Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

EMPOWERMENT TECHNOLOGIES

1st Quarter | 11 – J. Rizal


 can be associated with any technology that
LESSON 1: ICT applies the process of convergence.
 convergence refers to the meeting of
Information and Communication Technologies different elements to make up a whole.

World Wide Web 2. Mobile Technologies


 Smartphones and tablets have grown in
 Tim Berners - Lee (1989) popularity in recent years.
 The documents and other resources  This is largely due to the device's ability to
located from different terminals and web perform tasks that were previously only
pages with their unique uniform resource performed by personal computers.
locator (URL) can be interlinked through
the internet. Android – Google created an open-source OS
 Open source – many mobile phone
 In its initial stage, it only used hypertexts to providers can use it for free.
connect one page to another page/s.
 single = web page iOS – Apple (iPhone and iPad)
 multiple web pages = websites.
Blackberry OS – Blackberry
http://www.example.com
Windows Phone OS – closed source and propriety
Protocol identifier - http:// OS developed by Microsoft
Resource name - www.example.com
Symbian – original smartphone OS; Nokia
History of WWW
Web OS – originally smartphones; now for smart
Web 1.0 TVs
 Debatable
 Websites pages are static. 3. Social Media Platforms
 Website contents and layout are  Process of connecting the people and
inseparable. bringing relevant and pertinent information
 Website contents are stored in files. to people across the globe, social media
 Websites use proprietary HTML tags. platforms are in forefront.
 Websites forms are usually sent by email.
- Social Network – allow creation of personal
accounts that will be used to connect with
Web 2.0
people for different purposes.
 Darcy DiNucci (1999)
EX: Propeller, Facebook
 It has user-generated contents. - Bookmarking Sites – used to search,
 It has emphasis on user experience. manage, organize, and store web pages
 It has improved interoperability that a person wants to revisit or share with
others.
Web 3.0 EX. Pinterest, Flipboard
 It adheres to minimalist design. - Social News – to submit news, articles,
 It uses the semantic web framework. stories, videos, and photographs that are
 It is an ever-present web. worth sharing to their expected subscribers.
 It applies and uses artificial intelligence. EX: Reddit, Digg, Quora
- Media Sharing – to share and upload
TRENDS IN ICT multimedia contents like graphics, texts,
video and audios.
1. Convergent Technologies EX: Youtube, Instagram, Snapchat

REVILLA
EMPOWERMENT TECHNOLOGIES
1st Quarter | 11 – J. Rizal
Republic Act 10627 or The Cyberbullying Anti -
- Microblogging – online broadcast Bullying Act of 2013 defines bullying as “any
mediums that allow their users to post and severe or repeated use by one or more students of
exchange short content. a written, verbal or electronic expression, or a
EX: Twitter, Tumblr physical act or gesture.”
- Blogs and Forums – blog sites allow one
to post their content  Flaming - an online fight using electronic
EX: Blogger, WordPress messages with angry and vulgar languages.

4. Assistive Media  Harassment - act of repeatedly sending nasty,


 Devices are adaptive, assistive, and mean and insulting messages.
rehabilitative to the elderly and to people
with special needs.  Denigration - sending or posting gossip or
rumors about a person to damage his or her
Online Systems – refer to the integrated and reputation or friendship.
collaborative use of software, hardware, and the
internet to deliver their intended functions  Impersonation - someone is pretending to be
through and identified platform. someone else and sending or posting material
to get that person in trouble or danger or to
Online Functions – refer to what the system can damage that person’s reputation or friendship.
do for its users. A tool for searching and
researching vital information. Used to speed up  Outing - act of sharing someone’s secrets or
transactions that may take more time when done embarrassing information or images online.
manually.
 Trickery - someone is talking to a person to let
 Used to organize records that are generated him or her reveal his or her secrets or
in single or multiple transactions. embarrassing information and then shares the
 Used to manage the data involved in online sensitive information online.
transactions.
 Exclusion - one is intentionally or cruelly
Online Platforms – refers to the range of excluded from an online group.
services and tools available on the internet that
will be used to provide the indicated functions  Cyberstalking - act of repeated, intense
earlier. harassment and denigration that includes
threats or creates significant fear.
LESSON 2: ONLINE SAFETY
2. Identity Theft
Online Safety – refers to the maximization of
internet user's knowledge and awareness of safety US Department of Justice defines “identity theft”
protocols, online crimes, and security risk in the and “identity fraud” as “all types of crimes in which
private property and information in which are someone wrongfully obtains and uses another
connected to the use of the internet. person’s personal data in some way that involves
fraud or deception, typically for economic gain.”
Online Security – "Rules that are followed and
actions that are taken to make sure that online 3. Phishing
users and data privacy aren't compromised by
cybercriminals," (Mocan, 2019). Oxford Lexico defines Phishing as, “The
fraudulent practice of sending emails purporting to
Online Crimes be from reputable companies in order to reveal
personal information such as passwords and credit
1. Cyberbullying card numbers”

4. Plagiarism and Copyright Infringement


REVILLA
EMPOWERMENT TECHNOLOGIES
1st Quarter | 11 – J. Rizal
5. WRITE YOUR LETTER (MORE ITEMS)
The University of Oxford in the UK states that 6. REVIEW YOUR LETTERS
“plagiarism is presenting someone else’s work or 7. COMPLETE THE MERGE
ideas as your own, with or without their consent,
by incorporating it in your work without full LESSON 4: ADVANCED WORD PROCESSING
acknowledgement.”
Wrap Text
Common Internet Security Threats
1. In line with text
 dangers that are associated with using the  Default settings
internet.  The image is located in the line where the
text is located.
Most common forms identified by McAfee
Corporation: 2. Square – The text surrounds the image.

 Malware – Malicious Software 3. Behind the text – The image is located behind
 Computer Worms - these are programs the text.
that can replicate themselves from one
computer to another in great volume. 4. Tight – The text surrounds the image, but the
 Spam - generally, spam and unwanted margin/space between the image and the text
messages are harmless. is smaller.
 Phishing - these scams are created by
cybercriminals who intend to ask for private 5. Top and Bottom – Text at the top or bottom of
or elicit information from their victims. the image.

Internet Security Strategies 6. In front of text – Image is located in front of the


text or hovers above the text which obscures it.
 Browser Selection
 Email Security Guides in Making an Effective Presentation
 Multifactor Authentication (MFA)
Minimalism – Do not put too many slides in a
 Firewalls
Presentation.
Clarity – The slides in the presentation must be
Online Ethics – ethics deals with what is good
clear.
and bad. It is a set of moral principles that can be
Simplicity – Do not put an entire paragraph in
taken as a guiding philosophy in life.
the slide. Follow 6*7 rule that limits the
content.
Online Etiquette – This acceptable conduct that
Visual – Orientedness – Use relevant graphics
adheres to polite behaviors and respectful
to make the presentation more interesting.
manners.
Consistency – Slides should be uniform
Contrast – Make the presentation readable
LESSON 3: MAIL MARGE
Hyperlink – Allows you to connect your
Mail Merge – Allows you to produce multiple
presentation with other documents or even within
letters, Labels, envelopes, name tags, and more
your presentation by connecting it to a text or a
using information stored in a list, database, or
picture.
spreadsheet. Personalized Mail for many people.
LESSON 5: ADVANCE SPREADSHEET SKILLS
1. SELECT YOUR DATABASE (WORD OR
EXCEL)
Formulas – appears in the formula bar or written
2. SELECT CURRENT FILE
into a cell
3. SELECT STARTING DOCUMENT
4. SELECT RECIPIENT  (=) Equal Sign
 (+) Plus Sign
REVILLA
EMPOWERMENT TECHNOLOGIES
1st Quarter | 11 – J. Rizal
 (-) Minus Sign  Variety prevents design from being
 (*) Asterisk Sign monotonous.
 (/) Forward Slash Sign
INFOGRAPHICS
1. AUTOSUM – calculates the sum of the
numbers on the selected cells. Information graphics are used to represent
information, statistical data, or knowledge in a
2. SUMIF() – used to summate the values of graphical manner usually done in a creative way to
cells in a range that meet a criteria that attract the viewer’s attention.
have been specified.
REASONS TO USE INFOGRAPHICS
3. AVERAGE() – Allows user to get the
average of all the numbers in the chosen  To communicate a message
cells.  To present in a way that is compact and easy to
comprehend
 Basic formula is =AVERAGE (range to be  To analyze data in order to discover cause-and-
counted) effect relationships.

4. COUNT() – Used to count the number ELEMENTS OF INFOGRAPHICS


chosen cells that have a number value in
them. 1. Visual Elements
2. Content Elements
 Basic formula is =COUNT (range to be counted) 3. Knowledge Elements

IMAGING AND DESIGN FOR ONLINE ONLINE FILE FORMAT FOR IMAGES
ENVIRONMENT
1. JPEG (Joint Photographic Expert Group)
Principles of Design  One of the most popular image file
type, widely used for sharing and
1. Balance – The visual weight of objects, uploading visual content online.
texture, color, and space is evenly distributed  Supports 24-bit colors (16.7M)
on the screen.  Used for photographic images and
graphics with complex colors and
A. Symmetrical – has an imaginary line gradients.
B. Asymmetrical – doesn’t have imaginary
line. 2. PNG (Portable Network Graphics)
 Supports 24-bit colors (16M)
2. Emphasis – An area in the design that may  Features background transparency.
appear different in size, texture, shape, or color  Does not support animation.
to attract the viewer’s attention.  Older printers may not support PNG
transparencies.
3. Movement – Visual elements guide the
viewer’s eyes around the screen. 3. GIF (Graphic Interchange Format)
 Supports 8-bit colors (256 colors)
4. Pattern, Repetition, and Rhythm – Create
 Features background transparency and
unity in layout; repeating visual elements, and
animation
organized.
 Requires editing program.
5. Proportion – Visual elements create a sense of
unity where they relate well with one another.

6. Variety – Uses several designs elements to


draw a viewer’s attention.
REVILLA

You might also like