Q1-EMTECH-REVIEWER-fftza.pdf

Full Transcript

Q1 EMTECH REVIEWER | FFTZA 11 INTRODUCTION TO ICT Folksonomy - allows users to classify information using 2. Social media - computer mediated tools/websites that Data - raw inputs transcribed to information...

Q1 EMTECH REVIEWER | FFTZA 11 INTRODUCTION TO ICT Folksonomy - allows users to classify information using 2. Social media - computer mediated tools/websites that Data - raw inputs transcribed to information freely chosen keywords (use of #) enables web users to create, discuss, modify, and Information - knowledge obtained from investigation, Long Tail - services that are offered on demand rather exchange information study, or instruction than on a one-time purchase (time-based pricing is a. Social networks - site to connect with other people Communication - imparting or exchanging of better than file size-based pricing) (FB, Google+) information or news Web 3.0 - semantic web, focused on using machine-based b. Bookmarking sites - to store and manage links to Technology - machinery or equipment developed from understanding of data various websites and sources (Pinterest) the application of scientific knowledge (digital devices) Problems: Compatibility, Security, Vastness, Vagueness, Logic c. Social news - allows users to post their own news items (Reddit, Digg) ICT - provides access to information through telecommunication TECHNOLOGY TOOLS d. Media sharing - allows users to upload and share that deals with the use of different communication technologies Google Glass media content like images (YouTube, Instagram) to locate, send, and edit information. It is an extended form of IT e. Microblogging - focus on short updates from the or Information Technology. user (Twitter) iPhone watch f. Blogs and forums - allows users to post their *Abacus - first computing or calculating device, not a computer content (WordPress, Blogging) *Charles Babbage - father of computer *Douglas Engelbart - developed the first model of mouse using *Marc Zuckerberg - Facebook (2014), Instagram ($1B in 2014), wheels and woods Fitbit Charge 2 WhatsApp [Meta platform] *IBM (International Business Machines Corporations) - world’s *First YouTuber: Jawed Karim -> “Me at the Zoo” -> 04/23/05 largest IT company *Jack Dorsey sell Twitter to Elon Musk ($44B) in 10/2022 *China has Weibo not Facebook WORLD WIDE WEB VR Headset - system that enable you to access hypertext documents and 3. Mobile technologies - portable two-way other files over the internet communication devices and computing devices like - by Timothy John Berners Lee 1989 computer capabilities and the network technology that Microsoft HoloLens connects them with the use of mobile phones Web 1.0 - static web pages, cannot be manipulated by user Different Mobile Operating Systems (OS): Web 2.0 - dynamic web page, user can manipulate the website IOS Features of Web 2.0: SMURF L 3D Printer Software as a service - allows you to “rent” a software for a minimal fee Android Mass Participation - universal web access diverse information through web sharing User Participation - owner of website is not the only Blackberry OS TRENDS IN ICT (high-end) one to put the content 1. Convergence - synergy of technological advancements Rich User Experience - content is responsive to the to work on a similar goal or task (*we learn from the user’s input past technologies to be able to innovate in the present) By: fftza By: fftza By: fftza Q1 EMTECH REVIEWER | FFTZA 11 Symbian (Nokia) 6. Mother and father - risky, especially the (torrents) as the download is most likely not monitored mother’s maiden name by the site owner 7. Siblings - strangers may pretend or 14. Buy the software; do not use pirated ones use their identity to dupe you 15. Do not reply or click links from suspicious emails 8. Address - it will be easier 9. Home Phone - scams use this information *YAHOO - Yet Another Hierarchical Officious Oracle WebOS (Smart TVs) number to deceive you *VIRUS - Vital Information Resource Under Siege 10. Birthday - puts you at a greater risk of *QR Code - Quick Response Code identity theft *”config” - for your laptop to open fast and smooth *Internet is defined as an “Information Superhighway”, all information Windows Mobile *CVC - Card Verification Code can be accessed *OTP - One Time Password Tips to Stay Safe Online *SMS - Short Message Service 1. Be mindful of what you share online and what site you share it to “ILOVEYOU Virus” 4. Assistive media - designed to help people who have 2. Do not just accept terms and conditions; read it o Also known as the “Love Bug” or “Love Letter” virus, visual and reading impairments 3. Checkout the privacy policy page of a website to learn was a computer worm that spread rapidly in May 2000. 5. Cloud computing - on-demand availability of computer It was one of the most damaging malware events in how the website handles the information you share systems’ resources services especially data storage history, originating from the Philippines 4. Know the security features of the social networking site (cloud storage) you use. By keeping your profile private, search engines o This was created by a Filipino computer science student, will not be able to scan your profile Onel De Guzman, as part of a school project which was ONLINE SAFETY, SECURITY, AND RULES OF NETIQUETTE 5. Do not share your password with anyone later used maliciously. Internet safety 6. Avoid logging into public networks/Wi-Fi. Browsing in o It spread via email with the subject line “ILOVEYOU” and - online safety of people and their information when using the “incognito (or private) mode”, a feature of the browser, an attachment named “LOVE-LETTER-FOR-YOU.TXT.vbs”. internet will not protect you from hackers o It infected over 10 million computers worldwide, - act of maximizing user’s awareness of personal safety causing an estimated $10B in damages by disrupting 7. Do not talk to strangers whether online or face-to-face Type of Information Risks 8. Never post anything about a future vacation. It is similar systems in corporations, governments, and individuals. 1. First name - risk of sharing may result to to posting “rob my house at this date” o Major institutions, including the Pentagon and British 2. Last name a hacker or identity theft Parliament, were affected. 9. Add friends you know in real life 3. Middle name - you are vulnerable to being o At the time, there were no laws in the Philippines 10. Avoid using untrusted websites searched in search engines covering computer crimes. This led to the difficulty in 11. Install and update an antivirus software on your with image search prosecuting him, which eventually prompted the 4. Current and - they can use this computer. Use only one anti-virus software to avoid Philippine government to pass legislation to address previous schools information for verification conflicts cybercrimes. process for those who steal 12. If you have a Wi-fi at home, make it a private network by adding a password o Life after the incident: He lived a more reclusive life, identities 13. Avoid downloading anything from untrusted websites. working in low-profile jobs, including running a 5. Phone number - it should never be posted on You are most vulnerable in peer-to-peer downloads cellphone repair shop in Quiapo, Manila. internet By: fftza By: fftza By: fftza Q1 EMTECH REVIEWER | FFTZA 11 Netiquette *Keyloggers - used to record the keystroke done by - placeholders also referred to as data files or merge - short for “Internet Etiquette” user. This is done to steal their password or any other fields. This marks the position on your formed - refers to the rules of online courtesy, proper manners, and sensitive information. It can record email, messages, or document where individual data or information will be behavior online any other personal information inserted 10 Rules of Netiquette: e. Adware - designed to send you ads, mostly as pop-ups - marked by double-headed arrows () on each side 1. Remember you’re talking always to humans even if Spam 2. List of Data File you’re online - unwanted email mostly from bots or ads, it can be used to send - this is where the individual information or data that 2. Adhere to the same standards online that you follow in malware needs to be plugged in (merged) to the form document real life Phishing is placed and maintained 3. Know where you are in cyberspace - acquires sensitive personal information like passwords and 4. Respect another people’s time and bandwidth credit card details. This is done by sending you an email that will Steps in creating a simple mail merge 5. Make yourself look good online direct the user to visit a website and be asked to update his/her 1. Open an existing document or create a new one. From 6. Share expert knowledge username, password, credit card or personal information the Mailings tab, click the Start Mail Merge and select 7. Help keep flame wars under control *Pharming - more complicated way of phishing where it exploits Step by Step Mail Merge Wizard. Choose the type of 8. Respect other people’s privacy the DNS (Domain Name Service) System document you want to create in the Mail Merge tab 9. Don’t abuse your power Identity Theft - criminals impersonate individuals usually for 2. Select Use the current document, then click Next: Select 10. Be forgiving on other people’s mistakes financial gain. Poser acting like real owner of the account recipients Hacking - to gain access to security password used to see data 3. Address list is needed so Word can automatically place Internet Threats: stored and steal important information each new address into the document. You can use an Malware - malicious software Cyberbullying - form of bullying that involves behavior or acts by existing file or you can type a new address list. Locate a. Virus the use of technology and open your file. If the address list is in an Excel - computer program designed to replicate itself and Workbook, select the worksheet that contains the list. transfer one computer to another by local networks or MAIL MERGE (ung kay ma’am) In the Mail Merge Recipients dialog box, you can control data storage - this feature allows you to create documents and merge them which recipients are included in the merge. From the b. Worm with another document or data file Mail Merge Task Pane, click Next: Write your letter - computer program that transfers from one computer - it is commonly used when sending out advertising materials to 4. We’ll need to add placeholders for the recipient data so to another by any type of means various recipients Mail Merge knows exactly where to add the data. - often uses a computer network to spread itself Label Generation Place the insertion point in the document where you - ex: ILOVEYOU worm (Love Bug Worm) - creates blank form that stimulates either a blank label or want the information to appear. Choose one of the four c. Trojan envelope of predefined size and will use the data file that you options in the Mail Merge tab. A dialog box will appear - disguised as a useful program but once downloaded or select to print the information depending on your selection. A placeholder will appear installed, it leaves your PC unprotected and allows - you don’t have to type or create the form document yourself in your document. When you need to enter information hackers to get your information because it’s already pre-formatted in MS Word from your data record you need to repeat this steps. d. Spyware When you’re done, click Next: Preview your letters - runs in the background without you knowing it (spy) Two components of mail merge: 5. After checking the letters, click Next: Complete the - it can monitor what you are currently doing and typing 1. Form Document merge through keylogging - contains the main body of message 6. Click Print and select all. The print dialog box will appear and you can adjust the settings needed By: fftza By: fftza By: fftza Q1 EMTECH REVIEWER | FFTZA 11 Parts of a Letter Styles *types of style in letter LETTER HEADING FULL BLOCK STYLE Located in the upper left/right corner of the page, it introduces you The standard for official business to the recipient and provided key details [your name, address, phone letters, with no paragraph number, email, date] indentions, left-aligned send and DATE recipient addresses, and Indicates the date the letter was written or sent INSIDE ADDRESS skipping a line to indicate a new Includes the recipient’s information, starting with their name, job paragraph title, and complete address BLOCK STYLE SALUTATION No indentions, less formal and The words used at the beginning of a letter or speech [to whom it ideal for writing a letter to may concern, dear…] someone you work with MAIL MERGE (group1) BODY Parts Of MS Word Start with a brief introduction of the letter’s purpose. Provide details QUICK ACCESS TOOLBAR with a direct, polite tone, separating paragraphs with spaces. End - located directly above the with a two-sentence summary and thank the recipient, ensuring the SEMI-BLOCK STYLE File Tab in the upper left closing matches the letter’s tone. COMPLIMENTARY CLOSE Has an identical format as full corner of the screen. The location of frequently used Conclude your business letter with a professional closing like block but with indented commands "Sincerely," or "Best regards," paragraphs by 5 spaces. This is TITLE BAR suitable for formal letters and It shows the name of the Parts of Mail Merge those with a single line between application or document STARTING DOCUMENT paragraphs positioned at the top and Contains the field names for the variable information [name and middle of document address] INTEGRATING IMAGES AND EXTERNAL MATERIAL IN WORD window RECIPIENT LIST / DATA SOURCE PROCESSORS (group2) RULERS Contains information for mail merge (names and address) Horizontal: tab stops and - the creation, editing, formatting, storage, and output of both FIELD margins Data category that stores a specific piece of information printed and online or electronic documents Vertical: measuring an RECORD - can be used to create multiple types of files [text files (.txt), rich object’s vertical location Comprehensive set of data fields pertaining to a single entity (name, text files (.rtf), html files (.htm or.html), word files (.doc or VIEW BUTTONS address, phone no., birthdate).docx), xml files (.xml)] Read mode, print layout, MERGE FIELD web layout - most used business application Inserts data from data source into a main document surrounded by RIBBON TAB examples of wp: chevrons () All the commands you’ll ADDRESS BLOCK Abiword, Apple, iWork, Apple textEdit, Corel, WordPerfect, need to complete Consists of name, street address, city, state, zip code Google Docs, LibreOffice: Writer, MS Word, MS Works, GREETING LINE OpenOffice: Writer, Sun StarOffice Word automatically inserts the greeting text, title, and name fields in the greeting line of a mail merge document Kinds of Materials: HEADER ROW 1. Pictures - electronic or digital pictures, images, A table stores data source information, with the header row containing field names [FirstName, LastName, and Address] photographs such as logos and scanned pictures By: fftza By: fftza By: fftza Q1 EMTECH REVIEWER | FFTZA 11 ▪.jpeg /.jpg (Joint Photographic Experts Group) - graphically represent organization, process, Parts of MS Excel - identifies the kind of data compression that it relationships or flow uses to make it more compatible and portable 5. Chart through the internet - presents data characteristics and trends - can support 16.7 million colors, but does not - useful in reports that correlate and present data in a support transparency. graphical manner - doesn’t work well on lettering, line drawings 6. Screenshot and simple graphics since they are relatively - much more realistic image of what you are discussing small in file size. in your report ▪.png (Portable Network Graphics) : snipping tool WINDOWS+SHIFT+S - transfers images on internet at much faster : whole screen WINDOWS+PRTSC rates - can display up to 16 million colors Image placement: In Line with text, Square, Tight, Through, Top - good transparencies but doesn’t support and Bottom, Behind Text animation Applications: images are widely used in WP to enhance clarity - allows the control of transparency level or and effectiveness of document content opacity of images ▪.gif (Graphics Interchange Format) CREATING ADVANCED AND COMPLEX FORMULA IN MS EXCEL WORKBOOK - entire file we see when we open Excel - blends and displays simple animation but is (group3) WORKSHEET - a single sheet in a workbook not too useful on printed documents *Developed by MS Corporation QUICK ACCESS TOOLBAR - can support 256 colors only *Key founders: Doug Klunder, Charles Simonyi, Bill Gates, Jabe You can use this area to add commands that are related to - useful in sending documents electronically Blumenthal excel to your program - better for logos, drawings, small text, B&W *First release: 1985 (Mac) 1987 (Windows) TITLE BAR images and art decors with generally solid *Created in US It displays the active document’s name, located at the top- center of the window colors *Purpose: spreadsheet software for organizing, analyzing, and TOOLBAR / RIBBON 2. Clip Art visualizing data using rows, columns, and formulas Each menu bar contains several commands - generally in.gif file format - performs calculations using predefined formulas by specific SHEET TABS - line art drawing of images used as generic values called “arguments” in a particular order called “syntax” used for displaying the worksheet that is being edited by the representations for ideas and objects you want to user in real time integrate in your document Uses of MS Excel MENU BAR 3. Shapes o Financial Analysis Includes the group of related commands - printable objects or materials that you can integrate in o Data Management NAME BOX your document, enhance appearance of your document o Project Management Used to give a name to a table or cell - useful for layouts in graphics or posters o Inventory Management FORMULA BAR 4. Smart Art o Data Analysis To enter your formula and it can be found on the top of your - predefined sets of different shapes grouped together o Reporting spreadsheet that are organizational or structural in nature o Personal use COLUMN AND ROW HEADINGS By: fftza By: fftza By: fftza Q1 EMTECH REVIEWER | FFTZA 11 NAVIGATION BUTTONS MULTIPLICATION - Select an empty cell where you o table_array: the table or range of cells where you want Helps users to comprehend the layout of workbook easily, as want the result to perform the lookup. The first column of this range well as to navigate directly with elements - Type = then select the cell you should contain the values you're searching for want to multiply, * then select CELLS o col_index_num: the column number in the table from another cell - the boxes that you see in the grid; the intersection of a row which you want to retrieve the corresponding value. For DIVISION - Select an empty cell where you and column where data is entered and displayed want the result example, if the value you're looking for is in the first - 1048576 rows and 16384 columns, a total of 17,179,869,184 - Type = then select the cell you column of the table_array and you want to return a cells want to divide, + then select value from the third column, you would specify 3 WORKSHEET WINDOW another cell EXPONENT - Select an empty cell where you o [range_lookup] - an optional argument specifying Includes commands to display, edit, encode, and save data want the result whether you want an exact (0 or FALSE) or approximate - Type = then select the cell you as match (1 or TRUE) Formulas - help in operating calculations on values easier and your base number quicker - type ^ (caret) then select another MATCH function cell as your exponent - to return the number of the row or column where the input AVERAGE - highlight the range of cells you AUTOSUM - pick an empty cell for the total built-in tool in Excel that want to average helps in adding ranges of cells - press ALT + =, hit enter information is found. The MATCH function used within the calculates the sum of all the - enter formula automatically - enter formula VLOOKUP formula gives it a name of the column to search rather numbers in a specified range, =AVERAGE(number1,number2…) =SUM(number1, number2…) than just a fixed number of the column to search. This helps and the sum is divided by the -press enter, get the average create a function that is more flexible. When VLOOKUP and total count of those numbers ex. =AVERAGE(A1:A10) Shorthand Commands MATCH are used together, the function becomes known as a COUNTIF - select cell where you want the CTRL+E: automatically perceive patterns in adjacent columns and dynamic function. used to count cells that meet result a specific condition - enter formula fill the current column *range - choose cells to =COUNTIF(range,criteria) CTRL+K: displays the insert hyperlink dialog box for new Steps for VLOOKUP evaluate - press enter, get the count hyperlinks or the edit hyperlink dialog box for selected existing Organize the data *criteria - what you want to ex. =COUNTIF(A1:A10,”city”) hyperlinks count CTRL+Q: displays the Quick Analysis options for your data when SUMIF - select cell where you want the Adds up values in a range result you have cells that contain that data selected within certain conditions or - enter formula criteria =SUMIF(range,criteria,[sum_range]) VLOOKUP AND OTHER SHORT COMMANDS (group4) - press enter, get the sum based on - searches for the value in the first column of a range (table or Type what to look the criteria for array) and returns a corresponding value in the same row from a ADDITION - Select an empty cell where you want the result specified column - Type = then select the cell you - The "V" in VLOOKUP stands for "Vertical," indicating that it want to add, + then select another searches vertically (downward) in a table cell SUBTRACTION - Select an empty cell where you Syntax: VLOOKUP(lookup_value, table_array, col_index_num, want the result - Type = then select the cell you [range_lookup]) want to subtract, - then select o lookup_value: the value you want to search for in the another cell first column of the table By: fftza By: fftza By: fftza Q1 EMTECH REVIEWER | FFTZA 11 Select the table 1. Insert the airplane image and remove the bg at the 4. Notice that the text has color and underline. You may where the data is format tab continue to do this in other slides to put connection located (ex. highlight 2. Define point a, go to autoshape menu and pick up a on each slide the whole table from circle, let this be a point a at PH 5. F5 to preview A-C, excel will look for the info we want to 3. Define path to point b, go to autoshapes menu and look for pick a line connecting PH and China, make the line Select which column thicker by changing its shape outline BASIC PRINCIPLES OF GRAPHICS AND LAYOUT contains the data that 4. Define point b, go to autoshapes menu and pick up a Graphics - visual images, pictorial representation of data we want to have as circle, let this be point b at China Layout - process of planning and arranging graphics an output from 5. Place the airplane at point a, open animation pane to VLOOKUP. Type the manage your animations. Now, select the airplane, number that Elements of Graphic Design click add animation and go to more motion paths corresponds to the 1. Balance - can be symmetrical or asymmetrical; visual column number in 6. Under lines and curves, choose left. Move the weight of objects, texture, colors, space that table endpoint of the animation at point b. F5 to preview 2. Emphasis - area in design that may appear different in Choose if you want Enter FALSE or 0 or TRUE or 1 7. For the plane to go back from point a, add a new airplane. Add a disappear animation for airplane 1 and size, texture, shape, color that attracts the viewer’s an exact or add an appear animation for airplane b. Add another attention approximate match motion path for it to go back to PH 3. Movement - visual elements that guide the viewer’s ayes around the screen Motion Path - lets you animate objects moving along curves and 4. Consistency - pattern, repetition, rhythm CUSTOM ANIMATION AND TRANSITION (group5) complex shapes. Similarly to lines drawn with the pen tool, you 5. Proportion - refers to relative size and scale of various - set of effects applied to objects in PowerPoint so that they will define motion paths by setting anchor points which are then elements in design animate in the Slide Show PowerPoint connected by straight or curved lines 6. Unity - distance and closeness between elements that -can be added under the custom animation function 1. Create a new slide shows connection 2. Insert plane image 7. Variety - uses several design elements Animation triggers 3. Define the path from point a and point b - allows animators to apply effects that can be triggered when a 4. Apply animation Principles of Visual Message Design using Infographics specific object on Slide Show is clicked o Information Graphics - basis for the majority of PowerPoint games which involves Hyperlink - allows users to advance from one slide to another - graphical representation of information, data, or clicking objects to advance slide in the presentation when they click on a predetermined knowledge intended to present information word, shape, or image Sample animation: 1. First insert an object/text that will trigger the Characteristics of Infographic hyperlink, in this case, we will use a text Unique, Creative, Informative/Persuasive, Attractive, 2. Select the text, and under the insert tab, select Simple/Concise hyperlink under links group or you can use the shortcut key ctrl + k What can you use to make Infographics? 3. The insert hyperlink dialogue box will appear, and a. Canva, Venngage, Visme, Piktochart - web-based select the place in this document. Choose which application, has a set of pre-made templates or from among the slides will the hyperlink be directed. scratch By: fftza By: fftza By: fftza Q1 EMTECH REVIEWER | FFTZA 11 When should you use Infographics? a. Display survey data b. Concept - show comparisons Online file formats: *Edit Photos - store images as collection of pixels *Create digital paintings (Vector graphics) Common types of Vector file formats >Drawing Interchange Format (DXF) - used in computer-aided design software >Encapsulated Post Script (EPS) - used in desktop publishing software programs >Shapefile (SHP) - uses vector coordinates to store non- topological geometry and attribute information for features Common types of text file formats >Document file (doc/docx) - easily edited >Text file (txt) - commonly used by programmers >Portable Document Format (pdf) >HTML (htm/html) Combining text and graphics >Text overlaid on an image >Text wrapped around image >Text and images intersect >Text and images aligned UPLOADING, SHARING, AND IMAGE HOSTING PLATFORMS *Uploading - transmission of a file from the user’s computer to another *Sharing - allowing data to be accessed by other users *Downloading - from internet source to the user’s computer *Image Hosting - creating albums and slideshows, ability to add notes, edit images By: fftza By: fftza By: fftza

Use Quizgecko on...
Browser
Browser