ICT
RICH USER EXPERIENCE
content is dynamic and is responsive to user's input
The formula bar
displays information ENTERED—or being entered as you type—in the current or active cell. The contents of a cell can also be edited in the formula bar.
WORD COUNT
displays the NUMBER of WORDS in your document. Click Word Count to open the Word Count dialog box. Here, you can quickly view your document's statistics, like the number of pages, paragraphs, and lines.
Read Mode
displays your document in FULL-screen mode.•
Backstage view
gives you various OPTIONS for saving, opening a file, printing, and sharing your document.
COPYRIGHT INFRIGEMENT
includes the unauthorized or unlicensed copying of a work subject to copyright. ❑ Legal term ❑ Civil crime ❑ Unauthorized used of someone else's creative work ❑ Monetary damage for infringement
Malware
is a CATCH-ALL term for any type of malicious software, regardless of how it works, its intent, or how it's distributed.
Intellectual property (IP)
is a category of PROPERTY that includes INTANGIBLE creations of the human intellect. There are manytypes off intellectual property, and some countries recognize morethan otherss. The most well-known types are copyrights, patents,trademarks, and trade secrets
Rogue security software
is a type of malicious software and online fraud that TRICKS consumers into thinking their computer has a virus and tries to PERSUADE them to pay for a phony malware removal program that in fact installs malware on their computer.
The ruler
is located at the TOP and to the LEFT of your document. It makes it easier to make indention alignment and spacing ADJUSTMENT.
SPYWARE
is placed on a computer WITHOUT the end user's KNOWLEDGE. It intrudes ,takes private information and internet usage data, and then passes it to third parties like advertising, data companies, or other users. This type of malware that is HARD to DETECT
Print Layout
is selected by default. It shows the document as it would appear if it were PRINTED.•
PLAGIARISM
is using someone else's work or ideaswithout giving proper credit. ❑ Not a legal term ❑ Academic crime ❑ Claiming ownership of someone else's creative work ❑ Not punishable by government, but may be by academic
FAIR USE
means that an intellectual property may be used without consent as long as it is used in FAIR Uses of Copyrighted Material ❑Criticism ❑Comment ❑News reporting ❑Teaching▪ Includes making copies for use in the classroom ❑Scholarship and research ❑Parody
Assistive Media
media that consist of devices and services. This are equipment's that helps a people with disability to increase, to improve or to maintain his/her functional capabilities
Copyright
protects the ORIGINAL WORK of AUTHORSHIP. Such works are literature, drawings, paintings, songs, music, computer software, films, photos, web content. The time limit should be equal to or longer than 50 years after the creator's death. Longer periods of protection may however be provided at the national level
Webpage Layout
shows how your document would look as a WEBPAGE.
Google docs
used to create and edit word processing and spread sheet.
SOFTWARE AS A SERVICES
users will be subscribe to a software only when needed rather than purchasing them
Semantic web site
web 3.0 is a (1) WEB SITE, A movement led by the World Wide Web Consortium (W3C)
TRUE
"The Internet, truly, is a powerful tool. It can be used to promote your business, gain friends, and stay in touch with the old ones."
MICROSOFT WORD October 25, 1983
(1) Is a word processor developed by Microsoft.It was first released on (2)
Adware
, commonly referred to as ADVERTISEMENT-supported software, makes money for its creators by displaying banner ads on your screen, typically inside of a web browser. Although it is frequently made for desktops, adware can also be discovered on mobile devices. Some types of adware are extremely manipulative and provide a backdoor for dangerous software
VIRGINIA SHEA
10 COMMANDMENTSNETIQUETTE The Core Rules of Netiquette are excerpted from the book Netiquette by
PATENT TRADE SECRET COPYRIGHT TRADEMARK
4 TYPES OF IP P TS CR TM
COMPATIBILITY SECURITY VASTNESS VAGUENESS LOGIC
5 SEVERAL PROBLEMS OF WEB 3.0
ACCURACY AUTHOR CURRENCY FAURNESS RELEVANCE SEARCH ENGINE
6 EVALUATING INFORMATION A A C F R SE
FOLKSONOMY RICH USER EXPERIENCE LONG TAIL USER PARTICIPATION SOFTWARE AS SERVICES MASS PARTICIPATION
6 FEAUTURES OF WEB 2.0 F RUE LT UP SAS MP
computer worm
A (1) is a STANDALONE malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a HOST to scan and infect other computers
Trojan Horse Virus
A (1) is a form of malware that installs into a computer PRETENDING to be a RELIABLE APP. In order to try and access consumers' systems, an attacker will frequently utilize social engineering to conceal malicious malware in genuine applications
virus
A __ is a specific type of malware that SELF-REPLICATES by inserting its code into other programs. ❑ One type of malware ❑ Must be triggered by a user ❑ Self-replicating
The Cell cell pointer.
A __ is an INTERSECTION of a column and row. The heavy border around theselected cell is called the (2)
virtual
A collaborative platform is a (1) workplace that centralizes resources and technologies to facilitate communication and human contact in corporate project work.
TRADE SECRET
A is any valuable information that is NOT PUBLICALY known (a well guarded secret)e.g.,. ingredients used in their food products, business methods, customer data. Trade secret protection is not limited in time (patents last in general for up to20 years). It may continue indefinitely as long as the secret is not revealed to the public
trademark
A offers LEGAL PROTECTION for logo, design, symbol, phrase, wordmarks, or a combination of those that represents a source of goods or services. The term of trademark registration can vary but is usually ten years. It can be renewedindefinitely on payment of additional fees.
3 three Sheet1, Sheet2, and Sheet3
A workbook is made up of (1) worksheets. •The worksheets are labeled (2) In order to ACCESS a worksheet, click the tab that says Sheet#.
FOLKSONOMY
Allows user to categorize and classify information using freely chosen keywords. Tagging by FB, twitter, use tags that start with the sign #, referred to as hashtag.
CONVERGENT TECHNOLOGY
An extension of the term convergence, which means "coming together" of two or more separate technology or Synergy of technological advancements to work on a similar goal or task
WEB
An information system on the internet that allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another.
SOCIAL MEDIA
Are computer-mediated tools that allows people or companies to create, SHARE or exchange information, career interest, ideas and even pictures and videos in virtual communities and networks.
SOCIAL NEWS
CNN GOOGLE NEWS N
ZOOM CONTROL
Click and drag the slider to use this feature. It will make the view larger or smaller. The number to the right ofthe slider bar reflects the zoom percentage.
SCHOOL BAR
Click, hold, and drag the scroll bar to SCROLL upand down through the pages of your document.
FAIRNESS
Content is BALANCED, presenting all sides of an issue and multiple points of view
RELEVANCE
Content is RELEVANT to your topic or research.
Accuracy
Content is grammatically CORRECT, verifiable and cited when necessary
Author
Defines who CREATED the content, the individual or group's credential/expertise and provides contact information.
MASS PARTICIPATION
Diverse information sharing through universal web access. Web 2.0's content is based on people from various cultures.
Blurton 1999
Diverse set of technological tools and resources used to communicate, create, disseminate, store, and manage information -- ?
MT
EX OF? IOS ANDROID BLACK CHERRY WEB OS SYMBIAN WINDOWS FIREFOX
ASSISTIVE MEDIA
EXAMPLES OF: CALCULATOR AUTO WHEELCHAIR SIRI ALEXA HEY GOOGLE
1988-1990 1990-1995 1994-1995 1995-1999 1999-2003 2003-2007 2007-2010 2010-2013 2013-2019 2019
EXCEL 2.0 (2) 2XCEL 3.0-4.0 (5) EXCEL 5.0 ( 1) EXCEL 95.97 (4) EXCEL 2000-2002 (4) EXCEL 2003 (4) EXCEL 2007 (3) EXCEL 2010 (3) EXCEL 2013 (6) EXCEL 2019
cell address active cell cell pointer,
Each cell has a unique (1) composed of a cell's column and row. •The (2) is the cell that receives the data or command you give it .•A darkened border, called the (3) identifies it.
COMMAND GROUP
Each group contains a SERIES of different commands. Simply click any command to apply it. Some groups also have an command arrow in the bottom-right corner, which you can click to see even more commands.
WEB 2.0
Examples of Web _._ include social networking sites, blogs, wikis, video sharing sites, hosted services, and web applications.
SOCIAL NETWORK
FB TWITTER IG
COLLABORATIVE PLATFORM
G SUITE OFFICE 365 ADOBE ANDROID GAMES GITHUB ZOOM SKYPE CANVA GCLASSROOM
ICT Hub of Asia
ICT IN THE PHILIPPINESS... The Philippines has been dubbed the "_ _ _ _" due to the rapid growth of ICT-related jobs, one of which is BPO, or call centers.
PERSONAL CONTACT EDUCATION FINANCIAL LOCATION INFORMATION
INFORMATION YOU MUST LIMIT TO SHARE ONLINE
The Row headings
In the modern versions of Excel there are 1,048,576 rows. Each row is named by a number.
The Column headings
In the modern versions of Excel this is column XFD, which is 16,384 columns. Each column is named by a letter or combination of letters.
WHAT IS ICT
Information and Communication Technology
CURRENCY
Information is CURRENT & updated frequently.
MICROSOFT EXCEL
Is a SPREADSHEET developed by Microsoft for Windows, Mac OS, Android and iOS. It features calculation, graphing tools, pivot tables, and a macro programming language called Visual Basic for Applications
COLLABORATIVE PLATFORM
Is a category of business software that adds broad social networking capabilities to work processes.
PHISHING
Is the DECEIVING ATTEMPT to obtain sensitive information such as usernames, passwords, credit card details often for malicious reasons.
THE INTERNET
It is a source of entertainment.
malicious software
MALWARE ❑ Terms for ❑ Any malicious code ❑ Harms devices and steal data
SPAM
Malspam is an abbreviation for "malware spam" or "malicious spam," which refers to SPAM MESSAGES that include malware. When readers open an email attachment or click on a link, they often download malware such as keyloggers, ransomware, Trojan horses, bots, info-stealers, cryptominers, spyware, and Trojans
The Navigation buttons and sheet tabs
Navigation buttons allow you to move to another worksheet in an Excel workbook. They are used to display the first, previous, next, and last worksheets in the workbook
SITE ASTERISK HYPHEN QUOTATION RANGE PLUS LINK
ONLINE SEARCH TIPS:USING GOOGLE LIKE A PRO S A H Q R P L
BS
PINTEREST REDDIT GOOGLE
CT
PRINTER VIDEO GAMES USB SMARTPHONES
BE FORGIVING OF OTHER PEOPLE'S MISTAKE•
RULE NO. 10: Do not point out mistakes to people online. Remember that you were once the new kid on the block.• You still need to have a good manners even though you are online and cannot see the person face to face
REMEMBER THE HUMAN
RULE NO. 1: You need to remember that you are talking toa real person when you are online.• The internet brings people together who would otherwise never meet.• Remember this saying when sending an email: "Would I say this to the person's face?
ADHERE TO THE SAME STANDARDS ONLINE THAT YOU FOLLOW IN REAL LIFE
RULE NO. 2: • You need to behave the same way online thatyou do in real life.• You need to remember that you can getcaught doing things you should not be doingonline just like you can in real life.• You are still talking to a real person withfeelings even though you can't see them
KNOW WHERE YOU ARE IN CYBERSPACE•
RULE NO. 3: Always take a look around when you enter a new domain when surfing the web.• Get a sense of what the discussion group is about before you join it.
RESPECT OTHER PEOPLE'S TIME AND BANDWIDTH•
RULE NO. 4: Remember people have other things to do besides read your email.• You are not the center of their world.• Keep your post and emails to minimum by saying what you want to say. Remember everyone won't answer your questions.
MAKE YOURSELF LOOK GOOD ONLINE•
RULE NO. 5: Be polite and pleasant to everyone.• Always check your spelling and grammar before posting.• Know what you are talking about and make sense saying IT
SHARE EXPERT KNOWLEDGE•
RULE NO. 6: Ask questions online Share what you know online.• Post the answers to your questionsonlinee someone may have thesame questionn you do
HELP KEEP FLAMEWARS UNDER CONTROL
RULE NO. 7: Netiquette does not forgive flaming.• Netiquette does however forbid people who are flaming to hurt discussion groups by putting the group down.
RESPECT OTHER PEOPLE'S PRIVACY•
RULE NO. 8: Do not read other people's mail without their permission.• Going through other people's things could cost you, your job or you could even go to jail.• Not respecting other people's privacy is a bad etiquette
DONT ABUSE YOUR POWER•
RULE NO. 9: Do not take advantage of other people just because you have more knowledge or power than them.• Treat others as you would want them to treat you if the roles were reversed
Web 1.0
Refers to the first stage in the World Wide Web, which was entirely made up of the Web pages connected by hyperlinks.
PLUS +
SEARCH PAGES THAT CONTAIN BOTH WORDS
CTRIL +... A K F B C D E L I J M N X P T P O R S U W Y Z
SELECT ALL CONTENTS INSERT HYPERLINK OPEN FIND BOX BOLD TEXT COPY OPEN THE FRONT PREFERENCE ALLIGN IN CENTER ALLIN TO THE LEFT ITALIC ALLIGN TO JUSTIFY SCREEN INDENT OPENS NEW BLANK DOCUMENT WINDOW CUT TEXT PASTE HANGING INDENT PRINT WINDOW OPEN DIALOG BOX ALLIGN TO THE RIGHT SAVE DOCUMENT UNDERLINE CLOSE CURRENT OPEN DOCS REDO LAST ACTION UNDO LAST ACTION
SOCIAL NETWORKS SOCIAL NEWS BLOGS AND FORUMS MEDIA SHARING BOOKMARKING SITES
SOCIAL MEDIA TYPES SN SN B&F MS BS
LONG TAIL
Services that are offered on demand rather than on a one-time purchase. This is synonymous to subscribing to a data plan that charges you for the amount of time you spent on the internet.
FALSE All viruses are malware but not all types of malware are viruses.
T OR F All malware are viruses but not all types of viruses are MALWARE .
FALSE
T OR F?? The content is different for each users that is referred to as Web 1.0
FALSE - CAN TRUE
T OR F??? Technology trends CAN'T influence how customers reach your e -commerce site or the company's strategic efforts. Technology advancements can signal market openings or open up new products, but they can also present new ways that can give you a competitive advantage over your online competition.
Web 2.0
THIS allows users to interact with the page: instead of just reading a page, the user may be able to comment or create a user account. IT also allows users to use web browsers instead of just using their operating system.
HYPHEN -
TO EXCLUDE WORD OR PHRASES
ASTERISK HOW TO *
TO FILL THE MISSING WORD OR PHRASE
LINK LINK:
TO SEARCH FOR A PAGE THAT IS LINK TO ANOTHER PAGE
QUOTATION ""
TO SEARCH FOR EXACT WORD OR PHRASES
RANGE ...
TO SEARCH WITH A RANGE OF NUMBERS
SITE SITE:
TO SEARCH WITH SPECIFIC WEBSITE
B&F
TUMBLER EVERNOTE WORDPRESS
THE RIBBON menu bar
The (1) contains all of the commands you will need to perform COMMON TASK in Word. It has multiple tabs (2) each with several groups of commands.
FALSE-MOST DANGEROUS
The Internet is one of the most SAFE places, especially if you do not know what you are doing.
QUICK ACCESS TOOL BAR
The QUICK access toolbar lets you access COMMON commands no matter which tab is selected. By default, it includes the Save, Undo, and Redo commands. You can add other commands depending on your preference.
KEYLOGGER
The act of secretly recording the KEYS pressed on a keyboard such that the person using it is unaware that their actions are being watched is known as keystroke logging, also known as keylogging or keyboard capture. The person running the logging program can then get the data
Web 3.0
The aim of (1) is to have machines (or servers) understand the user's preferences to be able to deliver web content specifically targeting the user.
Ribbon
The contains all of the commandsyou will need to perform common tasks in Word.It has multiple tabs (menu bar) each withseveral groups of commands.
USER PARTICIPATION
The owner of the website is not the only one who is able to put content. Others can place a content of their own by means of comments, reviews and evaluation e.g., Lazada, Amazon.
PAGE NUMBER INDICATOR
The page number indicator helps you keep track of the number of PAGES your document contains. Click the page number indicator to open the document navigation pane. Here, you can search your document by headings or scroll quickly through its pages.
MOBILE TECHNOLOGY
The popularity of smartphones and tablets has taken a major rise over the years. This is largely because of the devices capability to do task that were originally found in personal computers
DOCUMENT VIEWS
There are three ways to view a document. Simply click to select the desired view:• RM PL WL
Worksheet Views
There are three ways to view a worksheet. Simply click to select the desired view: NV PLV PBR
SOCIAL NETWORKS
These are sites that allow you to CONNECT with other people with the same interest or background
SOCIAL NEWS
These are sites that allows user to post their own NEWS items or links to other news sources
BOOKMARKING SITES
These are sites that allows you to STORE and manage LINKSto various websites and resources
MEDIA SHARING
These sites allows you to UPLOAD and share media content like images, music and VIDEO
BLOGS AND FORUMS
These websites allows user to post their CONTENT
TITLE BAR
This displays the DOCUMENT NAME followed by a program name.
Title Bar
This displays the WORKBOOK NAME followed by a program name.
The Name box
This shows the ADDRESS of the current selection or active cell.
PATENT
Utility patent-It protects a process, manufacture, composition of matter, and a useful machine. Design patent-It protects the shape, appearance, pattern design, layout,and looks of a product. The protection is granted for a limited period, generally 20years from the filing date of the application
CONTEXTUALIZED ONLINE SEARCH & RESEARCH SKILLS
Utilize the Internet as a tool for reliable information gathering and research to best meet particular class objectives or solve a situation. Students will use search engines more effectively. They have a deeper understanding of search strategies, in particular, that will produce results that are helpful for their academic work and career of choice
Tim Berners Lee
WEB Is an information space where documents and other web resources are identified by URLs, interlinked by hypertext links, and can be accessed via the Internet. Invented by ???
The Department of Information and Communication Technology (DICT)
WHO is is in charge of developing, planning, and promoting the country's information and communications technology (ICT) agenda in support of national development?
1983-1987 1987-1991 1991-1993 1993-1995 1995-1999 1999-2003 2003-2007 2007-2010 2010-2013 2013-2019
WORD 1.0 (4) WORD 1.1 (4) WORD 2.0 (2) WORD 6.0 (2) WORD 95/97 (4) WORD 2000-2002 (4) WORD 2003 (4) WORD 2007 (3) WORD 2010 (3) WORD 2013 (6) WORD 2019
The Department of Information and Communication Technology (DICT)
What DICT stands for?
Word Start Screen
When you open Word for the first time, the (1) will appear. From here, you'll be able to create a new document, choose a template, or access your recently edited documents. Click the Blank document to begin
MS
YT SPOTIFY TT
static
__ Web Page is known as a flat page or stationary age in the sense that the page is ''as is'' and cannot be manipulated by the user.
Web-based threats, or online threats,
a category of cybersecurity risks that may cause an undesirable event or action via the internet. Web threats are made possible by end-user vulnerabilities, web service developers/operators, or web services themselves
Search Engines
are programs that look for documents based on SPECIFIED KEYWORDS and return these documents where the keyword were found.