E-TECH Flashcards
an umbrella term which covers any communication
ICT
Who invented World wibe web
Sir Tim Berners- LEE in 1989
are what make up the world wide
web and it can either be static or dynamic.
Web pages
, the user cannot manipulate or edit the
content of the page, as well as, the content is same for all
the users.
WEB 1.0 (STATIC WEB)
most of the websites contain dynamic
content or has interactive characteristics.
WEB 2.0 (DYANAMIC WEB)
WHAT ARE THE SIX FEATURES OF WEB 2.0
FOLKSONOMY, RICH USER EXPERIENCE, USER PARTICIPATION, LONG TAIL SERVICES, SOFTWARE AS A SERVICE, MASS PARTICIPATION
This feature allows user to
categorize and classify/arrange
information (ex.: hashtag like
#NewNormal).
FOLKSONOMY
This feature deals with how a
site uses user information for a
personalized content (ex.:
blog/vlog, social media accounts,
et cetera)
RICH USER EXPERIENCES
This means that those who view
the website can also put their
own information (ex.: the
comment section and/or the
reaction button of Facebook)
user participation
These services offer services on
demand as opposed to a one-time
purchase (ex.: the Netflix user must pay
the monthly subscription fee to enjoy
binge-watching)
LONG TAIL SERVICES
This feature deals with diverse
information sharing through universal
web access (ex.: regardless your
nationality, gender, et cetera, you can
share information online, but make
sure, it is not fake).
MASS PARTICIPATION
It contains how users would subscribe
to a software as opposed to
purchasing them (Ex.: thesis group
members can collaborate online
through Google Docs,
SOFTWARE AS SERVICE
It aims to produce machine that can understands the user’s
preferences. This machine can serve better by “learning”
from the previous choices of the user.
WEB 3.0 (SEMANTIC WEB)
ability of Web technologies to understand and
interpret human-generated content
EXAMPLE: Apple’s Siri
Semantics
WHO COINED WEB 3.0?
JOHN MARKOFF IN 2006
HTML FILES AND CURRENT WEB BROWERS COULD NOT SUPPORT
COMPABILITY
IT MIGHT NOT UNDERTSAND SARCASM
LOGIC
SAVING USERS PREFERANCE IS THE MAIN IDEA OF WEB3.0. IT IS ACHIEVABLE WITH THE CURRENT STATE OF ICT
SECURITY
WEB 3.0 MACHINE MUST CATER ALL LANGUAGES AS THIS THIRD GENERATION OF WEB AIMS TO SEARVE DIVERSE USERS.
VAGUENESS
INFORMATION COMES FROM BILLIONS OF WEB PAGES IS THE MEAIN FEATURE OF THE INTERNET
VASTNESS
WHAT ARE THE ICT TRENDS?
SOCIAL MEDIA, CONVERGENT MEDIA, M,OBILE TECHNOLOGIES, ASSSISTIVE MEDIA
THESE WEBSITES THAT LLOWAS THE NETIZENS TO CREATE, DISCUSS, AND EXCHANGE USER GENERATED CONTENT
SOCIAL MEDIA
WHAT ARE THE 6 TYPES OF SOCIAL MEDIA?
SOCIAL NETWORKS, BOOKMARKING SITE, SOCIAL MEDIA NEWS,MEDIA SHARING, MIRCO BLOGGING, BLOGS AND FORUMS
ENABLES THE USERS TO CONNECT WITH OTHER USERS EX: FB GOOTGLE
social networks
ALLOWS USER TO STORE AND MANAGE LINKS TO VARIOUS WEBSITES AND RESOURCES EX: PINTE
BOOKMARKING SITE
THIS SITE PROMOTES SHARING BETWEEN THE NEWS PROVIDER AND THE USER, BECOMES A CENTRAL HUB FOR NEW STORIES FROM VARIOUS OTHER THIRD PARTY EC: REDDIT
SOCIAL MEDIA NEWS
ENABLE USERS TO UPLOAD AND SHARE MEDIA CONTENT LIKE IMAGE, VIDEO, MUSIC TO LIKE ex: TIKTOK, YT, INSTA
MEDIA SHARING
FOCUSES ON SHORT UPDATES FROM USERS EX: TWITTER
MICROBLOGGING
USER POST THEIR OWN WRITE UPS, JOURNAL, DIARY. FORUM IS A PART OF CERTAIN WEBSITES WHEREIN USERS CAN HOLD AN ONLINE DISCUSIION ABOUT CERTAIN TOPIC
EX: BLOGGER. WORD PRESS
BLOGS AND FORUMS
THE COMBINATION OF TWO OR MORE DIFFERENT ENTITIES OF TECHNOLOGO=IES TO CRATE A NEW SINGLE DEVICE
CONVERGENT MEDIA
NON PROFIT SERVICE DESIGNED TO HELP VISUAL AND READING IMPAIRMENTS. `
ASSISTIVE MEDIA
the process of and tools for
storing, managing, using, and gathering of
data and communications in an
organization.
ONLINE SYSTEM
It is a category of business software that
adds
broad social networking capabilities to work
processes.
COLLABORATIVE PLATFORM
platforms are any hardware or software to
host an
application. These platforms come with the
different functions.
EX: COLLABORATIVE AND WEB SEARCH ENGINE
PLATFORMS
like
Google, Bing, and Yahoo
WEBSEACRH ENGINES
-This term came from the blended words
“malicious” and “software”
-It is an umbrella term with 5 different types:
Virus, Worm, Trojan, Spyware, Adware
MALWARE
It is malicious program that usually
transfer from one device to
another with the aid of the
Internet and local networks, but
commonly through data storage
such as flash drives or hard drive
VIRUS
Unlike Virus, this malware
replicates itself and can transfer by
any type of means, but more often
through computer network.
* Example: ILOVEYOU worm
WORM
This is known as Love Bug, that infected 45
million machines across the globe, including
Pentagon, within 24 hours last May 4, 2000
* When the victim opens the attachment, an email entitled LOVE-LETTER-FOR-YOU, the
malware automatically send itself to all the
victim’s Microsoft Outlook contact
ILOVEYOU WORM
Tracing its name origin, it can be link to the
mythology story about how Trojan fell because
of Greek’s wooden horse
* Like the Odysseus’ strategy; this malicious
program disguised as a useful program,
however when you left your devices
unprotected and become vulnerable to other
malwares once you accessed or downloaded it
TROJAN
A malicious program that monitors
the device, and the actions of the
user without its knowledge
* Example: the keylogger steals
sensitive information using the
recorded user’s keystrokes
SPYWARE
- This program automatically sends
pop-ups advertisements
ADWARE
Used to record the keystroke done
by the users
* This is done to steal their password,
or any other sensitive information
* It can record email, messages, or
any information you type using your
keyboard
KEYLOGGERS
A CYBERCRIME
Like fishing, criminals steals sensitive personal
information like account passwords and
banking details by sending out an alarming email as a bait.
Usually they ask you to click a link, or input
your username, password, or any personal info
PHISHING
r UNWANTED EMAILS contains bots
and advertisements
SPAM MESSSAGES
Defined as the Illegal act done using
Internet
CYBERCRIME
A more complicated way of phishing where it
exploits the DNS (Domain Name Service
system)
PHARMING
Defined as the information
superhighway
INTERNET
UNAUTHORIZED ACCESSING OF DATA FROM A COMPUTER NETWORK. MOSTLY HACKERS ATTACK COMMERCIAL AND GOVERMENT SITES TO CAUSE AN ALARM OR TO TRAT SOMEON
HACKING
an illegal act of gambling on any sports event that happened over the internet
SPORT BETTING
deceiving act which the culprit posted a product or service on the internet. ONCE THE VICTIM PLACED ITS PAYMENT, THE CULPRIT DOES NOT GIVE THE ITEM OR SERVICE
NON- DELIVERY OF MERCHANDISE
anonymous criminal who harass, abuse threat or annoy people. ex: cyberbully
electronic harassmenT
R.A. no. 9775 or knowm as Anti-Child porno act of 2009, it is an act of real or simulated explicit sexual activities
CHILD PORNOGRAPHY
an illegfal act engage in any sexaul activities
PROSTITUTION
an authorized use of stealing of intellectua; property
CRIMINAL COPYRIGHT INFRIGEMENT
TIPS
THAT COULD HELP YOU
AVOID COPYRIGHT
INFRINGEMENT:
- UNDERSTAND, BE RESPONSIBLE, BE CREATIVE, KNOW THE LAW
you can express something using your own
words, but you should give credit to the source.
- UNDERSTAND
*Ask yourself whether what you are making is
something that came from your won work or
something made out of somebody’s else
creativity
BE CREATIVE
*“Fair use” which means that an intellectual
property may be used without consent as
long as it is used in commentaries, criticisms,
search engine, parodies, news reports,
research, library archiving, teaching, and
education
KNOW THE LAW
Be responsible enough to know if something
has a copyright
. BE RESPONSIBLE
“MS. MANNERS” OF TEH INTERNET
VIRGINIA SHEA
IS THE WAY WE THINK, ACT AND BE ONLINE. ALSO REFERS TO THE REPONSIBLE USE OF TECHNO
DIGITAL CITIZENSHIP
STURFY THE TIPS TO STAY SAFE ONLINE LODA
is the process of interactively searching
for and retrieving requested information
via a computer from databases that are
online.
ONLINE SEARCH
TIPS TO CONDUCTING ONLINE RESEARCH
Have a question in mind, Narrow it down, Advanced Search., Look for a credible source, Give credit
is an attempt to be more precise in
providing the list of documents according
to the words used by the user to search
the Internet
Contextualized Online Research
is a software system that is designed to search for
information on the World Wide Web. The search
results are generally presented in a line of results
often referred to as search engine results pages.
SEARCH ENGINE
is one of the skills a person should possess in
research. It’s our capacity to absorb, reflect and conclude from the
searched knowledge like what Francis Bacon wrote, “some books are
to be tasted, others to be swallowed, and some few to be chewed and
digested.” Any of the knowledge shared online is not necessarily
accurate
Critical thinking
Tips to make contextualized online search
- Identify or choose a topic
● 2. Topic or task definition
● 3. Identify methods of search
● 4. Identify resources of your research
● 5. Make your research strategies
● 6. Compiling the research results
● 7. Evaluate the result of your research
● 8. Create a list of your references for citation
check if it is grammatically correct, verifiable and cite.
Accuracy
the data must be updated.
Currency
check the credentials/expertise of the information provider.
Author
the content must show all the sides and different points of view.
Fairness
the content must be related to the topic.
Relevance
or the ability to gather, organize,
visualize and adapt information that is tailored to the subject’s
context, is important.
or the ability to gather, organize,
visualize and adapt information that is tailored to the subject’s
context, is important.
is more than just
googling (typing a word in Google and then clicking the search
button). Look not only on the surface while you are searching;
computer literacy
Adding a + sign before a word means that it MUST be included in each site
listed. For example: +Florida +taxes
Addition Sign (+)
Using quotation marks will help to find specific phrases involving more than
one word.
Quotation Marks (“ ” )
Adding a - sign before a word means that it will NOT appear in the sites listed.
For example: +Washington –DC
Subtraction Sign ( - )
Asterisks can be used for wild-cards in
some search engines. For example: Mexic* will look for Mexico, Mexican,
Mexicali, etc
Asterisks ( * )
Finds or excludes web pages that
contain a group of words.
example: SEO (technical OR local)
Parenthesis ( )
- Finds web pages that contains
all the terms or phrases
AND or &
- Excludes web pages that contain a
term or phrase
NOT or – -
Finds web pages that contain either or
the term or phrases
example: marathon or race
OR or |
provides related websites
related:website.com
provide results from a specific
website.
example: site:youtube.com or site:.gov
site:website.com
search for specific file type to narrow the results
example: filetype:pp
filetype:
This features allow you to create documents and combine or merge them with another document or data file.
MAIL MERGE
Two components of mail merge
FORM DOCUMENTS , List or data file
the first component of the mail merged document.
form document
referred to as data fields or merge fields
This marks the position on your form documents where individual data or information will be inserted.
Denoted or marked by the text with double-headed arrows («_space;») on each side.
pLACE HOLDER
main body of the message is the part of the form document that remains the same no matter to whom you will send the message from among your contact list.
FORM DOCUMENTS
his where the individual information or data that needs to be plugged in (merged) to form document is placed and maintained.
One of the best things about the mail merge feature is that it allows data file to be created from Microsoft Word application itself or other data formats.
List or data file
is the process of interactively searching
for and retrieving requested information
via a computer from databases that are
online.
ONLINE SEARCH
- Internet researching is faster than other medium.
- Internet researching will save user’s physical distance.
- You can share information with other people very quickly.
- Quality of information also better than other medium.
- Strength include speed, immediacy, and a complete disregard for
physical distance.
Strengths
the data must be updated.
Currency –
Possibility of leak someone’s personal information. And it can
make negative effect in your life
* There is so many incorrect information that we trying to find.
* You can get many harmful objects such as advertising.
* Weaknesses include unrecognized bias difficulties in verifying a
writer’s credentials (and therefore the accuracy or pertinence of
the information obtained).
Weakness
is a software system that is designed to search for
information on the World Wide Web. The search
results are generally presented in a line of results
often referred to as search engine results pages.
SEARCH ENGINE
the content must be related to the topic.
Relevance
Tips to make contextualized online search
- Identify or choose a topic
● 2. Topic or task definition
● 3. Identify methods of search
● 4. Identify resources of your research
● 5. Make your research strategies
● 6. Compiling the research results
● 7. Evaluate the result of your research
● 8. Create a list of your references for citation
- Have a question in mind 2. Narrow it down
. Advanced Search. - Look for a credible source.
- Give credit
TIPS TO CONDUCTING ONLINE RESEARCH
- is an attempt to be more precise in
providing the list of documents according
to the words used by the user to search
the Internet
Contextualized Online Research
– check the credentials/expertise of the information provider
. Author
.com (commercial)
● .org (organization)
● .edu (education)
● .gov (government)
● .net (network)
● .mil (military)
● .ph (country domain)
asasasd
is one of the skills a person should possess in
research. It’s our capacity to absorb, reflect and conclude from the
searched knowledge like what Francis Bacon wrote, “some books are
to be tasted, others to be swallowed, and some few to be chewed and
digested.”
Critical thinking
can be used for wild-cards in
some search engines.
- Asterisks
– check if it is grammatically correct, verifiable and cite
Accuracy
the content must show all the sides and different points of view
Fairness
- Finds web pages that contain either or
the term or phrases
OR or |
or the ability to gather, organize,
visualize and adapt information that is tailored to the subject’s
context, is important.
analytical skill
sign before a word means that it MUST be included in each site
listed.
- Addition Sign
-Joint Photographic Experts Group.This type of image file can
support 16.7 million colors that
is why it is suitable for use when
working with full color
photographic images.
*Unfortunately, it does not
support transparency
jpg
will help to find specific phrases involving more than
one word.
Quotation Marks
sign before a word means that it will NOT appear in the sites listed.
Subtraction Sign
Finds or excludes web pages that
contain a group of words.
Parenthesis
Finds web pages that contains
all the terms or phrases
AND or &
Excludes web pages that contain a
term or phrase
NOT or –
These are printable objects or
materials that you can integrate
in your document to enhance
its appearance or to allow you
to have some tools to use for
composing and representing
ideas or message
SHAPES
*Generally, these are electronic
or digital pictures or
photographs saved in any local
storage device.
*There are three commonly used
types of picture files. They can
be identified by the extension
on their file names.
PICTURE
provide results from a specific
website.
site:website.com
provides related websites
related:website.com
search for specific file type to narrow the results
filetype:
are line art drawings or
images used as generic
representation for ideas and
objects that can be integrated
in Word documents.
CLIPART
Graphics Interchange
Format.
* This type of image file is capable of
displaying transparencies. It is also
capable of displaying simple
animation.
GIF
Portable Network
Graphics.
*It is also good with
transparencies but it
does not support animation.
.ALlows the control of the
transparency level or opacity of
images.
PNG
It treats the image like a text font with
the bottom side totally aligned with the text line.
In Line with Text
Generally, these are predefined
sets of different shapes grouped
together to form ideas that are
organizational or structural in
nature.
SMART
ART
g allows your
image to be placed right on top of the text as if
your image was dropped right on it, the text can
be covered by the image.
. In Front of Text
allows the image you
inserted to be placed anywhere within the
paragraph with the text going around the image in
a square pattern like a frame.
Square
Allows you to represent data
characteristics and trends in
your Word documents.
CHART
snipping tool for
your screenshots so you can
select and display only the
part that you exactly like to
capture on your screen.
screenshots
This is the same as the Square setting,
but here are the text “hugs” or conforms to the
general shape of the image.
Tight -
his setting allows the text on your
document to flow even tighter, taking the contours
and shape of the image.
Through
This allows your image to be
dragged and placed anywhere on your document
but with all the text floating in front of the list of it
which makes your image looks like a background.
Behind Text
This setting pushes the text
away vertically to the top/and or the bottom of
the image so that the image occupies a whole line
on its own.
Top and Bottom