Vous êtes sur la page 1sur 3

EMPOWERMENT TECHONOLOGIES

INTRODUCTION TO ICT WEB 2.0: DYNAMIC WEB PAGE


 Evolution of Wed 1.0
INFORMATION  The user is able to see a website differently than others
 Knowledge communicated or received concerning a  Allows users to interact with the page
particular fact or circumstance  Can make comments and create an account
 “Fragmented Future” Darcy DiNucci, 1999
COMMUNICATION  Social Networking Sites:
 The act or process of using words, sounds, signs or - Blogs
behaviors - Wikis
- Video sharing sites
- Hosted services
TECHNOLOGY
 Methods, systems and devices which are the result of
scientific knowledge being used for practical purposes WEB 2.0: KEY FEATURES
 Folksonomy – allows the user to categorize and
classify/arrange information using freely chosen keyboards
INFORMATION & COMMUNICATION TECHNOLOGY
 Rich User Experience – content is dynamic and is
(ICT)
responsive to user’s input
 The use of different communication technologies such as
 User Participation – the owner of the website is not only
phones, telephones & internet to locate, save, send & edit
the one who is able to put content
information
 Longtail – services that are offered/demand rather than on
a one-time purchase
ICT IN THE PHILIPPINES  Software as a Service – users will subscribe to a software
 “ICT Hub of Asia” only when needed rather than purchasing them
 Huge growth of ICT-related jobs around the country, one of  Mass Participation – diverse information staring through
which is called the call center or BPO (Business Process universal web access
Outsourcing) centers.
WEB 3.0
WORLD WIDE WEB (WWW)  Semantic Web
 Collection of public websites connected to the internet  World Wide Web Consortium (W3C) – the semantic web
worldwide provides a common framework that allows data to be
shared & reused across application, enterprise, etc.
TIM BERNERS-LEE  PROBLEMS:
 Timothy John Berners-Lee - COMPATIBILITY - HTML Files & current web
 Created HTML & WWW browsers could not support Web 3.0
- SECURITY - The user’s security is also in question
HTML since the machine is saving his/her preferences
 Hypertext Markup Language - VASTNESS - The WWW already contains billions
of web pages
HTTP - VAUGNESS - Certain words are imprecise
- LOGIC - These are certain limitations for a
 Hypertext Transfer Protocol
computer to be able to predict what the user is
 Set up rules for transferring files
referring to a given time

WEB 1.0 TRENDS IN ICT


 Static – flat page or stationary pages
1. Convergence – technological convergence is the synergy
of technological achievements to work on a similar goal or
 Milestones: task
- Invention of HTML, CSS & Javascript
2. Social Media – a website that enables web users to
- Invention of Java & Flash
create, co-create, discuss, modify & exchange user-
- Multimedia via <img> & <iframe> tags
generated content

3. Mobile Technologies – smartphones and tablets


- iOS – used in Apple devices b) Worm – malicious program that transfers from
- Android – open source operating system one computer to another by any type of means.
developed by Google c) Trojan – malicious program disguised as a useful
- Blackberry OS – used in Blackberry devices program
- Windows Phone OS – closed source and - Rogue security software – tricks the
proprietary operating system developed by user into posing that it is a security
Microsoft software.
- Symbian – original smartphone OS; used by d) Spyware – program that runs in the background
Nokia without you knowing it
- WebOS – originally for smartphones; now used - Keyloggers – used to record the
for smart TV’s keystroke done by the users.
- Windows Mobile – developed by Microsoft for e) Adware – program designed to send you
smartphones and tablets advertisements

4. Assistive Media – nonprofit service designed to help 2. Spam – unwanted email mostly from bots and
people who have visual & reading impairments. A advertisers
database of audio recordings is used to read the user.
3. Phishing – its goal is to acquire sensitive personal
TYPES OF SOCIAL MEDIA information like passwords and credit card details. This is
done by sending an email that will direct the user to visit a
 Social Network – sites that allow you to connect with website
people with same interest (Ex. Facebook)
 Social News – sites that allows users to post their own - Pharming – it exploits the DNS
news (Ex. Reddit and Digg) (Domain Name Service) system
 Bookmarking Sites – sites that allow you to store &
ADVANCED WORD PROCESSING SKILLS
manage links to various websites (Ex. Pinterest)
 Media Sharing – sites that allow you to upload & share MAIL MERGE AND LABEL GENERATION
media content like images, music & video
(Ex. Youtube, Instagram & Flicker) MAIL MERGE
 Microblogging – sites that focus on short updates from the
user. (Ex. Twitter & Pkurk)  Create documents and combine or merge them
 Blogs & Forums – sites that allow you to post their  Commonly used when sending out advertising materials to
content. Other users are able to comment on the said various recipients
topic. (Ex. Tumblr, WordPress, Blogger)  Two Components of Mail Merge
1. Form Document
RULES OF NETIQUETTE - Contains the body of the message
- The main body of the message is the part of the
 Internet – information superhighway form document that remains the same no
 Intellectual property - If you create something, you have matter whom you send it to
the right as to how it should be used by others. - Place Holders
 Fair Use – an intellectual property may be used without - Data fields or merge fields
consent as long as it is used in commentaries, criticisms, - Marks the position on your form
search engines, etc. document where individual data or
 Cybercrime – crime committed through the use of internet information will be inserted
 Privacy Policy – tells the used how the website handle its 2. List or Data File
data - Two essential components of creating a merged
 Copyright – part of the law; those who use your work document are present: the form document and
without your consent is punishable by law the data file

INRERNET THREATS INTEGRATING IMAGES AND EXTERNAL MATERIALS


1. Malware – malicious software KINDS OF MATERIALS
a) Virus – malicious program designed to replicate 1. Pictures – electronic or digital pictures or photographs you
itself and transfer from one computer to another have saved in your device
1. JPG. (Joint Photographic Experts Group)
- “Jay-peg” POWERPOINT
- Can support 16.7 million colors
- Does not support transparency  Created by Robert Gaskins and Dennis Austin
- Work well on lettering, line drawings, or simple  Provide visuals for group presentation
graphics
TIPS IN CREATING AN EFECTIVE PRESENTAITON
- Relatively small in file size
2. .GIF (Graphic Interchange Format) 1. MINIMIZE – keep slide counts to a minimum to maintain a
- Capable of displaying transparencies clear message and to keep the audience
- Good for blending with other materials or 2. Clarity – avoid being fancy by using a font style that is east
elements in your document to read.
- Also capable of displaying simple animations 3. Simplicity – use bullets or short sentences.
- May not be too useful on a printed document 4. Visuals – use graphics to help ion your presentation but
not too many to distract the audience.
- Can only support up to 256 colors
5. Consistency – make your design uniform. avoid having
- Much better for logos, drawings, etc.
different font styles and backgrounds
3. .PNG (Portable Network Graphics) 6. Contrast – use light font or dark background or vice versa.
- “ping” this is done so that it is easier to read. in most instances, it
- Developed basically for the purpose of is easier to read on screen if the background is dark
transporting images on the internet at faster
rates USING HYPERLINKS IN MICROSOFT POWERPOINT
- Good with transparencies
1. Select an object or highlight a text
- Does not support animation
2. Place in this document
- Can display up to 16 million colors 3. Create new document
- Allows the control of the transparency level or 4. Email address
capacity of images 5. When done, click OK
2. Clip Art – generally a .GIF type
3. Shapes – printable objects or materials that you can EMBEDDING OBJECTS IN MICROSOFT POWERPOINT
integrate in your document to enhance its appearance
1. Go to the insert tab
4. Smart Art – sets of different shapes grouped together to
2. On the text group, click on object
form ideas 3. The insert object dialog box would appear
5. Chart - allow you to represent data characteristics and
trends; suited for preparing reports
6. Screenshot – more realistic image of what you are
discussing on your report or manual.

IMAGE PLACEMENT

TEXT WRAPPING

1. In Line with Text – usually used when you need to place


your image at the beginning of a paragraph.
2. Square – placed anywhere within the paragraph with the
text going around the image in a square pattern
3. Tight – the text “hugs” or conforms to the general shape
of the image
4. Through – allows the text on your document to flow even
tighter, taking the contours and shape of the image
5. Top and Bottom – pushes the text away vertically to the
top and bottom
6. Behind Text – can be dragged and placed anywhere on
your document; background
7. In Front of Text – Allows your image to be placed right on
top of the text; the text will be covered by the image

Vous aimerez peut-être aussi