interaction. WEB 2.0- 2004 read and write social Evolution of communication – improve and evolved to facilitate daily activities. media and web dynamics. 21st century utilizes technology. WEB 3.0- read write execute web, work ICT – Information Communication being done by engine, google chrome, Lazada, shopee. Technology INFORMATION – Reading books, WEB 4.0- depending on context, facts as is (raw data). 6 TYPES OF SOCIAL MEDIA COMMUNICATION – Sharing with a. Social networks friends, process elements involved. b. Bookmarking sites TECHNOLOGY- Email findings, assist c. Social news human beings. Tools – overcome d. Media sharing environmental hazard. e. Micro blogging ICT- acquisition, analysis, manipulation f. Blogs and forum storage and distribution of information, provision of equipment. KINDS OF OPERATING SYSTEM GOAL OF COMMUNICATION = a. Ios COMMON UNDERSTANDING b. Android c. Blackberry os Philippines “ICT HUB OF ASIA” because d. Windows phone of many BPO (Business Process Outsourcing). e. Symbian f. Web os WORLD WIDE WEB – information space g. Windows identified by UNIFOMR RESOURCE LOCATOR accessed by internet invented by TIM BERNERS-LEE. FEATURES OF WEB 2.0 technological advancements to 1. Folksonomy – users to classify and work on similar goal. 2. Social media – website, app or arrange information using freely online channer that enables web chosen keyword like hashtag. 2. Rich user experience – content is users to create, discuss and modify. dynamic and responsive to user’s 3. Mobile technologies- popularity of input, example when logged on your account is used to modify smartphones and tablets major rise over years because of device what you see in their website. 3. Long tail – demand on a one time capability. 4. Assistive media – non-profit purchase. Time based pricing is service designed to help people better than file size based pricing. Subscribing to a data plan that who have visuals and reading impairments. Audio recordings. charges you for the amount of time. 4. User participation- owner of ONLINE PLATFORMS IN ICT website is not the only one who is able to put content. Some - Easier for users to interact, to websites allow readers to collect, and use the data from comment on an article or poll. user’s interaction for their 5. Software as a service- subscribe to particular needs. a software only when needed 1. Social Media – collection of rather than purchasing them. internet based communication Example is word processor. tools and computer. 6. Mass Participation – diverse 2. Search Engines – software system information sharing through that is designed to search for universal web access. information in WWW. 3. Communication Services – TRENDS IN ICT outsourced enterprises 1. Convergence – Technological communications solutions that convergence is a synergy of can be leased from single vendor or provider. (Communication Online Etiquette- correct or acceptable Service Provider is provider that way of communicating on the internet. transports information DANGER IN THE INTERNET electronically.) TOP 10 SEARCH ENGINES Email Spam (Junk Mail) – unsolicited Google commercial. Bing Email Spoofing- changing the email Yahoo header to disguise the true source. Ask.com Phishing- trying to get confidential AOL.com information. Baidu Wolframalpha Spyware- a computer program that is DuckDuckGo installed covertly on personal computer Internet Archive to collect information. ChaCha.com Malware – malicious 4. Payment Systems – system used program/software. to settle financial transactions through transfer of monetary 1. VIRUS -replicate itself transfer to value. computer to one another. 5. Advertising platforms – allows 2. WORM- transfers from one users to create and manage computer to another by any type advertising campaigns, generate of means. reports and retrieve information. 3. TROJAN- disguised as a useful 6. Creative content outlets – need to program but once downloaded or be transferred creatively. installed, leaves your PC unprotected and allows hacker to Online Safety- knowledge of maximizing get you information the user’s personal safety. 4. ADWARE- send you Online Security- extensive term advertisements, mostly as pop- encompassing a series of steps that ups. companies. 5. SPYWARE-a program that runs in IMAGE PLACEMENT – inserting an the background without you image or any other material in your knowing it. document is quite easy specially if the material already exist in your MAIL MERGE – adding personalized information into letters and envelopes storage. while they are being distributed and is IN LINE WITH TEXT- done through a data base. LABEL GENERATION – MS word is able to print out whatever your default setting for requirements you have for the label it images that inserted. Text font with may be tons of label. bottom side totally aligned with the 1. Form Document – First text line. component of our mail merge SQUARE document , document that allows image you inserted to be contains the main body of the placed within the message we want to convey or paragraph send. with text going 2. List or Data file – where the around the image individual information or data in square pattern like frame. needs to be plugged in to the form document is place and TIGHT maintain. Same as square Integrating Images and External but here the text Materials hugs or conforms the general Inserting pictures or integrating is shape of image. Get more creative fun and improves the impression of effect on your document. your document. THROUGH MAIL MERGE Text on your document to flow even - ADDRESS BLOCK tighter taking the - GREETING LINE contours and shape of the image.
TOP AND BOTTOM HEADER/ LETTER HEAD
Pushes the text away vertically the INSIDE ADDRESS
top and bottom of the image so the (Receiver)
DATE
SALUTATION (Mr. and ms.)
image occupies the whole text line on its own. BODY BEHIND TEXT Allow image to be fragged and COMPLIMENTARY CLOSING placed anywhere but with all the text SIGNATURE LINE floating in front of it like background.
IN FRONT OF TEXT MAM TASHA REVIEWER
settings allow images to be placed ICT- is un umbrella term used to right on top of the t text you placed. describe theoretical and practical aspects of equipment and software. HYPERTEXT TRANSFER PROTOCOL – Which of the following is an application protocol in hypermedia information systems that send request to web servers for web elements such as web wants to start website what is needer pages and images. him to start. CLOUD COMPUTING – Components of WEB BROWSER -used to view html ICT does most of the companies offer documents. with computing services and typically URL – You have been in a site that you charges for cloud computing services have found out beneficial from you and based on usage. you copied. What is technical terms for ADSPACE- Getting some money on the that address that you have copied? internet. LAPTOP- what piece of technology SEARCH ENGINES – Online platforms allows marco and his classmates to searching information. interact with information on a touchscreen projector. 2006 – second wave of web page evolution developed dynamic pages that enabled people all over to start =SUM(C1:c5.25”) – The correct syntax if interacting with each other via social you will find the sum of numbers that is media. greater than 25? WEB BROWSER – program used to view html document , can display web page. CTRL + P = Print SEARCH ENGINES – software system designed to search for information on CTRL + C = Copy WWW. CTRL + Z = redo ONLINE PLATFORMS – developed with the use of internet technology for the Katkat installs midi viodeoke design and development of teaching application in computer but the and learning process problem is can’t erase the application. FREE HOST, DOMAIN NAME, TROJAN HORSE – TRAITOR – pretends ADVERTISING COMPANY – Michael to be useful. Jhepoy receives message from BPI to give again the account and password. DUPLICATING FILES OR COMPUTER WORM ALAN SCHAAF – founded the online image sharing community.