SlideShare a Scribd company logo
1 of 17
GROUP 5
ABARQUEZ, MARIAH NIALLE
ALCUEZAR, HANNAH CHARADE
FONTALLA, ANGELITO
GUEVARRA, IRA
VILLAMOR, JUSTINE
PROF. MARK BAUTISTA
DISCUSSION
Informations and Computer
Technology (ICT)
- it is the main method if the following:
* Communication
*hospitals
*utilities
*getting info and education
*government
*attaining services from business
*purchasing products and services
* expressing social advocacies and awareness
*doing personal and business transaction
WEB 1.0
-Considered as read only web.
-Also, there were few web content creators.
WEB 2.0
-Users can now interact, contribute and create
using internet.
WEB 3.0
-Referred to as data driven or semantic web.
-It utilizes the web content as created by the
users into useful information as needed by the
users.
Technological Convergence
-providing the different services in one device. best example is
our mobile phones.
Social Media
-it allows the users communicate and share informations and
datas in a virtual community.
Mobile Media
-It enable the capture and sharing of media content.
GROUP 1:DANGER ON THE
INTERNET
1. Email Spam- this also known as junk mail, it is
unrequested or a kind of commercial advertising which
is timely use and feasible because that email very cost
effective medium for the sender.
2. Email Spoofing- is a fraudulent email activity hiding
email origins. The act of e-mail spoofing occurs when
imposters are able to deliver emails by altering emails'
sender information
3. Phishing- is one of cyber attack for a criminal to carry
out, but one which can provide these crooks with
everything they need to infiltrate every aspect of their
targets' personal and working lives.
4. Pharming- Pharming sets up a website that contains
copies of pages from a legitimate website in order to
capture confidential information from users, such as
credit card, bank account, social security numbers and
other sensitive personal information.
5. Spyware- is malicious software that, once installed on your
computer, steals your information and sends it to a third party.
It's called spyware because, like a spy hiding in the shadows
recording your every movement, spyware hides on your
computer recording your personal information and sending it
covertly to the attacker.
6. Trojan Horse- malware that is often disguised as legitimate
software. Trojans can be employed by cyber-thieves and hackers
trying to gain access to users' systems. Users are typically tricked
by some form of social engineering into loading and executing
Trojans on their systems.
7. Computer Worm- s a virus that spreads by creating duplicates of
itself on other drives, systems or networks. Computer worms may
send copies of themselves to other computers across network
connections, through email, through an infected Web page or
through instant messages
8. Hacker- Skilled computer programmer who breaks (hacks) a
password code, or otherwise gains remote access to a protected
computer system, mainly for the thrill of it. Unlike a 'cracker,' a
hacker may or may not also perform a criminal action such as
alteration or stealing of data, or transfer of funds.
GROUP 2
INTERNET RESEARCH
Internet research is the easiest form of research and saves
people/user's physical distance.
Though weak in being prone of leaking someone's personal info
and has so many incorrect info, many continue to utilize the
power of internet as a medium of research.
A researcher must know the following skills in order to gather
validated and viable information for thru research:
1. Checking their sources
2. Asking good questions
3. Going beyond what is laid in front (Digging deeper)
4. Being patient in gathering data
5. Citing sources
6. Using networks
GROUP 3
IMAGING WEB DESIGNING AND
ONLINE PLATFORMS
Basic principle of graphics and layout
Layout -is the process of planning and arranging graphics or text
in a page of book
Symmetrical -a layout may be symmetrical where there are equal
weight of elements on both sides of the pages.
Assymetrical- where there is an artistic and different intensity on
one side of page.
Text -the text type should be legible, appropriate font face, and
arranged either left justified, or centered.
Image - the image should be proportionate, with sharp color and
high resolution
Proximity and Harmony -the elements should be close together
and not scattered and arranged apart from each other
COMBINING TEXT, GRAPHICS, AND IMAGES:
Transparent Shapes -add simple shapes with a slight transparency
behind your text to clearly see the text you want to emphasize
Fonts and shapes -should complement each other. You can use
rounded shapes with rounded fonts and sharp shapes with sharp
fonts
Text and background -should be aligned to have an organized
look. You can aligned your text with shapes or geometric figures
in the image
Clean and clear background -use a clean and clear background for
the message to be readable
GROUP 4
Survey
Survey is a conduct market research or other research.
A blog is a discussion or informational website published
on the World Wide Web consisting of discrete, often
informal diary-style text entries.
- blogger - a free web blog publishing tool from google.
-live journal - a service for journals or blog
- issuu - is a free electronic publishing platforms
- tumblr- a mixture of microblogging.
How to create a blog using wordpress go to wordpress.com and
create an account.
Personalizing your blog
-site identity
-colors and background
-fonts
-menu
-content options
-widgets
-static font page
-theme options

More Related Content

What's hot (15)

What is Internet
What is InternetWhat is Internet
What is Internet
 
Introduction to Internet for Library Patrons
Introduction to Internet for Library PatronsIntroduction to Internet for Library Patrons
Introduction to Internet for Library Patrons
 
Application of the internet
Application of the internetApplication of the internet
Application of the internet
 
Gwapo
GwapoGwapo
Gwapo
 
Internet, web browser, search engines
Internet, web browser, search enginesInternet, web browser, search engines
Internet, web browser, search engines
 
Powerpoint Lejla Gacevic
Powerpoint Lejla GacevicPowerpoint Lejla Gacevic
Powerpoint Lejla Gacevic
 
Powerpoint Lejla Gacevic
Powerpoint Lejla GacevicPowerpoint Lejla Gacevic
Powerpoint Lejla Gacevic
 
Learning activity 2
Learning activity 2Learning activity 2
Learning activity 2
 
internet
internetinternet
internet
 
Lesson 08 Web Technology
Lesson 08   Web TechnologyLesson 08   Web Technology
Lesson 08 Web Technology
 
ICT
ICTICT
ICT
 
empowerment technology by: kier and joveryn
empowerment technology by: kier and joverynempowerment technology by: kier and joveryn
empowerment technology by: kier and joveryn
 
website, browser,Domain name, Email, Social networks,Ecommerce
website, browser,Domain name, Email, Social networks,Ecommercewebsite, browser,Domain name, Email, Social networks,Ecommerce
website, browser,Domain name, Email, Social networks,Ecommerce
 
Computer network introduction
Computer network introductionComputer network introduction
Computer network introduction
 
Internet browsing
Internet browsingInternet browsing
Internet browsing
 

Similar to Group 5

1 empowerment technology_by_rey_anthon_&_elma_mea[1]
1 empowerment technology_by_rey_anthon_&_elma_mea[1]1 empowerment technology_by_rey_anthon_&_elma_mea[1]
1 empowerment technology_by_rey_anthon_&_elma_mea[1]niniogolo
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technologypizonaim
 
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONImpowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONCedricPada
 
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology  by: Geraldine Salve Pepe and Lailanie PepeEpowerment Technology  by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepesalvepepe
 
Empowerment technology
Empowerment technology Empowerment technology
Empowerment technology jonaspalen1
 
Divine Gono and Peter Paul Gato
Divine Gono and Peter Paul GatoDivine Gono and Peter Paul Gato
Divine Gono and Peter Paul GatoVineGono
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyesandregoron
 
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...joanagolo4ever
 
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY   diana cerojales and jude bagayEMPOWERMENT TECHNOLOGY   diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagayniniogolo
 
Empowerment Technology by:jewelyn,liezel,mary joy,bryll
Empowerment Technology by:jewelyn,liezel,mary joy,bryllEmpowerment Technology by:jewelyn,liezel,mary joy,bryll
Empowerment Technology by:jewelyn,liezel,mary joy,brylljoanagolo4ever
 
Migo my labs
Migo my labsMigo my labs
Migo my labsrairuta
 
Information communication technology by:ASHLEE,DIANA MAE,ABIGAIL,JELOU
Information communication technology by:ASHLEE,DIANA MAE,ABIGAIL,JELOUInformation communication technology by:ASHLEE,DIANA MAE,ABIGAIL,JELOU
Information communication technology by:ASHLEE,DIANA MAE,ABIGAIL,JELOUashleetimkang
 
Empowerment
EmpowermentEmpowerment
Empowermentrairuta
 
Empowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena MastalEmpowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena MastalPadsromel
 
EMPOWERMENT TECHNOLOGIES.pptx
EMPOWERMENT TECHNOLOGIES.pptxEMPOWERMENT TECHNOLOGIES.pptx
EMPOWERMENT TECHNOLOGIES.pptxTedsTV
 
empowerment technologies
empowerment technologies empowerment technologies
empowerment technologies RicciGozon
 
Ict information communication technology
Ict  information communication technologyIct  information communication technology
Ict information communication technologyniniogolo
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technologyMariaGeronimo3
 
Final reviewer (1)
Final reviewer (1)Final reviewer (1)
Final reviewer (1)MarkTanon
 

Similar to Group 5 (20)

1 empowerment technology_by_rey_anthon_&_elma_mea[1]
1 empowerment technology_by_rey_anthon_&_elma_mea[1]1 empowerment technology_by_rey_anthon_&_elma_mea[1]
1 empowerment technology_by_rey_anthon_&_elma_mea[1]
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONImpowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
 
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology  by: Geraldine Salve Pepe and Lailanie PepeEpowerment Technology  by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
 
Empowerment technology
Empowerment technology Empowerment technology
Empowerment technology
 
Divine Gono and Peter Paul Gato
Divine Gono and Peter Paul GatoDivine Gono and Peter Paul Gato
Divine Gono and Peter Paul Gato
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
 
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
 
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY   diana cerojales and jude bagayEMPOWERMENT TECHNOLOGY   diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagay
 
Empowerment Technology by:jewelyn,liezel,mary joy,bryll
Empowerment Technology by:jewelyn,liezel,mary joy,bryllEmpowerment Technology by:jewelyn,liezel,mary joy,bryll
Empowerment Technology by:jewelyn,liezel,mary joy,bryll
 
Migo my labs
Migo my labsMigo my labs
Migo my labs
 
Information communication technology by:ASHLEE,DIANA MAE,ABIGAIL,JELOU
Information communication technology by:ASHLEE,DIANA MAE,ABIGAIL,JELOUInformation communication technology by:ASHLEE,DIANA MAE,ABIGAIL,JELOU
Information communication technology by:ASHLEE,DIANA MAE,ABIGAIL,JELOU
 
Empowerment
EmpowermentEmpowerment
Empowerment
 
Larra belle ict
Larra belle ictLarra belle ict
Larra belle ict
 
Empowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena MastalEmpowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena Mastal
 
EMPOWERMENT TECHNOLOGIES.pptx
EMPOWERMENT TECHNOLOGIES.pptxEMPOWERMENT TECHNOLOGIES.pptx
EMPOWERMENT TECHNOLOGIES.pptx
 
empowerment technologies
empowerment technologies empowerment technologies
empowerment technologies
 
Ict information communication technology
Ict  information communication technologyIct  information communication technology
Ict information communication technology
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
Final reviewer (1)
Final reviewer (1)Final reviewer (1)
Final reviewer (1)
 

Recently uploaded

How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17Celine George
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文中 央社
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMELOISARIVERA8
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptxPoojaSen20
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi RajagopalEADTU
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjMohammed Sikander
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnershipsexpandedwebsite
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesPooky Knightsmith
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxMarlene Maheu
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project researchCaitlinCummins3
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...Nguyen Thanh Tu Collection
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17Celine George
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhleson0603
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code ExamplesPeter Brusilovsky
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024Borja Sotomayor
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽中 央社
 

Recently uploaded (20)

How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 

Group 5

  • 1. GROUP 5 ABARQUEZ, MARIAH NIALLE ALCUEZAR, HANNAH CHARADE FONTALLA, ANGELITO GUEVARRA, IRA VILLAMOR, JUSTINE
  • 3. Informations and Computer Technology (ICT) - it is the main method if the following: * Communication *hospitals *utilities *getting info and education *government *attaining services from business *purchasing products and services * expressing social advocacies and awareness *doing personal and business transaction
  • 4. WEB 1.0 -Considered as read only web. -Also, there were few web content creators. WEB 2.0 -Users can now interact, contribute and create using internet. WEB 3.0 -Referred to as data driven or semantic web. -It utilizes the web content as created by the users into useful information as needed by the users.
  • 5. Technological Convergence -providing the different services in one device. best example is our mobile phones. Social Media -it allows the users communicate and share informations and datas in a virtual community. Mobile Media -It enable the capture and sharing of media content.
  • 6. GROUP 1:DANGER ON THE INTERNET
  • 7. 1. Email Spam- this also known as junk mail, it is unrequested or a kind of commercial advertising which is timely use and feasible because that email very cost effective medium for the sender. 2. Email Spoofing- is a fraudulent email activity hiding email origins. The act of e-mail spoofing occurs when imposters are able to deliver emails by altering emails' sender information 3. Phishing- is one of cyber attack for a criminal to carry out, but one which can provide these crooks with everything they need to infiltrate every aspect of their targets' personal and working lives. 4. Pharming- Pharming sets up a website that contains copies of pages from a legitimate website in order to capture confidential information from users, such as credit card, bank account, social security numbers and other sensitive personal information.
  • 8. 5. Spyware- is malicious software that, once installed on your computer, steals your information and sends it to a third party. It's called spyware because, like a spy hiding in the shadows recording your every movement, spyware hides on your computer recording your personal information and sending it covertly to the attacker. 6. Trojan Horse- malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. 7. Computer Worm- s a virus that spreads by creating duplicates of itself on other drives, systems or networks. Computer worms may send copies of themselves to other computers across network connections, through email, through an infected Web page or through instant messages
  • 9. 8. Hacker- Skilled computer programmer who breaks (hacks) a password code, or otherwise gains remote access to a protected computer system, mainly for the thrill of it. Unlike a 'cracker,' a hacker may or may not also perform a criminal action such as alteration or stealing of data, or transfer of funds.
  • 11. Internet research is the easiest form of research and saves people/user's physical distance. Though weak in being prone of leaking someone's personal info and has so many incorrect info, many continue to utilize the power of internet as a medium of research. A researcher must know the following skills in order to gather validated and viable information for thru research: 1. Checking their sources 2. Asking good questions 3. Going beyond what is laid in front (Digging deeper) 4. Being patient in gathering data 5. Citing sources 6. Using networks
  • 12. GROUP 3 IMAGING WEB DESIGNING AND ONLINE PLATFORMS
  • 13. Basic principle of graphics and layout Layout -is the process of planning and arranging graphics or text in a page of book Symmetrical -a layout may be symmetrical where there are equal weight of elements on both sides of the pages. Assymetrical- where there is an artistic and different intensity on one side of page. Text -the text type should be legible, appropriate font face, and arranged either left justified, or centered. Image - the image should be proportionate, with sharp color and high resolution Proximity and Harmony -the elements should be close together and not scattered and arranged apart from each other
  • 14. COMBINING TEXT, GRAPHICS, AND IMAGES: Transparent Shapes -add simple shapes with a slight transparency behind your text to clearly see the text you want to emphasize Fonts and shapes -should complement each other. You can use rounded shapes with rounded fonts and sharp shapes with sharp fonts Text and background -should be aligned to have an organized look. You can aligned your text with shapes or geometric figures in the image Clean and clear background -use a clean and clear background for the message to be readable
  • 16. Survey is a conduct market research or other research. A blog is a discussion or informational website published on the World Wide Web consisting of discrete, often informal diary-style text entries. - blogger - a free web blog publishing tool from google. -live journal - a service for journals or blog - issuu - is a free electronic publishing platforms - tumblr- a mixture of microblogging.
  • 17. How to create a blog using wordpress go to wordpress.com and create an account. Personalizing your blog -site identity -colors and background -fonts -menu -content options -widgets -static font page -theme options