Professional Documents
Culture Documents
Emtech Quarter 1
Emtech Quarter 1
Emtech Quarter 1
as Web 2.0.
| ICT IN OUR EVERYDAY LIVES
Features of Web 2.0:
Online platforms, sites, and content
Web 2.0 and Web 3.0 1. FOLKSONOMY
The World Wide Web
- allows users to categorize and classify or arrange
Trends in ICT
information using freely chosen keywords.
| INTRODUCTION TO INFORMATION AND
Example: Tagging. Popular social networking sites such as
COMMUNICATION TECHNOLOGIES
Twitter, Instagram, Facebook, etc. use tags that start with the
The state of ICT technologies pound sign (#) or hashtag sign.
Information and Communication Technologies (ICT) - Content is dynamic and is responsive to user’s input.
- Deals with the use of different communication (Dynamic - denoting or relating to web pages that update
technologies such as mobile phones, telephone, frequently or are generated according to an individual's
internet, etc. to: search terms.)
Locate,
Example: A website showing a local content. (In case of social
Save, and;
networking sites, when logged on, your account is used to
Edit information
modify what you see in their website)
WEB 1.0
3. LONG TAIL
When the World Wide Web was invented, most web - Services are offered on demand rather than on a one-time
pages were static and content cannot be purchase.
manipulated by the user. The content is also the
same for all users. - Time based pricing >>>> File sized pricing (vice versa)
(Static – also known as flat page or stationary page. In Web Example: Subscribing on a data plan (Netflix and other may
1.0 it is static in a sense that it cannot be manipulated by the plan na web) sa time spent of the internet or data plan na
user.) nagcha-charge for the amount ng bandwidth you used.
Experts refer to it as the “read-only” (Bandwidth - the data transfer capacity of a computer
A web that was not interactive in any significant network in bits per second (Bps))
sense.
4. USER PARTICIPATION
The web user was passive (for the most part)
User input took place OFFLINE. - The owner of the website is not the only one who is able to
put content. Others are able to place a content of their own
by means of comment, reviews, and evaluation.
Web 2.0 (Dynamic Web Pages)
5. SOFTWARE AS A SERVICE
- Is the evolution of Web 1.0 by adding dynamic web
- Users will subscribe to a software only when needed rather
pages. (Dynamic web pages – the user is able to see
than purchasing them. This is a cheaper option if you do not
a website differently than others)
always need to use a software.
- The “Wildly read-write Web”
- Allows users to interact with the page (the user may 6.MASS PARTICIPATION
be able to comment or create a user account
(parang Facebook, etc.) - It is a diverse information sharing through universal web
- Allows users to use web browsers instead of just access.
using their operating system. - Since most users can use the internet, Web 2.0’s content is
- In here, browsers can now be used for their user based on people from various cultures.
interface, application software (or web applications),
and even for file storage. Examples of Web 2.0:
World-Wide Consortium (W3C) standard encourages web - The popularity of smartphones and tablets has taken a
developers to include semantic content in their web pages. major rise over the years. This is largely because of the
(According to them, the Semantic Web provides a common devices’ capability to do tasks that were originally found in
framework that allows data to be shared and reused across personal computers.
application enterprise, and community boundaries.) Kinds of operating systems:
- The aim of Web 3.0 is to have machines (or servers) iOS
understand the user’s preferences to be able to Android
deliver web content specifically targeting the user. Blackberry OS
Windows Phone OS
Symbian
Several Problems of Web 3.0: WebOS
Windows Mobile
1. Compatibility (HTML files and current web browsers could
not support Web 3.0) 4. ASSISTIVE MEDIA
2. Security (The user’s security is also in question since the - is a nonprofit service designed to help people who have
machine is saving his or her preferences) visual and reading impairments. A database of audio
3. Vastness (The World Wide Web already contains billions of recordings is used to read to the user.
web pages)
2. SOCIAL MEDIA
Cyberbullying
Identity Theft
Cyber Stalking
Sexting
INTERNET THREATS
The importance of the internet plays a crucial part in Virus – a malicious program that replicates itself by
human development. Life becomes easy and comfortable copying itself to another program.
because of this technology. Most of us are connected to the Trojan Horse – a malicious program that disguises as
internet via laptop, mobile phone, tablet, personal computer, a legitimate program that user will accept and use
and other electronic gadgets. Behind this technology, there but takes control of your computer.
is a risk that everyone should be aware of. You could be at Worm – a malicious program that copies itself and
risk of scams, bullying, and illegal activities if you will not spreads to other computers.
take precautions in using the internet. We need to keep Spyware – A malicious program that gathers
ourselves safe and secure whenever we use the internet. information from a victim’s computer and sends it
That is why it is very important to know and learn the ways back to the hacker.
on how to be safe and secured online. Adware – An unwanted advertisement that will pop
up several times on the victim’s computer then
behaves abnormally and tedious to close them.
How to be safe online? Keylogger – A program that runs in the background
and steals user credentials and confidential
Do not share your password with anyone. information and sends it back to hack by recording
Add friends you know in real life. every keystroke that a user makes on their computer
Do not visit untrusted websites. or device.
Add a password to your WIFI at home to make it Botnet – A collection of infected internets–
private. connected devices such as PC and mobile phones
Install and update the antivirus on your computer. that are controlled by a common type of malware.
Rootkit – A software tool used by hackers to gain 10. Thou shalt use a computer in ways that show
control over a computer on a network without being consideration and respect.
exposed.
Ransomware – A ransom virus that blocks the user
Think Before You Click
from accessing the programs or files and demands to
pay the ransom through an online method for the 1. Before you post something on the web, ask these
removal of the virus. questions to yourself: Would you want your parents or
Spam - also known as junk email or unwanted email grandparents to see it? Would you want your future boss to
send by advertiser or bot. It can be used to send see it? Once you post something on the web, you have no
malware. control of who sees your posts.
Phishing - a cyber-attack method using deceptive
emails and websites to acquire sensitive personal 2. Your friends depend on you to protect their reputation
information. online. Talk to your friends about this serious responsibility.
Cybercrime - a crime in which a computer is used as 3. Set your post to “private.” In this way, search engines will
an object and tool in committing a crime such as not be able to scan that post.
hacking, phishing, spamming, child pornography,
libel, hate crimes, identity thief and others. 4. Avoid using names. Names are easy for search engines to
Cybercrime Law - a law that deals with all forms of scan.
cybercrime.
5. If you feel that a post can affect you or other’s reputation,
ask the one who posted it to pull it down or report it as
inappropriate.
NETIQUETTE
Copyright Issues
- it is a word that came from two words “net” and
“etiquette”. It is an etiquette applied online that shows - There are millions of information that we can get
proper manners and behavior. If you are a member of an from the internet. Some of this information is free
online society through social media, you are called a netizen. but others are not. They are protected by copyright
And in interacting with another netizen online, we need to law.
maintain good behavior which is acceptable to others in an
What is Copyright?
online community.
- Copyright is a protection given to the owner of the
rights in an original work such as books, musical
THE TEN COMMANDMENTS works, films, paintings, and other works, as well as
computer programs. This original work is called
The Ten Commandments of computer ethics have been intellectual property which is protected under
defined by the Compute Ethics Institute. Republic Act 8293 known as the “Intellectual
Property Code of the Philippines”.
1. Thou shalt not use a computer to harm other
people.
2. Thou shalt not interfere with other people's COPYRIGHT INFRINGEMENT
computer work.
3. Thou shalt not snoop around in other people's files. If you create something—an idea, an invention, a
4. Thou shalt not use a computer to steal. form of literary work, or research, you have the right of how
5. Thou shalt not use a computer to bear false witness. it should be used by others. This is called intellectual
6. Thou shalt not use or copy software for which you property.
have not paid.
7. Thou shalt not use other people's computer
resources without authorization FAIR USE
8. Thou shalt not appropriate other people's
- is the use of copyrighted material for comment,
intellectual output.
teaching, criticism, news reporting, research,
9. Thou shalt think about the social consequences of
scholarship, and another similar purpose that is not
the program you write.
an infringement of copyright.
- In fair use, 5% of the content of the reference can was first released in 1983. And have the file
only be copied. If 20% or less of extenxion .doc/ .docm/.docx and etc.
- the reference is copied, there must be a secondary
use agreement and fee. And if 20% or more of the
reference is copied, it requires purchasing creative GOOGLE DOCS
work.
Is a web-based productivity office suite offered by
Guidelines for Fair Use Google within its Google Drive service.
1. Majority of the contents created must be yours. Google Docs allows users to create and edit
documents online while collaborating with other
2. Give credits to the owner. users in real- time. Edits are tracked by user with a
revision history presenting changes.
3. Do not make a profit from copyrighted work.
2. SPREADSHEET
| PRODUCTIVITY TOOLS
A spreadsheet is an application tool that store,
Productivity tools (office productivity software) are organize, and calculate data in tables. They are used primarily
application software used for producing information (such as in recordkeeping tasks and accounting.
documents, presentations, worksheets, databases, charts,
MICROSOFT EXCEL
graphs, digital paintings, electronic music, and digital video).
Excel is a spreadsheet application developed and
1. WORD PROCESSORS
published by Microsoft. It is part of the Microsoft
Word processors are specialized programs that allow Office suite of productivity software.
you to change the look and feel of a text document. These Excel organizes data in columns and rows. Rows and
programs include tools that help you to create documents by columns intersect at a space called a cell. Each cell
inserting graphics, charts, tables, and other media elements. can contain a single of data, such as text, a numerical
These programs also help you to create a variety of business value, or a formula.
and personal documents such as reports, resumes, and Excel was originally code-named Odyssey during
letters. development. It was first released on September 30,
1985.
MICROSOFT WORDPAD It is used primarily to enter, edit, format, sort,
Is a limited function word processor and a free rich- perform mathematical computations, save, retrieve
text editor included with Microsoft Windows for and print numeric data. Files created in Microsoft
viewing and editing rich-text files (.RTF, .DOCX, Excel are often referred to as spreadsheets or
and .ODT) files. workbooks and have the file extension .xls or .xlsx
WordPad can perform basic text formatting like and etc.
changing the font, alignment, and even inserting GOOGLE SHEETS
multimedia. However, keep in mind that it does not
support all formatting options in .DOCX and .ODT Is a spreadsheet program included as part of the
files, so some formatting may be incorrect. Also free, web-based Google Docs Editors suite offered by
included with all editions of Windows. Google.
The app allows users to create and edit files online
MICROSOFT WORD while collaborating with other users in real-time.
Is a full function word processor, so you can create Edits are tracked by user with a revision history
professional documents and add indexes, captions presenting changes. An editor's position is
and table of figures. You can specify languages and highlighted with an editor-specific color and cursor
dictionaries, insert standard text and create and a permissions system regulates what users can
bibliographies. Sometimes called Winword, MS do.
Word, or Word, Microsoft Word is a word processor
published by Microsoft.
It is one of the office productivity applications 3. DATABASE MANAGEMENT SYSTEM (DBMS)
included in the Microsoft Office suite. Originally
A DBMS is a software tool for creating, editing, and
developed by Charles Simonyi and Richard Brodie, it
managing collection of information called databases.
MICROSOFT ACCESS Corel Corporation developed and released a
software program called CorelDRAW, a vector
Is an information management tool, or relational
graphics editor.
database, that helps you store information for
The software is a robust graphics suite, providing
reference, reporting and analysis.
many features for users to edit graphics. These
Access can also overcome the limitations found
features include contrast adjustment, color
when trying to manage large amounts of information
balancing, adding special effects like borders to
in Excel or other spreadsheet applications.
images, and it is capable of working with multiple
MICROSOFT SQL SERVER layers and multiple pages.
A. Group involves people who work independently to achieve FIVE PHASES OF PROJECT MANAGEMENT
its goal.
1. Initiating – an overview of the objectives of this
B. Team works interdependently where each member has a project, needs and the problem identified.
specific role or function, thus the team interacts dynamically 2. Planning – this is where a successful project
and adoptively to reach its common goal. conclusion is worked out by the project manager and
the project team.
3. Executing – This is where the project team goes
Team Structure about executing the project plan ones the project
plan has been constructed.
- refers to the creation of an individual team or the 4. Monitoring and Controlling – This is where the
creation of a multi-system. It is an essential project manager monitors and controls the work for
component of the teamwork process. time, lost, scope...
- 5. Closing – this happens when each phase has ended
and when the entire project is concluded.
Four parts of collaboration:
Sharing: Documenting explicit knowledge. Four steps in creating and choosing valuable ICT
content
Understanding: Adopting the process knowledge. 1. Define: Specify the main objective or goal that needs
to be promoted in your content.
Reflection: Analyzing or Interpreting shared information.
2. Analyze: Extract information from different
Expression: The process of making known one's thoughts or resources regarding the topic you want to write.
feelings. 3. Organize: Give an overview of your topic to help
readers understand what your topic is.
Team Members
4. Summarize: Create a summary of the information
you have gathered and analyzed to make sure your
article is free from graphical errors.
Relevant
Informative
Interesting