popularity of smartphones and tablets has secure place with online file storage.
taken a major rise over the years. This is largely Dropbox – keeps your files safe, synced,
because of the devices’ capability to do tasks and easy to share
that were originally found in personal
computers. 3. Social Media - are computer-mediated tools
that allow people, companies and other
Kinds of operating systems: organizations to create, share, or exchange
a. iOS information, career interests, ideas, and
b. Android pictures/videos in virtual communities and
c. Blackberry OS networks.
d. Windows Phone OS
e. Symbian Examples of Social Media Sites:
f. WebOS Instagram – used to share photos and
g. Windows Mobile videos to other people.
Facebook – is for-profit corporation and
4. Assistive Media – Assistive media is a
online social networking service.
nonprofit service designed to help people who
have visual and reading impairments. A database
4. Web Page Creation – encompasses a number
of audio recordings is used to read to the user.
of important elements including color, layout,
and overall graphical appearance.
ONLINE PLATFORM
What is an online platform?
Examples of Web Page Creation:
- are technologies that are grouped to be
• Wix – a cloud-based web development
used as a base upon which other
platform that allows users to create
Please avoid CHEATING! Learn to study and answer all your questions alone! Remember, at the end of
the day, you are going home ALONE.
For the wages of sin is DEATH (Romans 6:23)
HTML5 websites and mobile sites perhaps because people sometimes forget that
through the use of their online drag and there's a human being on the other side of the
drop tools computer, some people think that a lower
• Weebly – a web-hosting service standard of ethics or personal behaviour is
featuring a drag- and-drop website acceptable in cyberspace.
builder.
Rule 3: Know where you are in cyberspace -
5. File Management – is the storing, naming, Netiquette varies from domain to domain.
sorting and handling computer files. What's perfectly acceptable in one area may be
dreadfully rude in another.
Examples of File Management
• Zamzar – web application to convert Rule 4: Respect other people's time and
files. bandwidth - When you send email or post to a
• word2pdf – convert Word files to PDF discussion group, you're taking up other people's
(Portable Document Format) with this time (or hoping to). It's your responsibility to
online tool ensure that the time they spend reading your
posting isn't wasted.
6. Mapping – a transformation taking the points
of one space into the points of the same or Rule 5: Make yourself look good online - The
another space impression that the net is a cold, cruel place full
of people who just can't wait to insult each other.
Examples of Mapping: As in the world at large, most people who
Google Maps – a desktop web mapping service communicate online just want to be liked.
developed by Google. Networks -- particularly discussion groups -- let
you reach out to people you'd otherwise never
7. Blogging – is a discussion or informational meet. And none of them can see you. You won't
website published on the web consisting of be judged by the color of your skin, eyes, or
discrete, often informal diary-style text entries hair, your weight, your age, or your clothing.
("posts"). Posts are typically displayed in reverse
chronological order, so that the most recent post Rule 6: Share expert knowledge - The strength
appears first, at the top of the web page. of cyberspace is in its numbers. The reason
asking questions online works is that a lot of
Examples of Blogging Sites: knowledgeable people are reading the questions.
• WordPress (wordpress.com) And if even a few of them offer intelligent
• Blogger (blogger.com or blogspot.com) answers, the sum total of world knowledge
• Blog.com increases. The Internet itself was founded and
• Medium.com grew because scientists wanted to share
• Squarespace.com information. Gradually, the rest of us got in on
the act.
10 Rules of Netiquette
Rule 7: Help keep flame wars under control -
Rule 1: Remember the human - When you
"Flaming" is what people do when they express
communicate electronically, all you see is a
a strongly held opinion without holding back
computer screen. You don't have the opportunity
any emotion. It's the kind of message that makes
to use facial expressions, gestures, and tone of
people respond, "Oh come on, tell us how you
voice to communicate your meaning; words --
really feel."
lonely written words -- are all you've got. And
that goes for your correspondent as well.
Rule 8: Respect other people's privacy -
Failing to respect other people's privacy is not
Rule 2: Adhere to the same standards of
just bad Netiquette. It could also cost you your
behaviour online that you follow in real life -
job.
In real life, most people are fairly law-abiding,
either by disposition or because we're afraid of
Rule 9: Don't abuse your power - Knowing
getting caught. In cyberspace, the chances of
more than others, or having more power than
getting caught sometimes seem slim. And,
Please avoid CHEATING! Learn to study and answer all your questions alone! Remember, at the end of
the day, you are going home ALONE.
For the wages of sin is DEATH (Romans 6:23)
they do, does not give you the right to take 4 Types of Malware
advantage of them. a. Virus – a malicious program designed to
Rule 10: Be forgiving of other people's replicate itself and transfer from one computer to
mistakes - When someone makes a mistake -- another.
whether it's a spelling error or a spelling flame, a - Most people have heard of computer
stupid question or an unnecessarily long answer viruses, but not many know exactly what they
-- be kind about it. If it's a minor error, you may are or what they do.
not need to say anything. Even if you feel What they are:
strongly about it, think twice before reacting. Malicious computer programs that are often sent
Having good manners yourself doesn't give you as an email attachment or a download with the
license to correct everyone else. intent of infecting your computer, as well as the
computers of everyone in your contact list. Just
Tips to Stay Safe Online visiting a site can start an automatic download of
Here are some tips to help you stay safe when a virus.
using the Internet.
1. Be mindful of what you share and what b. Worm – a malicious program that transfers
site you share it to. from one computer to another by any type of
2. Do not just accept terms and conditions; means.
read it. - Worms are a common threat to
3. Check out the privacy policy page of a computers and the Internet as a whole.
website. What they are:
4. Know the security features of the social A worm, unlike a virus, goes to work on its own
networking site you use. without attaching itself to files or programs. It
5. Do not share password with anyone. lives in your computer memory, doesn't damage
6. Avoid logging in to public networks/Wi- or alter the hard drive and propagates by sending
Fi. itself to other computers in a network – whether
7. Do not talk to strangers whether online within a company or the Internet itself.
or face-to-face.
8. Never post anything about future c. Trojan - a malicious program that is
vacation. disguised as a useful program but once
9. Add friends you know in real life. downloaded or installed, leaves your PC
10. Avoid visiting untrusted websites. unprotected and allows hacker to get you
11. Install and update an antivirus software information.
on your computer. - may not be a term you're familiar with,
12. If you have a Wi-Fi at home, make it a but there's a good chance you or someone you
private network by adding password. know has been affected by one.
13. Avoid downloading anything from What it is:
untrusted websites. A malicious program that is disguised as, or
14. Buy the software; do not use pirated embedded within, legitimate software. It is an
ones. executable file that will install itself and run
15. Do not reply or click links from automatically once it's downloaded.
suspicious emails.
d. Spyware - a program that runs in the
background without you knowing it.
Internet Threats - are often used by third parties to
1. Malware – stands for Malicious infiltrate your computer.
Software. What it is:
- it is one of the more common ways to infiltrate Software that collects personal information
or damage your computer. about you without you knowing. They often
What it is: come in the form of a ‘free' download and are
Malicious software that infects your computer, installed automatically with or without your
such as computer viruses, worms, Trojan horses, consent. These are difficult to remove and can
spyware, and adware. infect your computer with viruses.
Please avoid CHEATING! Learn to study and answer all your questions alone! Remember, at the end of
the day, you are going home ALONE.
For the wages of sin is DEATH (Romans 6:23)
2. Spam – unwanted email mostly from bots or the human intellect, and primarily
advertisers. encompasses copyrights, patents,
- it is one of the more common methods and trademarks. It also includes other types of
of both sending information out and collecting it rights, such as trade secrets, publicity rights,
from unsuspecting people. moral rights, and rights against unfair
What it is: competition.
The mass distribution of unsolicited messages,
advertising or pornography to addresses which Copyright law - is intended to encourage the
can be easily found on the Internet creation of art and culture by rewarding authors
through things like social networking and artists with a set of exclusive rights.
sites, company websites and personal Copyright law grants authors and artists the
blogs. exclusive right to make and sell copies of their
works, the right to create derivative works, and
3. Phishing – its goal is to acquire sensitive the right to perform or display their works
personal information like passwords and credit publicly.
card details.
- used most often by cyber criminals Online Research
because it's easy to execute and can produce the 1. Have a question in mind. Focus on a
results they're looking for with very little effort. question you want answered.
What it is: 2. Narrow it down. Search engines like
Fake emails, text messages and websites created Google, Bing, or Yahoo use several
to look like they're from authentic companies. filters to determine the most appropriate
They're sent by criminals to steal personal and result for you.
financial Information from you. This is also 3. Advanced Search. The best way to
known as “spoofing”. filter information you get from search
engines is by using the advanced search.
Keyloggers – used to record the keystroke done 4. Look for a credible sources. Some
by the user. wikis, filled with updated information,
are not a credible source. When using
Copyright Infringement (colloquially referred wikis, check out the link of the cited
to as piracy) is the use of works protected text.
by copyright law without permission, infringing 5. Give credit. Give credit to the original
certain exclusive rights granted to the copyright author of the page or information. To
holder, such as the right to reproduce, distribute, properly site a reference, you may use
display or perform the protected work, or to the format below.
make derivative works.
7 Different Text Wrapping
Tips to Avoid Copyright Infringement 1. In Line with Text
1. Understand. Copyright protect literary 2. Square
works, photographs paintings, drawings, 3. Through
films, music (and lyrics), choreography, 4. Tight
and sculptures. 5. Top and Bottom
2. Be responsible. Even if a material does 6. Behind Text
not say that it is copyrighted, it is not a 7. In Front of Text
valid defense against copyright.
3. Be creative. Ask yourself whether what Two Components of Mail Merge:
you are making is something that came 1. Form Document - The document that
from you or something made from contains the main body of the message we want
somebody else’s creativity. to convey or send.
4. Know the law. There are some
limitations to copyright laws. 2. List or Data File - This is where the
individual information or data that needs to be
Intellectual property (IP) - is a category plugged in (merged) to our form document is
of property that includes intangible creations of placed and maintained.
Please avoid CHEATING! Learn to study and answer all your questions alone! Remember, at the end of
the day, you are going home ALONE.
For the wages of sin is DEATH (Romans 6:23)
amount of data that can be transmitted in a fixed
Label Generation - It creates a blank form amount of time. Usually expressed in bits per
document that simulates either a blank label or second (bps) or bytes per second.
envelope of pre-defined size and will use the
data file that you selected to print the
Recall the Conversion of
information, typically, individual addresses.
Whole number to Binary and
Integrating Images and External Vice Versa
Materials
Kinds of Materials:
1. Pictures. Generally, these are electronic
or digital pictures or photographs you
have saved in any local storage device.
Please avoid CHEATING! Learn to study and answer all your questions alone! Remember, at the end of
the day, you are going home ALONE.
For the wages of sin is DEATH (Romans 6:23)