Вы находитесь на странице: 1из 6

Information and Communication Technology

ICT Features of Web 2.0:


Deal with different communication Folksonomy
technology allows user to categorize and classify/
It is the infrastructure and components that arrange information using freely chosen
enable modern computing (to locate, save keywords (ex. Tagging)
and edit information) Rich User Experience
The term is generally accepted to mean all content is dynamic and responsive to user’s
devices, networking components, input
applications , and systems that allow people User participation
and organization to interact in the digital the owner of the website is not only one who
world is able to put content
Characteristics: Long tail
Acquisition, storage, manipulation, services that offered on demand rather than
management, transportation, or reception of one time purchase
data or information Software of a serviceusers
Real time access to information will subscribe to a software only when
Easy availability of updated data needed rather than purchasing them
Connecting geographically dispersed Mass participation
regions diverse information sharing through
Wider range of communication data universal web access
*BPO– Business Processing Outsourcing Web 3.0
Web Pages Design to cater individual users
Static – cannot edit information on that WEB 3.0 AND THE SEMANTIC WEB
webpage Semantic web is a movement led by the
Dynamic – we allow the user to manipulate world wide web (W3C World Wide Web
the data or information Consortium)
Web 1.0 W3C standard encourages web developers
Static website without interactivity to include semantic content in their web
First stage of the development of world wide pages
web Tim Berners Lee
Read only inventor of WWW coined the term W3C
Company focus and noted that the semantic web is a
Home pages component of web 3.0
Owning content ENCOUNTERED ISSUES W/ WEB 3.0
Web forms Compatibility
Directories Security
Page views Vastness
Web 2.0 Vagueness
Website containing dynamic content Logic
Darcy Dinucci (January 1999) Web 3.0
fragmented future Portable and personal
Include social networking sites, blogs, wikis, Individual focus
video sharing sites… Live stream/ waves
Read – write Consolidating content
Community focus Smart applications
Blogs/wikis User behaviour
Sharing content User engagement
Web applications
Tagging
Cost per click
Trends in ICT INTERNET
CONVERGENCE It is defined as information superhighway.
the synergy of technological advancement This means that anyone has access to this
to work on similar task or goal highway, they can place the information and
SOCIAL MEDIA grab the information.
is a website, application or online channel TIPS TO STAY SAFE ONLONE
that enables web user to create, co- create, Be mindful of what you share online and
discuss, modify and exchange user what site you share it to.
generated content. Do not just accept terms and conditions:
6 TYPES OF SCIAL MEDIA read it
Social network (FB, twitter Check out the privacy policy page of a
Bookmarking sites (stable upon and website
pinterest) Know the security features of the social
Social news ( reddit and digg) networking site you use
Media sharing ( youtube and instagram) Do not share password with anyone
Microblogging ( twitter and Plurk) Avoid logging in to public Wi-Fi/ networks
Blogs and forums ( blogger and tumblr) Do not talk to strangers online or face to
Mobile technology – technology used face
for cellular communication Never put anything about your future
MOBILE DEVICE AND OPERATING vacation
SYSTEMS Accept friends you know in real life
IOS – IPhone/ APPLE Avid visiting untrusted websites
Android – Google Install anti- virus software
Blackberry os – Blackberry Make a private network
Window Phone Os – Microsoft Avoid downloading form untrusted websites
Symbian Os – Nokia Buy a software, do not use pirated ones
Web Os – Operating system (Smart TV) Do not reply with suspicious mails
Windows Mobile – Microsoft MALWARE
ASSISTIVE MEDIA Malicious Software
is a non-profit service designed to help VIRUS
people who have visual and reading Vital information Under Siege
impairments. A database of audio recording Trojans
is used to read the user malicious software disguised as useful
RULES OF NETIQUETTE software but they’re malicious
Netiquette is a combination of the words ROOTKIT
network and etiquette. It is defined as a set have the access from the root of your
for acceptable online behaviour; Similarly, system, when they have access na pwede na
online ethics focuses on the acceptable use sila mag operate
of online resources in an online social WORMS
environment spread around
Also called as proper use of internet Spyware
ONLINE SAFETY AND SECURITY they spy
Internet is truly a powerful tool. It can be Crime ware
used in promoting business, gain new illegal activities
friends, source of entertainment and Adware
everything. In between, the internet is one of from ads
the most dangerous places especially if you Phishing
don’t know what you are doing with it. acquires sensitive information such as
password and pin numbers
Pharming
complicated way of phishing, it eploits the
DNS (Domain Name Service) system
INTELLECTUAL PROPERTY RIGHTS (IPR) ACADEMIC WEBSITES
IP is a category that includes intangible Internet achieve non- profit library
creations of the human intellect and Advanced World processing Skills – allows
primarily encompasses copyrights, patents, you to manipulate words/ text
and trademarks Microsoft
Patented Ebscohost
exclusive right for an invention which is a research platform
product JSTOR
To get a patent, technical into about. The different academic journals
invention must be disclosed TWO COMPONENTS OF MAIL MERGE
TM (trademark) Form Document
a symbol, word of words legally registered the letter itself
established by use as representing a List or Data file
company/ product saves data of the recipient
Trade secrets Individual information that needs to be
is a formula, or practice not generally known plugged in the form of document. It is
by often by which a business can obtain an placed and maintained
economic advantage over competitions or Label generation
customers includes in the mail merge the feature of
COPYRIGHT Microsoft word
Is a form of IP protection provided by the Integrating images and external materials
laws of the US. It is avail for original Retune, Clipart, Shapes, Smart Art, Chart,
workers or works of authorship that are and Screenshot
fixed to a tangible form, whether published/ Illustration group
unpublished. IMAGE FILE
ONLINE SEARCH AND RESEARCH JPEG
RESEARCH GIF
systematic inquiry that attempts to provide a PNG
solutions to existing problems and questions PSD(Commonly saved in Photoshop)
using facts and data Image placement
FORMS OF RESEARCH Square
Original research ( primary source) Tight
Scientific research (Providing explanation Through
about the world) STEPS IN MAKING A BIBLIOGRAPHY
Humanities research ( historic and Choose you reference site
sociological research) Add citations and sources
Artistic research ( Practice- based) Insert the bibliography
RESEARCH SKILLS SPELLING AND GRAMMAR TOOL
Check your sources For spelling error
Ask good questions Ignore
Go beyond the surface Ignore all
Be patient Add
Respect ownership Red line
Use your networks misspelled word
ICT TOOLS USEFUL IN RESEARCH Blue line
Google search grammatical error
Google Scholar Green line
Google journals Spacing
FINALIZING AND PROTECTING Types of sorting
DOCUMENTS Sort sheet
Document inspector It sort all data on your own worksheet by
Protecting document one column
Inserting passwords to protect documents Sort range
Mail merge It sorts the data in a rage of cells, which can
It allows you to create documents and be helpful when working with a sheet that
combine them with another document or contains several tables
file. Filtering
Write the markings It allows you to view information you need
HOW TO CREATE A MAIL MERGE Charts
Select Mailings A Graphical representation of your
Start with mail merge workbook data that’s easier to visualize for
Letters (content) comparison and trends
Write the markings TYPES OF CHARTS
Create a list for the data field Column
Input the data to the recipient list It uses vertical bars to represent data
ADVANCED EXCEL TOOL TO PROCESS Line
AND PRESENT DATA Is ideal for showing trends
Spreadsheet Pie
An electronic document in which data is used to compare proportion
arranged in the rows and columns of a grid. Bar
Column (letter) A column chart uses horizontal bars instead
Located at the top of the spreadsheet Area
Row (numbers) It is like the line chart, except the areas
Is located at the left side of the spreadsheet under the line are shaded.
MODIFYING VALUE FORMULA Surface
Active shell It allows you to display the data in 3D
Function landscape
is predefined as formula in excel that IF FUNCTION
performs calculation for specific value using Logical test
the reference cell is any value of expression that can be
PARTS OF A FUNCTION evaluated to true or false
= function Advanced presentation skills
Function name =sum(A1:A5) Microsoft power point
Always start with an equal sign Slides that contain information
Sum: add value
Average: Average value
Count: count the number of cells
Maximum (highest cell value)
Minimum (lowest cell value)
STEPS IN USING A FUNCTION
Select a cell where you want the function
Enter the desired function
Enter the cell range for the argument inside
parenthesis
Press enter
INERTING FUNCTION COMMAND
allows you to search a function using
keywords
Sorting
sorting data alphabetically and numerically
TIPS ON HOW TO CREATE Geometric shape
PRESENTATION triangle, square, circle
Keep it simple Natural
Limit bullet point and text animals and plants
Limit animations, transitions, and builds Abstract
Use high quality graphics Icons, stylized figures, and graphic
Have a visual theme but avoid using power illustration
point templates Circle
Use appropriate charts Represents harmony, infinity, community,
Use color well completeness, and perfection
Choose your fonts well Square and rectangle
Use video or audio symbolizes security and stability
Spend time in the slide sorter Triangle
Smart Art – used in power point for dynamic tension, aggression, and energy
presenting information graphically Colour
Step to insert hyperlink produced by and object that reflects light
Highlight a text Size
Go to insert (hyperlink) refers to how large or small something in a
When done choosing link, click ok to apply document
your hyperlink Texture
ELEMENTS OF DESIGN IN CREATING A look or feel
PRESENTATION Balance
Point refers to equal distribution of weight, which
a dot that acts as a visual focus in design, applies to visual weight
Line Contrast
is created by connecting two or more points replacement of light and heavy elements in a
Space page
area refers to the surface that acts as a visual Emphasis
container, drawing attention to other visual Distribution of heavy and light elements
elements in layout Rhythm
Shape repetition of one or more elements in a
Combination of line, points, and space design
Unity
feeling of harmony that is created by all the
parts and elements of a design

If may mali paki correct niyo nalngz. Good luck!!


-Hanna Alleia.

Вам также может понравиться