Académique Documents
Professionnel Documents
Culture Documents
Connect - bring together or into contact so that a real or notional link is established.
It deals with the use of different communication technologies such as mobile phones, telephone,
Internet to locate, save, send and edit information
Is a study of computers as data processing tools. It introduces students to the fundamental of using
computer systems in an internet environment.
Philippines is dub as the ‘’ICT Hub of Asia” because of huge growth of ICT-related jobs, one of
which is BPO, Business Process Outsourcing, or call centers.
ICT Department in the Philippines is responsible for the planning, development and promotion of
the country’s information and communications technology (ICT) agenda in support of national
development.
Computer- an electronic device for storing and processing data, typically in binary form, according to
instructions given to it in a variable program.
Internet- is the global system of interconnected computer networks that use the internet protocol suite
(TCIP/IP) to link billions of devices worldwide.
Means of connecting a computer to any other computer anywhere in the world via dedicated
routers and servers.
Sometimes called simply ‘’the Net’’, is a worldwide system of computer networks- a network of
networks in which the users at any one computer can get information from any other computer.
An information system on the internet that allows documents to be connected to other documents
by hypertext links, enabling the user to search for information by moving from one document to
another.
Is an information space where documents and other web resources are identified by URLs,
interlinked by hypertext links, and can be accessed via the Internet.
Web Pages
Web page is a hypertext document connected to the World Wide Web. It is a document that
is suitable for the World Wide Web.
1. Web 1.0 – refers to the first stage in the World Wide Web, which was entirely made up of the Web
pages connected by hyperlinks.
2. Web 2.0 – is the evolution of Web 1.0 by adding dynamic pages. The user is able to see a website
differently than others.
– Allows users to interact with the page; instead of just reading the page, the user may be able to
comment or create user account.
– Aims to have machines (or servers) understand the user’s preferences to be able to deliver web
content.
Static Web Page- is known as a flat page or stationary age in the sense that the page is ‘’as is’’ and
cannot be manipulated by the user. The content is also the same for all users that is referred to as Web
1.0
Dynamic Web Pages- web 2.0 is the evolution of web 1.0 by adding dynamic web pages. The user is able
to see website differently than others e.g. social networking sites, wikis, video sharing sites.
FEATURES OF WEB 2.0
1. Folksonomy- allows user to categorize and classify information using freely chosen keywords e.g.
tagging by FB, Twitter, use tags that start with the sign #, referred to as hashtag.
3. User Participation- The owner of the website is not the only one who is able to put content. Others
are able to place a content of their own by means of comments, reviews and evaluation e.g. Lazada,
Amazon.
4. Long Tail- services that are offered on demand rather than on a one-time purchase. This is
synonymous to subscribing to a data plan that charges you for the amount of time you spent in the
internet.
5. Software as a services- users will be subscribe to a software only when needed rather than
purchasing them e.g. Google docs used to create and edit word processing and spread sheet.
6. Mass Participation- diverse information sharing through universal web access. Web 2.0’s content is
based on people from various cultures.
TRENDS IN ICT
1. Convergence- is the synergy of technological advancements to work on a similar goal or task. For
example, besides using your personal computer to create word documents, you can now use your
smartphone.
2. Social Media- is a website, application, or online channel that enables web users web users to create ,
co-create, discuss modify, and exchange user generated content.
Six types of Social Media:
a) Social Networks - These are sites that allows you to connect with other people with the same
interests or background. Once the user creates his/her account, he/she can set up a profile, add people,
share content, etc
b) Bookmarking Sites - Sites that allow you to store and manage links to various website and
resources. Most of the sites allow you to create a tag to others.
c) Social News – Sites that allow users to post their own news items or links to other news sources.
The users can also comment on the post and comments may also be rank.
d) Media Sharing – sites that allow you to upload and share media content like images,
music and video.
e) Microblogging - focus on short updates from the user. Those that subscribed to the user will be
able to receive these updates.
f) Blogs and Forums - allow user to post their content. Other users are able to comment
on the said topic.
MOBILE OS
· Android - an open source OS developed by Google. Being open source means mobile phone
companies use this OS for free.
· Windows phone OS - A closed source and proprietary operating system developed by Microsoft.
4. Assistive Media - is a non- profit service designed to help people who have visual and
reading impairments. A database of audio recordings is used to read to the user.
CLOUD COMPUTING
e-mail account remotely. The software and storage for your account doesn’t exist
1. Client computers – clients are the device that the end user interact with cloud.
2. Distributed Servers – Often servers are in geographically different places, but server acts as if they
are working next to each other.
3. Datacenters – It is collection of servers where application is placed and is accessed via Internet.
TYPES OF CLOUDS
PUBLIC CLOUD allows systems and services to be easily accessible to the general public. Public cloud
may be less secured because of its openness, e.g. e-mail
PRIVATE CLOUD allows systems and services to be accessible within an organization. It offers increased
security because of its private nature.
HYBRID CLOUD is a mixture of public and private cloud. However, the critical activities are performed
using private cloud while the non-critical activities are performed using public cloud.
UNIT 1 LESSON 2: ONLINE SAFETY, SECURITY AND RULES OF NETIQUETTE
INTERNET SAFETY- it refers to the online security or safety of people and their information when using
internet.
You need to remember that you are talking to a real person when you are online.
The internet brings people together who would otherwise never meet.
Remember this saying when sending an email: Would I say this to the person’s face.
Rule No. 2: Adhere to the same standards online that you follow in real life.
You need to behave the same way online that you do in real life.
You need to remember that you can get caught doing things you should not be doing online just
like you can in real life.
You are still talking to a real person with feelings even though you can’t see them.
Always take a look around when you enter a new domain when surfing the web.
Get a sense of what the discussion group is about before you join it.
Remember people have other things to do besides read your email. You are not the center of their
world.
Keep your post and emails to minimum by saying what you want to say.
Remember everyone won’t answer your questions.
Rule no. 5: Make yourself look good online.
Do not take advantage of other people just because you have more knowledge or power than
them.
Treat others as you would want them to treat you if the roles were reversed.
Internet security
· Confidentiality
Data confidentiality
Privacy
· Integrity
Data integerity / System integrity
· Availability
Threat Consequence Threat Action ( Attack)
2. Hackers - can refer to any skilled computer programmer, the term has become associated in popular
culture with a "security hacker", someone who, with their technical knowledge, uses bugs or exploits to
break into computer systems.
3. Clandestine user
Parts of Virus
1. Infection mechanism
2. Trigger
3. Payload
Virus stages
Propagation phase Virus places an identical copy of itself into other programs or into certain system
areas on the disk.
Triggering phase Virus is activated to perform the function for which it was
intended. Caused by a variety of system events
Key Terms
Cyber crime- a crime committed or assisted through the use of the Internet.
Privacy Policy/Terms of Services (ToS) - tells the user how the website will handle its data.
Virus- a malicious program designed to transfer from one computer to another in any means possible.
Worms - a malicious program designed to replicate itself and transfer from one file folder to another
and also transfer to other computers.
Trojan - a malicious program designed that is disguised as a useful program but once downloaded or
installed, leaves your PC unprotected and allows hacker to get your information.
Spyware- a program that runs in the background without you knowing it. It has the ability to monitor
what you are currently doing and typing through key logging.
Phishing - acquires sensitive personal information like passwords and credits card details.
Pharming - a more complicated way of phishing where it exploits the DNS system.
Copyright - a part of law, wherein you have the rights to work, anyone who uses it w/o your consent is
punishable by law.
Fair Use - means that an intellectual property may be used w/o consent as long as it is used in
commentaries, criticism, parodies, research and etc.
Keyloggers - used to record the keystrokes done by user. This is done to steal passwords or any other
sensitive information.
Rogue security softwares - is a form of malicious software and internet fraud that misleads users into
believing there is a virus on their computer, and manipulates them into paying money for a fake
malware removal tool.
Keyword searching
Use quotation marks to search as a phrase and keep the words linked together
Boolean
AND - enter words connect with AND- it will include sites where both words and found
Uses: join similar or synonymous topics (i.e. global warming OR greenhouse effect)
NOT - searches for the first term and excludes sites that have the second term.
Question
Features are offered on many engines by going to an "Advanced search" page and making selections.
Effective in narrowing search returns to a specific topic or phrase.
UNIT 1 Lesson 4: Developing ICT content for specific purposes)
TYPES OF PRODUCTIVITY TOOLS
WORD PROCESSING
· ADVANTAGES · DISADVANTAGES
6. Less noise
7. Add pictures
8. Make tables
9. Email documents
SPREADSHEETS
DATABASE SOFTWARE
Set-up to do lists
Manage contact lists
Act as an appointment calendar
MOBILE SOFTWARE
SUITES
MICROSOFT OFFICE
Corel WordPerfect Office
IBM Lotus SmartSuite
Apple iWork
Sun Microsystems Star Office
OpenOffice.org
UNIT 1 Lesson 5: The principles and techniques of design using online
creation tools, platforms, and applications to develop ICT content for
specific professional tracks
OPERATOR
COMMON FUNCTIONS/FORMULAS
MS WORD
UNIT 2 Lesson 6: The principles and techniques of design using online creation
tools, platforms, and applications to develop ICT content for specific
professional tracks
IMAGING & DESIGN FOR ONLINE ENVIRONMENT
PHOTO EDITING - Photo editing encompasses the processes of altering images, whether they are digital
photographs, traditional photo chemical photographs, or illustrations. Traditional analog image editing
is known as photo retouching, using tools such as an airbrush to modify photographs, or editing
illustrations with any traditional art medium.
Graphic software programs - Which can be broadly grouped into vector graphics editors, raster graphics
editors, and 3D modelers are the primary tools with which a user may manipulate, enhance, and
transform images. Many image editing programs are also used to render or create computer art from
scratch.
1. RASTER IMAGES are stored in a computer in the form of a grid of picture elements or pixels.
2. VECTOR IMAGES such as Adobe Illustrator, Inkscape and etc. are used to create and modify vector
images, which are stored as descriptions of lines, Bezier curves and text instead of pixels.
· RASTER IMAGES use many colored pixels or individual building blocks to form a complete image JPEGs,
GIFs and PNGs are common raster image types. Almost all of the photos found on the web and in print
catalogs are raster images.
· VECTOR IMAGES alternatively, allow for more flexibility. Constructed using mathematical formulas
rather than individual colored blocks, vector file types such as EPS, AI and PDF are excellent for creating
graphics that frequently require resizing.
JPEG is a commonly used method of lossy compression for digital images, particularly for those images
produced by a digital photography.
PNG (PORTABLE NETWORK GRAPHICS) is a raster graphics file format that supports lossless data
compression.
GIF a lossless format for image files that supports both animated and static images.
BMP is a raster graphics image used to store bitmap digital images
EPS used in vector-based images in Adobe Illustrator.
SVG is an XML-based vector image format for two-dimensional graphics w/ support for interactivity and
animation
3ds- is one of the file formats used by the Autodesk 3Ds Max 3D Modelling, animation and rendering
software.
fbx- is an exchange format, in particular for interoperability between Autodesk products and other
digital content creation software
SELECTION One of the prerequisites for many of the app mentioned below is a method of selecting
part(s) of an image, thus applying a change selectively without affecting the entire picture
MAGIC WAND TOOL selects objects or regions in the image defined by proximity of color or luminance
LAYERS which are analogous to sheets of transparent acetate, stacked on top of each other, each
capable of being individually positioned, altered and blended with the layers below, w/o affecting any of
the elements on the other layers.
IMAGE SIZE resize images in a process often called image scaling, making them larger, or smaller. High
image resolution cameras can produce large images which are often reduced in size for Internet use.
CROPPING creates a new image by selecting a desired rectangular portion from the image being
cropped. The unwanted part of the image is discarded. Image cropping does not reduce the resolution
of the area cropped.
CLONING uses the current brush to copy from an image or pattern. It has many uses: one of the most
important is to repair problem areas in digital photos.
IMAGE ORIENTATION - Image editors are capable of altering an image to be rotated in any direction and
to any degree. Mirror images can be created and images can be horizontally flipped or vertically flopped.
Rotated image usually require cropping afterwards, in order to remove the resulting gaps at the image
edges.
PERSPECTIVE - is the art of drawing solid objects on a two- dimensional surface so as to give the right
impression of their height, width, depth and position in relation to each other when viewed from a
particular point.
SHARPENING AND SOFTENING – Sharpening makes images clearer. Too much sharpening causes grains
on the surface of the image. Softening makes images softer that removes some of the highly visible
flaws. Too much causes the image to blur.
SATURATION- is an expression for the relative bandwidth of the visible output from a light source. As
saturation increase, colors appear more “pure.’’ As saturation decreases, colors appear more ‘’ washed-
out.’’
PHOTO MANIPULATION
Photo manipulation involves transforming or altering a photograph using various methods and
techniques to achieve desired results. Some photo manipulations are considered skillful artwork while
others are frowned upon as unethical practices, especially when used to deceive the public, such as hat
used for political propaganda , or to make a product or person look better.
DIFFERENCES
PHOTO EDITING – signifies the regular process used to enhance photos and to create them ‘’Actual
editing simple process’’. Also includes some of the regular programs used for editing and expose how to
use them.
PHOTO MANIPULATION – includes all simple editing techniques and have some manipulation techniques
like erasing, adding objects , adding some graphical effects, background correction, creating incredible
effect, change elements in an image, adding styles , eliminating blemishes from a person’s face and
changing the features of a person’s body.
· It is any graphic that display and explains information, whether that be data or words. When we
use the term ‘’infographics’’, we’re using it as a general term used to describe data presented in a visual
way.
· Infographics are important because they change the way people find and experience stories.
Infographics are being used to augment editorial content on the web, it create a new way of seeing the
world of data, and they help communicate complex ideas in a clear and beautiful way.
TYPES OF INFOGRAPHICS
1. Statistical
2. Process Flow
3. Geographic
2. Brainstorm
a) Gather ideas
b) Build thought process
3. Design
a) Choose your tool and start designing
4. Review
a) Cross check the data to deliver flawless output
5. Launch
a) Make it viral
b) Share on social network
BALANCE- The visual weight of objects, textures, colors, and space is evenly distributed on the
screen.
EMPHASIS - An area in the design that may appear different in size, texture, shape or color to
attract the viewer's attention.
MOVEMENT - Visual elements guide the viewer's eyes around the screen.
PATTERN AND REPETITION - These are the repeating visual element on an image or lay-out to
create unity in the lay-out or image.
RHYTHM - is achieved when visual elements create a sense of organized movement.
PROPORTION - Visual elements create a sense of unity where they relate well with one another.
VARIETY - This uses several design elements to draw a viewer's attention.
BLOGGING ETHICS
Online Collaboration- Simply put, online collaboration lets a group of people work together in real-time
over the internet
Web Conference- provides live audio/video communication between two or more locations to conduct
meetings, training, or presentations via the Internet.
The difference between Online Collaboration and Web conference is that Online collaboration is sharing
information to each other to come with a way to achieve the groups goal. While in Web Conference is
more like a meeting to discuss about a certain topic.
Encryption- additional layer of security that makes content unreadable for people with malicious
intent.
SSL( Secure Socket Layer )- is the standard security technology for establishing an encrypted link
between a web server and a browser.
Interactive Multimedia
Rich content in the online environment
ICT as a platform for social change came into effect in some of the following events in the Philippines:
EDSA People Power Revolution (22-25 February 1986) - The People Power Revolution lasted
from 1983 to 1986. During a radio broadcast of Radyo Veritas, Cardinal Sin encouraged the
Filipinos to help end the regime of (then) President Ferdinand Marcos. A major protest took
place along EDSA from 22-25 February 1986, involving two million Filipinos from different
sectors.
EDSA Dos (17-21 January 2001) - Also known as the 2001 EDSA Revolution, this mass protest
was fueled after 11 prosecutors of (then) President Joseph Estrada walked out of the
impeachment trial. This revolution became successful through text brigades.
Million People March (22-26 Aug 2013) - This is a series of protests that mainly took place in
Luneta Park. There were also several demonstrations that happened around key cities in the
Philippines and some overseas locations. This protest was to condemn the misuse of the Priority
Development Assistance Fund (PDAF). Though it was dubbed as the "Million People March", the
number of total attendees were only around 400,000. Social Media was used as a means of
spreading campaigns/goals intended to be achieved in this protest.
Million People March
Yolanda People Finder - A people finder database powered by Google, this was a means for people
searching for missing friends/relatives during the Typhoon Yolanda (Internationally known as Haiyan)
last November 2013.
Change.org
Change.org is dubbed as the world's platform for change where anyone from the online community can
create a petition and ask others to sign it.
Change.org's mission is to help people from around the world to create the change they want to see. For
years, Change.org hosted several petitions that help solve the following problems: economic problems,
criminal injustice,. abuse of human rights, animal rights protection, and so on.
UNIT 4 Lesson 12: ICT PROJECT FOR SOCIAL CHANGE
Five Element
1. Introduction- includes your group mission and vision and a brief introduction
of your project
2.Purpose - includes the reasons why this project is worth.
3.Description- includes all the necessary information about the project
4.Support - Contain the budget needed for the project
5.Contact information- includes information on how the group can be contacted
UNIT 4 Lesson 13: Reflecting on the nature of ICT and the manner by which
the learning process has changed your worldview
TOPIC
The nature of ICT and the manner by which the learning process has
changed your worldview