Sunteți pe pagina 1din 10

La Union National High School

SENIOR HIGH SCHOOL


Catbangen, City of San Fernando, La Union
Telephone Number: (072) 682-9626 / E-mail: lunhs@gmail.com

EMPOWERMENT TECHNOLOGY

LESSON 1: INFORMATION AND COMMUNICATION TECHNOLOGY

ICT

-deals with the use of the different communication technologies.

 WEB 1.0 STATIC PAGES (FLAT PAGE OR STATIONARY PAGE )


- The page is “as is” and cannot be manipulated by user. The content is the same for all the
users.

 WEB 2.0 DYNAMIC PAGES

-The second stage of development of the World Wide Web, characterized especially by the

change from static web pages to dynamic or user-generated content and the growth of

social media.

-A term coined by Darcy DiNucci on January 1999.

-Allows the users interact with pages, the user maybe able to create a user account.

FEATURES OF WEB 2.0


1. Folksonomy
-Allow users to categorize and classify /arrange information using freely chosen
keywords example tagging. Popular social networking sites such as Twitter, Instagram ,
Facebook, etc. use tags that start with the pound sign(#). This is also referred to as
hashtag.

2. Rich User Experience

-Content is dynamic and responsive to users input.

3. User Participation

-The owner of the website is not the only one who is able to put content.

4. Long Tail

- Services offered on demand rather than on a one –time purchase. In certain

cases,time-based pricing is better than file size-based pricing or vice versa.

5. Software As A Service

-Users will subscribe to a software only when needed rather than purchasing them.
6. Mass Participation

- Diverse participation or sharing universal web access. Since most users can use the

internet , web 2.0 is based on people from various cultures.

 THE WEB 3.0 AND THE SEMANTIC WEB

Semantic Web

-Movement led by the World Wide Web Consortium (W3C)

- Coined by the inventor of WWW, Tim Berners-Lee. Lee also noted that the Semantic

Web is component for Web 3.0

-Provides a common framework that allows data to be shared and reused across

application, enterprise and community boundaries

-The aim of Web 3.0 is to have machines (or servers) to understand the user’s

preferences to be able to deliver web content specially targeting the user.

WEB 3.0 PROBLEMS

1. Compatibility

- HTML files and current web browsers could not support Web 3.0.

2. Security

- The user’s security is also in question since the machine is saving his or her own

preferences.

3. Vastness

-The WWW already contains billions of web pages.

4. Vagueness

- Certain words are imprecise.

5. Logic

- Since machines use logic, there are certain limitations for a computer to be able to
predict what the user is referring to at a given time.

TRENDS IN ICT

1. Convergence

- The synergy of technological advancements to work on similar goal or task.

For example, besides using your personal computer to create documents, you can

now use your smartphones. It can also use cloud technologies to sync files from one
device to another while also using the LTE Technology which means you can access
your files anytime and anywhere.
2. Social Media
-Is a website, application or online channel that enables web users to create, co –
create, discuss, modify and exchange user generated content.

TYPES OF SOCIAL MEDIA

A. Social Networks

-A site that allow you to connect with other people with the same interest or

background. Examples of these are Facebook and Google+.

B. Bookmarking Sites

-Allows you to store and manage links to various websites and resources.

Examples: StumbleUpon and Pinterest

C. Social News

-These sites that allow users to post their own news items or links to other news

sources. Examples: Rappler, CNN News.com, Reddit.com and Digg

D. Media Sharing

-Allow you to upload and share media content like images, music and video.

Examples: Flicker, YouTube , and Instagram

E. Microblogging

-Focus on short updates from the user. Those subscribed to the user will be able

to receive these updates. Examples: Twitter and Plurk

F. Blog and Forums

- This websites allow users to post their content. There are several free blogging

flatforms like blogger,wordpress and tumblr.

3. Mobile Technologies
Mobile devices use different operating systems.
A. iOS- use in apple devices such as the iPhone and iPad.
B. Android- an open source operating system developed by Google. Being open
source means several mobile companies use this for free.
C. Blackberry OS- in blackberry devices
D. Windows phone OS- a close source and proprietary operating system developed by
Microsoft.
E. Symbian- the original smartphone, use by the Nokia devices
F. Web OS- originally use by smartphones ; now used for smart TVs
G. Windows Mobile- Developed by Microsoft for smartphones and pocket PCs
4. Assistive Media
- A non-profit service designed to help people who have visual and reading impairment.
LESSON 2: RULES OF NETIQUETTE

NETIQUETTE

• Online Ethics and Etiquettes could be summarize into a single terminology called “Netiquette”

• It is a set of conduct, norms or rules that is to be followed strictly by all internet users.

• It is also the set of all acceptable behaviour or positive behaviour.

• Short cut for network etiquette

• Concerned with the proper ‘behaviour “ or way to communicate in an online environment

INTERNET THREATS

1. Malware

- stands for malicious software

TYPES OF MALWARES

A. Virus

- A malicious program designed to replicate itself and transfer from one


computer to another either through the internet and local networks or data storage like
flash drives and CDs.

B. Worm

-A malicious program that transfers from one computer to another by any type
of means. Often, uses a computer network to spread itself. Example the I LOVE YOU
WORM.

C. Trojan

-Disguised as a useful program but once downloaded or installed, leaves your


pc unprotected and allows hackers to get your information.

* Rogue security software

- Tricks the user into posing that it is a security software. It ask the user to

pay to improve his/her security but in reality , they are not protected at all.

D. Spyware

- A program that runs in the background without you knowing it. It has the ability
to monitor what you are currently doing and typing through keylogging.

*Keyloggers

- Used to record the keystroke done by the users. This is done to steal their

password or any other sensitive information. It can record email, messages, or

any information you type using your keyboard.

E. Adware

-A program designed to send you advertisements, mostly as pop-ups

2. Spam

- Unwanted email mostly from bots or advertisers. It can be used to send malware.
3. Phishing

-Its goal is to acquire sensitive personal information like passwords and credit card
details. This is done by sending you an email that will direct the user to visit a website and be
asked to update his/her username, password, credit card or personal information.

*Pharming

- A more complicated way of phishing where it exploits the DNS.

THINK BEFORE YOU CLICK

Things to Consider Before Posting Something Over The Internet

1. Before you post something on the web, ask these questions to yourself: would you want your
parents or grandparents to see it? Would you want your future boss to see it? Once you post
something on the web, you have no control of who sees your posts.

2. Your friends depend on you to protect their reputation online.

3. Set your post to “private”.

4. Avoid using names. Names are easy for search engines to scan.

COPYRIGHT INFRINGEMENT

Plagiarism

- is when the original work is manipulated and credit is not given where due or it can be
done with the specific purpose of deceiving the reader to think that the ideas are your
own.

Copyright Infringement

-Is the use of works protected by copyright law without permission for such a permission
is required.

-the use or production of copyright-protected material without the permission of

the copyright holder.

Copyright Law

- Includes your rights over your work and anyone who uses it without your consent is

punishable by law.

Copyright

-Is a form of protection for an author’s original piece of work (a.ka. Intellectual Property
Rights)

- This protection gives the owner of the copyright the “exclusive right” to decide who
can sell or reproduce their work.

Intellectual property

- If you create something-an idea, an invention, a form of literary work or a research,


you have the right as to how it should be used by others.
*There are also provisions of fair use which mean that an intellectual property
may use without a consent as long as it is used in commentaries, criticisms, search
engines, parodies, news reports, research, library achieving, teaching and education.

HERE ARE SOME TIPS THAT COULD HELP YOU AVOID COPYRIGHT INFRINGEMENT

1. Understand
- Copyright protects literary works, photographs, paintings, films, music, choreography
and sculptures but generally does NOT protect underlying ideas and facts. This means
that you can express something using your own words, but you should give credit to the
source.
2. Be Responsible
- Even if a material does not say that it is copyrighted, it is not a valid defense against
copyright. Be responsible enough to know if something has a copyright.
3. Be Creative
-Ask yourself whether what you are making is something that came from you or
something made from somebody else’s creativity.

4. Know the Law


-There are some limitations to copyright laws. For instance in the Philippines, copyrights
only last a lifetime (of the author) plus 50 years.

ONLINE RESEARCH

Online research is a research method that involves the collection of information from
the internet.

TIPS IN CONDUCTING ONLINE RESEARCH

1. Have one question in mind


-Focus on question you want to answer. If it is a series of questions, start with one. Never
search everything on one go.

2. Narrow it down

3. Advanced Search

- The best way to filter information you get from the search engines is by using the advanced
search. This will allow you to filter out information you do not need.

SYMBOLS USE IN SEARCH ENGINE

““ - Find the exact word or phrase

+ - Find web pages that contain all the terms that are preceded by the + symbol. Allows

you to include terms that are usually ignored.

() - Finds or excludes web pages that contain a group of words.

AND - Finds web pages that contain all phrases

NOT or - - Exclude web pages that contain a term or phrase

OR or I - Finds web pages that contain either of the terms or phrases


4. Look for credible source

- Some wikis, though filled with update information, are not credible source. This is due to

the fact that anyone can edit its content. When using wikis, check out the link of the
cited text to be navigated to the footnote where the list of sources is located. Click the
source of the information and see if it is credible.

5. Give Credit

- If you are going to use information from a source for educational purposes, give
credit to the original author of the page or information.

LESSON 3 : ADVANCE MICROSOFT WORD SKILLS

MAIL MERGE

-The most powerful and commonly use features of Microsoft Word.

- Allows you to create documents and combine or merge them with another document or
data file.

- It is commonly use when sending out advertising materials to various recipients.

THE TWO COMPONENTS OF MAIL MERGE

1. Form Document

-The first component of mail merge document

- It is generally the documents that contains the main body of the message we want to
convey or send.

- Literally a form that you will fill out with individual information

-Example : Regular tax Form or Registration Form

*Place holders

- Referred to us data fields or merge fields

- This marks the position on your document where individual data or information will
be inserted

- Denoted or mark by the text with double –headed arrows (<<>>) on each side and
with gray background

2. The List Or Data File

- This is where the individual information or data that needs to be plugged in


(merged) to the form document is placed and maintained.

- One of the best things about mail merge feature is that it allows data file created in
Microsoft Excel or other data formats.
INTEGRATING IMAGES AND EXTERNAL MATERIALS

HERE ARE SOME OF THE MATERIALS INSERTED

1. Pictures-these are electronic or digital photographs saved in any local storage device.
A.) .JPG/ JPEG
-pronounced as “jay-peg,” and is short form for Joint Photographic Experts
Group.
-This type of image file can support 16.7 million colors that is why it is suitable for
use when working with full color photographic images.

-.JPG does not work well on lettering, line drawing, or simple graphics.

-.JPG images are relatively small in file size.

B.) .GIF

-Stands for Graphics Interchange Format.

-This type of image file is capable of displaying transparencies. It is good for

blending with other materials in your documents. It is also capable of displaying

simple animation.

- The downside is that it can only support up to 256 colors so it is good mostly on
logos and art decors with very limited, and generally solid colors .

-This may not be too useful on printed document.

C. .PNG

-Pronounced as “ping.” It stands for Portable Network Graphics.

-It was built around the capabilities of .GIF.

-It is also good with transparencies but unlike .GIF , it does not support animation

but it can display up to about 16 millions colors. .PNG allows the control of the

transparency level or capacity of images.

2. Clip Art- line art drawings or images used as generic representation for ideas and objects.

3. Shapes- there are printable objects or materials that can integrate in your document to

enhance appearance or to allow some tools to use for composing ideas or

messages.

-useful for a poster or other graphic material for advertising

4. Smart Art-predefined sets of different shapes group together to form ideas that are

organizational or structural in nature.

- If you want to graphically represent ideas organization process, relationships or

flow of for the infographic document, then you will find this is easy and handy to

use.

5. Chart- Type of material that allows you to represent data characteristics and trends. Useful
when you preparing reports that correlate and present data in a graphical
manner.
6. Screenshot- Sometimes, creating reports or manuals for training and procedures will require
the integration of a more realistic image of what you are discussing on your reports or
manuals.

- Microsoft Word provides a snipping tool for your screen shots so you can select
and display only the part that you can select or display only the part that you

exactly like to capture on your screen.

7. Text Wrap-adjusts how the image behave around the objects or text.

IMAGE PLACEMENT

1. In Line With Text

-The default setting for the images that are inserted or integrated in your document. It

treats your images like a text font with the bottom side totally aligned the text line.

- Usually used when you need to place your image at the beginning of a paragraph.
When placed the between texts in a paragraph or sentence, it distorts the overall
appearance and arrangement of the texts in the paragraph because it will take up the
space it needs vertically, pushing lines of texts upward.

2. Square

- This setting shows the image you inserted to be placed anywhere within the
paragraph with text going the image in a square pattern like a frame.

3.Tight

-Almost the same with square setting, but here the text “hugs” or conforms to the
general shape of the image. This allow you to get a more creative effect of the
document.

-Mostly achieved if you are using an image that supports transparency like . GIF or .PNG
file.

4. Through

-This setting allows you the text on your document to flow even tighter, taking contours

and shape of the image.

- Can be best used .PNG or .GIF type of image

5. Top and Bottom

- This setting pushes the text away vertically to the top and/or the bottom of the image

so that the image occupies whole text line on its own

6. Behind The Text

- This allows the image to dragged and placed anywhere on your document but with

all the texts floating in front of it. It effectively look your image look like a background.

7. In Front of Text

-This setting allows your image to be placed right on the top of the text as if your image

was dropped right on it. This means whatever part of the text you placed the image on

, it will be covered by the image.

S-ar putea să vă placă și