0% found this document useful (0 votes)
16 views11 pages

ICT - Empowerment Technologies Review Notes

Read

Uploaded by

willietubal1996
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views11 pages

ICT - Empowerment Technologies Review Notes

Read

Uploaded by

willietubal1996
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Chapter 1: The Current State of ICT

Generations of the Internet

 Web 1.0:

o Characteristics: Static, read-only websites.

o Content Delivery: Delivered exactly as stored.

o Technology: Built using HTML or HTM.

o Example: Early web pages like the Space Jam website.

 Web 2.0:

o Characteristics: Interactive, dynamic, and user-driven.

o Focus: User participation and collaboration.

o Technology: Allows changes to page appearance and behavior, social


media integration.

o Examples: Social media platforms, wikis (e.g., Wikipedia), where users


can add or edit content.

 Web 3.0:

o Characteristics: Real-time, ubiquitous, always connected.

o Technology: Uses machine learning, AI, and real-time data processing.

o Example: IoT devices and applications that make decisions


autonomously, offering seamless, connected experiences.

Web Applications vs. Native Applications

 Web Application:

o Accessed through web browsers (e.g., Google Docs, online banking).

o Does not need to be installed.

 Native Application:

o Installed on a specific device (e.g., mobile apps like Instagram or


Facebook).

o Operates directly on the device hardware, not dependent on a browser.

Cloud Computing

 Cloud: A network of servers that provide services, data storage, and


applications remotely.

o Server: A computer that performs tasks for other computers.

o Client: A device that uses services provided by a server.

o Service: A task performed by a server on behalf of the client.


Benefits of Cloud Computing:

 Reduced Costs: No need for large on-site infrastructure.

 Flexibility: Easily scale services as needed.

 Mobility: Access from anywhere with an internet connection.

 Better Collaboration: Multiple users can access and collaborate on the same
resources.

 Updated Software: Always access the latest software versions without manual
updates.

Chapter 2: Online Safety and Security

The Importance of Online Safety

 Internet in Daily Life: The internet has become a necessity in the Information
Age, allowing global communication and easy access to vast information.
However, the need for online safety has also become essential as people are
required to submit personal information for access to services.

Information Security and Personal Data

 Personal Details at Risk: While personal details (e.g., name, birth date, email)
are needed for online transactions, they can be misused for identity theft or
other malicious activities.

 Common Personal Information and Risks:

o Full Name: Can be used for identity theft or to create fake accounts.

o Username: Can be traced back to you; avoid using real names in


usernames.

o Password: Highly sensitive information. Use strong, unique passwords


and avoid reusing passwords across multiple accounts.

 Password Tips: Use combinations of letters, numbers, and special


characters, and never share your password. Use a password
manager if needed.

o Birth Date: Used in security checks; sharing it carelessly can compromise


accounts.

o Home Address & Locations: Sharing these can compromise physical


security. Be cautious about allowing apps to track your location.

o Phone Numbers: Should only be shared when absolutely necessary to


avoid harassment.

o Email Address: Used in sign-ups, but can also lead to spam and phishing
attacks.

 Tip: Create separate emails for different purposes (e.g., leisure and
formal use).
o Financial Information: Highly sensitive. Be cautious during online
transactions, and only deal with trusted websites.

Malware: Online Threats

 Types of Malware:

o Virus: A program that can harm or slow down a system; spreads when
files are shared.

o Worm: A type of virus that spreads automatically without human action.

o Trojan Horse: Disguised as a useful file or program; can cause harm once
downloaded.

o Spam: Unwanted messages; can clog your inbox or contain viruses.

o Adware: Unwanted ads that can slow down systems.

o Phishing: Fraudulent attempts to steal personal information like


passwords, credit card details, etc.

How Malware Spreads

 Via Email: Spam emails can spread malware or phishing links.

 Via Downloads: Unverified software, pirated files, or clicking suspicious links


can introduce malware.

 Via Unsecure Websites: Malware can be introduced through poorly secured


sites.

How to Avoid Malware and Online Threats

1. Install Anti-virus Programs: Protect your system from viruses and malware.

2. Avoid Suspicious Websites: Don’t provide personal details unless necessary.

3. Beware of Fake Offers: Don’t fall for fake prizes or too-good-to-be-true deals.

4. Avoid Clicking Suspicious Links: Don’t click on unknown or untrusted links.

5. Review Installations: Always read installation prompts to avoid unwanted


software.

6. Don’t Download Pirated Content: They are often infected with malware.

7. Use Ad-blockers: Prevent intrusive ads that could contain malware.

General Online Security Tips

 Don’t Share Personal Information: Only give out personal details when
necessary. Be aware of what information is being requested.

 Use Strong Passwords: Create complex, unique passwords for each account,
and avoid sharing them.

 Regular Security Checks: Update software and change passwords regularly.


 Be Cautious with Public Devices: Avoid saving passwords or personal info on
shared/public devices.

Chapter 3: Module on Netiquette

1. What is Netiquette?

 Definition: Short for "Network Etiquette," netiquette refers to the rules of


proper behavior and communication online.

 Purpose: Ensures respectful, clear, and safe interactions in online communities


and platforms.

2. Formal Netiquette

 Strict rules enforced by online communities like forums, chat rooms, and
social media.

 Common violations include:

1. Foul language: Avoid using offensive language in professional or


academic spaces.

2. Spamming: Sending unwanted messages, flooding forums or email


inboxes.

3. Cyberbullying: Using digital platforms to harass or intimidate others.

4. Trolling: Deliberately disrupting discussions, often by posting irrelevant or


provocative content.

5. Sock Puppets: Creating multiple fake accounts to manipulate discussions


or advance personal interests.

6. Flame Wars: Heated arguments that lead to insults and threats,


damaging the community's integrity.

 Consequences: Users who violate these rules can face warnings, bans, or
account deletions by moderators or admins.

3. Plagiarism and Piracy

 Plagiarism: Using someone else's work (e.g., text, images) without proper
attribution.

 Piracy: Unauthorized reproduction or distribution of copyrighted materials (e.g.,


books, music, software).

o Examples: Illegal copying of music (bootlegging), software piracy, and


distributing unlicensed films.

 Copyright Protection: Intellectual Property (IP) laws safeguard creators'


rights. In the Philippines, Republic Act No. 8293 (IP Code) governs copyright.

4. Informal Netiquette

 Guidelines that are not strictly enforced but expected for good online behavior.
1. Golden Rule: Treat others as you wish to be treated.

2. Act as in real life: Respect, politeness, and patience should be


maintained.

3. Know your context: Adjust your tone and behavior according to the
platform (formal vs. casual settings).

4. Respect privacy: Avoid invasive actions and respect others' personal


information.

5. Respect intellectual property: Don’t misuse or steal content.

5. Mobile Device Etiquette

 Practical tips for using mobile devices responsibly and courteously in public
spaces:

1. Talk softly on the phone to avoid disturbing others.

2. Keep calls short in public places to avoid annoying others.

3. Avoid loud notifications: Set ringtones and notification sounds to a


moderate volume or use vibrate mode.

4. Use earphones when listening to music or watching videos to avoid


disturbing others.

5. Avoid distracting behavior such as using your phone while driving,


walking, or during social gatherings.

6. Seek permission before taking photos or videos of people or events.

 General Advice:

o Use devices responsibly: Always remain aware of your surroundings.

o Respect social norms: In formal settings (meetings, theaters), limit


phone use and ask for permission if necessary.

Chapter 4: Online Search

1. Introduction to Online Search

 The Internet became publicly available in 1990, leading to the need for
effective ways to search and organize vast amounts of information.

 Information Age: Searching for information online is an essential skill in


today's digital world.

2. Web Search Engines

 Definition: A web search engine is a program/system designed to help users


find information on the Internet based on their search queries.

 Popular Search Engines: Google (69.89% market share as of May 2016), Bing,
Yahoo, Ask.
 Focus on Google: Google's dominance in web searches makes it the most
widely used tool.

3. Basic Search Techniques

 Keyword Search: The most common way of searching online. Use relevant
keywords to find information.

 Using Browsers for Search:

o Google Chrome: Type keywords in the address bar → Press Enter or click
a suggestion → Results will display.

o Mozilla Firefox: Use the address bar or dedicated search bar to type
keywords → Press Enter or select suggestions.

o Safari: The address bar doubles as the search bar—type keywords and
press Enter.

 Tip: Using the mouse wheel to click on a search result opens the link in a new
tab.

4. Conducting Effective Online Research

 Formulate a Question: Have a clear question or goal in mind before you start
searching.

 Narrow Your Search: Be specific with keywords (e.g., use "Adobe Photoshop
instructions" instead of just "Photoshop") to avoid irrelevant results.

5. Advanced Search Techniques

 Google Advanced Search: Offers filters to refine your search by language,


region, file type, and date.

o Access at: Google Advanced Search

o Use filters for specific results.

 Advanced Operators: Use quotes (" ") for exact phrases, minus (-) to exclude
terms, and site

.com to search specific websites.

6. Evaluating Source Credibility

 Author: Verify the author’s qualifications or expertise.

 Purpose: Understand why the article was written (to inform vs. to promote).

 Publication Date: Check if the information is current, especially for fast-


changing topics like technology or current events.

 Top-Level Domain (TLD): Identifies the type of website:

o .gov: Government sites (reliable, authoritative).

o .edu: Educational institutions (trustworthy).


o .org: Non-profits (generally credible, but can vary).

o .com/.net/.info: Common but not always reliable. Exercise caution.

7. Citing Sources

 Giving Credit: Always cite sources to avoid plagiarism, lend credibility to your
work, and respect the author.

 How to Cite: Include the author's name, article title, URL, and date accessed.

o Example:
Snider, Lesa. “Edit your first photo in Photoshop.” Adobe Support.
https://helpx.adobe.com/photoshop/how-to/photo-editor.html. Viewed on
June 10, 2016.

Chapter 5: Applied Productivity Tools

1. The Spreadsheet (LibreOffice Calc)

 Purpose: Used to organize, calculate, and analyze data. In this module, we use
it to create databases and perform calculations, similar to Microsoft Excel.

 Creating a Spreadsheet:

o Use LibreOffice Calc to create a spreadsheet with information (e.g., ID


details) and save it.

o This file will be used to create a database later.

2. Creating a Database from a Spreadsheet

 Database Wizard:

1. Open LibreOffice Database, and select “Connect to an existing


database”.

2. Choose Spreadsheet as the database type, and browse for the saved
spreadsheet.

3. After importing the spreadsheet, save the database and confirm by


checking the data in Sheet 1.

3. Merging Data from a Spreadsheet

 Merging Process:

1. In the text document, go to View > Datasources to access registered


databases.

2. Double-click the name of the database, open Tables, and select Sheet1.

3. Drag columns to where they should be displayed in the document.

4. Click File > Print and select "Print a form letter" to finalize the merging.

5. Save the file, choosing the appropriate format (e.g., Microsoft Word
2007-2013).
4. Spreadsheet Formula Basics

 Understanding Cells:

o A cell is where data is entered, identified by the intersection of a row and


column (e.g., A1, B2).

o Rows are horizontal groups, and Columns are vertical groups of cells.

 Formulas:

o Purpose: Perform calculations like addition, subtraction, multiplication, or


division.

o Syntax: Formulas begin with an equals sign (=) and use operators like +,
-, *, /.

o Example:

 =SUM(B2:B6) adds the values in cells B2 to B6.

 Complex formulas can be created using multiple operations:


=B2+A2*B3.

5. Common Spreadsheet Operations

 Basic Mathematical Operations:

o Addition: +

o Subtraction: -

o Multiplication: *

o Division: /

o Example: =A2+B2 adds the values in A2 and B2.

 SUM Function: Adds up a range of cells, e.g., =SUM(B2:B6) adds all values
from cell B2 to B6.

6. Spreadsheet Activity: Savings Tracker

 Goal: Create a tracker that calculates weekly savings.

 Key Labels and Calculations:

1. Labels:

 Goal for 2016, Total Allowance, Total Spendings, Total Savings,


Balance, Progress.

2. Currency Formatting: Format cells to show currency (e.g., peso


symbol).

3. Date Formatting: Format cells as dates for tracking weekly savings.

 Formulas:
o Total Allowance: =SUM(C9:C80) — Sums all values in the allowance
column.

o Total Savings: =SUM(D9:D80) — Sums all savings entries.

o Total Spendings: =B2-B3 — Subtracts total savings from total allowance.

o Balance: =B1-B3 — Subtracts total savings from the goal.

o Progress: =B3/B1 — Calculates the percentage of savings progress.

 Progress Formatting: Change the format of progress to percentage using the


% icon on the toolbar.

Chapter 6: Emails

1. What is Email?

 Email (Electronic Mail): A digital message transmitted through computer


networks, replacing traditional postal mail (snail mail).

 Advantages:

o Instant communication, unlike postal mail which takes time.

o Can send large files (e.g., documents up to 100 pages) easily as


attachments.

o Eco-friendly since it eliminates the need for paper and physical delivery.

2. Email Address

 Definition: A unique identifier used to send and receive emails, similar to a


postal address in real life.

 Components of an Email Address:

o Local Part: The part before the "@" symbol (e.g., "myname" in
myname@website.com). This is unique and chosen by the user.

o Domain Part: The part after the "@" symbol (e.g., website.com). This is
provided by the email service provider and is not customizable.

3. Creating an Email Address (Using Gmail as an Example)

 Steps:

1. Go to Google’s sign-up page: accounts.google.com/SignUp.

2. Fill out the required information:

 Name, Username (Email), Password, Birthday, Gender.

 CAPTCHA (security test to confirm you're human).

3. Click "Next Step" to complete the sign-up process.

4. Log in to your new Gmail account at gmail.com to start sending emails.

4. Email Clients
 Definition: Applications used to send, receive, and organize emails. Examples
include Gmail, Microsoft Outlook, Apple Mail, Mozilla Thunderbird, and Yahoo
Mail.

 Logging Into Gmail:

1. Go to accounts.google.com.

2. Enter your email address and password.

3. Optionally, select "Stay signed in" for easier access on trusted devices.

5. Email Folders

 Purpose: Email clients organize emails into different folders for easy
management.

 Common Folders:

o Inbox: Where incoming emails are received. Unread emails are marked as
unread.

o Outbox/Sent: Contains sent and replied-to emails.

o Drafts: Stores emails that are unfinished or saved for later sending.

o Starred/Flagged: Marks important emails for easy access.

o Spam: Holds suspicious emails to protect you from malicious content.

o Trash: Holds deleted emails, which can be recovered. Emails in trash are
permanently deleted after a certain period.

6. Sending an Email (Gmail Example)

 Steps to Send an Email:

1. Click the Compose button to open a new email window.

2. To: Enter the recipient's email address. Use CC (Carbon Copy) for visible
recipients and BCC (Blind Carbon Copy) for hidden recipients.

3. Subject: Provide a brief title of the email’s content.

4. Message Body: Type your email. You can format the text (e.g., font, size,
color) and attach files (e.g., pictures, documents).

5. Send: Click the Send button to deliver the email.

 Tips for Effective Email Writing:

o Subject Line: Keep it short and relevant (e.g., "Research Data for Biology
Homework").

o Greeting: Start with a polite greeting.

o Signature: Include a signature with your name, title, and contact details
at the end of the email (even if your name is in the email address).

7. General Email Tips


 Professionalism: Always use clear and polite language.

 Email Etiquette: Be concise and to the point, and avoid using ALL CAPS (as it
may seem like shouting).

 Attachments: Ensure files are appropriately sized and named, and make the
recipient aware of them in the email body.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy