KEMBAR78
E-Tech Reviewer 1st QTR | PDF | Malware | Microsoft Excel
0% found this document useful (0 votes)
96 views5 pages

E-Tech Reviewer 1st QTR

coverage Introduction to ict, WWW, netiquette, productivity tools

Uploaded by

kazelynyt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
96 views5 pages

E-Tech Reviewer 1st QTR

coverage Introduction to ict, WWW, netiquette, productivity tools

Uploaded by

kazelynyt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

E-Tech Reviewer :3 Electro mechanical period (1840-1940)

Introduction to ict -Electricity for information handling and transfer


Information bloomed

-Knowledge, data, facts, message Telegraph – Use to transmit information over long
-Meaning of data presented after comprehension distances (coded in sounds dots, morse code)
Communications Telephone – enabling voice transmission over long
-Relay, spreading, transmission, dissemination distances by Alexander graham bell

-Information is exchanged between individuals Electronic period (1940-present)


Through a common system of symbols, signs or -Focused on solid state devices or electronic devices
Behaviour Transistor – Foundation of every electronic device

Technology Integrated circuit (IC) – composed of a group of


-Computers, automation, high tech, robotics transistors and circuit elements compressed in a
-Practical application of knowledge, a manner of single package
Accomplishing a task Electrical numerical integrator and computer

ICT (ENIAC) – First electronic general-purpose


-Refers to the technologies both hardware and computer
Software that enable users to communicate with Information literacy – Ability to identify, find,
Each Other evaluate, and use information effectively
Software – Instructions that tell a computer what Technology literacy – ability to assess, acquire, and
To do or perform specific tasks communicate in a fully digital environment
Application software – productivity programs Media literacy – ability to access, analyze, evaluate,

Dedicated for end users which performs a specific create and act using all forms of communication
Task The world wide web
System software – programs that are dedicated Internet – Allowing various computer networks

To managing the computer itself around the world to interconnect


EVOLUTION OF ICT World wide web – large collection of interconnected
Pre mechanical period (3000 BCE- 1450 BCE) content. Enables hypertext documents and other
-Humans started communicating with one another files over the internet

Using words and pictograms curved in rocks Web 1.0 static web/ read-only web
Petroglyphs – Used to tell story, map their terrain -web forms
Rock carvings -Focused on company’s homepage

Pictograms – curved in rocks -Only allows people to read from the internet
Abacus – Manually operated device similar to the -‘Information portal’ , no interaction
Modern calculator (first device to process info) Web 2.0 Dynamic web/ read & write web
Mechanical period (1450 – 1840) -Web applications

-A period that used machines driven by steam and -focus on communities


Gears dominated information processing & calculation -platforms that gives users the possibility to control
Pascaline – arithmetic machine by Blaise pascal data

Along with wilhelm shickhard -people are consuming as well as contributing


Analytical engine – first programmable mechanical information through blogs or sites
Computer by Charles Babbage -blogging or social networking
Ada Lovelace – first computer programmer
Other features of web 2.0 -google scholar
Folksonomy – allows user to categorize and classify MOOC sites or tutorial sites
Information using freely chosen keywords they -dedicated to teach and inform users focused on
Use ‘#’ tags different areas
Rich user experience – content is dynamic and is -Khan academy
Responsive to user’s input Employment websites
Mass participation – diverse information sharing -websites that enable companies to post job
Through universal web access. vacancies, accommodate job seekers
Long tail services – services that are offered on -have the ability to match the qualification of the
Demand rather than on a one-time purchase. This applicant
Is synonymous to subscribing to a data plan E-commerce
Web 3.0 semantic executing web -Technology that introduces ease in business
-web of data management and customer convenience
-the data will come from the user and the web will WHAT TO CHECK
Essentially adjust to meet the needs of the user - Published author’s name
Problems with web 3.0 - Credible web sites
Vastness – The internet is huge, (automated - Rating number of views and number of shares
Reasoning system) - Reference and related articles
Uncertainty – Deals with scores of uncertain NETIQUETTE
Values (Probabilistic reasoning techniques) -Importance of proper manners and behavior online
Vagueness – user queries are not really specific Rules of netiquette
Extremely vague bruh (fuzzy logic) 1. Your avatar, is not another world but an
Inconsistency – inconsistent data can lead to logical extension of your personality of the existing
Contradiction and unpredictive analysis society that you are part of
(paraconsistent reasoning) 2. Apply the values and conduct learned since
Deceit – While AI can help in filtering what if all childhood in the online extension of our
Data provided is misleading (cryptography techniq) society
Social media 3. There are laws existing in our society and on
-create and exchange user-generated information the web
-allow perople, companies, and other organizations 4. WWW enables participation from people from
To create, share or exchange information, career different counties, cultures and religions
Interests, ideas and pictures 5. Everything published on WWW should be
‘The world wide web is for research and education’ considered as copyrighted or owned by
‘Main objective of internet sites are to share and another individual
Disseminate information’ 6. Sending correspondence in either email, be
INFORMATION SOURCES careful selecting words to communicate
Web search engines -Be mindful of your language and tone
-Programs design to search or mine the www -don’t use ALL CAPS in text messages and chat
Based on keywords by the user Rules of netiquette
-Google, bing, yahoo, duckduckgo - Be respectful
Research indexing sites - Be scholarly
-dedicated to compile and index researches done by - Be professional
Academic researches, engineers, social scientist
Computer ethics – New branch of ethics that is -The law also penalizes offenses against the
Concerned with standards of conduct in the use of confidentiality, integrity and availability of computer
Computers data.
Netiquette – Set of ideal rules and conduct that a -Defines cybersquatting as the acquisition of a
Netizen should observe in communicating and domain name on the internet bad faith.
Publishing information over the WWW RA 10173 ‘Data privacy act of 2012’
Netizen – A person who is part of the online -Protects personal information and data from being
Community divulged without consent
Cyber bullying – bullying that takes place online or A comprehensive law on the protection of one’s
Using electronic technology over communication privacy that regulates proper use of an individual’s
Tools including social media, text, chat and websites personal data as collected, processed, stored, shared
THREATS IN WWW Data subject
Spam -Data subject refers to an individual whose personal
-Unsolicited bulk email (UBE) data is processed
-Attackers use spam as a tool of advertisement Transparency – data subjects must be aware of the
Phishing nature, purpose, and extent of the processing of
-Software or program used by an attacker to his/her personal data
Obtain personal information Legitimacy of purpose – processing of information
(they target credit cards) shall be compatible with the declared purpose
Malware Proportionality – processing of information shall be
-Malicious software adequate, relevant and not excessive
Computer software sent by attackers to inflict Data processing cycle
Chaos on a computer’s operation and process Collection – collects your personal information when
-Used to spy upon the activity of the computer necessary
And steal info Storage – personal information will be stored
Virus alert – desgined to keep spreading Use – uses your personal information
Automatically acrrross networks and devices Sharing – Personal information may be shared with
Spyware other agencies
– designed to gather data from a computer Disposal – once the purpose for collecting your
And its users personal information will be disposed
-It is installed on the user’s computer directly Rights of data subjects
Adware -Be informed, access own info, object, erase, file a
-Piece of software malicious or not, that displays complaint, rectification, data portability
Advertisements on a computer Intellectual property
Government provisions for online courtesy -When you create an idea, invention, a form of
RA 10627 ‘The Anti bullying act of 2013’ literary work or a research you have the right as to
-Aims to protect children enrolled in all levels from how it should be used
Being bullied. It requires schools to adopt policies TYPES OF IP
To address the existence of bullying Copyright
RA 10175 ‘The cybercrime prevention act of 2012 -legal term used to describe the rights that creators
-Punishes content related offenses such as have over their literary and artistic works
Cybersex, child pornography and libel. It also -They have the right to control the reproduction of
Penalizes unsolicited commercial communication’ their work
-Violation of a copyright is called infringement Parts of a function
Plagiarism - Equal sign
-An act or instance of using or closely imitating the - Function name
Language and thoughts of another author without - Argument
Representation of that author’s work Function in excel
Patent - SUM
-Exclusive right granted for an invention. Patent - MAX
Provides the patent owner with the right to devide - MIN
How or whether the invention can be used by others - AVERAGE
Trademark - COUNT
-A trademark is a sign capable of distinguishing the Sorting – A feature of MS excel that helps you
Goods or services of one enterprise from those of manage information and quickly arrange it
Other enterprise alphabetically and numerically
Fair use Filtering – A feature of MS Excel that helps you
-You can use copyrighted material without a narrow down data in your worksheet allowing you to
License only for certain purposes view only the information you need
Copyrighted infringement Advance number filter – allows you to manipulate
-Occurs when a copyrighted work is reproduced numbered data in different ways
Distributed, performed, publicly, displayed or made IF function – runs a logical test and returns one
Into a derivative work without permission of the value for a TRUE result, and another for a FALSE
Copyright owner result
PRODUCTIVITY TOOLS
Mail merge – A software toolkit that is used to
Produce multiple documents with a given template
Editing the basic information that is supplied by a
Structured data set
Spreadsheet – a computer application for
Organization, analysis and storage of data in tabular
Form
Cell – refers to the rectangular box that occurs at
The intersection of a vertical column and a
Horizontal row in a worksheet
Cell address – alphanumeric value used to identify a
Specific cell in a spreadsheet
Active cell – refers to the currently selected cell in
A spreadsheet
Formula – expression that calculates the value of a
Cell in a worksheet
Function – predefined formula that performs
Caclulations using specific values in a particular
Cell

You might also like