Emtech Quarter 1

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

EMTECH QUARTER 1 - Fun fact: Most websites we visit today are classified

as Web 2.0.
| ICT IN OUR EVERYDAY LIVES
Features of Web 2.0:
 Online platforms, sites, and content
 Web 2.0 and Web 3.0 1. FOLKSONOMY
 The World Wide Web
- allows users to categorize and classify or arrange
 Trends in ICT
information using freely chosen keywords.
| INTRODUCTION TO INFORMATION AND
Example: Tagging. Popular social networking sites such as
COMMUNICATION TECHNOLOGIES
Twitter, Instagram, Facebook, etc. use tags that start with the
The state of ICT technologies pound sign (#) or hashtag sign.

Online systems, functions, and platforms 2. RICH USER EXPERIENCE

Information and Communication Technologies (ICT) - Content is dynamic and is responsive to user’s input.

- Deals with the use of different communication (Dynamic - denoting or relating to web pages that update
technologies such as mobile phones, telephone, frequently or are generated according to an individual's
internet, etc. to: search terms.)
 Locate,
Example: A website showing a local content. (In case of social
 Save, and;
networking sites, when logged on, your account is used to
 Edit information
modify what you see in their website)
WEB 1.0
3. LONG TAIL
 When the World Wide Web was invented, most web - Services are offered on demand rather than on a one-time
pages were static and content cannot be purchase.
manipulated by the user. The content is also the
same for all users. - Time based pricing >>>> File sized pricing (vice versa)

(Static – also known as flat page or stationary page. In Web Example: Subscribing on a data plan (Netflix and other may
1.0 it is static in a sense that it cannot be manipulated by the plan na web) sa time spent of the internet or data plan na
user.) nagcha-charge for the amount ng bandwidth you used.

 Experts refer to it as the “read-only” (Bandwidth - the data transfer capacity of a computer
 A web that was not interactive in any significant network in bits per second (Bps))
sense.
4. USER PARTICIPATION
 The web user was passive (for the most part)
 User input took place OFFLINE. - The owner of the website is not the only one who is able to
put content. Others are able to place a content of their own
by means of comment, reviews, and evaluation.
Web 2.0 (Dynamic Web Pages)
5. SOFTWARE AS A SERVICE
- Is the evolution of Web 1.0 by adding dynamic web
- Users will subscribe to a software only when needed rather
pages. (Dynamic web pages – the user is able to see
than purchasing them. This is a cheaper option if you do not
a website differently than others)
always need to use a software.
- The “Wildly read-write Web”
- Allows users to interact with the page (the user may 6.MASS PARTICIPATION
be able to comment or create a user account
(parang Facebook, etc.) - It is a diverse information sharing through universal web
- Allows users to use web browsers instead of just access.
using their operating system. - Since most users can use the internet, Web 2.0’s content is
- In here, browsers can now be used for their user based on people from various cultures.
interface, application software (or web applications),
and even for file storage. Examples of Web 2.0:

 Social networking sites


 Blogs c) Social News. These are sites that allow users to post
 Wikis their own news items or links to other news sources.
 Video sharing sites d) Media Sharing. These are sites that allow you to
 Hosted services upload and share media content like images, music,
 Web applications and video.
e) Microblogging. These are sites that focus on short
updates from the user.
WEB 3.0 and THE SEMANTIC WEB f) Blogs and Forums. These websites allow users to
post their content.
Semantic Web – is a movement led by the World-Wide
Consortium (W3C). 3. MOBILE TECHNOLOGIES

World-Wide Consortium (W3C) standard encourages web - The popularity of smartphones and tablets has taken a
developers to include semantic content in their web pages. major rise over the years. This is largely because of the
(According to them, the Semantic Web provides a common devices’ capability to do tasks that were originally found in
framework that allows data to be shared and reused across personal computers.
application enterprise, and community boundaries.) Kinds of operating systems:
- The aim of Web 3.0 is to have machines (or servers)  iOS
understand the user’s preferences to be able to  Android
deliver web content specifically targeting the user.  Blackberry OS
 Windows Phone OS
 Symbian
Several Problems of Web 3.0:  WebOS
 Windows Mobile
1. Compatibility (HTML files and current web browsers could
not support Web 3.0) 4. ASSISTIVE MEDIA
2. Security (The user’s security is also in question since the - is a nonprofit service designed to help people who have
machine is saving his or her preferences) visual and reading impairments. A database of audio
3. Vastness (The World Wide Web already contains billions of recordings is used to read to the user.
web pages)

4. Vagueness (Certain words are imprecise.) | RULES OF NETIQUETTE


5. Logic (There are certain limitations for a computer to be  Online security, safety, and ethics
able to predict what the user us referring to at a given time)  Internet threats
 Protecting reputations online
 Copyright
TRENDS IN ICT  Contextualized online search and research skills
1. CONVERGENCE

- Technological convergence is the synergy of technological Online Safety and Security


advancements to work on a similar goal or task.

2. SOCIAL MEDIA

- social media is a website, application, or online channels


that enable web users to create, co- create, discuss, modify,
and exchange user-generated content.)

a) Social Networks. These are sites that allow you to


connect with other people with the same interests
or background.
b) Bookmarking Sites. These are sites that allow you to
store and manage links to various websites and
resources.
The Internet, truly, is a powerful tool. It can be used  Do not give your personal information to anyone.
to promote your business, gain new friends, and stay in touch  Think before you click.
with the old ones. It is also a source of entertainment. But like  Never post about your future vacation.
most things in this world, there is always “another side of the
coin.” The Internet is one of the most dangerous places,
especially if you do not know what you are doing. INTERNET RISK

Cyberbullying

It happens when someone intentionally is abused,


harassed, and mistreated by another person using electronic
communication.

Identity Theft

It is a crime of stealing personal information to


assume that person’s name or identity to make any form of
transaction.

Cyber Stalking

A criminal practice where electronic communication


is used to stalk or harass an individual or group.

Sexting

The act of sending sexually explicit text messages,


images, and videos.

INTERNET THREATS

1. Malware – also known as Malicious Software.

ONLINE SAFETY Types of Malware:

The importance of the internet plays a crucial part in  Virus – a malicious program that replicates itself by
human development. Life becomes easy and comfortable copying itself to another program.
because of this technology. Most of us are connected to the  Trojan Horse – a malicious program that disguises as
internet via laptop, mobile phone, tablet, personal computer, a legitimate program that user will accept and use
and other electronic gadgets. Behind this technology, there but takes control of your computer.
is a risk that everyone should be aware of. You could be at  Worm – a malicious program that copies itself and
risk of scams, bullying, and illegal activities if you will not spreads to other computers.
take precautions in using the internet. We need to keep  Spyware – A malicious program that gathers
ourselves safe and secure whenever we use the internet. information from a victim’s computer and sends it
That is why it is very important to know and learn the ways back to the hacker.
on how to be safe and secured online.  Adware – An unwanted advertisement that will pop
up several times on the victim’s computer then
behaves abnormally and tedious to close them.
How to be safe online?  Keylogger – A program that runs in the background
and steals user credentials and confidential
 Do not share your password with anyone. information and sends it back to hack by recording
 Add friends you know in real life. every keystroke that a user makes on their computer
 Do not visit untrusted websites. or device.
 Add a password to your WIFI at home to make it  Botnet – A collection of infected internets–
private. connected devices such as PC and mobile phones
 Install and update the antivirus on your computer. that are controlled by a common type of malware.
 Rootkit – A software tool used by hackers to gain 10. Thou shalt use a computer in ways that show
control over a computer on a network without being consideration and respect.
exposed.
 Ransomware – A ransom virus that blocks the user
Think Before You Click
from accessing the programs or files and demands to
pay the ransom through an online method for the 1. Before you post something on the web, ask these
removal of the virus. questions to yourself: Would you want your parents or
 Spam - also known as junk email or unwanted email grandparents to see it? Would you want your future boss to
send by advertiser or bot. It can be used to send see it? Once you post something on the web, you have no
malware. control of who sees your posts.
 Phishing - a cyber-attack method using deceptive
emails and websites to acquire sensitive personal 2. Your friends depend on you to protect their reputation
information. online. Talk to your friends about this serious responsibility.
 Cybercrime - a crime in which a computer is used as 3. Set your post to “private.” In this way, search engines will
an object and tool in committing a crime such as not be able to scan that post.
hacking, phishing, spamming, child pornography,
libel, hate crimes, identity thief and others. 4. Avoid using names. Names are easy for search engines to
 Cybercrime Law - a law that deals with all forms of scan.
cybercrime.
5. If you feel that a post can affect you or other’s reputation,
ask the one who posted it to pull it down or report it as
inappropriate.

NETIQUETTE
Copyright Issues
- it is a word that came from two words “net” and
“etiquette”. It is an etiquette applied online that shows - There are millions of information that we can get
proper manners and behavior. If you are a member of an from the internet. Some of this information is free
online society through social media, you are called a netizen. but others are not. They are protected by copyright
And in interacting with another netizen online, we need to law.
maintain good behavior which is acceptable to others in an
What is Copyright?
online community.
- Copyright is a protection given to the owner of the
rights in an original work such as books, musical
THE TEN COMMANDMENTS works, films, paintings, and other works, as well as
computer programs. This original work is called
The Ten Commandments of computer ethics have been intellectual property which is protected under
defined by the Compute Ethics Institute. Republic Act 8293 known as the “Intellectual
Property Code of the Philippines”.
1. Thou shalt not use a computer to harm other
people.
2. Thou shalt not interfere with other people's COPYRIGHT INFRINGEMENT
computer work.
3. Thou shalt not snoop around in other people's files. If you create something—an idea, an invention, a
4. Thou shalt not use a computer to steal. form of literary work, or research, you have the right of how
5. Thou shalt not use a computer to bear false witness. it should be used by others. This is called intellectual
6. Thou shalt not use or copy software for which you property.
have not paid.
7. Thou shalt not use other people's computer
resources without authorization FAIR USE
8. Thou shalt not appropriate other people's
- is the use of copyrighted material for comment,
intellectual output.
teaching, criticism, news reporting, research,
9. Thou shalt think about the social consequences of
scholarship, and another similar purpose that is not
the program you write.
an infringement of copyright.
- In fair use, 5% of the content of the reference can was first released in 1983. And have the file
only be copied. If 20% or less of extenxion .doc/ .docm/.docx and etc.
- the reference is copied, there must be a secondary
use agreement and fee. And if 20% or more of the
reference is copied, it requires purchasing creative GOOGLE DOCS
work.
 Is a web-based productivity office suite offered by
Guidelines for Fair Use Google within its Google Drive service.
1. Majority of the contents created must be yours.  Google Docs allows users to create and edit
documents online while collaborating with other
2. Give credits to the owner. users in real- time. Edits are tracked by user with a
revision history presenting changes.
3. Do not make a profit from copyrighted work.

2. SPREADSHEET
| PRODUCTIVITY TOOLS
A spreadsheet is an application tool that store,
Productivity tools (office productivity software) are organize, and calculate data in tables. They are used primarily
application software used for producing information (such as in recordkeeping tasks and accounting.
documents, presentations, worksheets, databases, charts,
MICROSOFT EXCEL
graphs, digital paintings, electronic music, and digital video).
 Excel is a spreadsheet application developed and
1. WORD PROCESSORS
published by Microsoft. It is part of the Microsoft
Word processors are specialized programs that allow Office suite of productivity software.
you to change the look and feel of a text document. These  Excel organizes data in columns and rows. Rows and
programs include tools that help you to create documents by columns intersect at a space called a cell. Each cell
inserting graphics, charts, tables, and other media elements. can contain a single of data, such as text, a numerical
These programs also help you to create a variety of business value, or a formula.
and personal documents such as reports, resumes, and  Excel was originally code-named Odyssey during
letters. development. It was first released on September 30,
1985.
MICROSOFT WORDPAD  It is used primarily to enter, edit, format, sort,
 Is a limited function word processor and a free rich- perform mathematical computations, save, retrieve
text editor included with Microsoft Windows for and print numeric data. Files created in Microsoft
viewing and editing rich-text files (.RTF, .DOCX, Excel are often referred to as spreadsheets or
and .ODT) files. workbooks and have the file extension .xls or .xlsx
 WordPad can perform basic text formatting like and etc.
changing the font, alignment, and even inserting GOOGLE SHEETS
multimedia. However, keep in mind that it does not
support all formatting options in .DOCX and .ODT  Is a spreadsheet program included as part of the
files, so some formatting may be incorrect. Also free, web-based Google Docs Editors suite offered by
included with all editions of Windows. Google.
 The app allows users to create and edit files online
MICROSOFT WORD while collaborating with other users in real-time.
 Is a full function word processor, so you can create  Edits are tracked by user with a revision history
professional documents and add indexes, captions presenting changes. An editor's position is
and table of figures. You can specify languages and highlighted with an editor-specific color and cursor
dictionaries, insert standard text and create and a permissions system regulates what users can
bibliographies. Sometimes called Winword, MS do.
Word, or Word, Microsoft Word is a word processor
published by Microsoft.
 It is one of the office productivity applications 3. DATABASE MANAGEMENT SYSTEM (DBMS)
included in the Microsoft Office suite. Originally
A DBMS is a software tool for creating, editing, and
developed by Charles Simonyi and Richard Brodie, it
managing collection of information called databases.
MICROSOFT ACCESS  Corel Corporation developed and released a
software program called CorelDRAW, a vector
 Is an information management tool, or relational
graphics editor.
database, that helps you store information for
 The software is a robust graphics suite, providing
reference, reporting and analysis.
many features for users to edit graphics. These
 Access can also overcome the limitations found
features include contrast adjustment, color
when trying to manage large amounts of information
balancing, adding special effects like borders to
in Excel or other spreadsheet applications.
images, and it is capable of working with multiple
MICROSOFT SQL SERVER layers and multiple pages.

 Is a RDBMS (relational database management


system) created by Microsoft. 5. PUBLISHING SOFTWARE
 It is used as a central location to save and obtain  Is used in the process of creating editorial projects.
data needed for applications. It uses SQL (structured
 The primary use of Desktop Publishing software (or
query language) for queries that store or retrieve
DTP software) is to lay out texts, images and graphics
data.
on a page and easily arrange these elements to
 SQL Server began in 1989 from the cooperation of create the preferred document.
Sysbase, Ashton Tate, and Microsoft, and at the time
 DTP software enables professional creation and
was very close to Sysbase SQL Server 3.0 for Unix.
management over the design of a document, and, if
GOOGLE DRIVE correctly used, a typographic quality.

 Is a cloud-based file storage service from Google. It ADOBE INDESIGN


also offers a free software suite that includes a word
 Is used to create documents containing stylized text
processor, and many others for spreadsheets,
and graphics.
presentations, drawings, and several others.
 The software includes various tools for formatting
 Since Google Drive is an online service, it allows
text, photographs, and other graphic elements on a
users to share files with one another, mutually edit
variety of page layouts, selection of templates that
documents, and synch their saved files across
users can use as a starting point.
multiple devices.
MICROSOFT PUBLISHER

4. GRAPHIC SUITE  Is considered an entry-level software (not specifically


professional) and is different from Word because it is
A graphics suite is a group of programs that are used to view,
more oriented to graphics than to text.
manipulate, and print computer graphics. Popular examples
 Publisher gives you two work possibilities: you can
are Adobe Photoshop and CorelDRAW.
start from a blank sheet or choose one of its
ADOBE PHOTOSHOP templates, which are divided into categories
(brochure, letterhead, postcards, calendars, leaflets,
 Adobe Photoshop is available in different versions, labels, etc.).
with the latest being Adobe Photoshop CC (Creative  The templates are original and graphically attractive.
Cloud). A large variety of editing tools exists, and one can
 It is the premier graphics and photo editing program add or remove words, colors, effects, and so forth.
used professionals in every field of digital imaging.
 Images can be imported, edited, and converted to CANVA
other formats. Images may be edited in layers,
 Is a simplified graphic-design tool website, founded
groups, and as Smart Layers, a proprietary Adobe
in 2012.
feature.
 It uses a drag-and-drop format and provides access
 The software provides a full range of image
to over a million photographs, vectors, graphics, and
adjustment and color correction, suitable for film,
fonts. It is used by non-designers as well as
television, digital video, and print publishing.
professionals.
 The tools can be used for both web and print media
design and graphics.

| BASIC WEB DESIGN PRINCIPLE AND ELEMENTS


COREL DRAW
Examples of Online Platform and Application: 5. Repetition, Pattern, Rhythm – duplicates the
characteristics of similar elements to contribute to
a) Web Design – it is a concept of planning, creating,
design consistency.
updating, and maintaining the website.
6. Contrast – refers to the use of conflicting elements
b) Web Page Creation – It is a document that is
or colors.
sustainable for the world wide web & web browser.
7. Space – refers to the area that an object occupies.
(Wix and Weebly)
c) Mapping – is the creation of maps, a graphic RULES:
symbolic representation of the significant features.
(Wikimapia and Google Maps)  Relevant
d) File Management – it is a computer program that  Informative
provide a user interface to manage. (tamar and  Interesting
word2pdf)
e) Social Media – A website and application that enable PRINCIPLES OF EFFECTIVE WEB DESIGN
user to create & share content. (FB, IG, Twitter)
f) Cloud Computing – it means storing & accessing 1. Purpose - Each page of a website needs to have a
data and programs over the internet instead of your clear purpose and fulfill a specific need for your
computer’s hard drive. (Google drive, evernote, website users in the most effective way possible.
dropbox) 2. Communication - People want to get information
g) Presentation tool – graphic program that allow you quickly, so it is important to communicate clearly
to crate slide shows presenting the topic or lecture. and make your information easy to read and digest.
(slideshare, presi, zohoshow) (by using headlines and sub-headlines, using bullet
points instead of long windy sentences, and cutting
Imaging & Designing for Online Environment the waffle.)
Infographics – is a collection of imagery, charts, and minimal 3. Typography – typography in web design is similar to
text. print design but requires certain considerations to
ensure legibility on all screen types. (typeface, type
Principles of Design – are the rules a designer must follow to size, color, line height, and letter shapes)
create an effective composition. 4. Colors – A well thought out color palette can go a
long way to enhance the user experience.
5. Images – A picture paints a thousand words and
ELEMENTS OF DESIGN choosing the right images for your website can help
with brand positioning and connecting with your
1. Line – are defined by points moving in space. It can target audience.
create a sense of movement. 6. Navigation – is about how easy it is for people to
2. Shape – is an enclosed space, the boundaries of take action and move around your website. Some
which are defined by other elements of art. tactics for effective navigation include a logical page
3. Direction – applying motion to create the visual hierarchy.
musion of movement. 7. Grid-Based Layouts – Placing content randomly on
4. Size (Scale) – size is basically the relationship of the your web page can end up with a haphazard
area occupied by one shape to another. appearance that is messy. Grid-based layouts
5. Texture – refers to surface appearance of an object arrange content into sections columns and boxes
given by the dimensions and/or form. that line up and feel balanced.
6. Color – is light redirected off object. 8. “F” Pattern Design – Eye-tracking studies have
identified that people scan computer screens in an
PRINCIPLES OF DESIGN “F” pattern.
9. Load Time – Everybody hates a website that takes
1. Balance – in design is the state of equal relationship. ages to load. Tips to make page load times more
2. Symmetrical balance – occurs when identical effective include optimizing image sizes, combining
weights are on equal sides of composition. code into a central CSS or JaceScript file (this reduces
3. Proximity – maintains a relationship between that HTTP requests), and minify HTML, CSS JavaScript
go together. (Compressed to speed up their load time).
4. Alignment – refers to lining up the element of a 10. Mobile-Friendly – It is now commonplace to access
design along the top, or bottom... websites from multiple devices with multiple screen
sizes. So, it is important to consider if your website is An effective team structure is composed of efficient team
mobile-friendly. members who have specific roles and responsibilities.

1. Project Manager - An individual who has general


accountability for the successful initiation, planning,
ELEMENTS OF EFFECTIVE WEB DESIGN
design, execution, monitoring, controlling, and
 Limit Color Use – Color schemes and color choices closure of a project.
are very important when it comes to modern web 2. Data Analyst - Someone who gather, process and
design. performs statistical analysis of data. A person who is
 Plenty of white space – white space is the term used accountable for collecting the data of ICT.
for the amount of “empty” space -i.e. margins 3. Content Writer and Editor - A person is responsible
between your content and the edge of your screen, for reviewing the data and finalize complete
and the buffers between the elements on your page. information.
 Clean backend coding – This modern website design 4. Web Designer - A person is responsible for creating
element is one that you might not notice visually, the appearance, layout, and elements of a website.
but one that is probably the most important when it The job involves understanding both graphics and
comes to the functionality of your site. computer programming.
 Search engine optimization (SEO) –There are 5. Web Developer - The person technically develops
modern website design elements that can greatly the overall functionalities of a web page.
improve web SEO. A lot of these are invisible to the
naked eye, and also appear in the backend coding of Online Platforms for hosting ICT content
your pages and posts.
 Conversation elements: call-to-action – These are  Presentation/Visualization (Prezi, Soho, Slideshare &
the things like email subscription form, free Mindmeister)
downloadable eBooks or whitepapers, free product  Cloud computing (Google Apps)
forms free consultation or other invites are great  Social Media (Facebook, Tumblr)
calls-to-action.  Web Page (Wix, Weebly)
 Blogs sites (Blogge, Livejournal & Issuu)

TEAM STRUCTURE AND DYNAMICS FOR ICT CONTENT

A. Group involves people who work independently to achieve FIVE PHASES OF PROJECT MANAGEMENT
its goal.
1. Initiating – an overview of the objectives of this
B. Team works interdependently where each member has a project, needs and the problem identified.
specific role or function, thus the team interacts dynamically 2. Planning – this is where a successful project
and adoptively to reach its common goal. conclusion is worked out by the project manager and
the project team.
3. Executing – This is where the project team goes
Team Structure about executing the project plan ones the project
plan has been constructed.
- refers to the creation of an individual team or the 4. Monitoring and Controlling – This is where the
creation of a multi-system. It is an essential project manager monitors and controls the work for
component of the teamwork process. time, lost, scope...
- 5. Closing – this happens when each phase has ended
and when the entire project is concluded.
Four parts of collaboration:

Sharing: Documenting explicit knowledge. Four steps in creating and choosing valuable ICT
content
Understanding: Adopting the process knowledge. 1. Define: Specify the main objective or goal that needs
to be promoted in your content.
Reflection: Analyzing or Interpreting shared information.
2. Analyze: Extract information from different
Expression: The process of making known one's thoughts or resources regarding the topic you want to write.
feelings. 3. Organize: Give an overview of your topic to help
readers understand what your topic is.
Team Members
4. Summarize: Create a summary of the information
you have gathered and analyzed to make sure your
article is free from graphical errors.

Three rules in creating quality content: (self-explanatory na


this)

 Relevant
 Informative
 Interesting

You might also like