0% found this document useful (0 votes)
14 views6 pages

Emtech Reviewer

The document serves as a comprehensive reviewer on Empowerment Technology and Technology Literacy, covering key concepts such as ICT, social media, online systems, and the evolution of the web. It discusses the components of ICT, the importance of information literacy, and the various types of social media and assistive technologies. Additionally, it highlights the advantages and disadvantages of different web technologies and emphasizes the significance of online safety, netiquette, and effective online research methods.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views6 pages

Emtech Reviewer

The document serves as a comprehensive reviewer on Empowerment Technology and Technology Literacy, covering key concepts such as ICT, social media, online systems, and the evolution of the web. It discusses the components of ICT, the importance of information literacy, and the various types of social media and assistive technologies. Additionally, it highlights the advantages and disadvantages of different web technologies and emphasizes the significance of online safety, netiquette, and effective online research methods.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

EMPOWERMENT TECHNOLOGY TECHNOLOGY LITERACY - the ability to use

1ST QUARTER REVIEWER digital technology, communication tools, and/or


networks to define an information need, access,
UNIT 1 manage, integrate and evaluate information,
LESSON 1: Understanding ICT create new information of knowledge and be able
ICT (Information and communications to communicate this information to others.
technology) - technologies that are used to - International ICT Literacy Panel,
support the processing, storing, securing, and 2002.
transmitting of information.
COMPONENTS OF ICT ICT AND SOCIETY
1. People - individuals responsible for the 1. Communication
development, improvement, and - Social networking sites
maintenance of an ICT system. - Instant messaging and video calls
2. Procedures - actions performed in a - Forums and webinars (web seminars)
certain order and conditions to make sure 2. Economics
an ICT system runs smoothly. - Online marketing
3. Hardware - technical term used to - Convenient business transactions
describe physical or tangible parts of a - Online payment gateways
computer system. 3. Education
ex: desktop computers, laptops, tablets - Source of learning, teaching, and research
smartphones materials
4. Software - computer programs and - Online learning communities
applications installed in your hardware - Recording and computation of grades
that provide instructions a computer has - Managing records and other
to follow to accomplish a task. administrative purposes
ex: word processing app, graphic 4. Travel
manipulation software, operating systems. - Online booking and reservation
5. Data - raw facts or figures that can be - Online tracking of reservation
processed, stored, and transmitted.
6. Information - result of processed, LESSON 2: Social, Mobile, and Assistive Media
organized, and structured data. SOCIAL MEDIA - websites or apps that give
EMPOWERMENT people the capability to share and receive
- the process of giving yourself, or other information and media contents with one
people, the capacity to achieve a specific another.
end-goal. - NIELSEN, a global information and
- strategy that gives individuals the tools measurement company, “internet users
and resources necessary to take initiative, spend more time in social media sites
as well as gather and analyze information than any other type of sites.”
or situations, thus making informed SIX (6) TYPES OF SOCIAL MEDIA
decisions to solve problems. 1. SOCIAL NETWORKS – allows connecting
EMPOWERMENT TECHNOLOGY - the computer w/ other people with the same interest or
technology that we use almost everyday, which background. (real-time conversation via
enables us to do tasks that, in the past, require text messages, audio, or video chat.) Ex:
professional help. FACEBOOK (META) & GOOGLE+
INFORMATION LITERACY - determining the 2. BOOKMARKING SITES – allows storing
nature and extent of needed information, and managing links to various websites
accessing it effectively, and using it efficiently for and resources. Ex: StumbleUpon &
a specific purpose. It includes understanding Pinterest
economic, legal, and social issues related to 3. SOCIAL NEWS – allow users to post their
information use while ensuring ethical and legal own news items or links to other news
access. Additionally, it requires critically sources. The users can also comment on
evaluating sources and integrating information the post and comments may be ranked.
into one’s knowledge and values. Ex: reddit & digg
4. MEDIA SHARING – allows you to upload MODALITIES OF TECH. CONVERGENCE
and share media content like images, 1. Computing Technology - improvements
music, and video. Ex: flickr, YouTube & made on electronic devices/gadgets
Instagram combining the functions of two devices
5. MICROBLOGGING – sites that focus on into one gadget.
short updates from users. Ex: twitter & 2. Content Technology - combines
Plurk different media formats such as text,
6. BLOGS AND FORUMS – allow users to pictures, sounds, and videos into one
post their content. On the other hand, multimedia content.
forums are typically part of a certain 3. Communication Technology - fast and
website or web service. Ex: Blogger, effective transfer of information through
WordPress & tumblr. the collaboration of different
MOBILE MEDIA – communication devices that communication technologies
are characterized by portability or their ability to
be moved or carried easily. WEBSITE VS. WEB PAGE - a very reliable
MOBILE TECHNOLOGIES – (smartphones and technology that aids people in communicating,
tablets) has the capability to do tasks that was researching for information, and disseminating
originally found in personal computers. information. Website is composed of web
pages hyperlinked together.
DIFFERENT OPERATING SYSTEM STATIC WEB PAGES - hard-coded and
1. iOS – used in Apple devices such as embedded in the web page, fixed and not
iPhone and iPad. capable of action or change, usually written in
2. Android – an open-source operating html code, have the code written separately, has
system developed by Google. Being open to be saved separately on the server, and
means several mobile phone companies changes have to be made manually every time
use this OS for free. and you need coding knowledge to make any and
3. Blackberry OS – used in Blackberry all changes.
devices. ADVANTAGES (PROS)
4. Windows Phone OS – a closed source 1. Easy to develop
and proprietary operating system 2. Cheap to develop
developed by Microsoft. 3. Cheap to host
5. Symbian – the original smartphone OS; DISADVANTAGES (CONS)
used by Nokia devices. 1. Requires web development expertise to
6. WebOS – originally used smartphones; update site
now used for smart TVs. 2. Changes and updates are very time
7. Windows Mobile – developed by consuming
Microsoft for smartphones and pocket PCs. 3. Site not as useful for the user
ASSISTIVE MEDIA 4. Content can get stagnant
- electronic devices or programs that seek 5. Out of date
to reach out to PWDs. DYNAMIC WEB PAGES - known for being
- provides the support that will increase or changeable, interactive, and can be manipulated
improve their functional capabilities. by the user. Its construction is controlled by an
TYPES OF ASSISTIVE MEDIA application server processed by server-side
1. For the Visually Impaired scripts.
2. For People with Hearing Impairments ● Pages of the website are not coded and
3. For People with Speech Difficulty saved separately.
4. For People with Learning Difficulty ● The design/template (look and feel) is
saved separately.
LESSON 3: Convergent Technologies & Evolution of the Web ● Corresponding content are saved
TECHNOLOGICAL CONVERGENCE (converge separately.
technologies) - the state in which two or more ● The pages are dynamically populated
technology entities/functions are combined into every time.
one device or system.
ADVANTAGES (PROS) preferences to be able to deliver web content
1. Much more functional website especially targeting the user.
2. Much easier to update SEMANTIC WEB - movement led by the World
3. Much Easier to add new content/pages Wide Web Consortium (W3C). It encourages web
4. New content brings people back to the site developers to include semantic content in their
and helps in the search engines web pages.
5. Can work as a system to allow staff or WHY WEB 3.0 IS YET FULLY REALIZED:
users to collaborate 1. Compatibility – HTML files and current
DISADVANTAGES (CONS) web browsers could not support Web 3.0.
1. More expensive to develop 2. Security – the machine is saving the
2. Slower to develop user's preferences.
3. Hosting costs a little more (may not be 3. Vastness – the W3C already contains
true now) billions of web pages.
4. Vagueness – certain words are imprecise.
EVOLUTION OF THE WEB 5. Logic – there are certain limitations for a
computer to be able to predict what the
user is saying. (machines use logic)

LESSON 4: Uses of the Internet, Online Systems, and


Platforms
USES OF THE INTERNET
- communication tool
- performing business transactions
- research
WEB 1.0 - first generation of websites, marked
- entertainment tool
as “read-only web.” Tools used: HTML and CSS.
ONLINE SYSTEMS - collaboration of hardware,
WEB 2.0 - “writable web” and “social web.”
software, and network devices that facilitates the
Transformed from static to dynamic webpages.
transfer and processing of data among internet-
FEATURES OF WEB 2.0
enabled devices.
● Folksonomy – allows categorizing and
classifying/arranging information using
COMPONENTS OF AN ONLINE SYSTEM (TNSP)
chosen keywords. ex: twitter, insta, fb,
● Terminal Devices - electronic devices
etc. (USING “#” or “hashtag”)
used to send data or instructions to the
● Rich user Experience – content is
internet.
dynamic and responsive to user’s input.
● Network - collection of computers,
ex: a website that shows local content.
internet devices, and communication
● User Participation – the owner is not the
media that are used to carry data.
only one who is able to put content.
● Server - software system that serves as
Others are able to place a content of their
the storage house of data coming in and
own by means of comments, review, and
out of the system.
evaluation. ex: amazon, online stores.
● Processing Systems - “Information
● Long Tail – services that are offered on
System” A group of hardware and
demand rather than on a one-time
software designed to collect, process,
purchase.
store and distribute information.
● Software as a Service – users will
subscribe to a software only when needed
UNIT 2
rather than purchasing them.
LESSON 1: Making One’s Self Safe in the Cyber World
● Mass Participation – diverse information
CYBER WORLD “CYBERSPACE” - virtual in
sharing through universal web access.
nature and unbounded unlike our physical
WEB 3.0 - The executable web of web evolution.
environment.
Deliver customized service, perform real-time
FEATURES OF THE CYBER WORLD
analysis, and generate reports with AI. Aims to
1. Virtual Self - a digital representation of
have machines (or servers) understand the user’s
humans to interact in virtual world
2. Source of Information - data that are d. SPYWARE - program that runs in the
available to anyone as long as they have background without your knowledge,
an internet connection monitoring your activities and typing
3. Social Interaction - digital socialization through keylogging.
using chat, blogs, vlogs, online games, Keyloggers - used to record
etc. keystrokes, stealing passwords or
SOCIAL MEDIA – enables web users to create, sensitive information like emails,
co-create, discuss, modify, and exchange user- messages, and anything typed on
generated content. your keyboard.
e. ADWARE - a program designed to send
DANGERS AND THREATS ON THE INTERNET you advertisements, mostly as pop-ups.
INTERNET THREAT - web threat is any SPAM - unwanted email mostly from bots or
cybercrime using the World Wide Web. It employs advertisers. it can be used to send malware.
malware, fraud, and HTTP/HTTPS protocols, often PHISHING - aimed at acquiring sensitive
through links in email, IM, or infected servers. information like passwords and credit card details
Cybercriminals steal information for sale and by sending emails that direct users to fake
create botnets. Risks include financial loss, websites, where they are prompted to update
identity theft, data breaches, network resource their personal information.
theft, reputational damage, and decreased trust Pharming - a more complicated way of
in e-commerce and online banking. phishing where it exploits the DNS
(Domain Name Service) system.
HACKING - stealing and accessing private
information of organizations such as government LESSON 2: Netiquette
systems, business systems, etc. NETIQUETTE - short term for “Internet
IDENTITY THEFT - stealing important etiquette,” which means proper behavior in
information from the target user. cyberspace.
INTERNET PREDATORS - individuals who lure CORE RULES OF NETIQUETTE (Virginia Shea)
children or teenagers to engage in sexual acts or Rule #1: Remember the human.
relationships online. Rule #2: Adhere to the same standards of
CYBERBULLYING - online act of humiliation behavior online that you follow in real life.
and/or threats. Rule #3: Know where you are in cyberspace.
MALICIOUS SOFTWARE - “malware” invades Rule #4: Respect other people’s time and
and destroys computer systems. bandwidth.
a. VIRUS – malicious program that replicates Rule #5: Make yourself look good online.
itself and spreads between computers Rule #6: Share expert knowledge.
through the Internet, local networks, or Rule #7: Help keep flame wars under control.
storage devices like flash drives and CDs. Rule #8: Respect other people’s privacy.
b. WORM - malicious program that transfers Rule #9: Don’t abuse your power.
from one computer to another by any type Rule #10: Be forgiving of other people’s
of means. Often, it uses a computer mistakes.
network to spread itself. (EX: ILOVEYOU
worm (Love Bug Worm) created by a LESSON 3: Online Research
Filipino.) ONLINE RESEARCH - method that involves the
c. TROJAN - malicious program disguised as collection of information from the Internet.
useful software that, once installed, leaves SEARCH ENGINE OPTIMIZATION (SEO) - using
your PC unprotected and allows hackers to it will give you better results for the information
steal information. you need.
Rogue Security Software – ADVANTAGES OF ONLINE RESEARCH
Tricks users into believing it’s - Easy access to large information
security software, asking for - Acquire diverse information in different
payment to enhance protection formats
while providing no real security. - Save more time when researching online
- Get up-to-date and relevant information
- Reduce the cost of conducting research PRINT - produces a hard copy of the document
DISADVANTAGES OF ONLINE RESEARCH when connected to a printer.
- One may encounter inconsistent FILE - manage the document using functions
information such as save, print, and open.
- It is hard to determine if sources are FONT - personalize the style and size of the text.
reliable WINDOWS - permits multiple screens for users
- One may be charged with payment to work on.
- One may find it difficult to locate SPELL CHECK - prompts the user for words
information. spelled differently from the built-in dictionary.
- One may risk online security and privacy
WORD PROCESSOR: ADDITIONAL FEATURES
5-STEP SIMPLE SEARCH PROCESS GRAMMAR CHECK - prompts for sentence
(CSDEC/“sisdek”) construction that does not meet the grammar
1. Clarify rules.
2. Search FOOTNOTES - provides further information
3. Delve about the document.
4. Evaluate AUTOMATED LIST - adds numbering or bullets
5. Cite to your list of text.
GRAPHICS - allows the user to insert objects
UNIT 3 such as diagrams, images, or shapes.
LESSON 1: Getting to Know Word Processing HEADER AND FOOTER - permits customization
WORD PROCESSOR - type of software that of the top and bottom part of the document page.
enables the user to create, edit, and format text PARAGRAPH LAYOUT - adjusts the indentation
using various tools. It can create documents that and spacing of a paragraph.
consist of text and graphics. MACROS - allows the user to automate
WORD PROCESSING SKILLS - require us to be templates or patterns for your document.
adept at producing text efficiently depending on MAIL MERGE - lets the user send out letters or
its purpose. documents in bulk to different recipients.
TABLE OF CONTENTS AND INDEX - lists topics
included in the document.
THESAURUS - built-in synonym provider.
BASIC WORD PROCESSING SKILLS COLLABORATION - allows multiple editors to
(KTPTI - ibon = katapati) access the document online.
1. Keyboard and User Interface INTERNET FEATURES - provides links to
Familiarization external sources via the Internet.
2. Typing Speed and Accuracy TRANSLATION AND SPEECH- voice commands,
3. Page Layouting text reading, and translation.
4. Text Formatting
5. Inserting Objects LESSON 2: Character and Paragraph Formatting
DIFFERENCE BETWEEN A WORD PROCESSOR
WORD PROCESSOR: STANDARD FEATURES FROM A TEXT EDITOR - a word processor’s
INSERT - adds objects (tables, imgs, shapes) customization features that allow manipulation of
DELETE - removes text or object. your work.
CUT - deletes chosen data and keeps it on the REMEMBER: Formatting capability varies
clipboard. depending on the software or its versions
COPY - keeps data on the clipboard. available.
PASTE - places copied data on chosen field. MICROSOFT WORD - most commonly used word
PAGE SETUP - sets the layout of the entire processor software.
document.
FIND - tool to search for a string of text and to FORMATTING IN A WORD PROCESSOR
provide an option to replace it with another. FORMATTING A DOCUMENT - vital in delivering
WORD WRAP - formats the alignment of your content to readers.
text and object/s.
CHARACTER FORMATTING - the application of 6. Line and Paragraph Spacing: A
properties or attributes into single characters or dropdown for vertical paragraph spacing
units without affecting the whole paragraph. options
1. FONT FACE: A dropdown to change the 7. Shading and Border: A dropdown for
font style (e.g Arial, Calibri, Times New shading color and border options for text,
Roman) and numerical font size paragraph, or table
2. INCREASE/DECREASE FONT SIZE: A
clickable to increase or decrease font size PARAGRAPH FORMATTING
3. CHANGE CASE: dropdown for options of ● Click the Dialogue Box Launcher to
character casing open the Paragraph Tab for formatting
4. CLEAR ALL FORMATTING: A clickable options.
that removes formatting properties ● The Indents and Spacing Tab offers
5. FONT STYLE: A clickable that changes a standard paragraph settings.
font into bold, italic, underline, ● The Line and Page Breaks Tab allows
strikethrough, superscript, and subscript. adjustments for:
6. TEXT EFFECTS AND TYPOGRAPHY: A - Pagination: Controls page
dropdown that provides a range of text numbering.
customization - Textbox Options: Manages text
7. TEXT HIGHLIGHT COLOR: A dropdown wrapping in textboxes.
for text highlight colors
8. FONT COLOR: A dropdown of font color
options.

CHARACTER FORMATTING
● Click the Dialogue Box Launcher to
open the Font Tab for character
formatting.
● The Font Tab provides default font
options.
● The Advanced Tab includes:
- Character Spacing: Adjust scale,
spacing, positioning, and kerning.
- OpenType Features: Enhance
language and glyph support.

PARAGRAPH FORMATTING - application of


properties or attributes into a paragraph in a
document.
1. Automated List: Dropdowns for bullets,
numberings, and multilevel lists
2. Decrease/Increase Indent: A clickable
to increase or decrease indentation
3. Sort: A clickable dialogue box for sorting
values options
4. Show/Hide: A clickable which shows or
hides paragraph marks on the page
5. Align: A clickable for alignment options of
left, center, right, or justified

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy