0% found this document useful (0 votes)
6 views6 pages

Emtech Quarter 3 Notes

The document covers various aspects of Information and Communication Technology (ICT) relevant to Grade 12 students, including user experience, participation, and the evolution of the internet from Web 1.0 to Web 3.0. It discusses trends in ICT, such as convergence and social media, as well as internet safety, netiquette, and threats like spam and malware. Additionally, it addresses copyright laws and online research techniques, providing guidelines for responsible internet use.

Uploaded by

leslieracines65
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views6 pages

Emtech Quarter 3 Notes

The document covers various aspects of Information and Communication Technology (ICT) relevant to Grade 12 students, including user experience, participation, and the evolution of the internet from Web 1.0 to Web 3.0. It discusses trends in ICT, such as convergence and social media, as well as internet safety, netiquette, and threats like spam and malware. Additionally, it addresses copyright laws and online research techniques, providing guidelines for responsible internet use.

Uploaded by

leslieracines65
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

2ND SEMESTER_THIRD QUARTER

EMPOWERMENT TECHNOLOGY
GRADE 12 ABM SENIOR HIGH SCHOOL
Q3 SM2

B. Rich User Experience - Content is dynamic and is


LESSON 1: INFORMATION AND responsive to user’s input. An example would be a
COMMUNICATION TECHNOLOGY website that shows local content.
 In the case of social networking sites, when
Information and communication technologies as a tool for logged on, your account is used to modify what
curating, contextualizing, collaborating, and creating content you see in their website.
and experiences for learning in the professional tracks
C. User Participation - The owner of the website is not
ICT refers to information handling tools used to generate, the only one who is able to put content. Others are able
store, process, spread, and information to place a content of their own by means of comment,
 Fundamentally a diverse set of applications, goods, reviews, and evaluation.
and services  Some websites allow readers to comment on
 Allows teachers and students to share, create, an article, participate in a poll, or review a
connect, and reflect on their own learning and that specific product (e.g., Amazon.com, online
of others stores).
 Includes computers, the Internet,
broadcasting technologies, and telephony that D. Software as a Service - Users will subscribe to a
enable people to work together and combine in software only when needed rather than purchasing
order to create networks in every corner of the them. This is a cheaper option if you do not always need
globe to use a software.
 When you need a software, like a Word
ICT IN THE PHILIPPINES Processor, you can purchase it for a one-time
huge amount and install it in your computer
Philippines is dub as the ICTHubofAsia because of the huge and it is yours forever.
Growth of ICT related jobs, one of which is Business Process  Software as a service allows you to ―rent‖ a
Outsourcing, or call centers. software for a minimal fee.
 Business Process Outsourcing started in the
Philippines with Accenture in 1992 thanks to E. Mass Participation - It is a diverse information sharing
FrankHolz the Partner responsible for developing through universal web access.
and marketing the first Global Resource Center  Since most users can use the Internet, Web
in Manila 2.0’s content is based on people from various
cultures.
GENERATIONS OF THE INTERNET
3. Web 3.0
Also called as Semantic Web
The World Wide Web, commonly referred to as WWW,
 Semantics – ability of Web technologies to understand
W3, or simply the Web is an interconnected system of public
and interpret humangenerated content
webpages accessible through the Internet. It was invented
 The aim of Web 3.0 is to have machines understand
Sir Tim Berners-Lee in 1989.
the user’s preferences to be able to deliver web
 Web pages are what make up the world wide web
content specifically targeting the user.
and it can either be static or dynamic.
 The Internet is able to predict the best possible answers
to your question by ―learning from your previous choices
1. Web 1.0
Web pages are static and not interactive. You can’t post
comments or create an account. TRENDS IN ICT

2. Web 2.0 As the world of ICT continues to grow, the industry has
Term used to describe the present generation of the World focused on several innovations. Whether it is for business or
Wide Web that concentrates on its capability of providing personal use, these trends are current front runners in the
people the means to collaborate and share information innovation of ICT.
online.
 The second stage in World Wide Web 1. Convergence
 Dynamic Website The content of the website changes Technological convergence is the combination of two or
 Interactive . The user may be able to comment or more different entities of technologies to create a new
create user account single device.
 Enables an increased user participation in the web  Example: Using of smartphone to create
 Darcy DiNucci, an information architecture consultant, word documents that was previously can
coined the term Web 2.0 in her 1999 article, only be created using desktop computer.
―Fragmented Future‖.
2. Social Media
Features of Web 2.0 It is a website, application, or online channel that enables
A. Folksonomy - It allows users to categorize and web users to create, co-create, modify, and exchange user-
classify/arrange information using freely chosen generated content.
keywords (e.g., tagging). Popular social networking sites
such as Twitter, Instagram, Facebook, etc. use tags that Types of Social media
start with the pound sign (#). This is also referred to as A. Social Networks - sites that allow you to connect with
hashtag. other people with same interests or background.
Examples: Facebook, Google+

1
2ND SEMESTER_THIRD QUARTER

EMPOWERMENT TECHNOLOGY
GRADE 12 ABM SENIOR HIGH SCHOOL
Q3 SM2

B. Bookmarking Sites - sites that allow users you to MOST POPULAR SEARCH ENGINES
store and manage links to various websites and
resources, and to tag. 1. Google - The world’s best search engine
 Examples: StumbleUpon, Pinterest 2. Microsoft Bing - Best Google alternative
C. Social News - sites that allow users to post their own 3. Yahoo - Most popular search engine
news items or links to other news sources. 4. Baidu - Best Chinese search engine
 Examples: reddit, dig 5. DuchDuckGo - Best search engine for private
D. Media Sharing - sites that allow you to upload and searches
share media content like images, music, and video. 6. Ask.com - Best for question answering
 Examples: Flickr, YouTube, and Instagram 7. AOL.com -Search engine with free email provider
E. Microblogging - sites that focus on short updates from 8. Internet Archive - Best searching Internet archive
the user. Those who are subscribed will receive updates. 9. Ecosia - The search engine that uses its profits to
 Examples: Twitter Plurk fund tree-planting projects
F. Blogs and Forums - sites that allow users to post their
content. LESSON 2: INTERNET SAFETY
 Examples: Blogger, WordPress, Tumblr
Internet Safety refers to the online security or safety of
3. Mobile Technologies people and their information when using internet.
The popularity of smartphones and tablets has taken a major
rise over the years. This is largely because of the devices’ NETIQUETTE
capability to do tasks that were originally found in personal Combination of the words network and etiquette and is
computers. defined as a set of rules for acceptable online behavior.

Different types of mobile operating systems: TEN RULES OF NETIQUETTE


a. iOS – used in Apple devices such as the iPhone and
iPad RULE 1: REMEMBER THE HUMAN
b. Android – an open source operating system  Remember this saying when sending an email: Would
developed by Google. Being open source means I say this to the person’s face.
several mobile phone companies use this OS for  The internet brings people together who would
free. otherwise never meet
c. Blackberry OS – used in blackberry devices  You need to remember that you are talking to a real
d. Windows Phone OS – a closed source and person when you are online.
proprietary operating system developed by
Microsoft RULE 2: ADHERE TO THE SAME STANDARDS ONLINE
e. Symbian – the original smartphone OS used by THAT YOU FOLLOW IN REAL LIFE.
Nokia devices  You need to remember that you can get caught
f. WebOS – originally used for smartphones; now doing things you should not be doing online just like
used for smartTVs you can in real life.
g. Windows Mobile – developed by Microsoft for  You need to behave the same way online that you
smartphones and pocket PCs. do in real life.
 You are still talking to a real person with feelings
4. Assistive Media even though you can’t see them.
It is a non-profit service designed to help people who have
visual and reading impairments. A database of audio RULE 3: KNOW WHERE YOU ARE IN CYBERSPACE.
recordings is used to read to the user.  Always take a look around when you enter a new
domain when surfing the web.
SEARCH ENGINES  Get a sense of what the discussion group is about
before you join it.
Search engine, computer program to find answers to
queries in a collection of information, which might be a RULE 4: RESPECT OTHER PEOPLE’S TIME AND
library catalog or a database but is most commonly the BANDWIDTH.
World Wide Web.  Remember people have other things to do besides
read your email. You are not the center of their
A Web search engine produces a list of ―pages‖— world.
computer files listed on the Web—that contain or relate to  Keep your post and emails to minimum by saying what
the terms in a query entered by the user into a field called a you want to say.
search bar.  Remember everyone won’t answer your questions.

Most search engines allow the user to join terms with such RULE 5: MAKE YOURSELF LOOK GOOD ONLINE.
qualifiers as and, or, and not to refine queries.  Be polite and pleasant to everyone.
They may also search specifically for  Always check your spelling and grammar before
 Images posting.
 Videos  Know what you are talking about and make sense
 Phrases saying it.
 questions, or
 news articles or for names of websites

2
2ND SEMESTER_THIRD QUARTER

EMPOWERMENT TECHNOLOGY
GRADE 12 ABM SENIOR HIGH SCHOOL
Q3 SM2

RULE 6: SHARE EXPERT KNOWLEDGE.


 Ask questions online
LESSON 3: INTERNET THREATS
 Share what you know online.
1. SPAM Unwanted email mostly from advertisers.
 Post the answers to your questions online because
2. PHISHING Its goal is to acquire sensitive personal
someone may have the same question you do.
information like passwords and credit card details.
PHISHING TYPES
RULE 7: HELP KEEP FLAME WARS UNDER CONTROL.
 Spear
 Netiquette does not forgive flaming.
 Whaling
 Netiquette does however forbid people who are
 Smishing
flaming to hurt discussion groups by putting the group
 Vishing
down.
3. MALWARE Stands for Malicious Software, any program
RULE 8: RESPECT OTHER PEOPLE’S PRIVACY.
or file that is harmful to a computer user.
 Do not read other people’s mail without their
 ILOVEYOU (2000) computer worm,
permission. Going through other people’s things
spreading thru email, Love-Letter-For-
could cost you, your job or you could even go to jail.
You.txt.vbs
 Not respecting other people’s privacy is a bad
 Code Red (2001) – Microsoft IIs Server
netiquette.
software
 My Doom (2004) – email targeting
RULE 9: DON’T ABUSE YOUR POWER.
government, business across the globe
 Do not take advantage of other people just because
 Crypto Locker (2013) - malicious software
you have more knowledge or power than them.
encrypted the files on a victim’s computer
 Treat others as you would want them to treat you
demanded a ransom for the decryption key.
if the roles were reversed.
 Wanna Cry (2017) – attacking Microsoft
Windows for ransom payments in the Bitcoin
RULE 10: BE FORGIVING OF OTHER PEOPLE’S
cryptocurrency.
MISTAKE
 Do not point out mistakes to people online.
 Remember that you were once the new kid on the KINDS OF MALWARE
block.
 You still need to have a good manners even though A. VIRUS is a malicious executable code attached to
you are online and cannot see the person face to face another executable file which can be harmless or can
modify or delete data.
B. WORM is a form of malware that replicates itself
and can spread to different computers via Network.
C. TROJAN A malicious program that is disguised as a
useful program but once downloaded or installed ,
leaves your PC unprotected and allows hacker to get
you information.
D. SPYWARE Software that ruins in the background
without you knowing it.
E. KEYLOGGERS Used to record the keystroke done
by the user.
F. ADWARE A program designed to send you
advertisements, mostly a pop-ups.

PROTECTING REPUTATIONS ONLINE

1. INTELLECTUAL PROPERTY
Intellectual property is a category of property that includes
intangible creations of the human intellect. Intellectual
property encompasses two types of rights: industrial
property rights and copyright.

2. COPYRIGHT LAW
It is the legal protection extended to the owner of the rights
in an original work.

3. COPYRIGHT PAGE
The copyright page is where the publisher places all the legal
notices and information related to a book.

TO AVOID COPYRIGHT INFRINGEMENT

 UNDERSTAND
Copyright protect literary works, photographs paintings,
drawing, films, music choreography and sculptures.

3
2ND SEMESTER_THIRD QUARTER

EMPOWERMENT TECHNOLOGY
GRADE 12 ABM SENIOR HIGH SCHOOL
Q3 SM2

 BE RESPONSIBLE
Even if a material does not say that it is copyrighted, it is not
LESSON 4: MICROSOFT
a valid defense against copyright. SOFTWARE
 BE CREATIVE Keyboard Shortcuts
Ask yourself whether what you are making issomething that – Select All
came from you or something made from somebody else – Bold Text
creativity. – Copy Text
– Show Font Dialog Box (DUPLICATE)
 KNOW THE LAW – Align Text to Center (ALIGNMENT)
There are some limitations to copyright laws. – Display Find Dialog Box
– Display Go To Dialog Box(GROUP AND
ONLINE RESEARCH GO TO)
– Display Replace Dialog Box
1. Have a question in mind- Focus on a question you - Italicize Text
want answered. – Justify Text
2. Narrow it down- Search engines like Google, Bing, – Create a hyperlink
or Yahoo use several filters to determine the most – Align Text to Left
appropriate result for you. + M – Tab (NEW SLIDE)
3. Advanced Search- The best way to filter information – Create a new document (NEW PAGE)
you get from search engines is by using the advanced – Open a document
search.
4. Look for a credible sources- Some wikis, filled with – Display Print dialog box
updated information, are not a credible source. When – Quit
using wikis, check out the link of the cited texts. – Align Text to Right
5. Give credit- Give credit to the original author of the – Save a document
page or information. To properly site a reference, you – New tab
may use the format below – Underline Text
– Paste a copied text
– Close the window
– Cut a selected Text
– Redo the last undone action
– Undo the last action

WHAT IS A SPREADSHEET
SOFTWARE?
Allows users to organize data in rows and columns and
perform calculations on the data
 These rows and columns collectively are called
worksheet.

KEY TERMS IN MS EXCEL

 Row - horizontal line of entries in a table


 Column – vertical line of entries in a table
 Cell - the place where info. is held in a spreadsheet
 Active Cell – the selected cell
 Column Heading – the box at the top of each
column containing a letter
 Row Heading – the row number
 Cell Reference – the cell address of the cell usually
combine letter and number (ex. A1, B4, C2)
 Merge – combining or joining two or more cells
 Formula – is an expression which calculates the value
of a cell.
 Functions – are predefined formulas and are already
available in Excel
 Formula Bar – the bar that displays the contents of a
cell

FUNCTIONS BASIC MATH OPERATIONS

1. = SUM(x,y) or =SUM(range) returns the sum of x


and y or (all the numbers within the range)
2. =PRODUCT(x,y) returns the product of x and y •

4
2ND SEMESTER_THIRD QUARTER

EMPOWERMENT TECHNOLOGY
GRADE 12 ABM SENIOR HIGH SCHOOL
Q3 SM2

3. =QUOTIENT(x,y) returns the quotient of x divided  You can now proceed to creating the mail merge
by y in Microsoft Word.
4. =x-y returns the difference of x subtracted by y
5. =x+y returns the sum of x and y
6. =x*y returns the product of x and y
LESSON 6: Advanced Word
7. =x/y returns the quotient of x divided by y Processing Skill Mail Merging Part
8. =x-y returns the difference of x subtracted by y
2 – MS Word
OTHER FUNCTIONS
1. Open Microsoft Word. The Word app icon looks like a
white "W" on a dark-blue background. As with Excel, the
1. =ABS(x) returns the absolute value of x
"New" page will open.
2. =AVERAGE(x,y) returns the average of x and y
 If you have an existing Microsoft Word document
3. =CONCATENATE(x,y) joins x and y
into which you want to import the Excel
4. =IF(Condition, x, y) returns x if the condition is
contacts, you'll instead double-click it to open it
true, else it returns y
and skip the next step.
5. =ISEVEN(x) returns true if x is an even number
6. =ISODD(x) returns true if x is an odd number
2. Click Blank document. It's a white box in the upper-
7. =COUNT(range) counts the number of cell
left side of the page. A blank Microsoft Word document
containing a number within a range
will open.
8. =COUNTIF(range, criteria) count the number of
cell that fits with the criteria within the rang
3. Click the Mailings tab. This tab is at the top of the
Microsoft Word window.
LESSON 5: Advanced Word  A toolbar will appear just below the row of tabs
Processing Skill Mail Merging Part here.

1 – MS Excel 4. Click Select Recipients. It's in the "Start Mail Merge"


section of the Mailings toolbar.
1. Open Microsoft Excel. Microsoft Excel's app icon  Doing so prompts a drop-down menu.
resembles a white "X" on a darkgreen background. The
Excel "New" page will open. 5. Click Use an Existing List…. You'll find this option in
 If you already have a contact sheet in Excel, skip the drop-down menu. A new window will open.
ahead to importing the Excel contacts instead.  If you ever want to use Outlook contacts instead,
you can select the Choose from Outlook
2. Click Blank workbook. It's in the upper-left side of  Contacts option in the drop-down menu.
the "New" page. This will open a new, blank Excel  You can also type a temporary list of contact
document. information into Word by selecting the Type a
New List option.
3. Add your contact headers. Starting in cell A1 and  This is useful when you only need to create a
moving right from there, enter the following headers: handful of contacts' information.
 First Name - Your contacts' first names will go
in this column (cell A1). 6. Select your Microsoft Excel contact sheet. On the
 Last Name - Your contacts' last names will go in left side of the window, click the folder in which you
this column (cell B1)… AND SO ON. saved the Excel sheet, then click the Excel sheet to
select it.
4. Enter your contacts' information. Starting in column
A, cell 2, begin entering the contact information for each 7. Click Open. It's in the bottom-right corner of the
of the people for whom you want to generate a mail window.
merge.
 Make sure that this information is accurate 8. Confirm the decision. Click the Excel sheet's name in
before proceeding. the pop-up window, then click OK at the bottom of the
window. Your Excel sheet will be selected as the location
5. Save your document. To do so: from which your contacts will load.
 Windows - Click File, click Save As, double-click  Make sure that the "First row of data contains
This PC, click a save location on the left side of column headers" checkbox at the bottom of
the window, type the document's name into the this window is checked.
"File name" text box, and click Save.
 Mac - Click File, click Save As..., enter the WORD PROCESSING SKILL MAIL MERGING
document's name in the "Save As" field, select a Mail Merging Steps
save location by clicking the "Where" box and
clicking a folder, and click Save. 1. Go to the place in which you want to insert contact
 Keep in mind your selected save location— information.
you'll need to find the Excel spreadsheet later.  Find the place where you want to insert contact
information (e.g., the top of the document) and
6. Close Excel. Click the X in the upper-right corner of click it to place the cursor there.
Excel (Windows) or the red circle in the upper-left
corner (Mac).

5
2ND SEMESTER_THIRD QUARTER

EMPOWERMENT TECHNOLOGY
GRADE 12 ABM SENIOR HIGH SCHOOL
Q3 SM2

2. Click Insert Merge Field. It's an option in the


"Write & Insert Fields" section of the Mailings tab. A
drop-down menu will appear.
 You may have to click the Mailings tab again
before doing this.

3. Select a type of information. In the drop-down


menu, click the name of one of the headers from your
Excel document to insert it.
 For example, you would click FirstName in the
drop-down menu if you wanted to insert a tag
for contacts' first names.

4. Add other information where necessary. This


might include contacts' addresses, last names, phone
numbers, and so on.

5. Click Finish & Merge. It's in the far-right side of the


Mailings tab's toolbar. This prompts a drop-down
menu.

6. Select a merge option. Click one of the following:


 Edit Individual Documents - Opens each
recipient's document, allowing you to
personalize further the documents.

 Print Documents... - Allows you to print out a


copy of your document for each individual
listed in your contact sheet.

 Send Email Messages... - Allows you to send


out the documents as emails. The contacts'
email addresses will be selected as the
destination email addresses.Follow the on-
screen instructions. Depending on your
selected option,

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy