0% found this document useful (0 votes)
54 views4 pages

Etech Notes

Uploaded by

lara salundaguit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views4 pages

Etech Notes

Uploaded by

lara salundaguit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

ETECH M1 Trends in ICT

1. Convergence
Information and Communication -combination of two or more different entities of
Technology or ICT - use of different technologies to create a new single device.
communication technologies such as mobile 2. Social Media - It is a website, application, or
phones. To locate, save, send, and edit online channel that enables web users to
information. create, co-create, modify, and exchange user-
generated content.
World Wide Web(WWW, W3)
-an interconnected system of public webpages Types of Social media
accessible through the Internet. It was invented 1. Social Networks- sites that allow you to
connect with other people with same interests.
Sir Tim Berners-Lee in 1989. It can be static 2. Bookmarking Sites- allow users to store and
or dynamic. manage links to various websites and
resources.
Web 1.0 3. Social News- sites that allow users to post
-Web pages are static and not interactive. You their own news items ог links to other news
can't post comments or create an account. sources.
4. Media Sharing- sites that allow you to
Web 2.0 upload and share media content like images.
- used to describe concentrates on its 5.Microblogging -sites that focus on short
capability of providing people the means to updates from the user.
collaborate and share information online. 6. Blogs and Forums- sites that allow users to
- popularized by Tim O'Reilly and Dale post their content.
Dougherty at the O'Reilly Media Web 2.0
Conference in 2004 Mobile Technologies
-The popularity of smartphones and tablets has
Features of Web 2.0 taken a major rise over the years because of
● Folksonomy- It allows users to the devices' capability to do tasks.
categorize information using freely
chosen keywords. Uses hashtags (#) Different types of mobile operating
● Rich User Experience- Content is systems:
dynamic and is responsive to user's
input. An example would be a website 1.iOS- used in Apple devices such as Iphone
that shows local content 2. Android- an open source operating system
● User Participation- The owner of the developed by Google.
website is not the only one who is able 3. Blackberry OS- used in blackberry devices
to put content. 4. Windows Phone OS - a closed source and
● Software as a Service- Users will proprietary operating system developed by
subscribe to a software only when Microsoft
needed rather than purchasing them. 5. Symbian- original smartphone OS used by
● Mass Participation- It is a diverse Nokia devices
information sharing through universal 6. WebOS-originally used for smartphones;
web access. now used for smartTV's
7. Windows Mobile-developed by Microsoft for
Web 3.0 smartphones and pocket PCs.
-called as Semantic Web
● ability of Web technologies to Assistive Media It is a nonprofit service
understand and interpret human- designed to help people who have visual and
generated content reading impairments.
-To have machines understand the user's
preferences to be able to deliver web content
specifically targeting the user.
ETECH M2 3.) Know the security features of the social
networking site you use. By keeping your
ONLINE SAFETY AND SECURITY - one of profile private, search engines will not be able
the most dangerous places to scan your profile.
4.) Do not share your password with anyone.
TYPE OF INFORMATION
5.) Avoid logging in to public networks/Wi-Fi.
1.) First Name- a hacker already knows plenty Browsing in "incognito (or private) mode will
of stuff about you even if you only give NOT protect you from hackers.
out your first name 6.) Do not talk to strangers whether online or
face-to-face/
2.) Last Name- You will be vulnerable to being 7.) Never post anything about a future
searched for using search engines, vacation. It is similar to posting. "Rob my house
which include image search. at this date."
-can lead to several cybercrimes like 8.) Add friends you know in real life. 9. Avoid
identity theft. visiting untrusted websites. 10. Install and
update an antivirus software on your computer.
3.) Middle Name- not the most risky of these
Use only one anti- virus software to avoid
shared information
conflicts.
4.) Current and previous school(s)- They can 11.) If you have Wi-Fi at home, make it private
use this information for verification network by adding a password.
purposes. 12.) Avoid downloading anything from
untrusted websites.
5.) Your Cellphone Number- Your cellphone 13. ) But the software, do not use pirated ones.
number should never be posted over the 14.) Do not reply or click links from suspicious
Internet. emails.
15.) Make Online Purchases from Secure Sites
6.) Who your Mother and Father are- Risky, yet
not as risky as posting their full names,
INTERNET THREATS
especially your mother's maiden name

7.) Who your siblings are- This is a huge risk, 1. Malware- or malicious software, in any
-Strangers may pretend or use their program or file that is harmful to computer
identity to dupe you. user.

8. Your address- It would be much easier for TYPES:


criminals to find you. a. Virus- a malicious program designed
9. Your homephone number- more risky than to replicate itself
sharing your personal phone number.
- Scams usually use this information to b. Worm- a malicious program that
deceive you transfers from one computer another by
any type of means
10. Your birth- having it in your profile makes  ILOVEYOU Worm: The malware
you vulnerable to identity theft originated the Pandacan neighborhood
of Manila in the Philippines on May 5, in
2000.
 The Internet is defined as the
information superhighway c. Trojana- malicious program that
disguises as a useful program but once
TIPS TO STAY SAFE ONLINE downloaded or installed, leaves your PC
unprotected and allows hackers get your
1.) Be mindful of what you share online and information.
what site you share it to.
2. ) Do not just accept terms and conditions; d. Spyware ("spy") - a program that runs
read it. in the background without you knowing
it. It has the ability monitor what you are
currently doing and typing through ETECH M3
keylogging.
 Keylogger- used to record keystrokes CONTEXTUALIZED ONLINE SEARCH AND
done by the user. This is done to steal RESEARCH SKILLS
their password or any other sensitive
information. Tips on Improving Search and Research Skills

e. Adware- a program designed to send 1. When searching online, narrow your topic.
you advertisements, mostly as pop-ups. Identify the key concepts or important ideas.

f. Ransomware or ransom software is a 2. Put the word "AND" between each keyword
type of malicious software from to create a search string.
cryptovirology that threatens to publish 3. Identify synonyms of the key words. Not all
the victim's data or perpetually block databases or articles use the same words to
access to it unless a ransom is paid. describe a topic. Group similar words together
by using the word "OR" for a quick and
2. Spam - an unwanted email mostly from bots relevant search.
or advertisers.
4. Review the first pages returned. If these are
3. Phishing - acquire sensitive personal not helpful, change your keywords for a better
information like passwords and credit card description.
details. This is done by sending you an e-mail
that will direct the user to visit a fake website 5. Use the plus (+) sign for more specific
and be asked to update his/her username, search.
password, credit card or personal information.
6. Use the minus (-) sign for a more specific
COPYRIGHT INFRINGEMENT- protected by search.
copyright law without permission for a usage
where such permission is required 7. Use wildcards for a broader search.
Wildcard characters () let you find variations of
Tips that could help you avoid copyright a word
infringement:
8. Use quotation marks to find phrases or
1. Always assume that the work is copyrighted. names.
2. Do not copy, share or alter without seeking
permission. 9. Use several search engines. Search engines
3. Review and retain licensing agreements. are programs that look for documents based
4. Consider buying content. from specified keywords and return these
5. Give credit to the original author of the page documents where the keywords were found.
or information.
EVALUATING WEBSITES

Domain Types
.com - Commercial
.edu - Educational
.org - Organizational
.gov -Government
.net - Network
.mil – Military
ETECH M4 document to enhance its appearance or to
allow you to have some tools to use for
ADVANCED TECHNIQUES USING composing and representing ideas or
MICROSOFT WORD messages.

WORD PROCESSOR- is an application that 4. SmartArt- Generally, these are predefined


allows users to create, edit, and print sets of different shapes grouped together to
documents. form ideas that are organizational or structural
in nature.
MICROSOFT WORD- One of the most widely
used word processors is. It is developed by 5. Chart- Another type of material that you can
Microsoft and was released on October 25, integrate in your Word document that allows
1983. you to represent data characteristics and
trends.
- can create random things like calendar,
newsletter, invitations, etc. 6. Screenshots- creating reports or manuals
for training or procedure will require the
- complex program which people use to
integration of a more realistic image of what
perform various functions such as composing
you are discussing on your report or manual.
and editing, formatting and saving, and
printing.

MAIL MERGE- allows you to create


documents and combine them with another
document or data file

KINDS OF MATERIALS

1. Pictures these are electronic, "soft copy",


or digital pictures you have saved in any local
storage device.

3 COMMON TYPES OF PICTURE FILES:

1 .JPG- pronounced as "jay-peg".

-Short term for Joint Photographic


Experts Group.

- can support 16.7 million colors.


Suitable for use when working with full
color photographic images.

2. .GIF- This stands for Graphics


Interchange Format.

- Only supports 256 colors.

3.PNG- It stands for Portable Network


Graphics.

- supports only 16 million colors

2. Clipart- This is generally a GIF type; line art


drawings or images used as generic
representation for ideas and objects that you
might want to integrate in your document.

3. Shapes- These are printable objects or


materials that you can integrate in your

You might also like