🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Empowerment-Technologies-Reviewer-1st-Quarter-Exam.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

EMPOWERMENT TECHNOLOGIES Lesson 1: Introduction to Information and Communication Technology Information and Communication Technology deals with the use of different communication technologies such as mobile phones, telephones, internet, etc. to locate save...

EMPOWERMENT TECHNOLOGIES Lesson 1: Introduction to Information and Communication Technology Information and Communication Technology deals with the use of different communication technologies such as mobile phones, telephones, internet, etc. to locate save, send and edit information. Among the goals of IC technologies, tools and systems is to improve the way humans create, process and share data or information with each other. Another is to help them improve their abilities in numerous areas, including business; education; medicine; real-world problem-solving; and even leisure activities related to sports, music, and movies. Importance of ICT in Different Fields 1. Communication: ICT facilitates global communication and networking through email, video conferencing, social media, and instant messaging, keeping people connected across different locations and time zones. 2. Education: ICT enables online access to educational resources and e-learning, expanding education accessibility, especially for remote or resource-limited individuals, and promoting lifelong learning and professional development. 3. Business: ICT revolutionizes business operations by managing data, communication, and transactions, supporting online marketing, e-commerce, and remote work, thus enhancing global reach, efficiency, and productivity. 4. Social and Economic Development: ICT fosters job creation, entrepreneurship, and access to information and services, promoting inclusive growth, particularly in developing countries. 5. Innovation: ICT drives innovation in various fields like medicine, science, and engineering, by providing advanced tools for data analysis, simulation, and modeling, leading to significant research and development breakthroughs. Lesson 2: Challenges in ICT Common Internet Threats a. Spam. Unwanted messages which are bothersome and may contain malware. b. Malware. Short for malicious software, is a blanket term for viruses, worms, trojans and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information. Adware. A type of malware that shows unwanted advertisements while a person is browsing the internet. c. Trojan. Disguised as normal computer programs for hackers to infiltrate your machine undetected. d. Virus. Typically attach silently to downloads due to their ability to spread at an alarming rate. e. Keylogger. Like a part of spyware, keyloggers records a user’s keyboard actions. Most keyloggers will be looking for distinguishable key entries, such as bank card details and passwords. Keylogging is often linked to identity and intellectual property theft. f. Hackers and Predators. People who victimize others for their own gain by breaking into computer systems to steal, change, or destroy information as a form of cyber-terrorism. These online predators can compromise credit card information, lock you out of your data, and steal your identity. g. Phishing. Often, official-looking emails are sent impersonating a well-known provider, such as a bank to acquire people’s passwords and credit card details. h. Pharming. A more complex version of phishing that exploits the DNS system. Pharmers often create web pages mimicking that of a trustworthy business, such as an online banking log-in page. Lesson 3: Rules of Netiquette Netiquette refers to the correct and acceptable way of communicating on the Internet. It combines "network" and "etiquette" and includes a set of ideal rules and conduct that netizens should observe when communicating or publishing information online, particularly on the World Wide Web (WWW) and in Information and Communication Technology (ICT) in general. a. Fair use allows the limited and transformative copying of copyrighted material, such as for commentary, criticism, or parody, without needing permission from the copyright owner. It's a legal defense against copyright infringement claims—if the use is deemed fair, it isn't considered infringement. b. Copyright Infringement. It happens when someone uses or produces material protected by copyright without the owner's permission. This means they are violating the owner's exclusive rights. Music and movies often face a lot of copyright infringement issues. Such cases can result in contingent liabilities, which are amounts reserved for potential lawsuits. c. Public Domain - refers to creative materials that are not protected by intellectual property laws such as copyright, trademark, or patent laws. How to Avoid Copyright Infringement a. Understand – copyright protects literary works, photographs, paintings, drawings, films, music (and lyrics), choreography, and sculptures, but it generally does not protect underlying ideas and facts. This means that you can express something using your own words, but you should give credit to the source. b. Be creative – ask yourself whether what you are making is something that came from you or something made from somebody else’s creativity. It is important to add your own creative genius in everything that will be credited to you. c. Be responsible – even if a material does not say that it is copyrighted, it is not a valid defense against copyright. Be responsible enough to know if something has a copyright. d. Know the law – there are some limitations to copyright laws. For instance, in the Philippines, copyrights only last a lifetime (of the author) plus 50 years. There are also provisions for “fair use” which means that an intellectual property may be used without the consent if it is used in commentaries, criticisms, search engines, parodies, news reports, research, library archiving, teaching, and education. Lesson 4: History of the World Wide Web 1. Web 1.0 (Static Web): The first stage of the web, known as the "read-only web," where users could view content but not interact with it. Communication was limited to private emails, with no direct commenting. 2. Web 2.0 (Dynamic Web): Emerged around 2004, introducing user interaction and content creation, leading to the rise of social media. Key features include: a. Folksonomy: User-generated tagging for content organization. b. Rich User Experience: Dynamic, responsive content. c. Long Tail: On-demand services. d. Software as a Service: Subscription-based software usage. e. Mass Participation: Broad information sharing. 3. Web 3.0 (Semantic Web): The current evolution where the web understands user preferences, providing personalized content. Challenges include compatibility, security, vastness, vagueness, and logical limitations. Trends in ICT 1. Technology Convergence: Combining different technologies to achieve common goals. 2. Social media: Platforms for creating, sharing, and interacting with user-generated content. Types include: Social Networks: Connecting with others (e.g., Facebook, Google+). Bookmarking Sites: Managing and sharing links (e.g., Pinterest). Social News: Sharing news content (e.g., Reddit). Media Sharing: Uploading and sharing media (e.g., YouTube, Instagram). Microblogging: Short updates (e.g., X). Blogs and Forums: Posting and discussing content. 3. Mobile Technology: The rise of smartphones and tablets. 4. Assistive Media: Services aiding those with visual and reading impairments. Lesson 5: Contextualized Online Research Contextual Search - an attempt to be more precise in providing the list of documents according to the words used by the user to search the Internet. Search engines scan the internet for content that matches the user's query and return relevant results. A good contextual search engine refines these results by requesting additional information to better match the user's needs. Contextual Research Steps 1. Identify or choose a topic 2. Identify methods of search 3. Identify resources of your research 4. Make your research strategies 5. Compiling the research results 6. Evaluate the results of your research 7. Create a list of your references for citation Remember the following in conducting an online search: Search Behavior: By default, all searches are treated as AND searches. Use NOT and OR in uppercase; otherwise, Bing will ignore them as stop words. Stop words and most punctuation are ignored unless enclosed in quotation marks or preceded by a + symbol. Only the first ten terms in a search query are used for results. Evaluating Credibility: Credible sources include scientific journals, established news sites, online encyclopedias, and scholarly databases. Check URLs:.org,.gov, and.edu are usually reliable;.com may be biased towards commercial interests. Be aware that not all websites follow standard domain name conventions, and credibility is not guaranteed by domain suffix alone. Use multiple sources to verify information Lesson 6: Advanced Word Processing MS Word is a word processor developed by Microsoft. It has advanced features which allow you to format and edit your files and documents in the best possible way. Mail Merge. A software toolkit that is used to produce multiple documents with a given template, editing the basic information that is supplied by a structured dataset. Components of Mail Merge 1. Form Document. Generally, the document that contains the main body of the message we want to convey or send. The main body of the message is the part of the form document that remains the same no matter whom you send it to from among your lists. Included in the form document is the place holders, also referred to as data fields or merge fields. This marks the position on your form document where individual data or information will be inserted. The place holders are denoted or marked by the text with double –headed arrows (>) on each side and with a gray background. 2. List or Data File. This is where the individual information or data that needs to be plugged in to the form document is placed and maintained. Steps in Creating a Mail Merge 1. Create a dataset with title headings on a spreadsheet (MS Excel) application. 2. Create the template of the letter or document that will receive the dataset in a word processor (MS Word). 3. Insert the label of customized detail in the word processor and insert the label that corresponds to the spreadsheet. 4. Select the option preview in the word processor to generate all the pages with different information. Lesson 7: Advanced Spreadsheet MS Excel is a spreadsheet program developed by Microsoft. It allows users to organize, format, and calculate data using a spreadsheet system Functions in MS Excel a. SUM(): Calculates the total of a specified range of cells. b. AVERAGE(): Computes the average of a selected group of numbers, aiding in quick statistical analysis. c. IF(): Returns one value if a specified condition is met and another value if it is not. d. CONCATENATE(): function (or the newer CONCAT()) combines multiple text strings from different cells into one single cell. e. VLOOKUP(): enable users to search for specific data within a table. f. COUNT(): function counts the number of cells containing numeric values. g. COUNTA(): counts all non-empty cells regardless of data type. h. TODAY(): returns the current date. i. DATEDIF(): can calculate the difference between two dates, facilitating time management and scheduling tasks. j. MEDIAN(): function identifies the middle value in a dataset. k. MAX() and MIN(): functions return the highest and lowest values, respectively. Lesson 8: Advanced Presentation Skills MS PowerPoint is a presentation graphics software program designed by Microsoft, widely used to create electronic slide shows. It allows users to combine text, images, charts, graphs, animations, and videos into a cohesive visual format for effective communication. Features of MS PowerPoint a. Slide Creation. Enables users to create individual slides that serve as pages for presentations, allowing the integration of multiple media types. b. Templates and Themes. Offers pre-designed templates and themes that help standardize the look of presentations, making it easy to create visually appealing content. c. Animations and Transitions. Users can add animations to individual elements (text, images) and transition effects between slides for a dynamic presentation. d. Multimedia Integration. Users can insert images, videos, and sound clips to enhance presentations, making the content more engaging. e. Collaboration Tools. Features allow multiple users to work on a presentation simultaneously, facilitating teamwork and ease of sharing.

Use Quizgecko on...
Browser
Browser