Information and Communications • Internet technology became more and more
Technology or ICT deals with the use of interactive.
different communication tools such as
• The internet became more available for
telephone , mobile phones, Internet, etc. to
everyone.
locate, save, send, and edit information.
• There is a give-and-take relationship
ICT in the Philippines
between a website and its users, in which the
-Philippines is considered as the ICT Hub of latter has the power to share different types
Asia because of the tremendous growth of of information such as texts, images, sounds,
ICT related jobs like Business Process and videos.
Outsourcing, or call centers.
• The users can now interact, contribute, and
create their own internet space and content
World Wide Web • This allows for the creation of interactive
application with more real-life uses like
The World Wide Web—commonly referred
online banking, online shopping, and media-
to as WWW, W3, or the Web—is a system of
sharing.
interconnected public webpages accessible
through the Internet, invented by Tim
Berners-Lee in 1989.
Features of Web 2.0
Folksonomy
WEB 1.0
It is a way to classify and to find information.
• Web 1.0 refers to the first generation of the It enables users to find information in an
Internet organized way, like tagging photos, websites,
or links. Ex: #
• Webpages were static and were called read
only web. Rich user experience
• Users are merely audiences or readers who It has a dynamic and interactive content. For
absorb information from websites. instance a user can click on an image of a
flower to get more information about that
• The only available feedback mechanism
flower like its growth conditions, nutrient
was through private emails.
requirements, and more.
User participation
WEB 2.0
It helps with the flow of information between
• The term Web 2.0 was first used around the user and the owner of a certain website.
2004. For instance, a user can interact by liking,
commenting, or sending reviews to a certain
• It is dynamic and focuses on user post or site.
participation.
Mass participation
Allows universal web access from a Computers and mobile devices can create
traditional internet user to a wider variety of data and make decisions based on the user’s
users of various cultures that leads to previous actions.
differentiation of concerns.
Trends in ICT
Long Tail
Technological Convergence
Services that are offered on demand rather
It is an evolution of technological
than on a one-time purchase. This means user
developments that integrate differenttypes of
can either subscribe to a data plan that
applications and media to form a new
charges users for the amount of time spent in
system.
the Internet or a data plan that charges for the
amount only of bandwidth used. Six types of Social media
Software as a Service (SAAS) Social Networks
Allows the user to subscribe to a software - enables people to connect with other people
rather than purchasing them subscribing and with the same interests or background (e.g.,
using Google Docs, a free web-based Facebook and Twitter).
application, to create or edit word documents
online. Bookmarking Sites
- allow user to store, manage links or create a
tag to various websites and resources that
WEB 3.0 allows you and others to easily search or
share them (e.g., StumbleUpon and
• The Web 3.0 also referred as Semantic Web
Pinterest).
or read-write-execute web is the era (2010
and above) by Tim Berners-Lee (Father of Social News
the WWW) which refers to the future of web.
- sites that allow users to post their own news
• In this era computers can interpret articles or links to other news sources and
information like humans via Artificial comment to the post or vote on the news
Intelligence and Machine Learning. articles of the website (e.g. ,Reddit, Digg)
Media Sharing
Characteristics of Web 3.0 - sites that allow users to upload and share
media content like music, images and video
Real-time
(e.g. ,Flicker, Youtube and Instagram)
Events and information are made available to
users as they take place.
Microblogging
- sites that focus on short updates from the
Everywhere
user wherein subscribers of this user will be
Internet can be accessed by users in all able to receive these updates. (e.g. ,Twitter
places. and Plurk)
Machine learning Blogs and Forums
- websites that allow users to post their accept and use but take control of your
content where users are able to comment to computer.
the said topic. Some of the free blogging
3. Worm – malicious program that copy’s
platforms are Blogger, Wordpress, and
itself and spreads to other computers.
Tumblr
Malicious email attachments or USB sticks
Online Safety and Security are the most common ways for worms to get
onto a computer. When a worm infects your
It is trying to be safe on the internet and is
computer, it will most likely send itself to
the act of maximizing a user’s awareness of
every email account on your machine. Your
personal safety and security risks to private
email will appear innocent to the recipient
information and property associated with
until they read it and find themselves infected
using the internet, and the self-protection
by the same worm.
from the computer crime.
4. Spyware – A malicious program that
gathers information from victim’s computer
Internet Risks and send it back to the hacker.
Cyberbullying - It happens when someone 5. Adware – An unwanted advertisement that
intentionally abused, harass, and mistreated will pop-up several times on victim’s
by other person using electronic computer then behave abnormally and
communication. tedious to close them.
Identity Theft - It is a crime of stealing 6. Phishing - is a type of fraudulent behavior
personal information for the purpose of in its most basic form. Official looking
assuming that person’s name or identity to emails impersonating a wellknown source,
make any form of transactions. such as a bank, are frequently sent. It is the
purpose of these emails to acquire people's
Cyber Stalking - A criminal practice where passwords and credit card information.
electronic communication is used to stalk or
harass individual or group. 7. Pharming - is a more sophisticated form
of phishing that takes advantage of the DNS
Sexting - The act of sending sexually explicit system. Pharmers frequently construct web
text messages, images, and videos. pages that look like those of a reputable
company, such as an online banking log-in
page. Users will then submit their
Internet Threats credentials, assuming they are logging in to
their regular service, and the pharmer will
Malware – also known as Malicious
steal their credentials.
Software.
8. Rogue Security Software - This is a form
Types of Malware
of malicious software and internet fraud that
1. Virus – a malicious program that replicate misleads users into believing there is a virus
itself by copying itself to another program. on their computer and aims to convince them
to pay for a fake malware removal tool that
2. Trojan Horse – a malicious program that actually installs malware on their computer.
disguised as legitimate program that user will
9. Keyloggers - are similar to spyware, 5. Make yourself look good online.
record a user's keyboard operations. The
6. Share expert knowledge.
majority of keyloggers will hunt for easily
identifiable key entries, such as bank card 7. Help keep flame wars under control.
numbers and passwords. Identity and
intellectual property theft are frequently tied 8. Respect other people's privacy.
to keylogging. 9. Don't abuse your power.
10. Ransomware - or ransom software is a 10. Be forgiving of other people's mistakes.
type of malicious software from
cryptovirology that threatens to publish the
victim's data or perpetually block access to it
ONLINE SEARCH AND RESEARCH
unless a ransom is paid.
SKILLS
Online Search - is the process of
Spam - also known as junk email or interactively searching for and retrieving
unwanted email send by advertiser or bot. It requested information via a computer from
can be used to send malware. databases that are online.
Cybercrime - A crime in which computer is TIPS IN CONDUCTING ONLINE
used as object and tool in committing a crime RESEARCH
such hacking, phishing, spamming, child
Have a question in mind.
pornography, libel, hate crimes, identity thief
Narrow it down.
and others.
Advanced search.
Look for credible sources.
Give credit.
Cybercrime Law - A law that deals with all
forms of cybercrime. Search Engine – is a software system that is
designed to search for information on the
Netiquette - It is a word that came from the World Wide Web. The search results are
two words “net” and “etiquette”. It is an generally presented in a line of results often
etiquette applied online that shows proper referred to as search engine results pages.
manner and behavior.
Infographics
The Core Rules of Netiquette
-is “a visual representation of information or
by Seth T. Ross data”.
1. Remember the human. -An infographic is composed of set of
2. Adhere to the same standards of behavior collection of various imagery, charts, and text
online that you follow in real life. that gives an easy-to-read and easy-to-
understand synopsis of a certain topic or
3. Know where you are in cyberspace. issue.
4. Respect other people's time and Steps in Making your Infographics
bandwidth.
1. Outline The Goals of Your Infographic
2. Collect Data For Your Infographic organization by grouping the same elements
together or in close proximity. The elements
3. Visualize The Data In Your Infographic
should be connected visually.
4. Layout The Elements Of Your Infographic
4. Hierarchy
Design
It is the principle of arranging the visual
5. Add Style To Your Infographic Design
elements to show their order of importance.
Fair Use means you can use copyrighted
This can be achieved in a variety of ways. If
materials without a license but only for
you make the font larger or bold, the most
certain purposes. These includes
important message will be physically higher
commentary, criticism, reporting, research,
than the other information.
and educational purposes.
6. Pattern, Repetition and Rhythm
Creative Commons – an American non-profit
organization devoted to expanding the range These are the repeating visual elements on an
of creative works available for others to build image or layout to create unity in the layout
upon and share legally. or image.
Copyright or author’s right is a legal term 7. Contrast
used to describe the rights that creators have
Contrast refers to the use of conflicting
over their literary and artistic works.
elements or colors while still remaining
harmonious and unified when the artwork is
viewed as a whole. It allows you to give
Basic Principles in Graphics & Layout
emphasis to key elements in your design.
1. Balance
8. Variety
The visual weight of objects, texture, colors,
Use several design elements to draw a
and space is evenly distributed on the screen.
viewer’s attention.
Symmetrical-There should be equal weights
Combine text, graphics and images. Do not
or elements on both sides of the page.
stick to “just text” only or” just images” only.
Asymmetrical- It may be asymmetrical when
9. Text
there is an artistic and different intensity on
one side of the page. The text type should be:
2. Emphasis • Legible
There should be one point of interest in a • Appropriate font face
page. The elements to be emphasized should
• Left justified, Right, justified, or centered
have a different size, color, shape, or
background. • The flow of text should be easy to read.
3. Proximity
Proximity maintains a relationship between SOURCES OF PHOTOS AND GRAPHICS
items that go together. It helps creates
1. Personal and Professional Photos: 1. Proprietary Formats
•Taken by amateur or professional • Owned and controlled by individuals or
photographers. corporations.
•Downloaded and stored in the computer. • File format specifications are not available
to the public
• Usually covered by copyrights.
2. Scanned Images:
2. Open Formats
• Photos transferred from printed photos and
graphics using scanning devices to your •AKA Free File Formats
computer
• Free and can be used by the public.
3. Stock Photo Library:
• Does not have copyrights or patents.
•Photographs and created images that are
• Sustained and maintained by a group of
available for sale.
individuals or organizations.
•Comes in CDs or DVDs
Digital File Formats Major Groups
•Royalty-free
1. Uncompressed or Raw Format: It is used
4. Online Stock Photos: for storing original file format. It is a flexible
form but needs bigger memory to store.
•Found in the World Wide Web (most
dominant source) 2. Lossless File Format: It is a file format
that was compressed to replicate the original
•May be subjected to copyright and fees.
quality but at a reduced file size. It is ideal
for storing important files (images, audio, or
video).
ONLINE DIGITAL FILE FORMATS
3. Lossy File Format – It is a file format that
File Format was compressed as an approximation of the
• It is a way of encoding and storing original file but is good enough. It has better
information to storage. compression rate requiring the least memory.
• Uses suffixes that are added to the end of RASTER IMAGE FILES
the filename • AKA Bitmap Image
File Name Extensions. •It is representing digital images in bits of
• File Name Extensions. - It is a means of information for storage, which translates to
identifying the format of the file with a PIXELS when viewed on screen.
period before it after the file name. • Majority of raster images are LOSSY.
• It is the common format you will encounter
Digital File Formats in the internet.
Pixels
• Pix = Picture; El = Element • It is a free, open-source bitmap image
format made to improve on GIF.
• It is the smallest information of an image.
• It supports 24-bit per pixel color and true
• It is represented by dots or squares that are
color (16 million colors).
arranged and added together to form a
picture. • It does not support animation.
• Employs lossless compression.
TYPES OF RASTER IMAGE FORMATS .psd (Photoshop Document)
.bmp (.dib) • It is a native file format for Adobe
Photoshop.
Bitmap Image File
• Photoshop has the ability to read all of the
• Developed and used on Microsoft Windows
other formats and edit them
environment.
VECTOR IMAGE FILES
• It is stored in the graphic file format called
Device-independent Bitmap (DIB). • AKA Vector Format or Graphic
• Not common in www since it has a large •These are lossless files created using
file size. mathematical geometric equations to
represent images in digital computer
.gif (Graphic Interchange Format File)
graphics.
• It is very popular in www because of its
• It retains the quality of the images in any
portability (Small file size) and support for
desired image size.
animation.
• It is the preferred format for those who
• It is ideal for images with large areas of
desire quality prints and display of images.
uniform color, small images, images with
text, navigation buttons. .ai (Adobe Illustrator File)
• It supports only a small 8-bits per pixel • It is the file extension for graphics created
color scheme. using Adobe Illustrator.
.jpg • It is created using paths and lines connected
by points instead of bitmaps (objects, color,
• Standardized by Joint Photographic Experts
and text).
Group (JPEG).
.drw (Drawing File)
• It is a common method for photographic
images as well as transmission of photos on •It is a generic drawing created and stored in
the www. a vector format that uses lines or paths to
represent images.
• It supports 24-bit per pixel color scheme.
.dxf (Drawing Exchange Format File)
• Not ideal use on line art.
.png (Portable Network Graphic)
• It is a drawing format developed and 5. BLENDING COLOR
introduced by Autodesk, the maker of
You can use color blending to match the
AutoCAD.
background with other elements in the page.
• It is used for computer-aided design (CAD)
6. EMPHASIS
vector images.
There should be a focal point to a page that
.ps (PostScript)
will attract viewers. The element you want to
• It is a Page Description Language (PDL) emphasize should be sharp, big, and most
developed by Adobe. vibrant in your design.
• It is a language for printing documents on
laser printers and image setters used to
produce camera ready copies.
• Can be changed in size without image
quality loss.
.svg (ScalableVector Graphics)
• Most common vector graphic format in the
internet.
• It was developed by The World Wide Web
Consortium (W3C).
Basic Techniques Of Image Manipulation
1. BACKGROUND COLOR
You can change the background if it does not
match the image or the totality of the
presentation. You can also add effects to the
background.
2. MULTIPLE IMAGES
You can combine multiple images to make a
point or use to highlight your message.
3. SHADOW
Using shadow effect will make the image
realistic.
4. PROPORTION
When combining images, resize the image to
make it proportionate and realistic.