ICT - Empowerment Technologies Review Notes
ICT - Empowerment Technologies Review Notes
Web 1.0:
Web 2.0:
Web 3.0:
Web Application:
Native Application:
Cloud Computing
Better Collaboration: Multiple users can access and collaborate on the same
resources.
Updated Software: Always access the latest software versions without manual
updates.
Internet in Daily Life: The internet has become a necessity in the Information
Age, allowing global communication and easy access to vast information.
However, the need for online safety has also become essential as people are
required to submit personal information for access to services.
Personal Details at Risk: While personal details (e.g., name, birth date, email)
are needed for online transactions, they can be misused for identity theft or
other malicious activities.
o Full Name: Can be used for identity theft or to create fake accounts.
o Email Address: Used in sign-ups, but can also lead to spam and phishing
attacks.
Tip: Create separate emails for different purposes (e.g., leisure and
formal use).
o Financial Information: Highly sensitive. Be cautious during online
transactions, and only deal with trusted websites.
Types of Malware:
o Virus: A program that can harm or slow down a system; spreads when
files are shared.
o Trojan Horse: Disguised as a useful file or program; can cause harm once
downloaded.
1. Install Anti-virus Programs: Protect your system from viruses and malware.
3. Beware of Fake Offers: Don’t fall for fake prizes or too-good-to-be-true deals.
6. Don’t Download Pirated Content: They are often infected with malware.
Don’t Share Personal Information: Only give out personal details when
necessary. Be aware of what information is being requested.
Use Strong Passwords: Create complex, unique passwords for each account,
and avoid sharing them.
1. What is Netiquette?
2. Formal Netiquette
Strict rules enforced by online communities like forums, chat rooms, and
social media.
Consequences: Users who violate these rules can face warnings, bans, or
account deletions by moderators or admins.
Plagiarism: Using someone else's work (e.g., text, images) without proper
attribution.
4. Informal Netiquette
Guidelines that are not strictly enforced but expected for good online behavior.
1. Golden Rule: Treat others as you wish to be treated.
3. Know your context: Adjust your tone and behavior according to the
platform (formal vs. casual settings).
Practical tips for using mobile devices responsibly and courteously in public
spaces:
General Advice:
The Internet became publicly available in 1990, leading to the need for
effective ways to search and organize vast amounts of information.
Popular Search Engines: Google (69.89% market share as of May 2016), Bing,
Yahoo, Ask.
Focus on Google: Google's dominance in web searches makes it the most
widely used tool.
Keyword Search: The most common way of searching online. Use relevant
keywords to find information.
o Google Chrome: Type keywords in the address bar → Press Enter or click
a suggestion → Results will display.
o Mozilla Firefox: Use the address bar or dedicated search bar to type
keywords → Press Enter or select suggestions.
o Safari: The address bar doubles as the search bar—type keywords and
press Enter.
Tip: Using the mouse wheel to click on a search result opens the link in a new
tab.
Formulate a Question: Have a clear question or goal in mind before you start
searching.
Narrow Your Search: Be specific with keywords (e.g., use "Adobe Photoshop
instructions" instead of just "Photoshop") to avoid irrelevant results.
Advanced Operators: Use quotes (" ") for exact phrases, minus (-) to exclude
terms, and site
Purpose: Understand why the article was written (to inform vs. to promote).
7. Citing Sources
Giving Credit: Always cite sources to avoid plagiarism, lend credibility to your
work, and respect the author.
How to Cite: Include the author's name, article title, URL, and date accessed.
o Example:
Snider, Lesa. “Edit your first photo in Photoshop.” Adobe Support.
https://helpx.adobe.com/photoshop/how-to/photo-editor.html. Viewed on
June 10, 2016.
Purpose: Used to organize, calculate, and analyze data. In this module, we use
it to create databases and perform calculations, similar to Microsoft Excel.
Creating a Spreadsheet:
Database Wizard:
2. Choose Spreadsheet as the database type, and browse for the saved
spreadsheet.
Merging Process:
2. Double-click the name of the database, open Tables, and select Sheet1.
4. Click File > Print and select "Print a form letter" to finalize the merging.
5. Save the file, choosing the appropriate format (e.g., Microsoft Word
2007-2013).
4. Spreadsheet Formula Basics
Understanding Cells:
o Rows are horizontal groups, and Columns are vertical groups of cells.
Formulas:
o Syntax: Formulas begin with an equals sign (=) and use operators like +,
-, *, /.
o Example:
o Addition: +
o Subtraction: -
o Multiplication: *
o Division: /
SUM Function: Adds up a range of cells, e.g., =SUM(B2:B6) adds all values
from cell B2 to B6.
1. Labels:
Formulas:
o Total Allowance: =SUM(C9:C80) — Sums all values in the allowance
column.
Chapter 6: Emails
1. What is Email?
Advantages:
o Eco-friendly since it eliminates the need for paper and physical delivery.
2. Email Address
o Local Part: The part before the "@" symbol (e.g., "myname" in
myname@website.com). This is unique and chosen by the user.
o Domain Part: The part after the "@" symbol (e.g., website.com). This is
provided by the email service provider and is not customizable.
Steps:
4. Email Clients
Definition: Applications used to send, receive, and organize emails. Examples
include Gmail, Microsoft Outlook, Apple Mail, Mozilla Thunderbird, and Yahoo
Mail.
1. Go to accounts.google.com.
3. Optionally, select "Stay signed in" for easier access on trusted devices.
5. Email Folders
Purpose: Email clients organize emails into different folders for easy
management.
Common Folders:
o Inbox: Where incoming emails are received. Unread emails are marked as
unread.
o Drafts: Stores emails that are unfinished or saved for later sending.
o Trash: Holds deleted emails, which can be recovered. Emails in trash are
permanently deleted after a certain period.
2. To: Enter the recipient's email address. Use CC (Carbon Copy) for visible
recipients and BCC (Blind Carbon Copy) for hidden recipients.
4. Message Body: Type your email. You can format the text (e.g., font, size,
color) and attach files (e.g., pictures, documents).
o Subject Line: Keep it short and relevant (e.g., "Research Data for Biology
Homework").
o Signature: Include a signature with your name, title, and contact details
at the end of the email (even if your name is in the email address).
Email Etiquette: Be concise and to the point, and avoid using ALL CAPS (as it
may seem like shouting).
Attachments: Ensure files are appropriately sized and named, and make the
recipient aware of them in the email body.