Vous êtes sur la page 1sur 7

EMTECH WEB 1.

0 – read only web static, no


interaction.
WEB 2.0- 2004 read and write social
Evolution of communication – improve
and evolved to facilitate daily activities. media and web dynamics.
21st century utilizes technology. WEB 3.0- read write execute web, work
ICT – Information Communication being done by engine, google chrome,
Lazada, shopee.
Technology
INFORMATION – Reading books, WEB 4.0-
depending on context, facts as is (raw
data).
6 TYPES OF SOCIAL MEDIA
COMMUNICATION – Sharing with a. Social networks
friends, process elements involved.
b. Bookmarking sites
TECHNOLOGY- Email findings, assist c. Social news
human beings. Tools – overcome d. Media sharing
environmental hazard. e. Micro blogging
ICT- acquisition, analysis, manipulation f. Blogs and forum
storage and distribution of information,
provision of equipment. KINDS OF OPERATING SYSTEM
GOAL OF COMMUNICATION = a. Ios
COMMON UNDERSTANDING b. Android
c. Blackberry os
Philippines “ICT HUB OF ASIA” because
d. Windows phone
of many BPO (Business Process
Outsourcing). e. Symbian
f. Web os
WORLD WIDE WEB – information space g. Windows
identified by UNIFOMR RESOURCE
LOCATOR accessed by internet invented
by TIM BERNERS-LEE.
FEATURES OF WEB 2.0 technological advancements to
1. Folksonomy – users to classify and work on similar goal.
2. Social media – website, app or
arrange information using freely
online channer that enables web
chosen keyword like hashtag.
2. Rich user experience – content is users to create, discuss and
modify.
dynamic and responsive to user’s
3. Mobile technologies- popularity of
input, example when logged on
your account is used to modify smartphones and tablets major
rise over years because of device
what you see in their website.
3. Long tail – demand on a one time capability.
4. Assistive media – non-profit
purchase. Time based pricing is
service designed to help people
better than file size based pricing.
Subscribing to a data plan that who have visuals and reading
impairments. Audio recordings.
charges you for the amount of
time.
4. User participation- owner of
ONLINE PLATFORMS IN ICT
website is not the only one who is
able to put content. Some - Easier for users to interact, to
websites allow readers to collect, and use the data from
comment on an article or poll. user’s interaction for their
5. Software as a service- subscribe to particular needs.
a software only when needed 1. Social Media – collection of
rather than purchasing them. internet based communication
Example is word processor. tools and computer.
6. Mass Participation – diverse 2. Search Engines – software system
information sharing through that is designed to search for
universal web access. information in WWW.
3. Communication Services –
TRENDS IN ICT outsourced enterprises
1. Convergence – Technological communications solutions that
convergence is a synergy of can be leased from single vendor
or provider. (Communication Online Etiquette- correct or acceptable
Service Provider is provider that way of communicating on the internet.
transports information
DANGER IN THE INTERNET
electronically.)
TOP 10 SEARCH ENGINES Email Spam (Junk Mail) – unsolicited
Google commercial.
Bing Email Spoofing- changing the email
Yahoo header to disguise the true source.
Ask.com
Phishing- trying to get confidential
AOL.com
information.
Baidu
Wolframalpha Spyware- a computer program that is
DuckDuckGo installed covertly on personal computer
Internet Archive to collect information.
ChaCha.com Malware – malicious
4. Payment Systems – system used program/software.
to settle financial transactions
through transfer of monetary 1. VIRUS -replicate itself transfer to
value. computer to one another.
5. Advertising platforms – allows 2. WORM- transfers from one
users to create and manage computer to another by any type
advertising campaigns, generate of means.
reports and retrieve information. 3. TROJAN- disguised as a useful
6. Creative content outlets – need to program but once downloaded or
be transferred creatively. installed, leaves your PC
unprotected and allows hacker to
Online Safety- knowledge of maximizing get you information
the user’s personal safety. 4. ADWARE- send you
Online Security- extensive term advertisements, mostly as pop-
encompassing a series of steps that ups.
companies.
5. SPYWARE-a program that runs in IMAGE PLACEMENT – inserting an
the background without you image or any other material in your
knowing it. document is quite easy specially if
the material already exist in your
MAIL MERGE – adding personalized
information into letters and envelopes storage.
while they are being distributed and is IN LINE WITH TEXT-
done through a data base.
LABEL GENERATION – MS word is able
to print out whatever your default setting for
requirements you have for the label it images that inserted. Text font with
may be tons of label. bottom side totally aligned with the
1. Form Document – First text line.
component of our mail merge SQUARE
document , document that
allows image you inserted to be
contains the main body of the
placed within the
message we want to convey or
paragraph
send.
with text going
2. List or Data file – where the
around the image
individual information or data
in square pattern like frame.
needs to be plugged in to the
form document is place and TIGHT
maintain. Same as square
Integrating Images and External but here the text
Materials hugs or conforms
the general
Inserting pictures or integrating is
shape of image. Get more creative
fun and improves the impression of
effect on your document.
your document.
THROUGH MAIL MERGE
Text on your document to flow even - ADDRESS BLOCK
tighter taking the - GREETING LINE
contours and shape
of the image.

TOP AND BOTTOM HEADER/ LETTER HEAD

Pushes the text away vertically the INSIDE ADDRESS


top and bottom of the image so the
(Receiver)

DATE

SALUTATION (Mr. and ms.)


image occupies the whole text line
on its own. BODY
BEHIND TEXT
Allow image to be fragged and COMPLIMENTARY CLOSING
placed anywhere but with all the text SIGNATURE LINE
floating in front of it like background.

IN FRONT OF TEXT MAM TASHA REVIEWER


settings allow images to be placed ICT- is un umbrella term used to
right on top of the t text you placed. describe theoretical and practical
aspects of equipment and software.
HYPERTEXT TRANSFER PROTOCOL –
Which of the following is an application
protocol in hypermedia information
systems that send request to web
servers for web elements such as web wants to start website what is needer
pages and images. him to start.
CLOUD COMPUTING – Components of WEB BROWSER -used to view html
ICT does most of the companies offer documents.
with computing services and typically
URL – You have been in a site that you
charges for cloud computing services
have found out beneficial from you and
based on usage. you copied. What is technical terms for
ADSPACE- Getting some money on the that address that you have copied?
internet.
LAPTOP- what piece of technology
SEARCH ENGINES – Online platforms allows marco and his classmates to
searching information. interact with information on a
touchscreen projector.
2006 – second wave of web page
evolution developed dynamic pages
that enabled people all over to start
=SUM(C1:c5.25”) – The correct syntax if
interacting with each other via social you will find the sum of numbers that is
media.
greater than 25?
WEB BROWSER – program used to view
html document , can display web page.
CTRL + P = Print
SEARCH ENGINES – software system
designed to search for information on CTRL + C = Copy
WWW. CTRL + Z = redo
ONLINE PLATFORMS – developed with
the use of internet technology for the
Katkat installs midi viodeoke
design and development of teaching
application in computer but the
and learning process
problem is can’t erase the application.
FREE HOST, DOMAIN NAME, TROJAN HORSE – TRAITOR – pretends
ADVERTISING COMPANY – Michael to be useful.
Jhepoy receives message from BPI to
give again the account and password.
DUPLICATING FILES OR COMPUTER
WORM
ALAN SCHAAF – founded the online
image sharing community.

Vous aimerez peut-être aussi