Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

̵ Enables the user to share mobile photo and video

Empowerment Technologies either publicly or privately and through other networking


site.

THE CURRENT STATE OF ICT


WEB 1.0
̵ The first stage of the World Wide Web.
̵ At the beginning of the WWW, there were very few 4. Snapchat
web content creators and many of them were so called ̵ It is designed for photo sharing, chat and messaging
“read only web” since there was no interaction. services. Images and videos shared in this app last
̵ The web pages are static, meaning you can read the only for a short time and they are gone after.
text and look at the photos but the user could not interact
with it to obtain more information. DANGERS ON THE INTERNET
̵ The feedback mechanism was thru private email and 1. Email Spam
direct comment was not available. ̵ Also known as junk mail, it is usually unsolicited
̵ Internet was focused more on businesses and commercial email sent from one source with identical
commercial purposes. message sent to multiple recipients.
̵ From 1997 to 2000, the dot-com bubble gave way to ̵ Dangerous spams carry vires like Trojan horse and
rise and fall of dot-com companies, or internet-based other malicious software (malware).
companies. ̵ Spamming is projected to continue because it is a
WEB 2.0 cheap means of advertising.
̵ The term “Web 2.0” was first used in a 1999 article ̵ Spammer is the term used to refer to a person who
written by Darcy DiNucci called “Fragmented Future”. creates electronic spam.
̵ Tim O’Reilly described its state as “Web as a 2. Email Spoofing
Platform” wherein software applications are web-based ̵ Refers to deceitful email practice in which the sender
rather than being on a desktop. address is changed, so that it would appear to have
̵ The internet became more and more interactive. come from a different source usually someone you
̵ The user can now interact, contribute and create their know.
own internet space and content resulting in the explosion of ̵ It is usually used by spammers to hide the origin of
information available for everyone on the net. the spam.
̵ The beginning of the wide use and popularity of the 3. Phishing
social media. ̵ A deceitful practice of trying to get confidential
̵ Web pages are now written using web programs such information such as passwords and usernames, and credit
as PHP, Python, Ruby or Perl – all dynamic programming card details by making it appear as if it comes from a
languages. trustworthy source.
̵ It is the advent of the “read-write” web. ̵ Internet user would think that they are accessing a
WEB 3.0 genuine website and through this way, a phisher would be
̵ It is named and referred to by web experts as able to gather sensitive information from the internet user.
semantic web or data driven web content and response. 4. Spyware
̵ The father of WWW, Time Berners-Lee described it ̵ A computer program that is installed covertly on a
as “read-write-execute” web. personal computer to collect information or event take
̵ The World Wide Web Consortium described it as control over the computer without the knowledge of the
having an integrated link of data across the entire Web. user.
̵ It is known that spyware programs also affect the
SOCIAL MEDIA performance and settings of the computer.
It is a collection of internet-based communication tools and 5. Computer Worm
computer-assisted channels dedicated to allow users to ̵ A dangerous computer program that replicates itself
interact, communicate and share information in virtual through a network.
community and network. ̵ Some worms delete files, other disrupt the network
The most common social media site are: function and still, other send junk mail from infected
1. Facebook computer.
̵ The most popular free networking site with more than 6. Trojan Horse
a billion user around the globe. ̵ This is a form of malicious software (malware) fronting
̵ It allows its user to create profiles, upload photos and to perform a good task, but covertly performs
videos, create and join groups, reacts to friends’ posts, undesirable function with the intention of entering the
create events send messages, keeping in touch with close computer without the user’s consent.
friends and relatives. ̵ It can disable the computer’s defenses opening it to
2. Twitter unauthorized entry.
̵ It allows users to microblog or broadcast short 7. Computer Virus
messages called “tweets”. ̵ A program that duplicates itself and the infects the
3. Instagram computer.
̵ It spreads like a real biological virus, wherein it
attaches itself to a host program and infect other
computers if it is received by a computer through the ̵ Named as one of the best of 2014 by both Apple and
internet. Google play.
8. Hacker ̵ Wunderlist bills itself as a tool for home, work and
̵ The person who is able to enter and control other play.
people’s computer without authorization. 4. Teux-deux (desktop and app)
̵ It combines graphic and functional simplicity into an
SECURITY CENTER interface that makes productivity a pleasure.
1. Firewall ̵ It’s a simple as a pen and paper, but much prettier,
̵ It helps in protecting your computer from unauthorized and the mobile app lets you take your to-do list on the road.
entries, viruses or worms from the Internet or network. 5. Bullet Journaling
2. Automatic Updates ̵ Bullet journaling bills itself as a system “for the list-
̵ Another feature of Windows which when turned on makers, the note-takers, the Post-It note pilots, the track-
will automatically download updates from Microsoft keepers and the dabbling doodlers”.
Windows website. ̵ A system for organizing the present, recording the
3. Virus Protection past and planning for the future, it centers on a technique
̵ It is usually about the current antivirus software called rapid logging, helping you direct your time and
installed in your computer; this option is energy efficiently.
recommended to be turned on always. 6. Today.txt
̵ Antivirus Software is meant to locate, find and remove ̵ According to the today.txt method, it’s not the
virus threats that are already in your computer. distractions that are the biggest problem but the lack of
THE CORE RULES OF NETIQUETTE prioritization.
1. Remember the human. 7. Post It
2. Adhere to the same standards of behavior online that you ̵ This concept can be summed up in one simple line “if
follow in real life. it won’t fit on a Post-It, it won’t fit in your day.”
3. Know where you are in cyberspace. 8. Evernote
4. Respect other people’s time and bandwidth. ̵ It may be the most beloved and most frequently
5. Make yourself look good online. recommended productivity app.
6. Share expert knowledge. ̵ The website promises that “for everything you’ll do,
7. Help keep flame wars under control. Evernote is the workspace to get it done.”
8. Respect other people’s privacy. ̵ From writing, collecting, finding and presenting,
9. Don’t abuse your power. Evernote allows you to keep track of everything you need –
10. Be forgiving of other people’s mistakes. and share and collaborate with others.
9. Trello
THE TEN COMMANDMENTS FOR COMPUTER ̵ It acts as a board of virtual post-it notes, allowing you
ETHICS to move from content planning and creation to distribution
Thou shalt… in a simple, yet robust, platform.
1. …not use a computer to harm other people. ̵ It can be used by an individual or a team and can
2. …not interfere with other people’s computer work. keep everyone involved up to date on the progress of every
3. …not snoop around in other people’s files. project.
4. …not use a computer to steal. 10. Asana
5. …not use a computer to bear false witness. ̵ The system allows you to navigate and track projects
6. …not use or copy software for which you have not paid. and liberates your team from email overwhelm.
7. ...not use other people’s computer resources without 11. Get It Done
authorization. ̵ “Creative people tend to see the world a little
8. …not appropriate other people’s intellectual output. differently than everyone else.”
9. …think about the social consequences of the program you ̵ It promises to take you from procrastination to
write. creative genius in 15 mins. a day – helping creative zero in
10. …use a computer in ways that show consideration and on goals, focus, get organized and harness energies in
respect. productive and income-generating ways.
THE BEST PRODUCTIVITY APPS, TOOLS AND 12. Pomodoro
METHODS ̵ It is based on the idea that we’re more productive
1. 1-3-5 List (desktop) when we work with our available time, instead of struggling
̵ It encourages you to “Get things done by setting against it.
these few simple goals for the day.” ̵ The system allows you for short, scheduled breaks to
̵ This system can help you feel in control of setting limit overwhelm and burnout; by combining a longer
realistic goals and meeting them. uninterrupted stretch of work with a short, timed break, it
2. Carrot (app) helps with both productivity and balance.
̵ It calls itself “the to do list with personality” and 13. Kanban
promises to make your to-do list fun by gamifying the ̵ It is a visual, hands-n system that relies on four
process. foundational pieces: visualizing your work, limiting the work
̵ This app lets you earn rewards by completing your you have in progress, focusing on flow and continuous
tasks, but warns that slackers make Carrot upset. improvement.
3. Wunderlist (desktop and app)
̵ The works for individuals or teams and for personal Hyperlink allows you to go to other slides in the same
work or large projects. or another presentation, in a web page and even to
email addresses.

B. Creating a hyperlink to a slide in a different presentation.


APPLIED PRODUCTIVITY TOOLS 1. Go to Normal view, select the text or the object that you
want to use as a hyperlink.
Using MS Publisher to Create a Mail Merge 2. On the Insert tab, go to the Links group and click Hyperlink.
A. Creating a Recipient List 3. Under Link to, click Existing File or Web Page.
1. Click on Mailings tab, go to the Start group and click Select 4. Locate the presentation that contains the slide that you want
Recipients. to link to.
2. On the list of options, select Type New List. 5. Click Bookmark, and the click the title of the slide that you
3. On the New Address List dialog box, click New Entry and want to link.
type the recipient information.
4. Click OK. ADVANCED AND COMPLEX FORMULAS AND
COMPUTATIONS
B. Editing a Recipient List Function Constants
1. Click the Mailings tab, go to the Start group and click Edit Equal Sign
Recipient List.
2. On the Mail Merge Recipient dialog box, click the name that
Reference
you would like to edit and type the correct information. Operators

Parts of Formula
C. Creating a Mail Merge Functions – The PI( ) function returns the value of pi: 3.1416…
1. Click Mailings tab, go to the Start group and click Mail References – A8 returns the value in cell A8.
Merge. Constants – Number or text values entered directly into a
2. Select the Step by Step Mail Merge Wizard and the pane will formula, such as 7, 6, 1.
be displayed. Operators
The ^ (caret) operator raises a number to a power.
Using MS PowerPoint to Create Custom Animations The * (asterisk) operator multiplies numbers.
A. Adding an Animation The + (plus) operator adds numbers.
1. Click the Animation tab and go to the Advanced Animation The – (minus) operator subtracts numbers.
group.
2. Select the animation from the list of options grouped as Functions are built-in formulas you can use to make
Entrance, Emphasis and Exit. your worksheet construction easier.

Slide Animation is a moving computer graphic effects Excel Functions


that can be added to the text, object or the entire  =SUM ( ) – Calculates the sum of the values of a range of
slide. cells.
 =AVERAGE ( ) – Calculates the arithmetic mean of a
B. Creating Custom Animation range of cells or values.
1. Zoom out the slide in order for you to see the outside part of  =MAX ( ) – Gives the maximum value in a range of cells or
the slide. values.
2. Draw an oval and bring it outside of the slide.  =MIN ( ) – Gives the minimum value in a range of cells or
3. On the Animation group, click the drop-down arrow to see values.
the available tools grouped as Entrance, Emphasis, Exit and  COUNT ( ) – Counts the number of cells in a range of cells
Motion Paths. or values.
4. On the Motion Paths, select Custom Path.  IF ( ) – Shows a series of calculations using the same
5. Click from the object and draw a line of path. formula but a different value of each calculation to
6. Double click the end of the line where the shape will rest. determine whether the formula is true or false.
7. You can also select the present motion path such as Line,
Arcs, Turns, Shapes and Loops. A. Using the SUM Function
1. Click on the cell you want to perform the formula.
Hyperlinking Presentation 2. Click the Formula tab, go to the Function Library group and
A. Creating a hyperlink to a slide in the same presentation. click the AutoSum button.
1. Click the text where you want to create a hyperlink. 3. Highlight the data that you would like to add.
2. Click the Insert tab, go to the Links group and click the 4. Press the Enter key to finish the formula.
Hyperlink button.
3. On the Hyperlink dialog box, select Page in This Document. B. Using the AVERAGE Function
4. Select the page where you want to go when the text with 1. Click on the cell you want to perform the formula.
hyperlink is clicked. 2. Click the Formula tab, go to the Function Library group and
5. Click OK. click the AutoSum drop-down button.
3. On the drop-down menu, click the Average command and
highlight the data that you would like to find the average value.
4. Press the Enter key to finish the formula. ̵ This file format has all the features of a printed
documents as an electronic image, print, navigate or
C. Using the MAX Function even forward to other people.
1. Click on the cell you want to perform the formula. ̵ This file format is good for printing, online content,
2. Click the Formula tab, go to the Function Library group and archiving, business and legal documents, combining
click the AutoSum drop-down button. multiple formats, file exchange and the fact that
3. On the drop-down menu, click the Max command and anyone can view it.
highlight the data that you would like to find the minimum 5. DOC (“Document File”)
value. ̵ A file format created by Microsoft and used in
4. Press the Enter key to finish the formula. Microsoft Word.
̵ MS Word is able to generate and distribute
D. Using the MIN Function documents using a writing tool and it is possible to
1. Click on the cell you want to perform the formula. include charts, formatted text, graphs, images, tables,
2. Click the Formula tab, go to the Function Library group and page formatting and has a few printing setting.
click the AutoSum drop-down button.
3. On the drop-down menu, click the Min command and BASIC PRINCIPLES OF GRAPHICS AND
highlight the data that you would like to find the minimum LAYOUT
value.
4. Press the Enter key to finish the formula. 1. Balance
̵ Generally, balance means it is the equal distribution
E. Using the COUNT Function of weight.
1. Click on the cell you want to perform the formula. ̵ Two kinds of balance:
2. Click the Formula tab, go to the Function Library group and o Symmetrical Balance is the order of
click the AutoSum drop-down button. elements so that they are evenly allocated to
3. On the drop-down menu, click the Count command and the left and to the right or top and bottom of
highlight the data that you would like to find the minimum center.
value. o Asymmetrical Balance is the order of
4. Press the Enter key to finish the formula. different objects of the same weight on each
side of the page. Color, shape, size, texture
LOOKUP FUNCTIONS and value can be used as balancing
HLOOKUP – Used when the table direction is horizontal or elements.
across the worksheet. 2. Proximity
VLOOKUP – Used when the table direction is vertical or down ̵ The Principle of Proximity shows that you resemble
the worksheet. Since most tables are vertical, this function is related objects together, move them physically close
widely used. to each other so the related items are seen as a
- The general form of this function is: united group rather than a group of unrelated things.
= VLOOKUP (search argument, table range, column number) ̵ Its sole purpose is to organize.
3. Alignment
ONLINE FILE FORMATS FOR IMAGES AND ̵ The Principle of Alignment says, “Nothing should be
TEXT placed on the page arbitrarily. Every item should have
a visual connection with something else on the page”.
File Format is a standard process that data is ̵ The purpose of alignment is to unify and organize the
encoded for storage in a computer file. page.
4. Repetition
1. JPEG (“Join Photographic Experts Group”) ̵ According to the Principle of Repetition, it states
̵ This format is the most commonly used by digital “Repeat some aspect of the design throughout the
cameras and other capture devices and also the most entire piece.”
common format when saving pictures on the internet. ̵ It aids organize the information; it guides readers and
̵ This format is used when a small file size is more helps to make parts of the design become more
important than the maximum quality of the image. united.
2. GIF (“Graphics Interchange Format”) 5. Contrast
̵ One of the formats that are used to show indexed- ̵ According to the Principle of Contrast, it states that,
color graphics and pictures in HTML pages on the “If two items are not exactly the same, then make the
web. different. Really different.”
̵ Unique features that GIF can do is to preserve ̵ It is used to create an interest on the page.
transparency and can also be animated. ̵ It is also used to aid in the arrangement of the
3. PNG (“Portable Network Graphics”) information.
̵ It is used to generate background transparency 6. White Space
without jagged edges. ̵ According to the Principle of White Space, it states
̵ Best uses are logos that involve transparency and that “White space is the art of nothing. White space is
fading, images in the middle of the editing process the absence of text and graphics.”
and large complex images if file size is not an issue. ̵ Two kinds of white space:
4. PDF (“Portable Document Format”)
o The undefined white space, which is what
you get when you open a new document.
o Active white space, which happens when an
object is placed in an unspecified white
space.

You might also like