Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 24

EMPOWERMENT -The increasing prevalence of

Software as a Service (SaaS), web


TECHNOLOGIES apps and cloud computing
-Mobile computing
INTRODUCTION TO -Mash-ups
-Social networking
INFORMATION AND -Crowdfunding or Crowdsourcing
COMMUNICATIONS -User-generated content (UGC)
Unified communications (UC)
TECHNOLOGY -Social curation

Tools of Web 2.0:


SOCIAL MEDIA
-allows people to interact with one another
exchange information, career interests,
ideas, and pictures/videos in virtual
communities and networks.

SOCIAL BOOKMARKING
-is a user-defined taxonomy system for
bookmarks.
The technology that lets users organize their
access to the web sites by storing the
preferred sites that have been recently
accessed, and then maybe accessed later on.

PODCAST
WEB 1.0 -an audio (or video) file.
-An evolution of web that is considered -a “podcaster” can solicit subscriptions from
“read-only web.” listeners, so that when new podcasts are
-is considered the foundation of web released, they are automatically delivered, or
technology. fed, to a subscriber's computer or mobile
device.
WEB 2.0
-An evolution of web that is considered EDUCATIONAL TOOLS
“read-write web.” Electronic portfolios(ePortfolios or
-Elements of Web 2.0: Webfolios)-storage medium for
-Online database with adjustable individuals who wish to store learned
content information.

kp
LMS(Learning Management multiple browsers, devices, and operating
Systems)-a software-based platform systems.
that provides infrastructure, JAVASCRIPT
framework, and tools to facilitate -is the programming language of HTML and
online learning and training. the Web used to define the behavior of web
HISTORY OF WEB 2.0 pages.
● The foundational components of Web 2.0 -An instance of this is a new window being
are the advances enabled by Ajax and displayed after clicking an image, text
other applications such as RSS and Eclipse shown in marquee mode), or control being
and the user empowerment that they in and out of visibility.
support.
● Darcy DiNucci coined the term “Web 2.0" *Manufacturing 2.0
in her 1999 article, "Fragmented Future”, -takes typical Web 2.0 apps and services and
indicating that the Web will be known to incorporates them into every stage of
be a "transport mechanism. Darcy foresaw development and production.
that the Web will be seen not only on *Enterprise 2.0
personal computer units but in TV sets, car -the inclusion of Web 2.0 technologies into
dashboards, mobile phones, and hand-held an enterprise’s business processes, intranet
game machines as well. and extranet are sometimes referred to as
● Tim O'Reilly is generally credited for Enterprise 2.0 (E2.0).
popularizing the term. O'Reilly Media has -Most enterprise 2.0 followers use a
subsequently been energetic about trying combination of blogs, social networking,
to copyright "Web 2.0" and holds an and social collaborative tools as well as free,
annual conference of the same name. paid and homegrown technologies.

WEB 2.0 TECHNOLOGIES WEB 3.0


ADOBE FLASH -An evolution of web that is considered
-is the plug-in on browsers used for “read-write-execute web.”
delivering high-impact, rich Web content. -the supposed third generation of Internet-
-Designs, animation, and application user based technological innovations is referred
interfaces are deployed immediately across to as ‘the intelligent Web’.
all browsers and platforms, attracting and -defined as a third-generation Web and is
engaging users with a rich Web experience. enabled by the convergence of several key
MICROSOFT SILVERLIGHT emerging technology trends:
-is a powerful development tool for ● Ubiquitous Connectivity
engaging in interactive user experiences for ○ Broadband adoption
Web and mobile applications similar to ○ Mobile Internet access
Adobe Flash. ○ Mobile devices
-This tool is a free plug-in that is based on ○ Network Computing
the .NET framework and compatible with ● Software-as-a-service business models

kp
○ Web services interoperability organizational, biological and sustainability
○ Distributed computing (P2P, grid system
computing, hosted “cloud
computing” server farms such as MORE INTELLIGENT WEB
Amazon S3) ● The threshold of the third-generation
● Open Technologies Web will have been crossed in 2007. At
○ Open APIs and protocols this juncture, the focus of innovation
○ Open data formats will start to shift back from front-end
○ Open-source software platforms improvements towards back-end
○ Open data (Creative Commons, infrastructure level upgrades to the Web.
Open Data License, etc.) ● Because the focus of the third-generation
● Open Identity Web is quite different from that of Web
○ Open identity (OpenID) 2.0, this new generation of the Web
○ Open reputation probably does deserve its own name.
○ Portable identity and personal data ● In keeping with the naming convention
● The Intelligent Web established by labeling the second
○ Semantic Web technologies generation of the Web as Web 2.0, this
○ Distributed databases third-generation of the Web could be
● Intelligent applications called Web 3.0.
More Intelligent Web: Technological
UBIQUITOUS COMPUTING Convergence
-The following defines clearly the elements Digital convergence
involved in a pervasive computing system: -refers to the convergence of four industries
Information Context-Aware into one conglomerate, ITTCE (Information
-The ability to collect, metricize, monitor Technologies, Telecommunication,
and platform machine to machine M2M, Consumer Electronics, and Entertainment). -
machine to human M2H telemetry across a Previously separate technologies such as
wide range of structured, semi-structured voice (and telephony features), data (and
and unstructured data productivity applications), and video can
Situation Context-Aware now share resources and interact with each
-The ability to create new physical and other synergistically.
virtual environments with intelligence Telecommunications convergence
information a process context from the level -also knows as network convergence
large to the very small. -is the term used to describe emerging
Internet of Things telecommunications technologies, and
-The ability to multiplex and multiplicity of network architecture used to migrate
entities, assets and services spacing beyond multiple communications services into a
the computing sphere into many other single network.
metasystems in social, commercial, Media convergence

kp
-is defined as the interlinking of computing In a typical wiki, text is written using a
and other information technologies, media simplified markup language (known as "wiki
content, and communication networks that markup"), and often edited with the help of
have arisen as the result of the evolution and a rich-text editor.
popularization of the Internet as well as the
activities, products, and services that have ASSISTIVE MEDIA
emerged in the digital media space. -is an Internet-based audio reading service
for people with reading impairments.
SOCIAL AND ASSISTIVE MEDIA -This opens a unique avenue of accessibility
SOCIAL MEDIA for said individuals with visual, cognitive,
-a collection of communication channels and communication disabilities.
accessed through the Web and mobile
applications with the purpose of allowing EDUCATIONAL TECHNOLOGY
users to interact, collaborate, and exchange ● Research findings show that ICT can lead to
information, interests, ideas, and any visual improved student learning and better
representation with another user in a Web- teaching methods.
based community. ● It has proven effective in contributing to
Types of social media: universal access to education, equity in
Microblogging - is a web service, which education, the delivery of quality learning
allows the subscriber to broadcast short and teaching, teachers’ professional
messages(microposts) to other subscribers of development and more efficient education
the service. management, governance and
Note: Microposts can be made public on a administration.
Web site and/or distributed to a private ADVANTAGES:
group of subscribers. ● Through the use of ICT tools, mentors may
Social curation(content aggregation) - is be able to use images that will allow
collaborative online sharing of content memory retention and boost of interest
organized around by an individual or ensuring students' comprehension
number of people within the community ● Through the use of ICT tools, mentors may
-is sometimes proposed to mitigate how be able to explain complicated instructions
other discriminators disagree of the term and be able to easily access resources to
curation as it is originally meant for the ones knowledge being imparted to the students.
used in the field of arts. ● Through the use of ICT tools, mentors may
Wikis-are content management systems that be able to create an environment making
provide collaborative modification of its the modules enjoyable, which could
content and structure directly from the web improve student attendance and
browser. concentration.
Note: Coined from a Hawaiian term which DISADVANTAGES:
means quick, a wiki is run using wiki ● The tools should be made available during
software, otherwise known as a wiki engine. the class. It would be a burden for the

kp
whole class if they will be unable to access ○ Instant messages
the resources needed due to slow ○ Online calendar
connection, loss of internet bandwidth, or ○ Online news and announcement
sudden power outage. (institution and course level)
● The tools are expensive to afford - ○ Online quiz
desktop/laptop units, licensed software, ○ Wiki
routers/switches, LAN cables, and so ○ Widgets that allow connections to
many more cost more than markers, social media
whiteboards, and board eraser. -serve many functions, but it is best to think
● Teachers should have a broad experience of them as a repository or vehicle for
and knowledge when it comes to ICT tools learning, not the learning itself.
usage. -do not support content creation and their
functionality is usually limited. Rather, the
LEARNING MANAGEMENT professor with an instructional designer, or
SYSTEMS (LMS) an instructional designer, design content,
-is the most common option/format for using separate, dedicated content authoring
teaching online. software, and places content in the LMS and
-Learning Management System functions runs classes, discussions, quizzes through
solely as an online classroom where the LMS.
professors can: -factors in considering LMS are (not in
○ discuss modules online, order):
○ upload reading materials, ○ Cost
○ play educational videos and audio ○ Ease of use
files, ○ The LMSs (and company’s) maturity
○ carry out learning activities, and presence
○ make announcements, ○ Appearance (look and feel)
○ assess and grade student work. ○ The ability to integrate with existing
-store and deliver materials developed in a Student Information Systems
variety of different formats — everything (SIS)/Education Information
from MS Office documents to videos and Management Systems (EMIS)
third-party applications. ○ Suite of supports
-All LMSs have “standard” or typical and ○ Special features
uniform features, including: SOCIAL MEDIA AND PEER-TO-
○ Analytics (with varying degrees of PEER PLATFORMS
quality) -free social media networks can be an
○ Apps alternative to an LMS.
○ Assignment submission -Edmodo, for example, is a free educational
○ Discussion forum social networking application. This type of
○ File upload/ download capacity application is used as an alternative to LMSs
○ Grading

kp
by universities and Ministries of Educations -An online identity may even be determined
and schools all over the world. by a user's relationship to a certain social
CONFERENCING group they are a part of online.
APPLICATIONS
ONLINE MEETING YOUR ONLINE DATA
-An alternative LMS that mimics the
traditional lecture one finds in university or DATA AND INFORMATION
classroom. The instructor can lecture, share -Any information about you can be
notes or a presentation and students can considered your data. This personal
even virtually raise their hands and ask information can uniquely identify you as an
questions/ communicate through voice or individual. This data includes photos and
chat. messages that you exchange with your
TWO-WAY AUDIO family and friends online.
-A final option is to use a two-way video for -Other Information, such as name, social
one-to-one coaching and tutoring (for security number, date, and place of birth, or
example, Skype or Google Hangouts). mother‘s maiden name, is known by you and
-This is an extraordinarily powerful form of used to identify you.
online learning because it can provide Medical Records - Information provided to
intensive one-to-one (or one-to-many) you by your doctor, including physical and
instruction and support and make e-learning mental health, prescription and other
less impersonal and more “face-based.” personal information that may not be
medically related, is considered your
ONLINE SAFETY, SECURITY, electronic health records (EHRs).
ETHICS, AND ETIQUETTE Education Records - Your grades and test
scores, your attendance, courses taken,
YOUR ONLINE AND OFFLINE awards and degrees rewarded, and any
IDENTITY disciplinary reports may be in your
-As more time is spent online, your identity, education record.
both online and offline, can affect your life. - This record may also include contact
Your offline identity is the person who your information, health and immunization
friends and family interact with on a daily records, and special education records
basis at home, at school or at work. including individualized education programs
-Your online identity is who you are in (IEPs).
cyberspace. Your online identity is how you Employment and Financial Records -
present yourself to others online. Your financial record may include
-Your online identity can also be considered information about your income and
as an actively constructed presentation of expenditures. Tax records could include
oneself. paycheck stubs, credit card statements,
credit ratings, and other banking
information. Your employment information

kp
can include your past employment and your ○ downloading malicious software disguised
performance. as keygens, cracks, and patches
○ downloading files via peer-to-peer networks
TYPES OF ORGANIZATIONAL (for example, torrents).
DATA ○ downloading attachments from emails sent
especially from unknown sources
TRADITIONAL DATA
○ replying to emails involving your credentials
-Corporate data include personnel
such as credit card numbers, social
information, intellectual properties, and
security numbers, and few other things
financial data.
○ installing software applications with bugs,
-Personnel information includes application
glitches, and vulnerabilities
materials, payroll, offer letters, employee
○ plugging in removable media containing
agreements, and any information used in
malicious programs
making employment decisions.
-Intellectual property, such as patents, Common Effects of Malware
trademarks, and new product plans, allows a ○ slowing down your operating system, your
business to gain an economic advantage Internet speed or the speed of your
over its competitors. applications.
○ unexpected pop-ups appearing on the system
○ system crashes frequently or BSOD (Blue
INTERNET OF THINGS AND
Screen of Death) is experienced regularly.
BIG DATA ○ physical disk continues to exhibit excessive
-IoT(Internet of Things) is a large network activity even when you don’t use it and
of physical objects, such as sensors and there is no program or download running
equipment that extend beyond the traditional at that moment, this could be the right time
computer network. to check your system for malware.
-All these connections, plus the fact that we ○ running out of hard disk space
have expanded storage capacity and storage ○ high network activity is being observed
services through the Cloud and ○ new homepage, new toolbars or unwanted
virtualization, lead to the exponential growth websites being accessed
of data. ○ programs automatically open and close
-This data has created a new area of interest without user intervention and unusual
in technology and business called “Big messages seen in them during or after the
Data". booting process
○ system suddenly shuts down for no reason
ONLINE SECURITY THREATS ○ security solution is disabled
AND ATTACKS ○ strange messages sent from your blogs or
Sources of threats emails to your peers via applications in
○ visiting sites that contain drive-by attack your system that you do not have any
codes. control of.

kp
MALICIOUS PROGRAMS -Unlike viruses and worms, Trojans
do not reproduce by infecting other
files nor do they self-replicate.
Classes of Malicious Software:
4. Bots
1. Viruses
-"Bot" is derived from the word
-virus is a type of malware that
"robot" and is an automated process
propagates by inserting a copy of
that interacts with other network
itself into and becoming part of
services.
another program.
-Bots often automate tasks and
-It spreads from one computer to
provide information or services that
another, leaving infections as it
would otherwise be conducted by a
travels.
human being.
-Almost all viruses are attached to an
-Bots can be used for either good or
executable file, which means the
malicious intent.
virus may exist on a system but will
-A malicious bot is a self-
not be active or able to spread until a
propagating malware designed to
user runs or opens the malicious host
infect a host and connect back to a
file or program. When the host code
central server or servers that act as a
is executed, the viral code is
command and control (C&C) center
executed as well.
for an entire network of
2. Worms compromised devices, or "botnet."
-are similar to viruses in that they
replicate functional copies of
PHISHING
themselves and can cause the same
-is the act of sending an email to a
type of damage.
user falsely claiming to be an
-worms are standalone software and
established legitimate enterprise in
do not require a host program or
an attempt to scam the user into
human help to propagate.
surrendering private information that
-A worm enters a computer through
will be used for identity theft.
a vulnerability in the system and
-Phishing email will typically direct
takes advantage of file-transport or
the user to visit a website where they
information- transport features on the
are asked to update personal
system, allowing it to travel unaided.
information, such as a password,
3. Trojans credit card, social security, or bank
-A Trojan horse is another type of account numbers, that the legitimate
malware that functioned the same organization already has. The
way as it was named. website, however, is bogus and will
-Trojans are also known to create capture and steal any information the
back doors to give malicious users user enters on the page.
access to the system

kp
CYBERSECURITY instructions found on the Internet to launch
attacks.
CYBER THREATS
-Your online credentials are HACKERS
valuable. These credentials give the -This group of attackers break into
thieves access to your accounts, computers or networks to gain access.
which in turn will give them access -white hat attackers break into
to the money you store in your networks or computer systems to
accounts. discover weaknesses so that the
-They could access your online security of these systems can be
accounts and your reputation to trick improved.
you into wiring money to your -black hat attackers take advantage
friends or family. This trick which is of any vulnerability for illegal
coined as social engineering allows personal, financial or political gain.
criminals to send messages stating -gray hat attackers are somewhere
that your family or friends need you between white and black hat
to wire them money so they can get attackers. The gray hat attackers may
home from abroad after losing their find a vulnerability in a system.
wallets.
Two types of security threats. ORGANIZED HACKERS
-Attacks originating from within an - These hackers include organizations of
organization or from outside of the cybercriminals, hacktivists, terrorists, and
organization is known as an internal state-sponsored hackers.
threat. When the mentioned attacks -Cyber criminals are usually groups
are done from outside the facility, of professional criminals focused on
this is considered to be an external control, power, and wealth.
threat. -Hacktivists make political
-Internal threats also have the statements to create awareness for
potential to cause greater damage issues that are important to them.
than external threats, because -State-sponsored attackers gather
internal users have direct access to intelligence or commit sabotage on
the building and its infrastructure behalf of their government.
devices.
The Consequences of a Security Breach
TYPES OF ATTACKERS ○ To protect an organization from every
AMATEURS possible cyberattack is not feasible, for a
-These people are sometimes called Script few reasons. The expertise necessary to set
Kiddies. They are usually attackers with up and maintain a secure network can be
little or no skill, often using existing tools or expensive.

kp
○ A hacker (or hacking group) may vandalize academia dedicated to improving global
the company website by posting untrue capabilities when dealing with cyber threats.
information and ruin the company’s
reputation that took years to build. CYBERWARFARE
○ The hackers can also take down the -is an Internet-based conflict that involves
company website causing the company to the penetration of computer systems and
lose revenue. networks of other nations.
○ If the company website or network has been -These attackers have the resources and
breached, this could lead to leaked expertise to launch massive Internet-based
confidential documents, revealed trade attacks against other nations to cause
secrets, and stolen intellectual property. damage or disrupt services, such as shutting
down a power grid.
Legal Issues in Cybersecurity -The main purpose of cyberwarfare is to
Personal Legal Issues gain an advantage over adversaries, whether
-You do not even have to be an employee to they are nations or competitors.
be subject to cybersecurity laws. In your -Besides industrial and militaristic
private life, you may have the opportunity espionage, cyberwar can sabotage the
and skills to hack another person’s computer infrastructure of other nations and cost lives
or network. in the targeted nations. For example, an
attack can cause the following:
Corporate Legal Issues ○ disrupt the power grid of a major city.
-Most countries have some cybersecurity ○ traffic would be disrupted
laws in place. They may have to do with ○ the exchange of goods and services is
critical infrastructure, networks, and halted
corporate and individual privacy. Businesses ○ patients cannot get the care needed in
are required to abide by these laws. emergency situations.
○ access to the Internet may also be
International Law and Cybersecurity disrupted.
-The area of cybersecurity law is much Confidentiality
newer than cybersecurity itself. As -Another term for confidentiality would be
mentioned before, most countries have some privacy.
laws in place, and there will be more laws to -The data may be compartmentalized
come. according to the security or sensitivity level
-International cybersecurity law is still quite of the information.
new. The International Multilateral -Methods to ensure confidentiality include
Partnership Against Cyber Threats data encryption, username ID and password,
(IMPACT) is the first, international public- two factor authentication, and minimizing
private partnership that is focused on cyber exposure of sensitive information.
threats. IMPACT is a global partnership of Integrity
world governments, industries, and

kp
-is the accuracy, consistency, and POINTS TO PONDER TO
trustworthiness of the data during its entire SECURE YOUR OWN DATA
life cycle. Data must be unaltered during ○ Use browsers in a private manner
transit and is not changed by unauthorized ○ You should take care when choosing a
entities. username or alias for your online
-A checksum is used to verify the integrity identity.
of files or strings of characters after they ○ Choose your passwords wisely.
have been transferred from one device to ○ Be careful when sharing documents,
another across your local network or the pictures, and other online resources via
Internet. blogs or emails.
-A hash function uses a mathematical ○ Be aware of shoulder surfing.
algorithm to transform the data into a fixed- ○ Verify data is encrypted.
length value that represents the data. The ○ Be aware of social engineering.
hashed value is simply there for comparison. ○ Use two-factor authentication if it is
From the hashed value, the original data available.
cannot be retrieved directly. ○ When connecting via Wi-Fi, log on to a
Availability secure network using WEP or WPA
-Availability is best ensured by rigorously
NETIQUETTE AND INTERNET
maintaining all hardware, performing
hardware repairs immediately when needed CHAT ROOMS
and maintaining a correctly functioning
operating system environment that is free of Netiquette - a colloquial term for network
software conflicts. etiquette or Internet etiquette, is a set of
social conventions that facilitate interaction
FIGHTING AGAINST SECURITY over networks.
THREATS
Interactions may be in the form of:
EMAIL
HOW TO COMBAT MALWARE
-is a common way of communicating
THREATS formally with people as you are able to put
○ Ensure that your operating system is up in your message to whom the message is for
to date. (it may be an individual or a group of
○ Install an anti-virus software in your people), a summary of the message in the
PC's. Subject field, and some critical information
○ Firewall should always be enabled. of the sender.
○ Assure that the file to be downloaded is When composing an email, you usually
safe. fill up the following components:
○ Be cautious accepting or agreeing to ○ To: field:
prompts. ○ CC: field
○ BCC: field
○ Body

kp
○ Signature ○ avoid flamewars and spam
CHAT ROOMS ○ avoid typing in all caps or grossly
-is the quickest way of sending a message to enlarging script for emphasis.
the recipient and are usually embedded in
most blog sites. It also shows the status of CONTEXTUALIZED ONLINE
the receiver which will give you a hint if he SEARCH AND RESEARCH
is available to read the message or not. SKILLS
USENET -Research is an integral part of students' life
-is a bulletin-type of service containing in creating presentations, solving scientific
newsgroups where the users can post problems, and searching for the definition of
messages and these posted messages are an unknown term, but there's more to these
distributed via Usenet servers. activities than what the students usually do.
-For professionals and academicians,
research assists them in developing new
CORE RULES OF ETIQUETTE theories, proposing a new solution to an
○ Remember the Human existing problem, or analyzing historical
○ Adhere to the same standards of information to determine the origins of a
behavior online that you follow in certain person, object or event.
real life -The easiest way for students to perform
○ Know where you are in cyberspace their research is to do it online. The
○ Respect other people's time and following six strategies can help online
bandwidth students produce stronger research.
○ Make yourself look good online The following six strategies can help
○ Share expert knowledge online students produce stronger
○ Help keep flame wars under control research.
○ Respect other people's privacy ○ Contact a librarian before getting stuck
○ Don't abuse your power sifting through piles of online information
○ Be forgiving of other people's ○ It's wiser to over-cite sources than risk
mistakes plagiarism
Points most strongly emphasized about ○ Use Google and Wikipedia at the
netiquette often include: beginning of a research process, not the
○ using simple electronic signatures; end
this can be done in the settings of the ○ Online students can access premium
mailing site. databases that are not available to the
○ avoiding multiposting, cross-posting, public
off-topic posting, hijacking a ○ Understand the professor's expectations
discussion thread, and other for citation format
techniques used to minimize the effort ○ Understand why professors still assign
required to read a post or a thread. research projects
○ use of unabbreviated English

kp
SEARCH ENGINES The following are steps you need to
-are programs that browse documents for consider in searching for a word or
specified keywords and returns a list of the phrase on the Internet:
documents where the keywords were found. ○ Select a search engine.
-A search engine is really a general class of ○ Type in whatever you want to search on
programs; however, the term is often used to the allotted text box.
specifically describe systems like Google, ○ Choose a few of the most specific or
Bing, and Yahoo! Search that enable users relevant keywords or phrases to describe
to search for documents on the World Wide your topic.
Web. ○ If you wish to be specific with the
sequence of the words as you type them,
WEB SEARCH ENGINES enclose the words inside double-quotes.
-work by sending out a spider to fetch as ○ Look for the advanced options of the site
many documents as possible. Another you are using if you wish to have a
program called an indexer then reads these Verbatim search
documents and creates an index based on the ○ Click Search or press the Enter key on
words contained in each document. Each your keyboard.
search engine uses a proprietary algorithm to ○ Assess your results.
create its indices such that, ideally, only
meaningful results are returned for each ____________________________________
query. ADVANCED
Common Types of Search Engines:
Local (or offline) Search Engine -
APPLICATION
Designed to be used for offline PC, TECHNIQUES FOR
CDROM or LAN searching usage.
Metasearch Engine - A search engine that
PRODUCTIVITY TOOLS
queries other search engines and then
combines the results that are received from APPLIED PRODUCTIVITY
all. TOOLS
Blog Search Engine - A search engine for PRODUCTIVITY TOOLS
the blogosphere. Blog search engines only -Productivity software is a type of
index and provide search results from blogs application program that helps users produce
(Weblogs). outputs such as documents, databases,
graphs, worksheets, and presentations.
-Many productivity applications are
intended for business use. There are some
that are used in schools and universities for
research and assignments.
-Examples of office productivity software
include word processors, database

kp
management systems (DBMS), graphics HISTORY OF WORD
software and spreadsheet applications. PROCESSORS
○ The first major advance from manual
OFFICE SUITE writing as far as the individual was
-also called an application suite or concerned was the typewriter.
productivity suite, is two or more software ○ Henry Mill, an English engineer of the
applications bundled and sold together. early eighteenth century, is credited
Benefits of Software Suites: with its invention. He was an English
○ The biggest benefit of using a software inventor who patented the first
suite of applications is the compatibility typewriter in 1714.
and integration between them. ○ The fact that almost nothing is known
○ The software applications in a suite are about his early version today is
designed to work with one another, evidence of its lack of success. The
making it easier for users to move work evolution of typewriters up to a
products between them. WYSIWYG (What You See Is What
○ Another benefit of software suites is You Get) typewriter is seen in the table
reduced cost. below.
○ The software suite bundle of
applications is generally priced far less
FEATURES OF A STANDARD
than it would cost to buy each
separately. WORD PROCESSOR
Popular Software Suites: Basic Features:
○ Microsoft Office 365 ○ insert text -Allows you to insert text
○ Adobe Creative Suite or Cloud anywhere in the document.
○ Apache OpenOffice ○ delete text - Allows you to erase
○ iWork characters, words, lines, or pages as
○ Google Docs easily as you can cross them out on
paper.
○ cut and paste - Allows you to
WORD PROCESSORS
remove (cut) a section of text from
-A word processor is a software application
one place in a document and insert
that involves composition, modification, and
(paste) it somewhere else.
printing of documents.
○ Copy - Allows you to duplicate a
-Typical features of a modern word
section of text.
processor include font application, spell
○ undo and redo - allows you to
checking, grammar checking, a built-in
remove the last change done to the
thesaurus, automatic text correction, Web
document (undo) and advances the
integration, and HTML exporting, among
buffer to a more current state (redo).
others.
Undo rolls back the previous action
while redo rolls back the previous
undo execution.

kp
○ page size and margins - Allows you ○ Layout - allows you to specify
to define various page sizes and different margins within a single
margins, and the word processor will document and to specify various
automatically readjust the text so that methods for indenting paragraphs.
it fits. ○ Macro - is a character or word that
○ Search and replace - Allows you to represents a series of keystrokes. The
direct the word processor to search keystrokes can represent text or
for a particular word or phrase. commands.
○ Word-wrap -The word processor ○ Merges - Allows you to merge text
automatically moves to the next line from one file into another file.
when you have filled one line with ○ spell checker - A utility that allows
text, and it will readjust text if you you to check the spelling of words.
change the margins. ○ tables of contents and indexes -
○ Print - Allows you to send a Allows you to automatically create a
document to a printer to get a hard table of contents and index based on
copy. special codes that you insert in the
Advanced Features: document.
○ file management - allows you to ○ thesaurus - A built-in thesaurus that
create, delete, move, and search for allows you to search for synonyms
files. without leaving the word processor.
○ Font specifications - Allows you to ○ Windows - Allows you to edit two or
change fonts within a document. For more documents at the same time.
example, you can specify bold, italics, Each document appears in a separate
and underlining. window.
○ footnotes and cross-references -
Automates the numbering and ESSENTIAL WORD
placement of footnotes and enables
PROCESSING FEATURES
you to easily cross-reference other
sections of the document. TEXT INPUT
-is entered into the word processor from a
○ Graphics - Allows you to embed keyboard.
illustrations and graphs into a
document. Some word processors let TEXT MANIPULATION
you create the illustrations within the -refers to the "processing" part of word
word processor processing.
○ headers, footers, and page
numbering -Allows you to specify TEXT FORMATTING
customized headers and footers that -Word-processing software typically
the word processor will put at the top includes "wizards" or "help" features to
and bottom of every page.

kp
provide automated formatting of common AUTOMATIC REFERENCES
business documents. AND INDEXES
-Typefaces are available in thousands of -Documents that include tables of contents,
varieties, including such commonly known cross-references, indexes, footnotes,
faces as Times Roman, Arial, Helvetica, and endnotes, and captions will benefit from the
Garamond. capability of a word processor to
automatically generate and format these
TEXT OUTPUT items.
-printing a document on paper is the most
common output method HEADERS/FOOTERS
-are typically used in multiple-page
ADVANCED FEATURES FOR documents to display descriptive
WORD PROCESSORS information. In addition to page numbers, a
STYLES header or footer can contain information
-are user-created formatting commands that such as:
allow great control over repetitive
formatting structures within a document.
○ the document name
○ the date and/or time you created or
MACROS AND MERGING
revised the document
-Macros are stored keystrokes or sets of
○ an author’s name
editing and formatting commands, that can
○ a graphic
be replayed whenever needed. Macros can
○ a draft or revision number.
boost productivity and take much of the
tedium out of repetitive word-processing
ENDNOTES/FOOTNOTES
tasks.
-A footnote is a term used to describe
-Merging is the process of using lists of such
additional information found at the bottom
information as names, addresses, phone
of a page.
numbers, product descriptions or model
- An endnote is additional information or
numbers, and so on to fill in designated
credits given at the end of the document
fields or blanks in documents to create mass
instead of at the bottom of each page.
mailings, address labels, directories, and
catalogs.
INDEX
-lists the terms and topics that are discussed
VERSION CONTROL in a document, along with the pages that
-Version-control features allow a user to they appear on.
track the various stages of editing that a
document may pass through, including TABLE OF CONTENTS
versions created by multiple users involved -is a feature of a word processor that lets one
in the creation and editing of a document. contain in a single page all the list of

kp
headings and subheadings for the entire
document together with the page where they LIBREOFFICE WRITER
are located. -is a word processor and publishing tool
similar to Microsoft Office Word and Corel
DESKTOP-PUBLISHING WordPerfect.
CAPABILITIES
-Graphical images from clip-art collections,
digital photographs, and scanned images,
and drawings created with graphics COREL WORDPERFECT
programs, can be integrated easily into -WordPerfect (WP) is a word processing
word-processing documents. application owned by Corel with a long
history on multiple personal computer
EXAMPLES OF WORD platforms.
PROCESSING SOFTWARE
INTEGRATING IMAGES AND
MICROSOFT WORD EXTERNAL MATERIAL
-When referring to a word processor,
Winword, Word or MS Word is short for MODIFYING AND IMAGE
Microsoft Word and also sometimes used as Modifying an image
an abbreviation for Microsoft WordPad. ○ Crop -is used to remove a portion of
- denoted either by a .doc or .docx filename an image.
extension. ○ Resize - involves changing the height
and/or length of an image.
○ Rotate/Flip - Rotating an image
GOOGLE DOCS involves changing its orientation in a
-is an online word processor program clockwise or counter-clockwise
capable of almost everything a typical word manner.
processor like Microsoft Word is capable of ○ Text Wrapping - allows the
doing without having to download any positioning of the picture relative to
software. the page and text.
-Supported file
types: .doc, .docx, .docm .dot, .dotx, .dotm, . MAIL MERGING AND LABEL
html, .txt, .rtf, .odt GENERATION
-"Mail merging is the use of a computer to
OPENOFFICE WRITER produce many copies of a letter, each copy
-is a software under Apache OpenOffice that with a different name and address stored on
is simple for a quick memo, yet capable of file, or a computer program that does this."
creating complete books with contents,
diagrams, indexes. etc. DATA SOURCE

kp
-contains the information that can vary in them to be manipulated and used in
each label, such as a destination address. calculations.

ENVELOPE VISUAL DESIGN


-The advantage of using a word processor is -Spreadsheets allow you to lay figures out
that you can directly print a copy of it and on a grid, calculating and manipulating them
fold it out to be an envelope. visually.
-Each envelope will contain an address in
your mailing list. You can also create and AUTOMATIC CALCULATIONS
print envelopes without using mail merge. -Spreadsheet software gives you the ability
to enter mathematical formulas ranging from
LABELS simple arithmetic to complex statistics.
-The following are the documents usually
involved in creating and printing labels DYNAMIC UPDATES
using the mail merge process: Your main -Any time you base the value of one cell on
document, and your mailing list the value of other cells, the value of one cell
updates automatically when the other is
STEPS FOR MAIL MERGING changed.
1. Creating a Main Document/Template.
2. Creating a Data Source. DATA ANALYSIS
3. Defining the Merge Fields in the main -Most spreadsheet software can
document. automatically create graphs and charts from
4. Merging the Data with the main your data, giving you different ways of
document. comparing and analyzing information.
5. Saving/Exporting.
DATA ANALYSIS
STEPS FOR LABEL GENERATION ○ SUM()
1. Setting up the Mailing List ○ VLOOKUP()
2. Prepare the main document for the ○ MAX() and MIN()
labels ○ ROUND()
3. Link the mailing list to your labels. ○ NOW()
4. Add the addresses to your labels. ○ SQRT()
5. Preview and print the labels. ○ ABS(x) Absolute value function
6. Save your labels document. ○ ALOGIT(l) Antilogarithmic function
○ CEIL(x) Rounds x up
SPREADSHEETS ○ E() Euler's number
-is an application designed for managing and ○ EXP(x) Natural exponential function
organizing the data in tabular format. ○ FLOOR(x) Rounds x down
-This type of document lets users arrange ○ INT(x) Integer value function
data in rows and columns of a grid, allowing ○ LN(x) Natural logarithm function
○ LOG(x) Logarithm function

kp
○ LOGIT(p) Logit function data, so we can simply use the Average
○ MOD(x,d) Modulo function function and select the range which needs to
○ POWER(x,p) Power function be averaged.
○ RAND(x) Random number function
(Uniform distribution) Median
○ RANDNORM(m,s) Random number -Median is a function that is used to find the
function (Normal distribution) middle number in a given range of numbers.
○ ROUND(x,n) Rounds the number x to -In a spreadsheet, you can simply use the
n digits Median function and select the range and
○ SIGN(x) Sign value you will find your median.
○ TRUNC(x) Truncates the number x
by removing the fractional part Mode
ADVANCED AND COMLPEX -Mode helps you to find out the value that
FORMULAS AND COMPUTATIONS occurs most times.
VLOOKUP Function -To find the most occurring value, use the
The VLOOKUP formula has four MODE function and select the range you
components: want to find the mode of.
○ Lookup_value
○ Table_array CHARTS AND GRAPHS
○ Col_index_num PARTS OF A GRAPH
○ Range_lookup ○ Title
○ Labels
Conditional Functions ○ Scale
-A spreadsheet evaluates the source against ○ Key/Legend
the criteria, and returns a value if the logical DIFFERENT TYPES OF A GRAPH
test is “true” and a different value for ○ Pie Chart
“false”. ○ Bar Chart
-The elements “value_if_true” and ○ Line Graph
“value_if_false” may be a static value or ○ Scatter Chart
another formula.
PRESENTATION PROGRAM
Array Formulas FEATURES OF PRESENTATION
-A single array formula can perform PROGRAM
thousands of calculations and replace ○ Slides
hundreds of usual formulas. ○ Layout
-=SUM((B2:B10>=A2:A10) * (B2:B10>0)) ○ Templates
○ Animation effects
STATISTICAL FUNCTIONS ■ Entrance
Average Function(mean) ■ Exit
-One of the most used statistical functions is ■ Motion Paths
Mean. Mean is simply the average of all the

kp
■ Emphasis -This is what connects the “anchor” with the
○ Slide master “target”.
○ Transitions
○ Slide notes EXAMPLES OF ONLINE
HYPERLINKS IN PRESENTATION PROGRAMS:
PRESENTATION SOFTWARE ○ Prezi
-hyperlink, or more commonly called a link, ○ Google Slides
allows the viewer to quickly access another ○ PowToon
screen on the computer by simply clicking ○ Emaze
on a text entry or a graphic object ○ Haiku Deck
-Hyperlinks in a presentation software can
link to -
○ another slide in the presentation
○ another presentation file
○ another slide in a different
presentation
○ a website ______________________________
○ an email address IMAGING AND DESIGN
○ any other file on the computer LAYOUT AND GRAPHICS
ANATOMY OF A LINK
ANCHOR
LAYOUT
-This is the object that you click or hover
-The process of planning and arranging in
upon to make the interactivity happen.
detail something such as a page or book to
These may be any images, pictures, or any
be reproduced.
texts that when clicked will allow you to
proceed to the destination.
GRAPHICS
TARGET(DESTINATION) -may refer to any computer device or
-This is what the "anchor" is linked to. program that makes a computer capable of
LINK(HYPERLINK) displaying and manipulating pictures.

-This is what connects the “anchor” with the BASIC PRINCIPLES OF


“target”. GRAPHICS AND LAYOUT
○ White Space
SCREEN TIP ○ Contrast
-can be added to any hyperlink on a ○ Repetition
PowerPoint slide ○ Alignment
TARGET(DESTINATION) ○ Proximity
-This is what the "anchor" is linked to. ○ Balance
LINK(HYPERLINK)

kp
BALANCE -Related items are grouped together, be
-It is the equal distribution of visual weight. move physically close to each other so that
-Two main types of balance: they appear as one cohesive group rather
○ Symmetrical - an arrangement of than a bunch of unrelated bits.
elements so that they are evenly
distributed to the left and to the right,
or top and bottom of the center.

○ Asymmetrical - an arrangement of
unlike objects
of equal
weight on
each side of
the page.
TIPS ON
CREATING
BALANCE
-Colors have weight (Red = Heavy, Baby
Blue = Light)

ALIGNMENT
-Text/type must be legible. Use simple font. -When items are aligned, the result is a
Also consider the size (Larger = Heavier) stronger cohesive unit. The basic purpose of
alignment is to unify and organize the page.

-
Lines: Thin vs. thick

PROXIMITY

kp
REPETITION
-It can be anything that a reader will visually WHITE SPACE
recognize as being a “theme.” Repetition -It breaks up the elements on the page.
can be thought of as consistency. It is a -It provides a visual breathing room for the
conscious effort to unify all parts of a eye.
design. -Add white space to make a page less
cramped, confusing, or overwhelming.
-It doesn’t actually have to be white.
-White space is also referred to as “negative
space”.

VISUAL MESSAGE
-involves the appropriate considerations of
visual perceptions when designing an
instructional program.
-The interpretation of pictures is based on
prior experiences, culture, etc.
-When designing an instructional program it
CONTRAST is important to consider the culture,
-Contrast is the most effective way to add educational ability, and language of the
visual interest to your page. audience.
-A reader should always be able to glance at -The purpose of visual message design is to
a document and instantly understand what's gain attention, create meaning, and facilitate
going on. Add contrast through your retention.
typeface choices, line thicknesses, colors, Principles of Visual Message Design
shapes, sizes, space, etc. Using Infographics
Contrast has two purposes: ○ BE UNIQUE
○ To create an interest on the page. If a ○ KEEP IT SIMPLE
page is interesting to look at, it is more ○ BE CREATIVE AND BOLD
likely to be read. ○ LESS IS MORE
○ To aid in the organization of the ○ SHARING
information. The message should be clear
and easily recognizable. ONLINE FILE FORMATS FOR
IMAGES AND TEXT
JPEG
-Joint Photographic Experts Group
-are “full-color images that dedicate at least
24 bits of memory to each pixel, resulting in
images that can incorporate 16.8 million

kp
____________________________________
TIF
IMAGE MANIPULATION
-TIF is lossless (including LZW
-It is an art that involves transforming or
compression option), which is considered
altering an image using different methods
the highest quality format for commercial
and techniques to achieve desired results.
work.
Principles and basic techniques of image
-TIF simply has no JPG artifacts, no
manipulation:
additional losses or JPG artifacts to degrade
○ Proportion
and detract from the original.
○ Texture
○ Color Blending
EPS
○ Emphasis on Detail
-Encapsulated PostScript
○ Combining Multiple Images
-is a PostScript image file format that is
○ Shadows
compatible with PostScript printers and is
often used for transferring files between
PROPORTION
various graphics applications.
-is probably one of the most important
-EPS files may also include a rasterized
things a designer must possess if he wants to
version of the image used for previewing the
do image manipulations.
contents of the file.

kp
-This will make the image more realistic if
the original design is extremely farfetched.

TEXTURE
-is the surface quality of the image.
-adds to the depth of the image and blend all
the images together evenly.
-Blending is a huge part of image
manipulation, so textures are something a
designer has to carefully select.

COLOR BLENDING
-Colors like pink, white, yellow, and orange
blend together easily.
EMPHASIS ON DETAIL
-When creating a piece of art, set one area as
the main focus. You want to draw the
viewer’s eyes instantly to that spot.
-Work on focusing attention on the most
vibrant, colorful, or sharp area in the design.

COMBINING MULTIPLE
IMAGES
-Images are like missing puzzle pieces;
without them, you can never fully complete
the puzzle
-In your design, you can use a multitude of
images, but they all have to flow properly
and be used to your advantage.

SHADOWS
-makes the image more realistic, because it
emphasizes the object effectively.
-is realistic in the way that every item has a
shadow if it needs one and every item is
proportional to everything else.

kp

You might also like