Information and Communication Technology in the 21st Century PDF

Summary

This document provides an overview of information and communication technologies (ICT) in the 21st century. It discusses the concept of ICT, its different types including mobile technology, social media, and various online platforms. It also touches on elements like assistive technology, artificial intelligence, the world wide web, and online safety and cyber security topics.

Full Transcript

INFORMATION AND COMMUNICATION e. Assistive Technology TECHNOLOGY IN THE 21ST CENTURY which is a software program or A. What is ICT? product system th...

INFORMATION AND COMMUNICATION e. Assistive Technology TECHNOLOGY IN THE 21ST CENTURY which is a software program or A. What is ICT? product system that is intended to help people with disabilities Information and Communications Technology (ICT) refers to a set of concepts, resources, and d. Artificial Intelligence (AI) tools that, when combined, allow people and send, process, share and exchange information. They act like humans. HTML - Hypertext Markup Language e. Technological Convergence URL - Universal Resource Locator Combining multiple devices into one device WWW – World Wide Web ICT - Information and Communications Technology C. The World Wide Web ISP – Internet Service Provider. Using this vast information superhighway is the World Wide Web a. Mobile Technology (Simply known as the web) and b. Social Media consist of webpage and website Types of Web Social Networking Site (SNS) Virtual Communities where a user a. Web 1.0 interact with another user or group of users that shares common interest Also known as STATIC OR using an online identity. STATIONARY WEBPAGE. Here, users SOCIAL REVIEW SITES cannot interact of modify the content Review sites are websites where of the webpage. people can post their reviews about b. Web 2.0 businesses, products, or services. c. Media Sharing Platforms Also known as DYNAMIC WEBPAGE. These are websites that can be used by The information displayed to a user is people for storing and sharing various different from others. E.G Facebook, types of media. Twitter o Photo Sharing Site c. Web 3.0 o Video Sharing Site Also called as SEMANTIC WEBPAGE. This o Music Sharing Site is a type of webpage where machines will d. Blogging process data and information in a A blog is a webpage that contains humanlike way. informational posts by one user II. Online Safety and Security using text A. What is Cyber Security? Microblogging Cyber Security refers to the body of technologies, is a fused idea of blogging and process, and practices designed to protect instant messaging allowing users to networks, computer programs and data from compose short or limited attack, damage, and unauthorized access. messages/text to be posted SAFE: Phishing is a type of cyberattack where attackers deceive people into revealing 1. Make your password strong and unique sensitive information, such as passwords 2. Geta Virtual Private Network and Use It or credit card numbers, or installing malware on their devices 3. Turn on Two-Factor Authentication 4. Pharming 4. Use Passcodes Even if they are Optional 5. Online Ethics and Etiquette 5. Use Different Email Addresses for Guidelines and rules are needed for Different Types of Accounts the appropriate use of computer technology. 6. Clear Your Cache D. ICT for Research 7. Turn Off ‘Save Password’ Feature in 1. Google Scholar Browsers 2. ERIC 3. DOAJ B. Internet Threats 4. Dupli checker (Plagiarism checker) 1. Malware Programs designed to harm your computer and make it vulnerable to INCREASING PRODUCTIVITY THROUGH ICT attack. Mail Merge a. Computer Virus A powerful word processing application tool that These are commonly obtained from enables you to send a similar letter or document executable files (.exe) and those that to multiple recipients. are downloadable from unknown Main Document sources. This is the file that will be sent to the recipients. b. Computer Worm The Three types of documents that you need to These are types of malware that take select for distribution are: advantage of software vulnerabilities, a. Letter it can replicates from one computer and to another. b. Email c. Trojan Horse c. Envelopes It disguises itself to be beneficial/legit d. Data Source application or software but once they e. This is the list of recipients that you want are installed, they are harmful. to include in your document. Y d. Spyware This hides and restricts access to your files, and your files can only be Placeholders reverted in exchange of payment, most These are also called "merge fields." Placeholders of the times, through cryptocurrency. mark the place of the data from the source on the 3. Phishing document. Steps in creating a Simple Mail Merge: Cell - the place where information is held in a spreadsheet 1. CREATE DATA SOURCE OF THE LIST OF RECIPIENTS Active Cell – the selected cell 2. Create a word file that will pull out Column Heading – the box at the top of the data from excel each column containing a letter 3. Click MAILINGS and click Select Recipients Row Heading – the row number 4. CLICK USE EXISTING LIST AND Cell Reference – the cell address of the SELECT YOUR EXCEL FILE cell usually combines letter and number 5. SELECT SHEET 1 AND CLICK OK (ex. A1, B4, C2) 6. HIGHLIGHT THE ANY RECIPIENT DATA AND CLICK INSERT MERGE Merge – combining or joining two or FIELD more cells 7. SELECT SURNAME AND FIRST NAME Formula – is an expression which 8. CLICK PREVIEW RESULT calculates the value of a cell. II. Custom Animation and Timing Functions – are predefined formulas and are already available in Excel A. Steps in inserting animation to your presentation Formula Bar – the bar that displays the contents of a cell B. Types of Animation: 1. Entrance (Green Star) Functions in Microsoft Excel 2. Emphasis (Yellow Star) VLOOKUP 3. Exit (Red Star) 4. Motion Paths VISUAL PERSUASION III. Hyperlink I. Basic Principles of Graphics and Layout Steps in the creating a hyperlink in a presentation Graphic design is the art of combining different images, shapes, and colors for a certain purpose. Advance functions using PowerPoint: 1. Create a Custom Animation: Principles of Design 2. Create a Hyperlink to a slide in the same 1. Balance (Equal Distribution) presentation: a. Symmetrical (Equal both side) V. Advanced Functions in Microsoft Excel b. Asymmetrical (Not Equal Distribution of both side) Key Terms in MS Excel: c. Radial (It have Central Point) Row - horizontal line of entries in a table 2. Emphasis (It emphasize one object) Column – vertical line of entries in a 3. Movement (Have direction or motion table Path) 4. Pattern (This refers to repeating certain 4. Texture objects through visual content.) It used to put a surface feel to your 5. Repetition design. - This is a way to create relationship 5. Space and unity among different objects in Areas on the design that is left your visual content. blank. 6. Proportion 6. Form This tells whether which element Connotes something that is three- in a visual content is more dimensional. important. 7. Value 7. Unity How light or dark on a scale (tonal This is how well the design Value) elements in a visual content work together to convey a clear and Principles of Visual Message Design using unified message to the viewers. Infographics 8. Contrast Visual Persuasion It is the process of influencing people’s -This refers to the striking thoughts and stimulate them to act in a certain difference between two elements. way using graphic materials or elements, such as 9. Harmony photos and illustrations. This is achieved when all the Factors affect visual persuasion: elements are arranged to make the viewer think that they form a 1. Viewer’s knowledge coherent whole. It comes when there is a context 10. Variety that will stimulate the mind to decode the visual and draw a This uses the different element in conclusion an image to create visual interest. 2. Visual content Make your graphics and other Fundamental Elements of Design: visual elements supported or 1. Lines connected to the message that you want to convey 2. Shapes Geometric Organic Astract 3. Graphic style 3. Color Too much simplicity may deliver The most obvious elements in the message subtly design. Too much complexity might take contain more than one frame the message difficult to understand 6. PDF 4. Relationship to copy Portable Document Format The copy pertains to the main text used in the material III. Principles and Basic Techniques of INFOGRAPHICS Image Manipulation Infographics are used to creatively present data or information using different shapes, colors, and pictures. Image manipulation is the process of transforming an image to what you want it to How to present data using Infographics? look like, rather than what the original image 1. Define your topic may have shown. 2. Gather your data Basics Principles and Techniques of Image Manipulation: 3. Organize your data 1. Save the original copy of your project. 4. Use proper typography 2. Crop out parts that you do not need. 5. Use color properly 3. Retain perspective and maintain quality 6. Finalize and publish when resizing. 4. Do not over-retouch. ONLINE FILE FORMAT FOR IMAGE AND TEXT: 5. Select the right image file format. Online Platforms as Tools for ICT Content What is a File Format? Development A File Format is the design or arrangement of a file in terms of how it I. The Nature and Purposes of Online was organized. Platforms and Applications An Online Platform is a base of technologies 1. JPEG or JPG designed to run within an online environment Joint Photographic Expert Group and provides interactive online services. They can be compressed to II. Basic Web Design principles and much smaller file sizes than elements other types of image files The principles of design refer to the way elements are assembled and to the overall 2. PNG composition of the designed pages. Portable network Graphic a type of raster image file A. Web Design Principles and Elements: 3. GIF 1. Simplicity Graphics Interchange Format a. Color b. Typeface and Font Typeface - Main Name of the Text Font – The variant of the Typeface (Bold, Italic, Underline) c. Imagery 3. F-shaped Pattern Reading How users scan text (left to right, top to bottom 4. Visual Hierarchy ARRANGEMENT OF DESIGN ACCORDING TO THE IMPORTANCE 5. Content Grammatically and Spelling Correct 6. Grid-based Layout Column, Modular & Hierarchical 7. Load Time The file size of the content o Internet o Device Specs Web page design using templates and online WYSWYG platforms A “What You See Is What You Get” editor is a program or application that allows a user to see what the project or output will look like while it is still being created.

Use Quizgecko on...
Browser
Browser