ICT

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

RICH USER EXPERIENCE

content is dynamic and is responsive to user's input

The formula bar

displays information ENTERED—or being entered as you type—in the current or active cell. The contents of a cell can also be edited in the formula bar.

WORD COUNT

displays the NUMBER of WORDS in your document. Click Word Count to open the Word Count dialog box. Here, you can quickly view your document's statistics, like the number of pages, paragraphs, and lines.

Read Mode

displays your document in FULL-screen mode.•

Backstage view

gives you various OPTIONS for saving, opening a file, printing, and sharing your document.

COPYRIGHT INFRIGEMENT

includes the unauthorized or unlicensed copying of a work subject to copyright. ❑ Legal term ❑ Civil crime ❑ Unauthorized used of someone else's creative work ❑ Monetary damage for infringement

Malware

is a CATCH-ALL term for any type of malicious software, regardless of how it works, its intent, or how it's distributed.

Intellectual property (IP)

is a category of PROPERTY that includes INTANGIBLE creations of the human intellect. There are manytypes off intellectual property, and some countries recognize morethan otherss. The most well-known types are copyrights, patents,trademarks, and trade secrets

Rogue security software

is a type of malicious software and online fraud that TRICKS consumers into thinking their computer has a virus and tries to PERSUADE them to pay for a phony malware removal program that in fact installs malware on their computer.

The ruler

is located at the TOP and to the LEFT of your document. It makes it easier to make indention alignment and spacing ADJUSTMENT.

SPYWARE

is placed on a computer WITHOUT the end user's KNOWLEDGE. It intrudes ,takes private information and internet usage data, and then passes it to third parties like advertising, data companies, or other users. This type of malware that is HARD to DETECT

Print Layout

is selected by default. It shows the document as it would appear if it were PRINTED.•

PLAGIARISM

is using someone else's work or ideaswithout giving proper credit. ❑ Not a legal term ❑ Academic crime ❑ Claiming ownership of someone else's creative work ❑ Not punishable by government, but may be by academic

FAIR USE

means that an intellectual property may be used without consent as long as it is used in FAIR Uses of Copyrighted Material ❑Criticism ❑Comment ❑News reporting ❑Teaching▪ Includes making copies for use in the classroom ❑Scholarship and research ❑Parody

Assistive Media

media that consist of devices and services. This are equipment's that helps a people with disability to increase, to improve or to maintain his/her functional capabilities

Copyright

protects the ORIGINAL WORK of AUTHORSHIP. Such works are literature, drawings, paintings, songs, music, computer software, films, photos, web content. The time limit should be equal to or longer than 50 years after the creator's death. Longer periods of protection may however be provided at the national level

Webpage Layout

shows how your document would look as a WEBPAGE.

Google docs

used to create and edit word processing and spread sheet.

SOFTWARE AS A SERVICES

users will be subscribe to a software only when needed rather than purchasing them

Semantic web site

web 3.0 is a (1) WEB SITE, A movement led by the World Wide Web Consortium (W3C)

TRUE

"The Internet, truly, is a powerful tool. It can be used to promote your business, gain friends, and stay in touch with the old ones."

MICROSOFT WORD October 25, 1983

(1) Is a word processor developed by Microsoft.It was first released on (2)

Adware

, commonly referred to as ADVERTISEMENT-supported software, makes money for its creators by displaying banner ads on your screen, typically inside of a web browser. Although it is frequently made for desktops, adware can also be discovered on mobile devices. Some types of adware are extremely manipulative and provide a backdoor for dangerous software

VIRGINIA SHEA

10 COMMANDMENTSNETIQUETTE The Core Rules of Netiquette are excerpted from the book Netiquette by

PATENT TRADE SECRET COPYRIGHT TRADEMARK

4 TYPES OF IP P TS CR TM

COMPATIBILITY SECURITY VASTNESS VAGUENESS LOGIC

5 SEVERAL PROBLEMS OF WEB 3.0

ACCURACY AUTHOR CURRENCY FAURNESS RELEVANCE SEARCH ENGINE

6 EVALUATING INFORMATION A A C F R SE

FOLKSONOMY RICH USER EXPERIENCE LONG TAIL USER PARTICIPATION SOFTWARE AS SERVICES MASS PARTICIPATION

6 FEAUTURES OF WEB 2.0 F RUE LT UP SAS MP

computer worm

A (1) is a STANDALONE malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a HOST to scan and infect other computers

Trojan Horse Virus

A (1) is a form of malware that installs into a computer PRETENDING to be a RELIABLE APP. In order to try and access consumers' systems, an attacker will frequently utilize social engineering to conceal malicious malware in genuine applications

virus

A __ is a specific type of malware that SELF-REPLICATES by inserting its code into other programs. ❑ One type of malware ❑ Must be triggered by a user ❑ Self-replicating

The Cell cell pointer.

A __ is an INTERSECTION of a column and row. The heavy border around theselected cell is called the (2)

virtual

A collaborative platform is a (1) workplace that centralizes resources and technologies to facilitate communication and human contact in corporate project work.

TRADE SECRET

A is any valuable information that is NOT PUBLICALY known (a well guarded secret)e.g.,. ingredients used in their food products, business methods, customer data. Trade secret protection is not limited in time (patents last in general for up to20 years). It may continue indefinitely as long as the secret is not revealed to the public

trademark

A offers LEGAL PROTECTION for logo, design, symbol, phrase, wordmarks, or a combination of those that represents a source of goods or services. The term of trademark registration can vary but is usually ten years. It can be renewedindefinitely on payment of additional fees.

3 three Sheet1, Sheet2, and Sheet3

A workbook is made up of (1) worksheets. •The worksheets are labeled (2) In order to ACCESS a worksheet, click the tab that says Sheet#.

FOLKSONOMY

Allows user to categorize and classify information using freely chosen keywords. Tagging by FB, twitter, use tags that start with the sign #, referred to as hashtag.

CONVERGENT TECHNOLOGY

An extension of the term convergence, which means "coming together" of two or more separate technology or Synergy of technological advancements to work on a similar goal or task

WEB

An information system on the internet that allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another.

SOCIAL MEDIA

Are computer-mediated tools that allows people or companies to create, SHARE or exchange information, career interest, ideas and even pictures and videos in virtual communities and networks.

SOCIAL NEWS

CNN GOOGLE NEWS N

ZOOM CONTROL

Click and drag the slider to use this feature. It will make the view larger or smaller. The number to the right ofthe slider bar reflects the zoom percentage.

SCHOOL BAR

Click, hold, and drag the scroll bar to SCROLL upand down through the pages of your document.

FAIRNESS

Content is BALANCED, presenting all sides of an issue and multiple points of view

RELEVANCE

Content is RELEVANT to your topic or research.

Accuracy

Content is grammatically CORRECT, verifiable and cited when necessary

Author

Defines who CREATED the content, the individual or group's credential/expertise and provides contact information.

MASS PARTICIPATION

Diverse information sharing through universal web access. Web 2.0's content is based on people from various cultures.

Blurton 1999

Diverse set of technological tools and resources used to communicate, create, disseminate, store, and manage information -- ?

MT

EX OF? IOS ANDROID BLACK CHERRY WEB OS SYMBIAN WINDOWS FIREFOX

ASSISTIVE MEDIA

EXAMPLES OF: CALCULATOR AUTO WHEELCHAIR SIRI ALEXA HEY GOOGLE

1988-1990 1990-1995 1994-1995 1995-1999 1999-2003 2003-2007 2007-2010 2010-2013 2013-2019 2019

EXCEL 2.0 (2) 2XCEL 3.0-4.0 (5) EXCEL 5.0 ( 1) EXCEL 95.97 (4) EXCEL 2000-2002 (4) EXCEL 2003 (4) EXCEL 2007 (3) EXCEL 2010 (3) EXCEL 2013 (6) EXCEL 2019

cell address active cell cell pointer,

Each cell has a unique (1) composed of a cell's column and row. •The (2) is the cell that receives the data or command you give it .•A darkened border, called the (3) identifies it.

COMMAND GROUP

Each group contains a SERIES of different commands. Simply click any command to apply it. Some groups also have an command arrow in the bottom-right corner, which you can click to see even more commands.

WEB 2.0

Examples of Web _._ include social networking sites, blogs, wikis, video sharing sites, hosted services, and web applications.

SOCIAL NETWORK

FB TWITTER IG

COLLABORATIVE PLATFORM

G SUITE OFFICE 365 ADOBE ANDROID GAMES GITHUB ZOOM SKYPE CANVA GCLASSROOM

ICT Hub of Asia

ICT IN THE PHILIPPINESS... The Philippines has been dubbed the "_ _ _ _" due to the rapid growth of ICT-related jobs, one of which is BPO, or call centers.

PERSONAL CONTACT EDUCATION FINANCIAL LOCATION INFORMATION

INFORMATION YOU MUST LIMIT TO SHARE ONLINE

The Row headings

In the modern versions of Excel there are 1,048,576 rows. Each row is named by a number.

The Column headings

In the modern versions of Excel this is column XFD, which is 16,384 columns. Each column is named by a letter or combination of letters.

WHAT IS ICT

Information and Communication Technology

CURRENCY

Information is CURRENT & updated frequently.

MICROSOFT EXCEL

Is a SPREADSHEET developed by Microsoft for Windows, Mac OS, Android and iOS. It features calculation, graphing tools, pivot tables, and a macro programming language called Visual Basic for Applications

COLLABORATIVE PLATFORM

Is a category of business software that adds broad social networking capabilities to work processes.

PHISHING

Is the DECEIVING ATTEMPT to obtain sensitive information such as usernames, passwords, credit card details often for malicious reasons.

THE INTERNET

It is a source of entertainment.

malicious software

MALWARE ❑ Terms for ❑ Any malicious code ❑ Harms devices and steal data

SPAM

Malspam is an abbreviation for "malware spam" or "malicious spam," which refers to SPAM MESSAGES that include malware. When readers open an email attachment or click on a link, they often download malware such as keyloggers, ransomware, Trojan horses, bots, info-stealers, cryptominers, spyware, and Trojans

The Navigation buttons and sheet tabs

Navigation buttons allow you to move to another worksheet in an Excel workbook. They are used to display the first, previous, next, and last worksheets in the workbook

SITE ASTERISK HYPHEN QUOTATION RANGE PLUS LINK

ONLINE SEARCH TIPS:USING GOOGLE LIKE A PRO S A H Q R P L

BS

PINTEREST REDDIT GOOGLE

CT

PRINTER VIDEO GAMES USB SMARTPHONES

BE FORGIVING OF OTHER PEOPLE'S MISTAKE•

RULE NO. 10: Do not point out mistakes to people online. Remember that you were once the new kid on the block.• You still need to have a good manners even though you are online and cannot see the person face to face

REMEMBER THE HUMAN

RULE NO. 1: You need to remember that you are talking toa real person when you are online.• The internet brings people together who would otherwise never meet.• Remember this saying when sending an email: "Would I say this to the person's face?

ADHERE TO THE SAME STANDARDS ONLINE THAT YOU FOLLOW IN REAL LIFE

RULE NO. 2: • You need to behave the same way online thatyou do in real life.• You need to remember that you can getcaught doing things you should not be doingonline just like you can in real life.• You are still talking to a real person withfeelings even though you can't see them

KNOW WHERE YOU ARE IN CYBERSPACE•

RULE NO. 3: Always take a look around when you enter a new domain when surfing the web.• Get a sense of what the discussion group is about before you join it.

RESPECT OTHER PEOPLE'S TIME AND BANDWIDTH•

RULE NO. 4: Remember people have other things to do besides read your email.• You are not the center of their world.• Keep your post and emails to minimum by saying what you want to say. Remember everyone won't answer your questions.

MAKE YOURSELF LOOK GOOD ONLINE•

RULE NO. 5: Be polite and pleasant to everyone.• Always check your spelling and grammar before posting.• Know what you are talking about and make sense saying IT

SHARE EXPERT KNOWLEDGE•

RULE NO. 6: Ask questions online Share what you know online.• Post the answers to your questionsonlinee someone may have thesame questionn you do

HELP KEEP FLAMEWARS UNDER CONTROL

RULE NO. 7: Netiquette does not forgive flaming.• Netiquette does however forbid people who are flaming to hurt discussion groups by putting the group down.

RESPECT OTHER PEOPLE'S PRIVACY•

RULE NO. 8: Do not read other people's mail without their permission.• Going through other people's things could cost you, your job or you could even go to jail.• Not respecting other people's privacy is a bad etiquette

DONT ABUSE YOUR POWER•

RULE NO. 9: Do not take advantage of other people just because you have more knowledge or power than them.• Treat others as you would want them to treat you if the roles were reversed

Web 1.0

Refers to the first stage in the World Wide Web, which was entirely made up of the Web pages connected by hyperlinks.

PLUS +

SEARCH PAGES THAT CONTAIN BOTH WORDS

CTRIL +... A K F B C D E L I J M N X P T P O R S U W Y Z

SELECT ALL CONTENTS INSERT HYPERLINK OPEN FIND BOX BOLD TEXT COPY OPEN THE FRONT PREFERENCE ALLIGN IN CENTER ALLIN TO THE LEFT ITALIC ALLIGN TO JUSTIFY SCREEN INDENT OPENS NEW BLANK DOCUMENT WINDOW CUT TEXT PASTE HANGING INDENT PRINT WINDOW OPEN DIALOG BOX ALLIGN TO THE RIGHT SAVE DOCUMENT UNDERLINE CLOSE CURRENT OPEN DOCS REDO LAST ACTION UNDO LAST ACTION

SOCIAL NETWORKS SOCIAL NEWS BLOGS AND FORUMS MEDIA SHARING BOOKMARKING SITES

SOCIAL MEDIA TYPES SN SN B&F MS BS

LONG TAIL

Services that are offered on demand rather than on a one-time purchase. This is synonymous to subscribing to a data plan that charges you for the amount of time you spent on the internet.

FALSE All viruses are malware but not all types of malware are viruses.

T OR F All malware are viruses but not all types of viruses are MALWARE .

FALSE

T OR F?? The content is different for each users that is referred to as Web 1.0

FALSE - CAN TRUE

T OR F??? Technology trends CAN'T influence how customers reach your e -commerce site or the company's strategic efforts. Technology advancements can signal market openings or open up new products, but they can also present new ways that can give you a competitive advantage over your online competition.

Web 2.0

THIS allows users to interact with the page: instead of just reading a page, the user may be able to comment or create a user account. IT also allows users to use web browsers instead of just using their operating system.

HYPHEN -

TO EXCLUDE WORD OR PHRASES

ASTERISK HOW TO *

TO FILL THE MISSING WORD OR PHRASE

LINK LINK:

TO SEARCH FOR A PAGE THAT IS LINK TO ANOTHER PAGE

QUOTATION ""

TO SEARCH FOR EXACT WORD OR PHRASES

RANGE ...

TO SEARCH WITH A RANGE OF NUMBERS

SITE SITE:

TO SEARCH WITH SPECIFIC WEBSITE

B&F

TUMBLER EVERNOTE WORDPRESS

THE RIBBON menu bar

The (1) contains all of the commands you will need to perform COMMON TASK in Word. It has multiple tabs (2) each with several groups of commands.

FALSE-MOST DANGEROUS

The Internet is one of the most SAFE places, especially if you do not know what you are doing.

QUICK ACCESS TOOL BAR

The QUICK access toolbar lets you access COMMON commands no matter which tab is selected. By default, it includes the Save, Undo, and Redo commands. You can add other commands depending on your preference.

KEYLOGGER

The act of secretly recording the KEYS pressed on a keyboard such that the person using it is unaware that their actions are being watched is known as keystroke logging, also known as keylogging or keyboard capture. The person running the logging program can then get the data

Web 3.0

The aim of (1) is to have machines (or servers) understand the user's preferences to be able to deliver web content specifically targeting the user.

Ribbon

The contains all of the commandsyou will need to perform common tasks in Word.It has multiple tabs (menu bar) each withseveral groups of commands.

USER PARTICIPATION

The owner of the website is not the only one who is able to put content. Others can place a content of their own by means of comments, reviews and evaluation e.g., Lazada, Amazon.

PAGE NUMBER INDICATOR

The page number indicator helps you keep track of the number of PAGES your document contains. Click the page number indicator to open the document navigation pane. Here, you can search your document by headings or scroll quickly through its pages.

MOBILE TECHNOLOGY

The popularity of smartphones and tablets has taken a major rise over the years. This is largely because of the devices capability to do task that were originally found in personal computers

DOCUMENT VIEWS

There are three ways to view a document. Simply click to select the desired view:• RM PL WL

Worksheet Views

There are three ways to view a worksheet. Simply click to select the desired view: NV PLV PBR

SOCIAL NETWORKS

These are sites that allow you to CONNECT with other people with the same interest or background

SOCIAL NEWS

These are sites that allows user to post their own NEWS items or links to other news sources

BOOKMARKING SITES

These are sites that allows you to STORE and manage LINKSto various websites and resources

MEDIA SHARING

These sites allows you to UPLOAD and share media content like images, music and VIDEO

BLOGS AND FORUMS

These websites allows user to post their CONTENT

TITLE BAR

This displays the DOCUMENT NAME followed by a program name.

Title Bar

This displays the WORKBOOK NAME followed by a program name.

The Name box

This shows the ADDRESS of the current selection or active cell.

PATENT

Utility patent-It protects a process, manufacture, composition of matter, and a useful machine. Design patent-It protects the shape, appearance, pattern design, layout,and looks of a product. The protection is granted for a limited period, generally 20years from the filing date of the application

CONTEXTUALIZED ONLINE SEARCH & RESEARCH SKILLS

Utilize the Internet as a tool for reliable information gathering and research to best meet particular class objectives or solve a situation. Students will use search engines more effectively. They have a deeper understanding of search strategies, in particular, that will produce results that are helpful for their academic work and career of choice

Tim Berners Lee

WEB Is an information space where documents and other web resources are identified by URLs, interlinked by hypertext links, and can be accessed via the Internet. Invented by ???

The Department of Information and Communication Technology (DICT)

WHO is is in charge of developing, planning, and promoting the country's information and communications technology (ICT) agenda in support of national development?

1983-1987 1987-1991 1991-1993 1993-1995 1995-1999 1999-2003 2003-2007 2007-2010 2010-2013 2013-2019

WORD 1.0 (4) WORD 1.1 (4) WORD 2.0 (2) WORD 6.0 (2) WORD 95/97 (4) WORD 2000-2002 (4) WORD 2003 (4) WORD 2007 (3) WORD 2010 (3) WORD 2013 (6) WORD 2019

The Department of Information and Communication Technology (DICT)

What DICT stands for?

Word Start Screen

When you open Word for the first time, the (1) will appear. From here, you'll be able to create a new document, choose a template, or access your recently edited documents. Click the Blank document to begin

MS

YT SPOTIFY TT

static

__ Web Page is known as a flat page or stationary age in the sense that the page is ''as is'' and cannot be manipulated by the user.

Web-based threats, or online threats,

a category of cybersecurity risks that may cause an undesirable event or action via the internet. Web threats are made possible by end-user vulnerabilities, web service developers/operators, or web services themselves

Search Engines

are programs that look for documents based on SPECIFIED KEYWORDS and return these documents where the keyword were found.


Ensembles d'études connexes

labour failure market causes 1.4

View Set

Biology 2 Chapter 42, test material

View Set

Microeconomics final exam: quiz questions

View Set

(CISCO) Intro to Networks - Chapter 1

View Set

State Regulation of Insurance Producers

View Set

Genetics Exam Two Learning Curves

View Set

Computer Science I - C++ Chapter 02

View Set