Sunteți pe pagina 1din 5

Information and Communication Technologies Web 3.

0
Information and Communication Technology (ICT) deals  According to the W3C, “The Semantic Web
with the use of different communication technologies provides a common framework that allows data to
such as mobile phones, telephone, Internet, etc. to locate, be shared and reused across application,
save, send and edit information. enterprise, and community boundaries.”
 The aim of Web 3.0 is to have machines (or
Web 1.0 servers) understand the user’s preferences to be
 When the World Wide Web was invented, most able to deliver web content specifically targeting
web pages were static. the user.
 Static (also known as flat page or stationary page)
in the sense that the page is “as is” and cannot be Several problems of Web 3.0
manipulated by the user. 1. Compatibility. HTML files and current web browsers
 The content is also the same for all users. could not support Web 3.0.
2. Security. The user’s security is also in question since the
WEB 2.0 machine is saving his or her preferences.
 Web 2.0 is the evolution of Web 1.0 3. Vastness. The World Wide Web already contains billions
 Dynamic web pages (the user is able to see a of web pages.
website differently than others) were added. 4. Vagueness. Certain words are imprecise. The words
 Social networking sites, blogs, wikis, video sharing “old” and “small” would depend on the user.
sites, hosted services, and web applications. 5. Logic. Since machines use logic, there are certain
 Web 2.0 allows users to interact with the page: limitations for a computer to be able to predict what the
instead of just reading a page, the user may be user is referring to at a given time.
able to comment or create a user account. Web
2.0 also allows users to use web browsers instead ICT IN THE PHILIPPINES
of just using their operating system. Browsers can  "ICT Hub of Asia"
now be used for their user interface, application  growth of ICT-related jobs especially in BPO
software (or web applications), and even for file (Business Process Outsourcing)
storage.  106.8 cellphones per 100 Filipinos (2012 data)
 ICT shares 19.3% of employment population (2010
Features of Web 2.0 data)
1. Folksonomy. It allows users to categorize and classify /  Makati City (#1) and Cebu City (#9) - Selfiest Cities
arrange information using freely chosen keywords (e.g., around the World (Time Magazine)
tagging). Popular social networking sites such as
Twitter, Instagram, Facebook, etc. use tags that start Trends in ICT
with the pound sign (#). This is also referred to as 1. Convergence. Technological convergence is the synergy
hashtag. of technological advancements to work on a similar
2. Rich User Experience. Content is dynamic and is goal or task.
responsive to user’s input. An example would be a 2. Social Media. Social media is a website, application, or
website that shows local content. In the case of social online channels that enable web users to create, co-
networking sites, when logged on, your account is used create, discuss, modify, and exchange user-generated
to modify what you see in their website. content.
3. Long Tail. Services are offered on demand rather than
on a one-time purchase. In certain cases, time-based Six Types of Social Media:
pricing is better than file-size-based pricing or vice a. Social Networks. These are sites that allow you to
versa. This is synonymous to subscribing to a data plan connect with other people with the same interests or
that charges you for the amount of time you spent in background. Facebook, Google+
the Internet, or a data plan that charges you for the b. Bookmarking Sites. These are sites that allow you to
amount of bandwidth you used. store and manage links to various websites and
4. User Participation. The owner of the website is not the resources. StumbleUpon, Pinterest
only one who is able to put content. Others are able to c. Social News. These are sites that allow users to post
place a content of their own by means of comment, their own news items or links to other news sources.
reviews, and evaluation. Some websites allow readers Reddit, Digg
to comment on an article, participate in a poll, or d. Media Sharing. These are sites that allow you to upload
review a specific product (e.g., Amazon.com, online and share media content like images, music, and video.
stores). Flickr, Youtube, Instagram
5. Software as a Service. (SaaS) Users will subscribe to a e. Microblogging. These are sites that focus on short
software only when needed rather than purchasing updates from the user. Twitter, Plurk
them. This is a cheaper option if you do not always f. Blogs and Forums. These websites allow users to post
need to use a software. their content. Blogger, Wordpress, Tumblr
6. Mass Participation. It is a diverse information sharing
through universal web access. Since most users can use 3. Mobile Technologies. The popularity of smartphones
the Internet, Web 2.0’s content is based on people and tablets has taken a major rise over the years. This is
from various cultures.
largely because of the devices’ capability to do tasks that a. Virus – a malicious program designed to replicate
were originally found in personal computers. itself and transfer from one computer to another
(internet, local networks, FDs, CDs, etc.)
Kinds of MOBILE operating systems: b. Worm – a malicious program that transfers from
 iOS – use in apple devices such as iPhone and one computer to another by any types of means.
iPad. Ex. ILOVEYOU Worm
 Android – an open source OS developed by c. Trojan – a malicious program that disguises as a
Google. Being open source means mobile phone useful program but once downloaded or installed,
companies use this OS for free. leaves your PC unprotected and allows hackers to
 Blackberry OS – use in Blackberry devices. get your information.
 Windows Phone OS – a closed source and Rogue Security Software tricks the user into
proprietary operating system developed by posing that it is a security software. It then asks
Microsoft. the user to pay to improve his/her security but in
 Symbian – the original smartphone OS; used by reality, they are not protected at all
Nokia devices. d. Spyware – a program that runs in the background
 WebOS – originally used in smartphones; now without you knowing it (thus called “spy”). It has
used in smartTVs. the ability to monitor what you are currently
 Windows Mobile – developed by Microsoft for doing and typing through keylogging.
smartphones and pocket PCs. Keyloggers are used to record keystrokes done by
users.
4. Assistive Media. Assistive media is a nonprofit service e. Adware – a program designed to send you
designed to help people who have visual and reading advertisements, mostly as pop-ups.
impairments. A database of audio recordings is used to
read to the user. 2. Spam – an unwanted email mostly from bots or
advertisers. It can be used to send malware.
TIPS FOR ONLINE SAFETY 3. Phishing – an unwanted acquisition of sensitive
1. Be mindful of what you share online and what site personal information like passwords and credit
you share it to. card details.
2. Do not just accept terms and conditions. Read it. Pharming a more complicated way of phishing where
3. Check out the privacy policy page of a website to it exploits the DNS (Domain Name Service) system.
learn how the website handles the information 4. Botnet – group of compromised computers
you share. connected to a network ("zombie")
4. Know the security features of the social 5. Denial of Service Attack - disrupts computer
networking site you use. By keeping your profile access to internet services online.
private, search engines will not be able to scan
your profile. THINK BEFORE YOU CLICK
5. Do not share your password with anyone. 1. Before posting ask these questions. Would you
6. Avoid logging in to public networks/Wi-Fi. want your parents to see it? Would you want your
Browsing in “incognito (or private) mode,” a future boss to see it?
feature of the browser, will not protect you from 2. Your friends depend on you to protect their
hackers. reputation online.
7. Do not talk to strangers whether online or face-to- 3. Set your post to “Private”.
face. 4. Avoid using names.
8. Never post anything about a future vacation. It is 5. If you feel that a post can affect you or others
similar to posting, “Rob my house at this date.” reputation, ask the one who posted it to pull it
9. Add friends you know in real life. down or report it as inappropriate.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your COPYRIGHT INFRINGEMENT
computer. Use only one anti-virus software to If you create something an idea, an invention a form of
avoid conflicts. literacy work, or a research, you have the right as to how
12. If you have a Wi-Fi at home, make it a private it should be used by others. This is called “Intellectual
network by adding a password. Property”
13. Avoid downloading anything from untrusted
websites. You are most vulnerable in peer-to-peer HOW TO AVOID COPYRIGHT INFRINGEMENT
downloads (torrents) as the download is most  Understand
likely not monitored by the site owner.  Be Responsible
14. Buy software; do not use pirated ones.  Be creative
15. Do not reply or click links from suspicious emails.  Know the law
Fair use - may be used in commentaries, criticisms, search
INTERNET THREATS engines, parodies, news reports, research, library
1. Malware – stands for malicious software. archiving, teaching and education.
EXAMPLES OF MALWARE In the Philippines, copyright lasts with the author’s
lifetime plus 50 years.
ONLINE RESEARCH o The downside is that it can only support
It is the process of interactively searching for and up to 256 colors so it is good mostly on
retrieving requested information via a computer from logos and art decors with very limited, and
databases that are online. generally solid colors.
 .PNG
TIPS FOR AN EFFECTIVE ONLINE RESEARCH o It stands for Portable Network Graphics.
1. Have a question in mind. o Its development was basically for the
2. Narrow it down. purpose of transporting images on the
3. Advanced search. Internet at faster rates.
 + - allows you to include terms that are usually o It is also good with transparencies but
ignored unlike .GIFs, it does not support animation
 “ ” - finds the exact words in a phrase but it can display up to 16 million colors.
 ( ) - finds or excludes web pages that contain a 2. CLIPART
group of words This is generally a .GIF type; line art drawings or images
 AND or & - finds web pages that contains all the used as generic representation for ideas and objects that
terms or phrases you might want to integrate in your document.
 NOT or – - excludes web pages that contain a term 3. SHAPES
or phrase These are printable objects or materials that you can
 OR or | - finds web pages that contain either or integrate in your document to enhance its appearance or
the term or phrases allow you to have some tools to use for composing and
4. Look for credible sources. representing ideas or messages.
5. Give credit. 4. SMART ART
Author. “Article Title.” Page Title. Url. Date last viewed. Generally, these are predefined sets of different shapes
grouped together to form ideas that are organizational or
WHAT IS Mail Merge? structural in nature.
Mail Merge is a MS Word feature that allows you to create 5. CHART
documents and combine them with another document or This allows you to represent data characteristics and
data file. trends. This is quite useful when you are preparing reports
Two Components of Mail Merge that correlate and present data in a graphical manner.
1. FORM DOCUMENT 6. SCREENSHOT
Form Document is the document that contains the main Microsoft Word provides a snipping tool for your screen
body of the message you want to convey or send. shots so you can select and display only the part that you
2. DATA FILE exactly like to capture on your screen.
Data File includes the individual information or data or the
recipients' information. TEXT-WRAPPING STYLES
1. IN LINE WITH TEXT
A Merge Field marks the position on your form document It treats your image like a text font with the bottom side
where individual data or information will be inserted. It totally aligned with the text line.
serves like a variable name in algebra. 2. SQUARE
This setting allows the image you inserted to be placed
Integrating Images and External Materials anywhere with the paragraph with the text going around
the image in a square pattern like frame.
1. PICTURES 3. TIGHT
Generally, these are electronic or digital pictures or This is almost the same as the Square setting, but here
photographs you have saved in any local storage device. the text “hugs” or conforms to the general shape of the
Pictures image.
 .JPG / .JPEG 4. THROUGH
o This is pronounced as “jay-peg“ and is the This setting allows the text on your document to flow
short form of .jpeg or Joint Photographic even tighter taking the contours and shape of the image.
Experts Group. 5. TOP AND BOTTOM
o This type of image file can support 16.7 This setting pushes the texts away vertically to the top
million colors that is why it is suitable for and/or the bottom of the image so that the image
use when working with full color occupies a whole text line on its own.
photographic images. 6. BEHIND TEXT
o It does not support transparency. This allows your image to be dragged and placed
 .GIF anywhere on your document but with all the texts floating
o This stands for Graphics Interchange in front of it.
Format. 7. IN FRONT OF TEXT
o This type of image file is capable of This setting allows your image to be placed right on top of
displaying transparencies. the text as if your image was dropped right on it.
o It is also capable of displaying simple
animation.
AVERAGEIF
Finds average for the cells specified by a given condition
or criteria

=AVERAGEIF(range, criteria,average range)


Range - the cells where you want to look for the criteria
Criteria - the label or value that determines a cell is part of
the range to be averaged
Average Range - the actual range of cells that will be
FUNCTIONS AND FORMULAE averaged

SUM
Adds all the numbers in a range of cells. =AVERAGEIF(D16:D19,15,G16:G19)will produce 4.5.

=SUM(range) COUNT
Range - the cells to be added Counts the number of cells in a range that contain
numbers.
=SUM(F5:H6) will produce 21.
=COUNT(range)
SUMIF Range - the cells where the counting will take place
Adds the cells specified by a given condition or criteria.
=COUNT(A12:P12) will produce 6.
=SUMIF(range, criteria,sum range)
Range - the cells where you want to look for the criteria COUNTIF
Criteria - the label or value that determines a cell is part of Counts the number of cells within a range that meet the
the range to be added given condition.
Sum Range - the actual range of cells that will be added
=COUNTIF(range, criteria)
=SUMIF(E15:E19,”Teacher”,I15:I19) will produce 10. Range - the cells where the counting will take place
Criteria - the label or value that determines if it is to be
AVERAGE counted
Returns the average of its arguments.
=COUNTIF(J5:J19,”YES”) will produce 14.
=AVERAGE(range)
Range - the cells to be included in the computation of TIPS FOR EFFECTIVE PRESENTATIONS
average  Minimize (Compactness)
 Clarity
=AVERAGE(D5:D7) will produce 15.3333.  Simplicity (Complication-less)
 Visuals (Charts & Visuals)
 Consistency
 Contrast allows you to publish, edit and manipulate, organize and
USING HYPERLINKS delete web content. CMS is used in blogs, news websites,
1. Select an object or highlight a text. and shopping.
2. Insert > Hyperlinks
 Link to Options:
a. Existing File or Web Page
b. Place in This Document
c. Create a New Document
d. E-mail Address
3. Click OK to apply your hyperlink.

Basic Principles of Graphics and Layout


1. Balance. The visual weight of objects, texture,
colors, and space is evenly distributed on the
screen.
2. Emphasis. An area in the design that may appear
different in size, texture, shape or color to attract
the viewer’s attention.
3. Movement. Visual elements guide the viewer’s
eyes around the screen.
4. Pattern, Repetition, and Rhythm. These are the
repeating visual element on an image or layout to
create unity in the layout or image. Rhythm is
achieved when visual elements create a sense of
organized movement.
5. Proportion. Visual elements create a sense of
unity where they relate well with one another.
6. Variety. This uses several design elements to draw
a viewer’s attention.

Information graphics or infographics are used to represent


information, statistical data, or knowledge in a graphical
manner usually done in a creative way to attract the
viewer’s attention.

Principles and Basic Techniques of Image Manipulation


1. Choose the right file format. Try to make a real-life
photograph into GIF to see the difference
between PNG, GIF, and JPEG. Knowing the
purpose is the key to finding out the best file
format.
2. Choose the right image size. A camera with 12
megapixels constitutes to a bigger image size.
Monitors have a resolution limit, so even if you
have a million megapixels, it will not display
everything.
3. Caption it. Remember to put a caption on images
whenever possible. If it is not related to the web
page, then remove it.

Online Platforms for ICT Content Development


1. Social Media Platforms. Websites like Facebook
allow you to create not only personal accounts but
also pages and groups where you can share
content.
2. Blogging Platforms. It typically looks like a
newsletter where you are given options to change
the design to your liking. Though you can
manipulate the design, social media platform’s
popularity is still unrivaled.

A Content Management System (CMS) is a computer


application (sometimes online or browser-based) that

S-ar putea să vă placă și