3. Informations and Computer
Technology (ICT)
- it is the main method if the following:
* Communication
*hospitals
*utilities
*getting info and education
*government
*attaining services from business
*purchasing products and services
* expressing social advocacies and awareness
*doing personal and business transaction
4. WEB 1.0
-Considered as read only web.
-Also, there were few web content creators.
WEB 2.0
-Users can now interact, contribute and create
using internet.
WEB 3.0
-Referred to as data driven or semantic web.
-It utilizes the web content as created by the
users into useful information as needed by the
users.
5. Technological Convergence
-providing the different services in one device. best example is
our mobile phones.
Social Media
-it allows the users communicate and share informations and
datas in a virtual community.
Mobile Media
-It enable the capture and sharing of media content.
7. 1. Email Spam- this also known as junk mail, it is
unrequested or a kind of commercial advertising which
is timely use and feasible because that email very cost
effective medium for the sender.
2. Email Spoofing- is a fraudulent email activity hiding
email origins. The act of e-mail spoofing occurs when
imposters are able to deliver emails by altering emails'
sender information
3. Phishing- is one of cyber attack for a criminal to carry
out, but one which can provide these crooks with
everything they need to infiltrate every aspect of their
targets' personal and working lives.
4. Pharming- Pharming sets up a website that contains
copies of pages from a legitimate website in order to
capture confidential information from users, such as
credit card, bank account, social security numbers and
other sensitive personal information.
8. 5. Spyware- is malicious software that, once installed on your
computer, steals your information and sends it to a third party.
It's called spyware because, like a spy hiding in the shadows
recording your every movement, spyware hides on your
computer recording your personal information and sending it
covertly to the attacker.
6. Trojan Horse- malware that is often disguised as legitimate
software. Trojans can be employed by cyber-thieves and hackers
trying to gain access to users' systems. Users are typically tricked
by some form of social engineering into loading and executing
Trojans on their systems.
7. Computer Worm- s a virus that spreads by creating duplicates of
itself on other drives, systems or networks. Computer worms may
send copies of themselves to other computers across network
connections, through email, through an infected Web page or
through instant messages
9. 8. Hacker- Skilled computer programmer who breaks (hacks) a
password code, or otherwise gains remote access to a protected
computer system, mainly for the thrill of it. Unlike a 'cracker,' a
hacker may or may not also perform a criminal action such as
alteration or stealing of data, or transfer of funds.
11. Internet research is the easiest form of research and saves
people/user's physical distance.
Though weak in being prone of leaking someone's personal info
and has so many incorrect info, many continue to utilize the
power of internet as a medium of research.
A researcher must know the following skills in order to gather
validated and viable information for thru research:
1. Checking their sources
2. Asking good questions
3. Going beyond what is laid in front (Digging deeper)
4. Being patient in gathering data
5. Citing sources
6. Using networks
13. Basic principle of graphics and layout
Layout -is the process of planning and arranging graphics or text
in a page of book
Symmetrical -a layout may be symmetrical where there are equal
weight of elements on both sides of the pages.
Assymetrical- where there is an artistic and different intensity on
one side of page.
Text -the text type should be legible, appropriate font face, and
arranged either left justified, or centered.
Image - the image should be proportionate, with sharp color and
high resolution
Proximity and Harmony -the elements should be close together
and not scattered and arranged apart from each other
14. COMBINING TEXT, GRAPHICS, AND IMAGES:
Transparent Shapes -add simple shapes with a slight transparency
behind your text to clearly see the text you want to emphasize
Fonts and shapes -should complement each other. You can use
rounded shapes with rounded fonts and sharp shapes with sharp
fonts
Text and background -should be aligned to have an organized
look. You can aligned your text with shapes or geometric figures
in the image
Clean and clear background -use a clean and clear background for
the message to be readable
16. Survey is a conduct market research or other research.
A blog is a discussion or informational website published
on the World Wide Web consisting of discrete, often
informal diary-style text entries.
- blogger - a free web blog publishing tool from google.
-live journal - a service for journals or blog
- issuu - is a free electronic publishing platforms
- tumblr- a mixture of microblogging.
17. How to create a blog using wordpress go to wordpress.com and
create an account.
Personalizing your blog
-site identity
-colors and background
-fonts
-menu
-content options
-widgets
-static font page
-theme options