The document discusses various topics related to information and communication technology (ICT). It provides an overview of the evolution of the World Wide Web from static Web 1.0 to more interactive Web 2.0 and emerging semantic Web 3.0. It also discusses technology convergence and popular social media platforms. Additionally, it outlines some common online dangers like email spam, phishing and computer viruses as well as protections like firewalls and antivirus software.
2. ICT
ICT
COMMUNICATION
TECHNOLOGYINFORMATION
• IT IS THE UMBRELLA THAT
INCLUDES ANY COMMUNICATION
DEVICE OR APPLICATION,
INCOMPASING, RADIO, TELEVISION,
CELLPHONE, COMPUTER, ECT.
• IT IS ALSO MAIN METHOD OF
COMMUNICATION, AND
EDUCCATION, GETTING
INFORMATION AND ATTAINING
SERVICES, EXPRESSSING SOCIAL
ADVOCATES AND AWARENESS
5. WEB 1.0
• IN THIS STAGE OF INTERNET
TECHNOLOGY THERE WERE VERY
WEB CONTENT CREATORS AND
MANY OF THEM WERE SO CALLED
‘‘READ ONLY WEB’’
• THERE WERE NO USER
INTEACTION
• WEB PAGES ARE STATIC
• THE FEEDBACK MECHANISM WAS
THRU PRIVATE EMAIL.
• NO DIRECT COMMENT AVAILABLE
• EXAMPLE:
6. WEB 2.0
• THE TERM WEB 2.0 WAS USED
AROUND 2004
• INTERNET TECHNOLOGY BECOME
MORE AND MORE INTERACTIVE
(USE OF SOCIAL MEDIA BEGINS)
• THE INTERNET BECAME MORE
AVAILABLE TO EVERY ONE
• THE USERS CAN NOW INTERACT,
CONTRIBUTE AND CREAT THERE
OWN INTERNET SPACE AND
CONTENT
7. WEB 3.0
• IT IS DESCOVERED BY, TIM
BERNES-LEE (FATHER OF THE
WORLD WIDE WEB) AS THE READ-
WRITE –EXECUTE WEB
• IT IS REFFERED TO AS THE
SEMANTIC WEB OR DATA DRIVEN
WEB CONTENT AND RESPONSE.
• IT WILL NOT MAKE THE WEB 2.0
OBSELETE
9. TECHNOLOGY CONVERGENCE
• IT IS AN EVOLUTION OF TECHNOLOGICAL
DEVELOPMENT THAT MERGE INTO A NEW
SYSTEMS BRINGING TOGETHER DIFFERENT
TYPES OF APPLICANTS AND MEDIA
SOCIAL MEDIA
• INTERNET CONNECTION
• IT IS A COLLECTION OF INTERNET –BASED
COMMUNICATION TOOLS AND COMPUTER-
ASSISTED CHANNELS DEDICATED TO ALLOW
USERS TO INTERACT ,COMMUNICATE ,AND
SHARE INFORMATION IN A VIRTUAL
COMMUNITY AND NETWORK.
FACEBOOK
10. FACEBOOK
• IS A POPULAR AND FAMOUS
• IS A POPULAR AND FREE AND SOCIAL NETWORKING SITE
WITH MORE THAN A BILLION USERS TO CREATE PROFILES
,UPLOAD PHOTO AND VIDEOS, CREATE AND JOIN GROUPS,
REACT TO FRIENDS POST ,CREATE EVENTS, SEND MESSAGES
,KEEPING IN TOUCH WITH CLOSE FRIENDS,AND RELATIVES.
11. TWITTER
• WITH MORE THAN 300 MILLION USERS IN 2016
• ALLOWS USERS TO MICROBLOG OR BROADCAST SHORT
MESSAGE CALLED ‘’TWEETS.’’
12. INSTAGRAM
• A SOCIAL NETWORKING APP THAT ENABLES THE USER TO
SHARE MOBILE PHOTO AND VIDEO EITHER PUBLICITY OR
PRIVATELY.
13. SNAPCHAT
• DESIGNED FOR THE MOBILE NETWORKING APPLICATION.
• ALSO DESIGNED FOR PHOTO SHARING , CHAT AND
MESSAGING SERVICES.
14. ASSISTIVE MEDIA
• IT IS A NONPROFIT ORGANIZATION FOUNDED IN 1996 IN ANN
ARBOR, MICHIGAN USA.
• IT WAS THE FIRST INTERNET –BASED READING SERVICE FOR
PERSONS WITH VISUAL AND READING IMPAIRMENTS.
16. EMAIL SPAM
• KNOWN AS JUNK EMAIL, USUALLY UNSOLICITATED
COMMERCIAL EMAIL SENT FROM ONE SOURCE WITH
IDENTICAL MESSAGE TO SEND TO MULTIPLE RECIPIENTS.
• SPAMMER - IS THE TERM USED TO REFER TO A PERSON WHO
CREATES ELECTRONIC SPAM.
•
17. EMAIL SPOOFING
• A DECIETFUL EMAIL PRACTICE IN WHICH THE SENDER
ADDRESS IS CHANGED SO THAT IT WOULD APPEAR TO HAVE
COME FROM A DIFFERENT SOURCES USUALLY SOMEONE YOU
KNOW.
• IT IS USUALLY USED BY SPAMMERS TO HIODE THE ORIGIN OF
THE SPAM.
18. PHISHING
• A DECEITFUL PRACTICE OF TRYING TO GET CONFIDENTIAL
INFORMATION SUCH AS PASSWORDS AND USERNAME,AND
CREDIT CARD details by making it appear as it if comes from a
trustworthy source
19. Pharming
• A dangerous hacker attack on a web site which directs all traffic to the web
site to another fictitious website.
• It main objective it to obtain username and passwords, as well as credit card
and financial information and use these to steal money electronically.
`
20. Spyware
• It is the computer program that is installed covertly on a personal computer
to collect information even take control over the computer without the
knowledge of the user.
21. Computer Worm
• It will delete your files
• Is a dangerous computer program that replicates itself though a network
then infect the system.
22. Trojan Horse
• A malicious software fronting to perform a good task, but covertly performs
undesirable function which the intension of entering the computer without
the users content.
• It can erase your data , can corrupt files
23. Computer Virus
• A program that duplicates itself & then infects the computer
• It spread like a real biological virus, where in attaches itself to a host
program and infects other computer it is received by a computer through the
internet.
• Virus can also be transferred by the use of removable storage
24. Hacker
• Is a person who is able to enter the control another peoples computer
without authorization.
• Be able to enter another computer, usually vandalizes the victims website,
steal personal information, obtains intellectual property, performs credit
cards fraud.
28. FIREWALL
• Helps in protecting your computer from unauthorized entries viruses,or
worms from the internet or network.
29. Automatic updates
• Another feature of windows which when turned on will automatically
download updates from microsoft windows website.
30. Virus protection
• Is usually about the current antivirus software installed in your computer.
• Antivirus software is meant to locate, find ,and remove virus threats that are
already in your computer.
31. Contextualize
• Is to place (something , such as
word or activity )in a context
Research
• The collecting about a particular
subject.
Strategy
• The art of devising or employing
plans or strategies toward a goal.
• A careful plan or method
Compilation
• The act or process of compiling
32. Citation
• An act of quoting; especially the
citing of a previously settled case at
law.
33. Contextual Search
• Is attempt to be more precise in
providing the list documents
according to the words used by the
user to search the internet
• A good contextual research engine
would request for more
information to narrow down the
result of the research.
34. 1.Identify or choose a topic
2.Topic or task definition
3.Identify methods of search
Experiments
Explore
Survey
36. Critical Thinking
• It is the ability to digest, reflect and
conclude from the information
searched.
37. ANALYTICAL THINKING
• The ability to look verbalize , conceptualized and gather data attuned
to the context of the subject.
The ability to apply synthesis focus and critical thinking to extract
the useful information.
38. PROBLEM SOLVING CAPABILITY
• The ability to present solution or solve problems by presenting a
decision based on the given information.
•People with this ability are able to define and identify the latitude of the
problem and present all possible solution.
39. ORGANIZED DATA MINING
• It is the ability to organized and catalogue all collected materials
efficiently despite data size.
40. RESEARCH PRESENTATION
• It is the ability to present ideas and draw conclusion from the research.
Be able to explain in writing the purpose , steps goals and objective of
the research.
41. CREATIVITY AND DEVELOPED
IMAGINATION
• It is the ability to look for alternative solutions to the problems needed
to solve in the research.
Thinking beyond the usual approaches to the research objectives.
42. COMPUTER LITERACY
• Knowledge of the various computer application and tools.
Skills in the use of software to write design and present.
43. Steps in contextualize Research
1. Open the google site.
2. On the upper right side of the window, click the google app icons & click search
G.
3. On the lower right part of the window , click setting and the google search setting
pop-up list will appear.
4. Click advanced search & the advanced search window will appear.
5. Type the keywords that you would like to search & click the advance search
button.
44. Identify good source from satirical source
• Satirical sites are websites that report untrue or false stories meant to amuse
or entertain.
• Untrue stories should not be shared with your friends, and family.
45. HOW TO DETECT SATIRICAL NEWS
1. If it is too good to be true,then it must be so.
2. If the news did not emanate from reliable news site.
3. If they are from known satirical sites.
46. LIST OF TOP SOURCES OF SATIRICAL
SITES
1. Adobo Chronicles ( adobochronicles.com )
2. So what’s News ?(sowhatsnews.wordpress.com)
3. Eritas Times (eritastime.com)
4. The Professional Heckler (ProfessionalHeckler.wordpress.com)
47. 1. LIST AMERICAN SATIRICAL SITES IN
THE US
1. The Onion (theonion.com)
2. ClickHole (clickhole.com)
3.Christwire Global Media (christwire.org.)
48. MAIL MERGE AND LABEL
GENERATION
• It is used to automatically add mailing addresses or personalized information
to your publication.
49. PARTS OF MAIL MERGE
1. Recipient list
2. Publication with merge fields
3. Merge publication
50. MAILING START GROUP COMMANDS
• Mail merge
• Email merge
Merges data into a publication which
will be printed mailed. Shows step by
step mail merge wizard.
Merge data into a publication that will
be sent as e-mail.
51. • Select recipients
• Edit recipient list
• Chooses the list of people you
intend to send the letter to. You can
type your own list use our outlook
contacts or connect to a database.
• Makes changes to the llist of
recipients and decide whichof them
should receive you letter.
52. • Insert Merge field • Adds a field from your recipient list
to the publication.