0% found this document useful (0 votes)
23 views12 pages

EM-TECH

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views12 pages

EM-TECH

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

EM-TECH REVIEWER.

WEEK 1

Introduction to Information and

Communication Technologies

Information and Communication Technology (ICT)

- is concerned with the use of different communication technologies


to locate, store, send, and edit information.

THE CURRENT STATE OF ICT

WEB 1.0

 Tim Berners-Lee created the World Wide Web


 First stage of the World Wide Web (www)
 Age of “Read – Only Web”
 Web pages were static, which means that you can read the text and look at the photos, but the
user could not interact with them to obtain more information.

WEB 2.0

 Also known as the “Dynamic Web”


 The beginning of the wide use and popularity of social media such as Twitter, Facebook, and
Youtube.

WEB 3.0

 Also known as the “Semantic web” or “Data driven web”.


 As the user interacts or responds, contributes, and collaborates on the web, the user search
context is processed by a programming language to help the user by presenting options of what
the user is interested in.

INFORMATION AND COMMUNICATION TECHNOLOGY TRENDS (ICT TRENDS)

1. CONVERGENCE

- Technological convergence is the synergy of technological advances to work towards a similar goal or
task.

2. SOCIAL MEDIA

- a collection of web-based communication tools and computer-assisted channels dedicated to enabling


users to interact, communicate, and share information in a virtual community and network.
TYPES OF SOCIAL MEDIA

 SOCIAL NETWORKS - These are sites that allow you to connect with people of the same interest
or background.

EXAMPLE:

FACEBOOK, GOOGLE+
 BOOKMARKING SITES - These are sites that allow you to store and manage links to a
variety of websites and resources. Most of these sites allow you to create a tag that
allows you and others to search or share easily.
EXAMPLE:
PINTEREST, STUMBLEUPON

 SOCIAL NEWS - These are sites that allow users to post their news articles or links to
other news sources. Users may also comment on the post, and comments may also be
ranked.
EXAMPLE:
REDDIT, DIGG

 MEDIA SHARING - These are sites that allow you to upload and share media content
such as images, music, and video.
EXAMPLE:
YOUTUBE, INSTAGRAM
 . MICROBLOGGING - These are the sites that focus on the user's short updates.
EXAMPLE:
TWITTER, PLURK

 BLOGS & FORUMS - These websites allow users to post their content. Other users can
comment on the topic.
EXAMPLE:
BLOGGER. TUMBLR
.3. MOBILE TECHNOLOGY
- a form of technology that is mostly used in cellular communication and other related
aspects.
- It uses a form of platform where by many transmitters have the ability to send data at
the same time on a single channel.

TYPES OF MOBILE TECHNOLOGY


Symbian - The original smartphone Operating system used by Nokia devices.
webOS - Originally used for smartphones; now used for smart TVs.
Windows Mobile - Operating system developed by Microsoft for smartphones and Pocket PCs.
IOS - Operating system used on Apple devices such as iPhone and iPad.
Android - An open-source operating system developed by Google.
Blackberry - Operating system used on Blackberry devices.
Windows phone - A close source and proprietary operating system developed by Microsoft.

4. ASSISTIVE MEDIA

- Assistive Media was the first internet-based service to be designed to help people with visual and
reading disabilities.

WEEK 2
NETIQUETTE
CONTENT COVERAGE
- Online Security
- Internet Threats
- Protecting Reputations Online
- Copyright
- Contextualized online search and research skill

INTERNET SAFETY
- Refers to the online security or safety of people and their information when using
internet.
NETIQUETTE
- Combination of the words network and etiquette and is defined as a set of rules for
acceptable online behavior.

TEN RULES OF NETIQUETTE


Rule no. 1: Remember the human
- You need to remember that you are talking to a real person when you are online.
- The internet brings people together who would otherwise
never meet.
- Remember this saying when sending an email: Would I say this to the person’s face.
Rule no. 2: Adhere to the same standards online that you follow in real life.
- You need to behave the same way online that you do in real life.
- You are still talking to a real person with feelings even
though you can’t see them.
Rule no. 3: Know where you are in cyberspace.
- Always take a look around when you enter a new domain when surfing the web.
- Get a sense of what the discussion group is about before You join it.
Rule no. 4: Respect other people’s time and bandwidth.
- Keep your post and emails to minimum by saying what you want to say.
- Remember everyone won’t answer your questions.
- Be polite and pleasant to everyone.
Rule no. 5: Make yourself look good online.
- Know what you are talking about and make sense saying it.
- Always check your spelling and grammar before posting.
Rule no. 6: Share expert knowledge
- Ask questions online
- Share what you know online.
- Post the answers to your questions online because someone may have the same
question you do.
Rule no. 7: Help keep flame wars under control
- Netiquette does not forgive flaming.
- Netiquette does however forbid people who are flaming to hurt discussion groups by
putting the group down.
Rule no. 8: Respect other people’s privacy. Rule no.
- Do not read other people’s mail without their permission.
- Going through other people’s things could cost you, your job or you could even go to
jail.
- Not respecting other people’s privacy is a bad netiquette.
9: Don’t abuse your power
- Do not take advantage of other people just because you have more knowledge or power
than them.
- Treat others as you would want them to treat you if the roles were reversed.
Rule no. 10: Be forgiving of other people’s mistake.
- Do not point out mistakes to people online.
- Remember that you were once the new kid on the block.
- You still need to have a goodmanners even though you are online and cannot see the
person face to face.

COMMON DETAILS THAT ARE DANGEROUS TO SHARE ONLINE


FULL NAME
- You will be vulnerable to being searched for the use of search engines, including image
search.
- Matching a name with a face is modus for a few cybercrimes like identity theft.
CURRENT AND PREVIOUS SCHOOL(S)
- Most of the people who steal identities study their subject.
- This information can be used for verification purposes.
CELLPHONE NUMBER
- Your cell phone number should never be posted on the internet.
- The internet is a public place to be

ADDRESS
- Giving your number to the internet is one thing; giving them your address is another
level.
- It would have be easier for the criminals to find you out.
BIRTHDAY
- Let people know your birthday is probably a must if you want to make as many gifts as
you can.
- But having this in your profile makes you vulnerable to identity theft.

TIPS TO STAY SAFE ONLINE


1. Do not post any personal information online.
2. Know the security features of the social networking you use.
3. Don't give out your password.
4. Be careful that you're meeting online.
5. Keep your privacy settings as high as you can.
6. Avoid visiting untrusted websites.
7. If you have Wi-Fi at home, turn it into a private network by adding a password.
8. Avoid downloading anything from untrusted websites.
9. Buy the software, do not use the pirated ones.
10. Don't reply or click links from suspicious emails.

INTERNET THREATS
 MALWARE
 SPAM
 PHISHING

MS WORD
LESSON OBJECTIVES
 Use some advanced capabilities of Microsoft Word commonly used to increase
productivity and efficiency.
 Effectively used these features to help improve the productivity of an organization
through maximizing the potential of Microsoft Word.
 Create form letters or documents for distribution to various recipients
WORD PROCESSOR
 Electronic device or computer software application that performs the task of
composing, editing, formatting, and printing of documents.
EXAMPLES OF WORD PROCESSOR
 OPENOFFICE WRITER
 LIBREOFFICE WRITER
 POLARIS WRITER
 KINGSOFT WRITER
 WORDPERFECT
 WORDPAD
 MICROSOFT WORD (MS WORD)
OPEN OFFICE WRITER

POLARIS OFFICE

KINGSOFT OFFICE
WORDPERFECT

WORDPAD

MICROSOFT WORD

COMMAND:

Press “Windows Logo” + R

then type “winword” then enter.

FEATURES OF MS – WORD
 AutoCorrect
 AutoFormat
 Grammar Checker
 Template
 Thesaurus
 Tables
 Mail Merge
 Text Wrap
KEYBOARD SHORTCUTS
 Ctrl + F – Display Find Dialog Box
 Ctrl + G – Display Go To Dialog Box
 Ctrl + H – Display Replace Dialog Box
 Ctrl + I - Italicize Text
 Ctrl + J – Justify Text
 Ctrl + K – Create a hyperlink
 Ctrl + L – Align Text to Left
 Ctrl + M – Tab (Indention)
 Ctrl + N – Create a new document
 Ctrl + O – Open a document
 Ctrl + P – Display Print dialog box
 Ctrl + R – Align Text to Right
 Ctrl + S – Save a document
 Ctrl + U – Underline Text
 Ctrl + V – Paste a copied text
 Ctrl + Y – Redo the last undone action
 Ctrl + Z – Undo the last action
 Ctrl + C – Copy Text/ Image
TEXT ALIGNMENT
 Align LEFT
 Align RIGHT
 Align ENTER
 JUSTIFIED
UNIVERSAL PAGE SIZES
 Letter (Short) – 8.5’’ by 11’’
 Long (Folio) – 8.5’’ by 13’’
 A4 – 8.27’’ by 11.69’’
PAGE ORIENTATION
Portrait Landscape

IMAGE PLACEMENT
 IN LINE WITH THE TEXT
 SQUARE
 TIGHT
 THROUGH
 TOP AND BOTTOM
 BEHIND TEXT
 IN FRONT OF THE TEXT
LESSON DISCUSSION
- In the professional world, sending out information to convey important information is
vital.
- Because of ICT, things are now sent much faster than the traditional newsletters or
postal mail.
- You can now use the Internet to send out information you need to share.

RECAPITULATION
(Ribbon) Tabs

- The Ribbon Tabs are the access or control portions in order for a ribbon to be
activated or displayed.
THE HOME RIBBON
- This ribbon contains the most commonly used commands in MS Word.
 CLIPBOARD
 FONT
 PARAGRAPH
 STYLES
THE INSERT RIBBON
- This ribbon contains the commands normally needed to insert text, illustrations,
symbols, etc., into a document.
 PAGES
 TABLES
 ILLUSTRATIONS
 LINKS
 HEADER AND FOOTER
 TEXT
 SYMBOLS
THE PAGE LAYOUT RIBBON
- This ribbon contains the commands related to the layout and appearance of the
page or pages in the document.
 THEMES
 PAGE SET - UP
 PAGE BACKGROUND
 PARAGRAPH
 ARRANGE
THE REFERENCES RIBBON
- This ribbon contains a variety of references that can be used within a document.
 Table of Contents
 Footnotes
 Citations & Bibliography
 Index
 Table of Authorities
 Captions

THE MAILINGS RIBBON


- This ribbon contains the commands commonly used when creating documents
intended to be distributed via email, printed letters, or web postings.
 Create
 Start Mail Merge
 Write & Insert Fields
 Preview Results
THE REVIEW RIBBON
- This ribbon contains the commands needed to review and revise an existing
document.
 Proofing
 Comments
 tracking
 Changes
 Compare
 Protect
THE VIEW RIBBON
- This ribbon contains settings that affect how the document appears on the
screen.
 Document Views
 Show/Hide
 Zoom
 Window
 Macros

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy