This document provides an introduction to educational technology by Sam Joseph I. Llander, a student at Amando Cope College studying Bachelor of Secondary Education majoring in Biology. It discusses key topics like what educational technology is, how to connect to the internet, how to evaluate websites, what plagiarism and copyright are. It defines educational technology as the application of research findings and studies to improve teaching and learning. It also outlines different types of networks like LAN and WAN and explains how to connect to the internet through options like dial-up, DSL, cable, satellite, 3G/4G. Password safety tips and an introduction to search engines are also provided.
This document provides a summary of a student's educational technology assignment. It introduces the student, Madelaine C. Bonaobra, a second year Bachelor of Secondary Education student at Amando Cope College. The document then defines educational technology and discusses its scope, including behavioral technology, instructional technology, teaching technology, and information technology. It also provides examples of how information technology can be used in education.
This document contains a portfolio created by Oriel Ryan Cano for an Educational Technology course. The portfolio outlines topics covered in the course including an introduction to educational technology, uses of technology in education, what the internet and web browsers are, and how to avoid plagiarism and follow proper netiquette. Key terms defined include educational technology, internet, website, web page, HTML, URL, types of internet connections, copyright, and plagiarism. Common keyboard shortcuts are also listed.
The document provides an introduction to basic internet concepts for seniors. It covers what the internet is, how to use a web browser and mouse, how to visit known and unknown websites, and basic terminology like URLs, hyperlinks, home pages, and web pages. It aims to explain the essential tools and navigation needed to begin exploring the internet.
The document discusses the history and evolution of the Internet. It describes how the Internet began as a network called ARPANET established by the US Department of Defense in 1969. Over time, restrictions were lifted and it became available for commercial use. Major developments included the creation of the World Wide Web in 1990, the release of early web browsers like Mosaic, and the commercialization of the Internet in the mid-1990s. The document also provides definitions of key Internet-related terms and technologies like search engines, browsers, and basic services like email, FTP, and telnet.
The document discusses the Internet and its various uses and components. It defines the Internet as the interconnection of computer networks using TCP/IP protocols. It describes common Internet facilities like email, e-commerce, e-banking, online reservations, search engines, chatting and video conferencing. It also discusses types of Internet connections, web browsers, domain names, websites for different purposes, and technologies used to develop websites.
The World Wide Web (WWW) is a worldwide collection of electronic documents that can contain text, graphics, sound, video, and connections between pages. Each document is called a Web page and is accessed through a Web browser. A Web site is a collection of related Web pages, with the home page often providing connections to other pages within the site.
The document provides an overview of the internet including:
- The internet is a global system of interconnected computer networks that connects millions of private, public, academic and government networks worldwide.
- It allows for communication through email, messaging, phone calls, websites and more.
- Key people in the development of the internet include those who created the ARPANET and Tim Berners-Lee who invented the World Wide Web.
- Common ways to connect include wired connections through cables/phone lines, wireless connections, and satellite connections. Devices like modems facilitate these connections.
- Popular web browsers, search engines, and communication tools help users access and navigate the internet. Basic safety tips are also outlined.
This document provides a summary of a student's educational technology assignment. It introduces the student, Madelaine C. Bonaobra, a second year Bachelor of Secondary Education student at Amando Cope College. The document then defines educational technology and discusses its scope, including behavioral technology, instructional technology, teaching technology, and information technology. It also provides examples of how information technology can be used in education.
This document contains a portfolio created by Oriel Ryan Cano for an Educational Technology course. The portfolio outlines topics covered in the course including an introduction to educational technology, uses of technology in education, what the internet and web browsers are, and how to avoid plagiarism and follow proper netiquette. Key terms defined include educational technology, internet, website, web page, HTML, URL, types of internet connections, copyright, and plagiarism. Common keyboard shortcuts are also listed.
The document provides an introduction to basic internet concepts for seniors. It covers what the internet is, how to use a web browser and mouse, how to visit known and unknown websites, and basic terminology like URLs, hyperlinks, home pages, and web pages. It aims to explain the essential tools and navigation needed to begin exploring the internet.
The document discusses the history and evolution of the Internet. It describes how the Internet began as a network called ARPANET established by the US Department of Defense in 1969. Over time, restrictions were lifted and it became available for commercial use. Major developments included the creation of the World Wide Web in 1990, the release of early web browsers like Mosaic, and the commercialization of the Internet in the mid-1990s. The document also provides definitions of key Internet-related terms and technologies like search engines, browsers, and basic services like email, FTP, and telnet.
The document discusses the Internet and its various uses and components. It defines the Internet as the interconnection of computer networks using TCP/IP protocols. It describes common Internet facilities like email, e-commerce, e-banking, online reservations, search engines, chatting and video conferencing. It also discusses types of Internet connections, web browsers, domain names, websites for different purposes, and technologies used to develop websites.
The World Wide Web (WWW) is a worldwide collection of electronic documents that can contain text, graphics, sound, video, and connections between pages. Each document is called a Web page and is accessed through a Web browser. A Web site is a collection of related Web pages, with the home page often providing connections to other pages within the site.
The document provides an overview of the internet including:
- The internet is a global system of interconnected computer networks that connects millions of private, public, academic and government networks worldwide.
- It allows for communication through email, messaging, phone calls, websites and more.
- Key people in the development of the internet include those who created the ARPANET and Tim Berners-Lee who invented the World Wide Web.
- Common ways to connect include wired connections through cables/phone lines, wireless connections, and satellite connections. Devices like modems facilitate these connections.
- Popular web browsers, search engines, and communication tools help users access and navigate the internet. Basic safety tips are also outlined.
This document provides an overview of how the web works. It begins with the basic concepts and history of the Internet, distinguishing between the Internet and the World Wide Web. It describes key components like web browsers that users employ to access web pages, and web servers that host websites and content. Specific examples of popular browsers like Chrome and Safari are outlined, as well as common web server software like Apache, IIS, and Nginx. The document aims to explain the fundamental workings and interconnected pieces that make up the modern web.
The document discusses the history and development of the Internet and World Wide Web. It begins with the creation of ARPANET in the 1960s and the invention of the Web by Tim Berners-Lee in 1989. It then covers various Internet technologies like instant messaging, VoIP, blogs, podcasts, and social networking. The document also discusses online annoyances like spam, cookies, and malware. Finally, it briefly discusses evaluating websites and the future of Internet technologies.
this pdf file description
what is the Internet Basics topics likes ;
what is the internet
What is the World Wide Web?
Exploring the Internet using Microsoft Internet Explorer
What is a URL?
What are Domains? and so on.
Empowerment Technology By: JOAN GOZO AND KENNETH MACUTOPadsromel
This document discusses empowerment through technology. It begins by defining ICT and outlining the evolution from Web 1.0 to 3.0. It then discusses technologies like social media, smartphones, and specific platforms. Dangers of the internet like viruses and hackers are also covered. The document provides guidance on contextualized research including defining terms and outlining steps. It also discusses skills needed for research and summarizes parts of tools like Gmail merge and GIMP image software.
The document discusses various topics related to information and communication technology (ICT). It provides an overview of the evolution of the World Wide Web from static Web 1.0 to more interactive Web 2.0 and emerging semantic Web 3.0. It also discusses technology convergence and popular social media platforms. Additionally, it outlines some common online dangers like email spam, phishing and computer viruses as well as protections like firewalls and antivirus software.
The document discusses the pros and cons of using the internet. Some of the key pros are that the internet allows for easy global communication through email and chat rooms, facilitates online shopping and access to vast information. However, some cons are risks to personal privacy, receiving spam emails, and potential for cyber crimes. The internet also allows anonymous posting that can spread hate speech and instigation. Additionally, internet overuse can make people lazier and impose a fast pace of information.
This slide is about the computer services and it's uses. It also explain much about technology and how it's changed our lives. It states the benefits of computer services. It is very helpful for children to in secondary school to understand this topic with ease. Also , it's enriched with pictures to make the slide altogether more helpful.
Empowerment Technology By: Zyrhell Rafer and Bretny RocesPadsromel
This document discusses the use of information and communication technology (ICT) and how it has evolved over time. It provides details on:
- ICT being the umbrella term for any communication device or application, including radio, television, computers, etc.
- The evolution of the World Wide Web from static Web 1.0 to more interactive Web 2.0 to the semantic Web 3.0.
- Popular social media platforms like Facebook, Twitter, Instagram, and Snapchat.
- Potential dangers of using technology like email spam, spoofing, phishing, malware, and how to better protect computers and networks.
The document discusses the history and services of the Internet and World Wide Web. It begins with the origins of the ARPANET network project in 1969 and how it evolved into the Internet we know today. It then explains the development of the World Wide Web and how users can access and navigate it using web browsers, search engines, links and other features. The document also outlines various internet services like email, forums, chat rooms and e-commerce as well as best practices for online etiquette.
The document provides an overview of the internet including:
1. The internet began in 1969 as a US military network called ARPANET and has since grown to connect billions of users worldwide.
2. The internet allows people to communicate via email, social media, chat, blogs, streaming media and more. It also provides access to information through search engines and websites on a huge variety of topics.
3. Ensuring strong, unique passwords is important for security as hackers can crack weak passwords to access personal or financial information. Proper password practices help reduce this risk.
This document discusses the internet and its uses and misuses. It defines the internet and describes how it has led to both increased connectivity but also overdependence on technology. It outlines important internet services and both positive and negative uses. Positive uses include online communication and information sharing, while misuses include piracy, identity theft, cyberbullying, fake advertisements, hacking, time wastage, and cybercrime. The conclusion emphasizes both the potential of the internet for business if used carefully and properly, but also the complex issues that must be understood to avoid risks.
Empowerment technology Grecille Mae Gesulga and CatalinoPadsromel
The document discusses various topics related to information and communication technology (ICT). It provides information on the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also discusses popular social media platforms like Facebook, Twitter, and Instagram. Additionally, it outlines some potential dangers of internet use like email spam, phishing, and computer viruses. It provides tips for protecting networks and computers from online threats. The document also discusses contextual search strategies and how to identify satirical news sources.
This document discusses empowerment through information and communication technologies (ICT) and provides information on current states of the internet. It describes the evolution from static Web 1.0 to more interactive Web 2.0 and the emerging semantic Web 3.0. The document also discusses technology convergence through examples like smartphones, discusses popular social media platforms, and outlines some dangers of computers like email spam, phishing, and computer viruses. It provides guidance on research skills and contextualizing online searches as well as how to use mail merge functions in Microsoft Word.
Internet ppt includes :history, introduction, defination, internet services, differences between web and internet, different types of web browser, web page., web browsers, protocol, electron mail, advantages and disadvantages of internet
The document discusses the internet and its uses and misuses. It defines the internet as a worldwide network of interconnected computer networks that transmit data using the Internet Protocol. It notes that the internet allows people to communicate and share data anywhere in the world if they have access. Some key uses mentioned include communication with friends, online shopping, watching videos, and performing research. However, the document also lists several misuses, such as identity theft, piracy, cyberbullying, fake advertisements, pornography, hacking, time wastage, and negative impacts on family communication.
This class is a very basic internet class. In this class you will learn terms such as browser, URL, search engines, links, etc. After this class you will be able to open a browser, navigate to a website, and navigate within a website.
The document discusses the history and development of the Internet and how it has revolutionized communication globally. It began as disconnected computer networks but over time became interconnected, allowing people around the world to communicate nearly instantly. While the Internet has enabled faster and cheaper communication, some drawbacks include potential misunderstandings without visual/audio cues and receiving unwanted emails or files containing viruses. Overall, email and instant messaging are popular ways to communicate despite some disadvantages.
The presentation gives the basic idea on how internet is used as a powerful tool for education. In India UGC is the apex body for higher education. Also find information on INFLIBNET centre which is an Autonomous Inter-University Centre (IUC) of University Grants Commission (UGC) of India.
The document discusses the origins and uses of the Internet. It explains that the Internet began in the late 1960s as the ARPANET, a network created by the U.S. Department of Defense to link computers. It grew into a "network of networks" connecting thousands worldwide. The document then lists several common uses of the Internet today, including social networking, communication, career development, education, research, news/updates, financial transactions, shopping, and leisure activities. In summary, the Internet originated as a military network and is now the world's largest computer network used widely for social media, information sharing, commerce, and entertainment.
The document discusses the evolution of the World Wide Web from Web 1.0 to the potential future versions such as Web 5.0. It provides definitions and predictions of each phase from various sources:
- Web 4.0 is described as enabling "intelligent interaction" through technologies like voice input and tablets that can receive information without touch. It is also defined as relying on "ultra-intelligent electronic agents."
- Descriptions of Web 5.0 include it being focused on time-based services, enabling direct brain interface, or developing a "Wise Web" with self-aware global intelligence.
- There is no clear consensus on the definitions and progressions as different sources propose varying visions, but
The document provides an overview of the internet, including its definition, history, uses, and advantages/disadvantages. It defines the internet as a network of connected computers around the world used to share information. The history section outlines the early developments from basic communication needs to modern internet use. Key advantages discussed are faster global communication, online services, social networking, research, education, and entertainment. Disadvantages include virus threats, loneliness, social isolation, spamming, and theft of information. The conclusion emphasizes the importance of internet security both for personal protection and computer protection through tools like antivirus software and firewalls.
This document provides information about information and communication technology (ICT). It defines ICT as dealing with using different communication technologies like mobile phones and the internet to locate, save, send, and edit information. It then discusses the evolution of the World Wide Web from static Web 1.0 pages to dynamic Web 2.0 pages that allow user participation through features like tagging, user-generated content, and social media. Finally, it outlines trends in ICT like technological convergence in devices, the rise of social media, and increased use of mobile technologies.
This document provides an overview of how the web works. It begins with the basic concepts and history of the Internet, distinguishing between the Internet and the World Wide Web. It describes key components like web browsers that users employ to access web pages, and web servers that host websites and content. Specific examples of popular browsers like Chrome and Safari are outlined, as well as common web server software like Apache, IIS, and Nginx. The document aims to explain the fundamental workings and interconnected pieces that make up the modern web.
The document discusses the history and development of the Internet and World Wide Web. It begins with the creation of ARPANET in the 1960s and the invention of the Web by Tim Berners-Lee in 1989. It then covers various Internet technologies like instant messaging, VoIP, blogs, podcasts, and social networking. The document also discusses online annoyances like spam, cookies, and malware. Finally, it briefly discusses evaluating websites and the future of Internet technologies.
this pdf file description
what is the Internet Basics topics likes ;
what is the internet
What is the World Wide Web?
Exploring the Internet using Microsoft Internet Explorer
What is a URL?
What are Domains? and so on.
Empowerment Technology By: JOAN GOZO AND KENNETH MACUTOPadsromel
This document discusses empowerment through technology. It begins by defining ICT and outlining the evolution from Web 1.0 to 3.0. It then discusses technologies like social media, smartphones, and specific platforms. Dangers of the internet like viruses and hackers are also covered. The document provides guidance on contextualized research including defining terms and outlining steps. It also discusses skills needed for research and summarizes parts of tools like Gmail merge and GIMP image software.
The document discusses various topics related to information and communication technology (ICT). It provides an overview of the evolution of the World Wide Web from static Web 1.0 to more interactive Web 2.0 and emerging semantic Web 3.0. It also discusses technology convergence and popular social media platforms. Additionally, it outlines some common online dangers like email spam, phishing and computer viruses as well as protections like firewalls and antivirus software.
The document discusses the pros and cons of using the internet. Some of the key pros are that the internet allows for easy global communication through email and chat rooms, facilitates online shopping and access to vast information. However, some cons are risks to personal privacy, receiving spam emails, and potential for cyber crimes. The internet also allows anonymous posting that can spread hate speech and instigation. Additionally, internet overuse can make people lazier and impose a fast pace of information.
This slide is about the computer services and it's uses. It also explain much about technology and how it's changed our lives. It states the benefits of computer services. It is very helpful for children to in secondary school to understand this topic with ease. Also , it's enriched with pictures to make the slide altogether more helpful.
Empowerment Technology By: Zyrhell Rafer and Bretny RocesPadsromel
This document discusses the use of information and communication technology (ICT) and how it has evolved over time. It provides details on:
- ICT being the umbrella term for any communication device or application, including radio, television, computers, etc.
- The evolution of the World Wide Web from static Web 1.0 to more interactive Web 2.0 to the semantic Web 3.0.
- Popular social media platforms like Facebook, Twitter, Instagram, and Snapchat.
- Potential dangers of using technology like email spam, spoofing, phishing, malware, and how to better protect computers and networks.
The document discusses the history and services of the Internet and World Wide Web. It begins with the origins of the ARPANET network project in 1969 and how it evolved into the Internet we know today. It then explains the development of the World Wide Web and how users can access and navigate it using web browsers, search engines, links and other features. The document also outlines various internet services like email, forums, chat rooms and e-commerce as well as best practices for online etiquette.
The document provides an overview of the internet including:
1. The internet began in 1969 as a US military network called ARPANET and has since grown to connect billions of users worldwide.
2. The internet allows people to communicate via email, social media, chat, blogs, streaming media and more. It also provides access to information through search engines and websites on a huge variety of topics.
3. Ensuring strong, unique passwords is important for security as hackers can crack weak passwords to access personal or financial information. Proper password practices help reduce this risk.
This document discusses the internet and its uses and misuses. It defines the internet and describes how it has led to both increased connectivity but also overdependence on technology. It outlines important internet services and both positive and negative uses. Positive uses include online communication and information sharing, while misuses include piracy, identity theft, cyberbullying, fake advertisements, hacking, time wastage, and cybercrime. The conclusion emphasizes both the potential of the internet for business if used carefully and properly, but also the complex issues that must be understood to avoid risks.
Empowerment technology Grecille Mae Gesulga and CatalinoPadsromel
The document discusses various topics related to information and communication technology (ICT). It provides information on the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also discusses popular social media platforms like Facebook, Twitter, and Instagram. Additionally, it outlines some potential dangers of internet use like email spam, phishing, and computer viruses. It provides tips for protecting networks and computers from online threats. The document also discusses contextual search strategies and how to identify satirical news sources.
This document discusses empowerment through information and communication technologies (ICT) and provides information on current states of the internet. It describes the evolution from static Web 1.0 to more interactive Web 2.0 and the emerging semantic Web 3.0. The document also discusses technology convergence through examples like smartphones, discusses popular social media platforms, and outlines some dangers of computers like email spam, phishing, and computer viruses. It provides guidance on research skills and contextualizing online searches as well as how to use mail merge functions in Microsoft Word.
Internet ppt includes :history, introduction, defination, internet services, differences between web and internet, different types of web browser, web page., web browsers, protocol, electron mail, advantages and disadvantages of internet
The document discusses the internet and its uses and misuses. It defines the internet as a worldwide network of interconnected computer networks that transmit data using the Internet Protocol. It notes that the internet allows people to communicate and share data anywhere in the world if they have access. Some key uses mentioned include communication with friends, online shopping, watching videos, and performing research. However, the document also lists several misuses, such as identity theft, piracy, cyberbullying, fake advertisements, pornography, hacking, time wastage, and negative impacts on family communication.
This class is a very basic internet class. In this class you will learn terms such as browser, URL, search engines, links, etc. After this class you will be able to open a browser, navigate to a website, and navigate within a website.
The document discusses the history and development of the Internet and how it has revolutionized communication globally. It began as disconnected computer networks but over time became interconnected, allowing people around the world to communicate nearly instantly. While the Internet has enabled faster and cheaper communication, some drawbacks include potential misunderstandings without visual/audio cues and receiving unwanted emails or files containing viruses. Overall, email and instant messaging are popular ways to communicate despite some disadvantages.
The presentation gives the basic idea on how internet is used as a powerful tool for education. In India UGC is the apex body for higher education. Also find information on INFLIBNET centre which is an Autonomous Inter-University Centre (IUC) of University Grants Commission (UGC) of India.
The document discusses the origins and uses of the Internet. It explains that the Internet began in the late 1960s as the ARPANET, a network created by the U.S. Department of Defense to link computers. It grew into a "network of networks" connecting thousands worldwide. The document then lists several common uses of the Internet today, including social networking, communication, career development, education, research, news/updates, financial transactions, shopping, and leisure activities. In summary, the Internet originated as a military network and is now the world's largest computer network used widely for social media, information sharing, commerce, and entertainment.
The document discusses the evolution of the World Wide Web from Web 1.0 to the potential future versions such as Web 5.0. It provides definitions and predictions of each phase from various sources:
- Web 4.0 is described as enabling "intelligent interaction" through technologies like voice input and tablets that can receive information without touch. It is also defined as relying on "ultra-intelligent electronic agents."
- Descriptions of Web 5.0 include it being focused on time-based services, enabling direct brain interface, or developing a "Wise Web" with self-aware global intelligence.
- There is no clear consensus on the definitions and progressions as different sources propose varying visions, but
The document provides an overview of the internet, including its definition, history, uses, and advantages/disadvantages. It defines the internet as a network of connected computers around the world used to share information. The history section outlines the early developments from basic communication needs to modern internet use. Key advantages discussed are faster global communication, online services, social networking, research, education, and entertainment. Disadvantages include virus threats, loneliness, social isolation, spamming, and theft of information. The conclusion emphasizes the importance of internet security both for personal protection and computer protection through tools like antivirus software and firewalls.
This document provides information about information and communication technology (ICT). It defines ICT as dealing with using different communication technologies like mobile phones and the internet to locate, save, send, and edit information. It then discusses the evolution of the World Wide Web from static Web 1.0 pages to dynamic Web 2.0 pages that allow user participation through features like tagging, user-generated content, and social media. Finally, it outlines trends in ICT like technological convergence in devices, the rise of social media, and increased use of mobile technologies.
This document provides an introduction to educational technology. It defines educational technology as focusing on developing teacher materials and student outputs while introducing learning theories and principles for instructional design. It discusses behavioral technology which aims to modify teaching behaviors and instructional technology as a systematic process of learning and teaching. The document also outlines six uses of information technology in education such as providing educational resources, enabling instant access to information, supporting full-time learning, facilitating group learning, enhancing teaching through audio/visual aids, and enabling long-distance learning. It further discusses how information and communication technologies can help improve education quality by motivating learning, facilitating basic skills acquisition, and enhancing teacher training.
This document provides an overview of a college lecture on computer networks and the internet. It discusses the objectives of the lecture which are to describe the evolution and components of the internet, how data travels online, IP addresses and domain names, the world wide web, and web browsers. The lecture will cover the history of the internet from its origins as ARPANET to the development of the world wide web. It will also explain internet connections, internet service providers, and how requests are routed from users to servers and back.
Empowerment Technology ICT, Internet, Web 2.0, Web 3.0MaryGraceCaringal2
This document provides information about empowerment technology and the internet. It discusses how empowerment technology aims to give individuals more control over their lives through tools and strategies. It then explains key concepts about information and communication technology, including how the internet connects millions of networks and allows for sharing of information. Different types of internet-based collaboration tools are outlined, such as document sharing, web conferencing, and instant messaging. The document also discusses characteristics of Web 2.0 like social networking and wikis, and visions for Web 3.0 including ubiquitous connectivity, open technologies, and an intelligent web.
The document discusses the key components of a computer network and how information flows through it. It identifies the hardware required, including computer workstations, Ethernet cables, switches or hubs, routers, servers, and the internet. It explains that computer workstations connect to the network via Ethernet cables, and information flows from there through switches or hubs and routers, which direct the information either to the internet or main server for storage. The local area network (LAN) refers to connected computers and devices within an organization, while a wide area network (WAN) connects devices across the world, such as the internet.
This document discusses the history and development of the internet and online platforms. It begins by explaining how the internet originated from ARPANET in 1969 and the first email connection to the Philippines in 1994. It then discusses the evolution of the World Wide Web from static Web 1.0 pages to dynamic Web 2.0 pages that allow user interaction. Online platforms are categorized into social media, search engines, communication services, payment systems, and advertising/creative content outlets. Platforms range in size and allow users to program web content and connect consumers and producers in new ways.
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagayniniogolo
This document provides an overview of information and communication technology (ICT), including current states of the web, social media platforms, and presentation tools. It discusses ICT as an umbrella term encompassing communication devices and applications. Web 1.0 allowed read-only access to static pages, while Web 2.0 enabled user interaction, participation, and sharing on dynamic pages. Web 3.0 aims to be a read-write-execute web guided by semantic analysis. The document also outlines dangers online like spam, spoofing, phishing, and malware, as well as security measures.
The Internet is a global network of interconnected computers that allows for the exchange of information. It consists of private, public, academic, business, and government networks linked by copper wires, wireless connections, and other technologies. The Internet uses domain names and IP addresses to route data between servers and clients around the world via transmission media. Popular services on the Internet include the World Wide Web, email, chat rooms, and streaming media.
Online platforms allow users to create and share content, and serve as bases for developing applications and technologies. Examples of online platforms include presentation tools like Prezi, cloud computing services like Google Drive, social media sites like Twitter and Facebook, web page builders like Wix and Weebly, and file management and mapping tools. Platforms provide online tools and services across various categories like visualization, file storage, social networking, website creation, and more.
The document discusses current and future trends in information and communication technology (ICT). It covers topics like Web 2.0, which enables greater user interactivity and collaboration, as well as Web 3.0, which aims to make web pages more intelligent through semantic analysis. Converging technologies, social media, mobile devices, and assistive media are also shaping new ICT trends. The document provides examples of these concepts and outlines some challenges of emerging technologies like compatibility and security issues with Web 3.0.
The document discusses various uses and applications of the internet, including communicating, shopping, searching, entertainment, and education. It describes common internet activities like email, instant messaging, online shopping, accessing online libraries for information, and taking online courses. It also outlines different types of internet connections and speeds like dial-up, DSL, cable, wireless, and satellite. Finally, it discusses different types of websites like news sites, information sites, business/marketing sites, blogs, and personal websites.
This document discusses the benefits and pitfalls of internet usage. The benefits section outlines several advantages, including access to vast amounts of information for learning, connectivity and communication abilities, and conveniences like online banking and shopping. However, the document also notes several potential pitfalls. These include health issues from overuse like eyestrain and obesity. It also discusses risks like exposure to inappropriate content, online bullying/harassment, and addictive tendencies from overuse that can negatively impact users' lives. The conclusion emphasizes that the internet has both good and bad effects depending on how users apply it.
The Internet is a worldwide system of interconnected computer networks that began as a US military project. It allows users to access and share information across vast distances. Today, the Internet is a public resource used by billions of people worldwide as a primary source of information through activities like social media, online shopping, communication, and more. While it provides vast access to information and opportunities for connection, overreliance on the Internet also poses risks like reduced social skills, spread of misinformation, and security/privacy issues that come with vast data collection online. Care must be taken to achieve a balanced use of both online and real-world information sources and interactions.
The Internet is a global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link billions of devices worldwide. It consists of private, public, academic, business and government networks linked together via electronic, wireless, and optical technologies. The Internet carries a wide range of information and services, including the World Wide Web. Most traditional media are also being reshaped by the Internet through new services like email, Internet telephony, online music/video and more.
This document discusses various online platforms and applications that can be used for information and communication technology (ICT) development. It defines an online platform as a base technology that other applications or processes are built upon. Some examples of online platforms discussed include presentation tools, cloud computing services, social media sites, web page creators, file management systems, and mapping services. Specific applications are provided within each of these categories like Prezi, Google Drive, Twitter, Wix, and Google Maps.
This document provides an overview of internet service provider options in Woodstock, Vermont. It begins with an introduction on the importance of internet access and different types of users. It then discusses the various technology options available, including DSL, cable/fiber optic, and fixed wireless/mobile. Specific providers that serve parts of Woodstock are profiled. The document aims to help residents understand their choices and pick a service that meets their needs.
The prayer document asks God for guidance and blessings for the class. It asks that the students listen attentively, appreciate their teacher's efforts, participate actively and value each other's contributions to promote harmony. It also asks God to recognize his presence in all classmates and teachers and keep everyone safe and help them apply what they've learned.
A computer network allows computers to exchange data and information by connecting together through special hardware and software. There are two main types of networks - wired networks which use physical cables to connect devices, and wireless networks which connect devices using radio waves without cables. Computers can be connected in a local area network within a single building, or in a wide area network across a broader geographical area like countries. The internet is a global network that allows people to browse and search for information online using internet browsers and search engines, and to send and receive email.
The document discusses various online participatory tools and applications, including social networking sites, file sharing platforms, VoIP services, social bookmarking, RSS feeds, WiFi networks, collaborative documents, blogging, and their benefits and risks. It provides examples of popular tools for each category and encourages the reader to experiment with the technologies and consider their implications for extension work.
🔥🔥🔥🔥🔥🔥🔥🔥🔥
إضغ بين إيديكم من أقوى الملازم التي صممتها
ملزمة تشريح الجهاز الهيكلي (نظري 3)
💀💀💀💀💀💀💀💀💀💀
تتميز هذهِ الملزمة بعِدة مُميزات :
1- مُترجمة ترجمة تُناسب جميع المستويات
2- تحتوي على 78 رسم توضيحي لكل كلمة موجودة بالملزمة (لكل كلمة !!!!)
#فهم_ماكو_درخ
3- دقة الكتابة والصور عالية جداً جداً جداً
4- هُنالك بعض المعلومات تم توضيحها بشكل تفصيلي جداً (تُعتبر لدى الطالب أو الطالبة بإنها معلومات مُبهمة ومع ذلك تم توضيح هذهِ المعلومات المُبهمة بشكل تفصيلي جداً
5- الملزمة تشرح نفسها ب نفسها بس تكلك تعال اقراني
6- تحتوي الملزمة في اول سلايد على خارطة تتضمن جميع تفرُعات معلومات الجهاز الهيكلي المذكورة في هذهِ الملزمة
واخيراً هذهِ الملزمة حلالٌ عليكم وإتمنى منكم إن تدعولي بالخير والصحة والعافية فقط
كل التوفيق زملائي وزميلاتي ، زميلكم محمد الذهبي 💊💊
🔥🔥🔥🔥🔥🔥🔥🔥🔥
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...TechSoup
Whether you're new to SEO or looking to refine your existing strategies, this webinar will provide you with actionable insights and practical tips to elevate your nonprofit's online presence.
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxEduSkills OECD
Iván Bornacelly, Policy Analyst at the OECD Centre for Skills, OECD, presents at the webinar 'Tackling job market gaps with a skills-first approach' on 12 June 2024
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.pptHenry Hollis
The History of NZ 1870-1900.
Making of a Nation.
From the NZ Wars to Liberals,
Richard Seddon, George Grey,
Social Laboratory, New Zealand,
Confiscations, Kotahitanga, Kingitanga, Parliament, Suffrage, Repudiation, Economic Change, Agriculture, Gold Mining, Timber, Flax, Sheep, Dairying,
How Barcodes Can Be Leveraged Within Odoo 17Celine George
In this presentation, we will explore how barcodes can be leveraged within Odoo 17 to streamline our manufacturing processes. We will cover the configuration steps, how to utilize barcodes in different manufacturing scenarios, and the overall benefits of implementing this technology.
2. MYSELF:
NAME: SAM JOSEPH I. LLANDER
ADDRESS: Z-1 SAN ROQUE, TABACO CITY
AGE: 22
DATE OF BIRTH: MAY 13, 1996
GENDER: MALE
CIVIL STATUS: SINGLE
RELIGION: ROMAN CATHOLIC
STUDYING AT: AMANDO COPE COLLEGE
COURSE: BACHELOR OF SECONDARY EDUCATION
/ Major In Biology
3. TOPIC OUTLINE
• MYSELF
• WHAT IS EDUCATIONAL TECHNOLOGY?
• WHAT IS AN INTERNET?
• HOW TO CONNECT TO THE INTERNET?
• HOW TO EVALUATE A WEBSITE?
• WHAT IS PLAGIARISM?
• WHAT IS COPYRIGHT?
6. EDUCATIONAL TECHNOLOGY
IS THE APPLICATION OF THE
RESULTS OF RESEARCHES AND
STUDIES, MATERIAL OR NON-
MATERIAL TO IMPROVE
TEACHING AND LEARNING.
7. THIS COURSE IS DESIGN TO FOCUS ON
BOTH DEVELOPING TEACHER-SUPPORT
MATERIALS AND THE PRODUCTION OF
TECHNOLOGY-BASED STUDENT
OUTPUTS. AND INTRODUCE STUDENTS
WITH THE BASIC LEARNING THEORIES
AND PRINCIPLES AS BASES IN THE
DESIGN, DEVELOPMENT,
IMPLEMENTATION AND EVALUATION
8.
9. SCOPE OF EDUCATIONAL TECHNOLOGY
• BEHAVIORAL TECHNOLOGY
ATTEMPTS TO SCIENTIFICALLY DESIGN TRAINING TO
MODIFY TEACHER BEHAVIOR FOR EFFECTIVE & EFFICIENT
TEACHING. BEHAVIORALLY-INFORMED DESIGNS CAN GUIDE
STUDENTS TO CHOICES OF LEARNING AND CREATE NEW IDEAS
• INSTRUCTIONAL TECHNOLOGY
A SYSTEMATIC WAY OF DESIGNING, DEVELOPING, AND
EVALUATING THE TOTAL PROCESS OF LEARNING AND
TEACHING.
10.
11. 3. TEACHING TECHNOLOGY
TEACHING IS THE SOCIAL AND PROFESSIONAL
ACTIVITY. IT IS A PROCESS OF DEVELOPMENT
TEACHING IS SYSTEM OF ACTIONS, WHICH INDUCE
LEARNING THROUGH INTERPERSONAL
RELATIONSHIP. TEACHING TECHNOLOGY IS THE
APPLICATION OF PHILOSOPHICAL, SOCIOLOGICAL
AND SCIENTIFIC KNOWLEDGE TO TEACHING.
4. INFORMATION TECHNOLOGY
THE BRANCH OF ENGINEERING THAT DEALS WITH
THE USE OF COMPUTERS AND
TELECOMMUNICATIONS TO RETRIEVE, STORE, AND
TRANSMIT INFORMATION. HAS THE ABILITY OF
12. 6 USES OF IT IN EDUCATION
1. PLENTY OF EDUCATIONAL RESOURCES
INFORMATION TECHNOLOGY MAKES IT EASY TO
ACCESS ACADEMIC INFORMATION AT ANY TIME. BOTH
STUDENTS AND TEACHERS USE INFORMATION
TECHNOLOGY TO ACQUIRE AND EXCHANGE EDUCATIONAL
MATERIAL.
2. INSTANT ACCESS TO EDUCATIONAL INFORMATION
INFORMATION TECHNOLOGY SPEEDS THE TRANSFER
AND DISTRIBUTION OF INFORMATION. STUDENTS CAN
EASILY ACCESS ACADEMIC DATA USING COMPUTERS AND
13. 3. FULL TIME LEARNING
STUDENT WILL ACCESS INFORMATION AT ANY GIVEN TIME OF THE
DAY
4. GROUP LEARNING
STUDENTS FROM VARIOUS SCHOOLS AROUND THE WORLD CAN BE IN
THE SAME ACADEMIC GROUP AND SHARE ACADEMIC INFORMATION
5. USE OF AUDIO – VISUAL
VISUAL ILLUSTRATION USING IMAGES ON PROJECTORS HELPS A
STUDENT UNDERSTAND THE CONCEPT
6. LONG DISTANCE LEARNING
ENABLES STUDENTS ACROSS THE GLOBE TO STUDY FROM ANYWHERE
THROUGH ONLINE EDUCATION
14. HOW CAN THE USE OF ICTS HELP IMPROVE THE QUALITY OF
EDUCATION?
1. MOTIVATING TO LEARN
• ICTS SUCH AS VIDEOS, TELEVISION & MULTIMEDIA COMPUTER SOFTWARE THAT
COMBINE TEXT, SOUNDS & COLORFUL MOVING IMAGES CAN BE USED TO PROVIDE
CHALLENGING AND AUTHENTIC CONTENT THAT WILL ENGAGE THE STUDENT IN
LEARNING PROCESS.
2. FACILITATING THE ACQUISITION OF BASIC SKILLS
• EDUCATIONAL TELEVISION PROGRAMS SUCH AS SESAME STREET USE REPETITION AND
REINFORCEMENT TO TEACH THE ALPHABET, NUMBERS COLORS, SHAPES AND OTHER BASIC
CONCEPTS.
• EDUCATIONAL AND ONLINE TUTORIAL SITE LIKE WWW.GCFLEARNFREE.ORG GIVES
TECHNICAL TOPICS IN DIFFERENT KINDS OF COMPUTER APPLICATION WITH TUTORIAL
VIDEOS.
16. THE INTERNET IS A GLOBAL SYSTEM OF
INTERCONNECTED COMPUTER NETWORKS PROVIDING E-
MAIL AND INFORMATION FROM COMPUTERS IN
EDUCATIONAL INSTITUTIONS, GOVERNMENT AGENCIES, AND
TO SERVE BILLIONS OF USERS WORLDWIDE. A NETWORK IS A
GROUP OF TWO OR MORE COMPUTER SYSTEMS LINKED
TOGETHER.
17. COMMON TYPES OF NETWORK:
•LOCAL AREA NETWORK (LAN) – FROM ONE
STATION WORKSTATION TO ANOTHER
WITHIN THE OFFICE BUILDING, CAMPUS OR
SITE.
•WIDE AREA NETWORK (WAN) – FROM ONE
LOCALITY TO ANOTHER WITHIN THE
COUNTRY.
18. A SERVER IS A COMPUTER THAT "SERVES" MANY DIFFERENT
COMPUTERS IN A NETWORK BY RUNNING SPECIALIZED SOFTWARE
AND STORING INFORMATION. FOR EXAMPLE, WEB PAGES ARE
STORED ON SERVERS.
WHEN YOU ACCESS A WEB PAGE, YOUR COMPUTER IS ACTING AS A
CLIENT. A CLIENT RUNS FAMILIAR SOFTWARE SUCH AS WEB
BROWSERS OR EMAIL SOFTWARE, AND IT COMMUNICATES WITH
THE SERVER TO GET THE INFORMATION IT REQUIRES.
IN ORDER FOR YOUR BROWSER TO DISPLAY A WEB PAGE, IT
REQUESTS THE DATA FROM THE SERVER WHERE THE PAGE IS
STORED. THE SERVER PROCESSES THE REQUEST, AND THEN SENDS
THE DATA TO YOUR BROWSER, WHERE IT IS DISPLAYED.
19. WEB BROWSER – IS THE SOFTWARE WE NEED IN ORDER TO FIND,
RETRIEVE, VIEW AND SEND INFORMATION OVER THE INTERNET.
THE WORLD WIDE WEB IS A VIRTUAL NETWORK OF WEB SITES
CONNECTED THAT LET YOU LINK TO MANY SITES IN THE INTERNET.
WEB SITES ARE STORED ON SERVERS ON THE INTERNET, SO THE
WORLD WIDE WEB IS A PART OF THE INTERNET.
• THE INTERNET IS THE PHYSICAL NETWORK OF COMPUTERS ALL
OVER THE WORLD.
• THE WORLD WIDE WEB IS A VIRTUAL NETWORK OF WEB
SITES CONNECTED BY HYPERLINKS (OR "LINKS"). WEB SITES ARE
STORED ON SERVERS ON THE INTERNET, SO THE WORLD WIDE
WEB IS A PART OF THE INTERNET.
20. • THE WORLD WIDE WEB WAS CREATED IN 1989 BY TIM BERNERS-LEE, A SOFTWARE
ENGINEER. BEFORE THEN, COMPUTERS COULD COMMUNICATE OVER THE INTERNET, BUT
THERE WERE NO WEB PAGES.
• WEBSITE – A SITE (LOCATION) ON THE WORLD WIDE WEB, IT MAY CONSIST OF ONE OR MORE
WEB PAGES THAT RELATE TO A COMMON THEME, SUCH AS A PERSON, BUSINESS,
ORGANIZATION OR ANY SUBJECT. THE SITE MIGHT ALSO CONTAIN ADDITIONAL
DOCUMENTS AND FILES. EACH SITE IS OWN AND MANAGED BY AN INDIVIDUAL OR AN
ORGANIZATION.
• WEB PAGE – WEB PAGES ARE ACTUALLY GROUP OF ELECTRONIC FILES STORED ON
COMPUTERS ALL OVER THE WORLD. A VAST AMOUNT OF INFORMATION IS PROVIDED BY
THESE WEB PAGES. THESE PAGES WRITTEN IN THE HTML “HYPERTEXT MARKUP LANGUAGE”,
HAVE “LINKS” – MEANS CONNECTION, THAT ALLOW THE USER TO QUICKLY MOVE FROM
ONE DOCUMENT TO ANOTHER EVEN WHEN THE DOCUMENT ARE STORED IN DIFFERENT
COMPUTERS. IT INCLUDES THE FOLLOWING: TEXT, GRAPHICS, SOUNDS, VIDEOS, AND OTHER
FILES.
• HTML - THE BACKBONE OF THE WORLD WIDE WEB IS MADE OF HTML FILES, WHICH ARE
SPECIALLY-FORMATTED DOCUMENTS THAT CAN CONTAIN LINKS, AS WELL AS IMAGES AND
21. • URL - TO GET TO A WEB PAGE, YOU CAN TYPE THE URL (UNIFORM
RESOURCE LOCATOR) IN A BROWSER. THE URL, ALSO KNOWN AS
THE WEB ADDRESS, TELLS THE BROWSER EXACTLY WHERE TO FIND
THE PAGE. HOWEVER, MOST OF THE TIME, PEOPLE GET TO A WEB
PAGE BY FOLLOWING A LINK FROM A DIFFERENT PAGE OR BY
SEARCHING FOR THE PAGE WITH A SEARCH ENGINE.
• PARTS OF THE URL: HTTP://WWW.CNN.COM
• HTTP:// – INDICATES THAT THE BROWSER AND WEB SERVER WILL
COMMUNICATE USING HYPERTEXT TRANSFER PROTOCOL.
• WWW – INDICATES A RESOURCES COMING FROM THE WORLD WIDE
WEB.
• .CNN.COM – CALLED THE DOMAIN NAME, IDENTIFIES WHICH
COMPUTER CALLED THE WEB SERVER, THE ONE WHO HOST THE SITE.
23. THREE THINGS TO ACCESS THE INTERNET
• INTERNET SERVICE PROVIDERS (ISP) USUALLY OFFER DIFFERENT
LEVELS OF SPEED BASED ON YOUR NEEDS. IF YOU'RE MAINLY USING
THE INTERNET FOR E-MAIL AND SOCIAL NETWORKING, A SLOWER
CONNECTION MIGHT BE ALL YOU NEED, BUT IF YOU WANT TO
DOWNLOAD A LOT OF MUSIC OR WATCH STREAMING MOVIES,
YOU'LL WANT A FASTER CONNECTION. YOU'LL NEED TO DO SOME
RESEARCH TO FIND OUT WHAT THE OPTIONS ARE IN YOUR AREA.
• MODEM AN ELECTRONIC DEVICE THAT CONNECTS COMPUTERS VIA A
TELEPHONE LINE, ALLOWING THE EXCHANGE OF INFORMATION.
• ROUTER IS A HARDWARE DEVICE THAT ALLOWS YOU TO CONNECT
SEVERAL COMPUTERS AND OTHER DEVICES TO A SINGLE INTERNET
CONNECTION, WHICH IS KNOWN AS A HOME NETWORK. MANY
ROUTERS ARE WIRELESS, ALLOWING YOU TO EASILY CREATE A
24. TYPES OF INTERNET CONNECTION:
•DIAL-UP
• SLOWER THAN INTERNET CONNECTION
TYPES
• CONNECT THROUGH EXISTING PHONE
LINES USING DIAL-UP MODEMS
• MUST “DIAL UP” TO CONNECT TO THE
INTERNET & DISCONNECT WHEN DONE
25. • DSL – DIGITAL SUBSCRIBER LINE
• BROADBAND MUCH FASTER THAN
DIAL-UP
• CONNECT THROUGH PHONE LINES
BUT NECESSARILY REQUIRE PHONE
LINES
• “ALWAYS ON” DOES NO T REQUIRE
DIALING UP
• INTERNET & PHONE CAN BE USED
AT THE SAME TIME
26. • CABLE
• BROADBAND MUCH FASTER THAN
DIAL-UP & CAN BE FASTER THAN DSL
• USES CABLE CONNECTION, BUT DOES
NOT NECESSARILY REQUIRE CABLE TV
SUBSCRIPTION
• “ALWAYS ON” DOES NO T REQUIRE
DIALING UP
• ONLY AVAILABLE WHEN CABLE IS
AVAILABLE
27. • SATELLITE
• BROADBAND FASTER THAN DIAL-UP
BUT DATA IS DELAYED, SO IT IS NOT
GOOD FOR REAL-TIME APPLICATIONS
LIKE GAMING & VIDEOCONFERENCE
• CONNECT VIA SATELLITES ORBITING
THE EARTH
• CAN BE AFFECTED BY RAIN & SNOW
• DOES NOT REQUIRE PHONE & CABLE
LINES; CAN BE USED ALMOST
ANYWHERE IN THE WORLD
28. • 3G & 4G
• AVAILABLE FOR MOBILE PHONES,
COMPUTER & TABLET COMPUTERS
• CONNECT WIRELESSLY THROUGH
YOUR PROVIDER’S 3G OR 4G
NETWORK
• ALLOWS YOU TO ACCESS THE
INTERNET AWAY FROM HOME EVEN
WHEN THERE IS NO WIFI CONNECTION
• 3G MAY NOT BE FAST AS A DSL OR
CABLE CONNECTION
29. PASSWORD SAFETY
HACKERS OFTEN USE PASSWORD-CRACKING SOFTWARE
THAT CAN KEEP TESTING MANY DIFFERENT PASSWORDS
UNTIL THEY FIND THE CORRECT ONE, AND THEY CAN
EASILY CRACK WEAK PASSWORDS.
30. TIPS FOR CREATING STRONG
1. NEVER USE PERSONAL INFORMATION
2. USE A LONGER PASSWORD
3. WRITE DOWN YOUR PASSWORDS
4. DON'T USE THE SAME PASSWORD FOR EACH ACCOUNT.
31. 5. INCLUDE NUMBERS, SYMBOLS AND BOTH
UPPERCASE AND LOWERCASE LETTERS
6. AVOID USING WORDS THAT CAN BE FOUND IN
THE DICTIONARY
7. RANDOM PASSWORDS ARE THE STRONGEST
8. CREATE A MNEMONIC DEVICE
• "H=JNP2#" CAN BE REMEMBERED AS "HARRY =
JESSICA NOKIA PARIS 2 #."
32. INTRODUCTION TO SEARCH ENGINES
SEARCH ENGINES ARE SPECIALIZED WEBSITES THAT
CAN HELP YOU FIND WHAT YOU'RE LOOKING FOR.
YOU'VE PROBABLY HEARD OF SOME OF THE MOST
POPULAR ONES - INCLUDING GOOGLE, YAHOO!, AND
BING - EVEN IF YOU'VE NEVER USED THEM. GOOGLE
IS THE MOST POPULAR SEARCH ENGINE BECAUSE IT'S
THE MOST EFFECTIVE AT FINDING WHAT YOU'RE
LOOKING FOR. ON AVERAGE, IT PRODUCES MORE
RELEVANT RESULTS THAN YAHOO! OR BING, AND ITS
33. GOOGLE YOURSELF
GOOGLE YOURSELF TO FIND OUT WHAT IS OUT
THERE. TO GET THE MOST ACCURATE AND
COMPLETE SEARCH RESULTS, ENTER SEARCH
TERMS SUCH AS YOUR NAME, EMAIL ADDRESS,
HOME AND WORK ADDRESS, AND PHONE
NUMBERS IN A VARIETY OF WAYS. ALSO, PUT
QUOTES AROUND YOUR SEARCH TERMS. THIS
TELLS THE SEARCH ENGINE TO FIND A SPECIFIC
34. EXAMPLE:
• FIRST NAME AND LAST NAME: “JAY HERNANDEZ”
• FIRST, MIDDLE, AND LAST NAME: “JAY ORTEGA HERNANDEZ”
• LAST NAME FOLLOWED BY A COMMA AND YOUR FIRST NAME:
“HERNANDEZ, JAY”
• LAST NAME FOLLOWED BY A COMMA, YOUR FIRST NAME AND
MIDDLE NAME: “HERNANDEZ, JAY ORTEGA”
• STREET ADDRESS: “2521 STREET ADDRESS LANE”
• PHONE NUMBER (USING NO SPACES OR HYPHENS SEARCHES
ALL INSTANCES OF YOUR NUMBER): “9267276178”
• EMAIL ADDRESS: AKOSINARUTO@GMAIL.COM
36. 1. IS THE INFORMATION RELEVANT?
• SHOULD CONTAIN THE INFORMATION YOU’RE
LOOKING FOR.
2. WHAT IS THE SITE PURPOSE?
• MAY APPEAR A NEWS SITE BUT IT’S A HUMOR
SITE.
3. IS THE SITE BIASED?
• NEWS ORG., ENCYCLOPEDIAS, & OTHER SOURCES
ARE TRYING TO BE BIASED.
37. 5. IS THE AUTHOR RELIABLE?
• IT’S BETTER TO FIND OUT MORE INFO ABOUT THE
AUTHOR.
6. IS THE INFORMATION CURRENT?
• MANY WEBSITES WILL INCLUDE A DATE AT THE TOP
OR BOTTOM OF AN ARTICLE. THIS CAN TELL YOU
HOW CURRENT THE INFORMATION.
7. DOES THE SITE HAVE A GOOD REPUTATION?
• YOU MAY NEED TO GET A “SECOND OPINION” IN
OTHER WORDS, SEE WHAT OTHER PEOPLE ARE
SAYING ABOUT THE WEBSITES.
38.
39.
40. SYNTHESIZING INFORMATION
SYNTHESIS IS VERY IMPORTANT WHEN IT
COMES TO FINDING AND USING INFORMATION
ONLINE. EVEN IF YOU'VE DONE A LOT OF
RESEARCH AND FEEL LIKE YOU UNDERSTAND
THE TOPIC, YOU HAVE TO KNOW HOW TO
COMBINE IT IN ORDER TO CREATE SOMETHING
NEW. OTHERWISE, YOU WON'T BE ABLE TO
PRESENT YOUR MESSAGE EFFECTIVELY.
41. ORGANIZING YOUR THOUGHT:
• PLAN AHEAD - IF YOU'RE GOING TO CREATE A POWERPOINT PRESENTATION, YOU
MIGHT WANT TO ORGANIZE YOUR CONTENT INTO SLIDES THAT ARE SHORT AND
TO-THE-POINT, INSTEAD OF A FULL-PAGE REPORT. IF YOU'RE WRITING A
RESEARCH PAPER FOR SCHOOL, THINK ABOUT HOW YOU'RE GOING TO UTILIZE
YOUR SOURCES.
• START AN OUTLINE - YOUR OUTLINE DOESN'T HAVE TO BE VERY DETAILED;
INSTEAD, WRITE DOWN JUST ENOUGH INFORMATION TO HELP YOU ORGANIZE
YOUR IDEAS, AND VISUALIZE THE FINAL PRODUCT.
• RECORD YOUR IDEAS & BOOKMARK YOUR SOURCES
• THERE ARE TWO REASONS YOU SHOULD ALWAYS BOOKMARK YOUR SOURCES.
ONE, SO YOU CAN REFER BACK TO THEM IF YOU NEED TO VIEW THE
INFORMATION AGAIN; AND TWO, SO YOU HAVE EVERYTHING YOU NEED TO CITE
YOUR SOURCES PROPERLY, SUCH AS THE AUTHOR AND WEB ADDRESS.
43. PLAGIARISM IS PRESENTING SOMEONE ELSE'S
WORK AS YOUR OWN. IT CAN INCLUDE COPYING
AND PASTING TEXT FROM A WEBSITE INTO A
PROJECT THAT YOU'RE WORKING ON, OR TAKING
AN IDEA FROM A BOOK WITHOUT INCLUDING A
CITATION TO GIVE CREDIT TO THE BOOK'S
AUTHOR. PLAGIARISM IS VERY COMMON, AND THE
INTERNET HAS MADE IT EVEN MORE COMMON.
44. TIPS FOR AVOIDING PLAGIARISM:
• IF YOU USE A SOURCE, CITE IT - TO AVOID PLAGIARISM IS TO
CITE YOUR SOURCES. IT GIVES PROPER CREDIT TO THE ORIGINAL
AUTHORS.
• USE QUOTATION MARKS WHEN NECESSARY - MAKE SURE THAT
YOU USE QUOTATION MARKS ON THE SOURCE EXACT WORDS
INSTEAD OF PARAPHRASING OR REWRITING IT.
• DON’T JUST CHANGE A FEW WORDS - TO PROPERLY USE
ANOTHER AUTHOR’S IDEA, YOU SHOULD REWRITE IT IN YOUR
OWN WORDS.
• SYNTHESIZE THE INFORMATION - IF YOU FOCUS ON
DEVELOPING A UNIQUE POINT OF PERSPECTIVE, RATHER THAN
46. COPYRIGHT IS THE LEGAL CONCEPT THAT
WORKS - ART, WRITING, IMAGES, MUSIC, AND
MORE - BELONG TO THE PEOPLE WHO CREATE
THEM. ACCORDING TO COPYRIGHT LAW, ANY
ORIGINAL CONTENT YOU CREATE AND RECORD
IN A LASTING FORM IS YOUR OWN INTELLECTUAL
PROPERTY.
TO USE, COPY, OR CHANGE A COPYRIGHTED
WORK, YOU NEED PERMISSION FROM THE
PERSON WHO HOLDS THE COPYRIGHT. THIS
47.
48. NETIQUETTE – THE ETIQUETTE OF
THE INTERNET: POLITE ONLINE
BEHAVIOR AND THE CORRECT OR
ACCEPTABLE WAY OF
COMMUNICATING ON THE
INTERNET.
49. NETIQUETTE TIPS:
1. BE RESPECTFUL
• DON’T TYPE IN ALL CAPS.
• DON’T SAY BAD WORDS OR “B@%#&*+$”
• STAY ON TOPIC AND DON’T POST IRRELEVANT LINKS,
COMMENTS, THOUGHTS OR PICTURES
• RESPECT THE OPINION OF OTHERS
• DO NOT DO UNTO OTHERS WHAT YOU DO NOT WANT
OTHERS TO DO UNTO YOU
50. 2. DON'T BE TOO QUICK TO TAKE OFFENSE
• CHECK THE MOST RECENT COMMENTS BEFORE
YOU REPLY
3.USE EMOTICONS AND ABBREVIATIONS TO CONVEY
MEANING
• LEARN COMMON ABBREVIATIONS, LIKE "LOL"
(LAUGH OUT LOUD) OR "JK" (JUST KIDDING), OR
USE EMOTICONS, SUCH AS :) OR :( OR =0.
• DON’T WRITE ANYTHING THAT SOUNDS ANGRY OR
SARCASTIC EVEN AS A JOKE.
51. 4. PROTECT THE PRIVACY OF OTHERS
• DON’T PUSH ANYONE TO DO SOMETHING
FOR YOU
• DO NOT POST COPYRIGHTED MATERIALS
• ASK PERMISSION BEFORE POSTING
PHOTOS OR VIDEOS OF OTHERS ONLINE
AND PROTECT THE EMAIL ADDRESSES OF
OTHERS BY DELETING THEM FROM EMAILS
YOU FORWARD
52. 5. CHECK YOUR SPELLING, GRAMMAR AND
LANGUAGE
• RUN A SPELLING & GRAMMAR CHECK
• KEEP YOUR POST SHORT & CONCISE
6. THINK BEFORE YOU SHARE
• FREEDOM OF EXPRESSION SEEMS TO RULE
ABOVE ALL ELSE ON THE INTERNET,
FREQUENTLY AT THE EXPENSE OF GOOD
MANNERS.
53. KEYBOARD SHORTCUT
USING KEYBOARD SHORTCUTS CAN MAKE
COMPLETING A TASK MUCH QUICKER AND EASIER.
THESE SHORTCUTS ARE PRACTICALLY UNIVERSAL.
THAT MEANS THAT MANY OF THEM WILL WORK IN
SEVERAL DIFFERENT PROGRAMS; FOR EXAMPLE,
YOUR BROWSER, MICROSOFT OFFICE, ADOBE
PHOTOSHOP, AND MUCH, MUCH MORE.
54. Common Shortcuts For Your Browser
Copy: CTRL+C New window: CTRL+N
Cut: CTRL+X New tab: CTRL+T
Paste: CTRL+V Refresh page: CTRL+R
Undo: CTRL+Z Top of page: HOME
Redo: CTRL+Y Bottom of page: END
Find: CTRL+F Downloads: CTRL+J
55. Save: CTRL+S Bookmarks: CTRL+B
Print: CTRL+P History: CTRL+H
Bold: CTRL+B Windows system key combinations
Italic: CTRL+I Help F1
Underline: CTRL+U Open Start menu CTRL+ESC
Close active item: CTRL+W Switch between open programs ALT+TAB
Quit active program: ALT+F4 Quit program ALT+F4
Delete item permanently SHIFT+DELETE
56. Display or hide the Start menu Windows Logo Highlight Shift + Right/Left Arrow
Display the desktop Windows Logo+D Move to next word to right Ctrl + Right Arrow
Minimize all of the windows Windows Logo+M Move to previous word Ctrl + Left Arrow
Restore the minimized windows Windows Logo+SHIFT+M Highlight each word to right Ctrl + Shift + Right Arrow
Open My Computer Windows Logo+E Highlight each word to left Ctrl + Shift + Left Arrow
Search for a file or a folder Windows Logo+F Highlight one line Shift + end/home
Search for computers CTRL+Windows Logo+F Using Dialog Box (Run)
Display Windows Help Windows Logo+F1 MS Word winword
Lock the keyboard Windows Logo+ L MS Office Excel excel
Open the Run dialog box Windows Logo+R MS Office PowerPoint powerpnt
Open Utility Manager Windows Logo+U Command Prompt cmd