SlideShare uma empresa Scribd logo
1 de 76
EMPOWERMENT
TECHNOLOGIES
INFORMATION COMMUNICATION
TECHNOLOGY (ICT)
•It is the umbrella that includes any
communication device or
application,encompassing;radio,television,c
omputer and ect.
•It is the main method of
communication,getting information and
education,attaining services and expressing
social advocacies and awareness.
(WWW) WORLD WIDE WEB (INTERNET
TECHNOLOGY)
•1st version WEB 1.0
In this stage of internet technology there were
very few web content creators and many of them were
so called “read only web”.
• There were no USER INTERACTION.
• Web Pages were STATIC.
• The feedback mechanism was thru private email.
• No Direct Comment available.
Webmaster Static Web User
2nd Version WEB 2.0
•The term Web 2.0 was used around 2004.
•Internet technology became more and more
interactive (used of social media begins).
•The internet became more available to
everyone.
•The users can now interact,contribute,and
create their own internet space and content.
Web Master
Web Dynamic
User’s Contribution Community
Web 3.0
• It is discovered by Tim Berners-Lee (Father of the
World Wide Web) as the read-write-execute web.
• It is referred to as the semantic web or data
driven web content and response.
TECHNOLOGY CONVERGENCE
• It is an evolution of technological development that merge into a
new system bringing together different types of applications and
media.
Example:
Smartphone – as it provides functionality of various
individual separate and different devices now available in one
year.It can function as a telephone,camera,radio,TV and gaming
console.
• Social Media- It is a collection of internet-based
communicaton tools and computer-assisted channels
dedicated to allow users to interact,communicate,and
share information in a virtual community and network.
• Facebook-is a popular free social networking site with
more than a billion users around the globe that allows its
users to create profiles,upload photos and videos.
• Twitter-With more than 300 million users in 2016.
-Allow users to microblog or broadcast short
message called “tweets”.
• Instagram-A social networking app that enables the user
to share mobile photo and video either publicly or
privately.
• Snapchat-Designed for the mobile networking application.
-Also designed for photo sharing,chat,and
messaging services.
-Images and videos shared in this app last only
for a short time and they are gone.
• Assistive Media-It is a nonprofit organization founded in
1996 in Ann Arbor,Michigan USA.
-It was the first internet-based reading
service for persons with visual and reading impairments.
DANGER IN THE COMPUTER
• Email Spam-known as junk email,usually unsolicited commercial email sent
from one source with identical message to send to multiple recipients.
• Spammer-the term used to refer to a person who creates electronic spam.
• Email Spoofing-A deceitful email practice in which the sender address is
changed,so that it would appear to have come from a different sources
usually someone you know.
-It is usually used by spammers to hide the origin of the
spam.
• Phishing-A deceitful practice of trying to get confidential information such as
passwords and usernames,and credit and details by making it appear as if it
comes from a trustworthy source.
• Pharming-A dangerous hacker attack on a website which
directs all traffic to that website to another fictitious website.
-Its main objective is to obtain username and
passwords,as well as credit card and financial information
and use these to steal money electronically.
• Spyware-It is acomputer program that is installed convertly on
a personal computer to collect information or even take
control over to collect information.
• Computer Worm-Is a dangerous computer program that
replicates itself through a network.
-Some worms delete files,others disrupt the
network function.
• Trojan Horse-A malicious software fronting to perform a good
task,but convertly performs undesirable function with the intention
of entering the computer without the user’s consent.
• Computer Virus-A program that duplicates itself and then infects
the computer.
-Virus can also be transeferred by the removable
storage.
• Hacker-who is able to enter the control other people’s computer
without authorization.
PROTECTION FROM THREAT
• Security Center-place where you can set protection.
Security Settings
1. Firewall-protect the unauthorized entries,viruses,worm
from the interner/network.
-turn on
-Don’t allow exceptions
2.Automatic Updates-ON
Microsoft
3.Virus Protection-ON
-current antivirus/Antivirus
• Antivirus-locate,find and remove virus threats that are
already in your computer.
-prevent the malicious software from (malware)
entering your computer.
UNLOCKING OF DIFFICULTIES
• Contextualize-is to plase (something such as a word or
activity) in a context.
• Research-the collecting of information about a particular
subject.
• Strategy-the art of devising or employing plans or
stratagems toward a goal.
-careful plan or method
• Compilation-the act or process of compiling.
• Citation-an act of quoting.
-the citing of a previously settled case at law.
CONTEXTUAL SEARCH
• Is an attempt to be more precise in providing the list
documents according to the words used by the user to
search the Internet.
• A good contextual search engine would request for more
information to narrow down the result of the search.
8 STEPS TO MAKE CONTEXTUALIZED
ONLINE RESEARCH
1. Identify or choose a topic.
2. Topic or task definition.
3. Identify methods of search.
4. Identify resources of your research.
5. Make your research strategies.
6. Compiling the research results.
7. Evaluate the results of your research.
8. Create a list of your references for citation.
RESEARCH SKILLS
• Critical Thinking-it is the ability to digest,reflect,and
conclude from the information searched.
• Analytical Thinking-the ability to
look,verbalize,conceptualize,and gather data attuned to
the context of the subject.
-the ability to apply synthesis,focus
and critical thinking to extract the useful information.
• Problem Solving Capability-the ability to present solutions
or solve problems by presenting a decision based on the
given information.
-people with this ability are able to define
and identify the lattitude of the problem and present all
possible solutions.
• Organized data mining-it is the ability to organize and
catalogue all collected materials efficiently despite data
size.
• Research presentation-it is the ability to present ideas
and draw conclusions from the research.
-Be able to explain in writing the purpose,steps,goals and
objective of the research.
• Creativity and developed imagination-it is the ability to
look for alternative solutions to the problems needed to
solve in the research.
-thinking beyond the usual approaches to the
research objectives.
• Computer literacy-knowledge of the various computer
applications and tools.
MAIL MERGE AND LABEL GENERATION
• Mail Merge-is use to automatically add mailing address or
personalized information to your publication.
MAILINGS START GROUP COMMANDS
• Mail Merge-Merges data into a publication which will be
printed and mailed.Shows step by step Mail Merge Wizard.
• Email Merge-Merges data into a publication that will be sent
as email.
• Select Recipients-Chooses the list of people you intend to
send the letter to.You can type your own list,use your Outlook
contacts or connect to a database.
• Edit Recipient List-Makes changes to the list of recipients
and decide which of them should receive your letter.
WRITE AND INSERT GROUP COMMANDS
• Insert Merge Field-Adds a field from your recipient list to
the publication Address Block.
• Greeting Line-Adds a greeting line to your letter.
• Picture-Adds a picture field from your recipient list to the
publication.
• Insert Personalized Hyperlink-Insert hyperlink that are
customized for each recipient.
• Format-Changes the format for the field content.
PARTS OF MAIL MERGE
1. Recipient List
2.Publication with Merge Fields
3.Merged publications
HANDS-ON:USING MS WORD TO CREATE A
MAIL MERGE
• STEP 1: CREATING A RECIPIENT LIST
1. Click the Mailings tab,go to the Start Group and Click
Select Recipients
2. On the list of options,select Type New List
3. On the New Address List dialog box,click New Entry and
type the recipient information.
4. Click OK
• STEP 2: PREPARE YOUR PUBLICATION
1. Create your publication in MS WORD
2. Insert any addition at text that you want to appear in
every version of your mail merge publication,such as
greeting.
• STEP 3: CREATE MERGED PUBLICATION
1. PRINT
a.Click Merge to a Printer
b.In the print space,select the options you want and
Click OK.
2.Merge to new publication
a.Click Merge to New Publication
b.In the new publication,click Save this Publication in
the Mail Merge task pare.
c.Type the name of your new publication and click
Save.
=PI ( ) * A8^7-6+1
MS Excel is use to compute costs incurred in the creation of
projects,or create tables for finding the searches,and then
create reports for business or research that you are doing.
Parts of a Formula
• Functions
• References
• Constants
• Operators
Excel Functions
• =SUM-Calculates the sum of a
range of cells.
• Average-Calculate the
arithmetic mean of a range of
cells/values.
• =MAX-Gives the maximum
value in a range.
• =MIN-Gives the minimum
value in a range.
• =COUNT-Counts the number
of cells in a range
• =IF-Shows a series of
calculations using the same
formula but a different value for
each calculation to determine
whether the formula is
true/false.
LIST OF AMERICAN SATIRICAL SITES IN
THE US
1. The Onion (Theonion.com)
2.Clickhole (clickhole.com)
3.Christwire Global Media (Christwire.org)
LIST OF TOP SOURCES OF SATIRICAL
NEWS
1. Adobo Chronicles (adobochronicles.com)
2.So,what’s News? (sowhatsnews.wordpress.com)
3.Eritas Times (fritastimes.com)
4.The Professional Heckler
(professionalheckler.wordpress.com
SOURCES OF PHOTOS AND GRAPHICS
There are many sources of photos and graphics.They can
come direct from your camera,old pictures,free from
internet or purchased from the internet or stores.
1. Personal and Professional Photos
are photos taken by amateur or professional
photographers using a digital camera.These images are
downloaded and are stored in the computer.They are
sources of images for any project that you may
embark.They are original and definitely something one
would like to work on.
2.Scanned Images
are those that you transfer from printed photos and
graphics using scanning devices which you can transfer to
your computer for further improvement and
modification.These are mostly old pictures photographed
before the digital age.
3.Stock Photo Library
are several photographs and created for sale.They
come in CD or DVD format and many of these images are
royalty-free,which means that they can be used without
additional fees.
4.Online Stock Photo
are found in the World Wide Web.The WWW is
now the dominant source f photos and graphics around the
globe because of the widely available choices and
reasonable prices.Other sites even offer copyright free
photos and other media.One advantage of this set up is
that you do not have to go to places where most of these
photos were taken.Another is that before you purchase or
get a picture,you can view it and if you decide to
buy,simply download it to your computer.
ONLINE DIGITAL FILE FORMATS FOR
IMAGES AND TEXT
A computer will have a certain method of encoding
information for storage in the hard drive or any form of
computer storage.The ways of encoding and storing this
information to storage,is called format.Digital file formats
are categorized as either proprietary or open.
PROPRIETARY FORMATS
• Are owned and controlled by individuals or corporations
and the file format specifications are not available to the
public.They are usually covered by copyright and the
owner has exclusive control of the present and future
technology development of this format.An example of a
proprietary format is the one used in the storage for
Microsoft Word,Excel and Powerpoint.
OPEN FORMATS
• Are means and ways for storing digital information that
are free,can be used by the public and are not
encumbered by copyrights or patents.These formats are
also called free file formats and the specifications for
these formats are usually sustained and maintained by a
group of individuals or organizations.Examples of these
formats are used in the storage for Open office and other
free or open software.
FILE FORMAT
• Uses suffixes that are added to the end of a
filename,called filename extensions.The file extension is
a means of identifying the format of the file,with a period
before it after the filename.The file extension has usually
two or more characters,although historically there were
only three,but modern operating systems are not
constrained anymore by that number of characters,more
are now allowed.
DIGITAL FILE FORMATS ARE CLASSIFIED INTO THREE
MAJOR GROUPS:
1.Uncompressed or raw format
is usually used for storing original file format,it is
a flexible form but needs bigger memory to store.
2.Lossless file format
is a file format that was compressed to replicate
the original quality but at a reduced file size.This type is
ideal for storing important files (images,audio or video0.
3.Lossy File Format
a file format that was compressed as an
approximation of the original file.
IMAGE FILE FORMAT
• Means of storing and organizing digital images,photos
and illustrations.
Classified into two types;
1.Raster image files
2.Vector image files
RASTER IMAGE FILES
(BITMAP IMAGES)
• Means of representing digital images in bits of information for
storage which translates into pixels.
Pixel- is the smallest information.
• Lossy
• Translates into pixel,the smallest information of an image
represented by dots and square comes from the word picture
(Pix) and element (el)
• Stored as bitmaps
• Common formats you will encounter in the internet and with
many digital image files,such as those coming from digital
cameras.
TYPES OF RASTER IMAGE
FORMATS
Filename Extensions
• Bmp
• Gif
• jpg
Description
• Bitmap image file is an Image File Format
developed and used in Microsoft windows
environment and is stored in a graphics file
format called device independent
bitmap.(DIB)
• Graphical interchange format very popular on
the www because of its portability(small
filesize) and support for animation.
• JPEG Image File. (standardized by the joint
photographic experts group (JPEG) common
method fore photographic images as well as
transmission of photos on the WWW its
support 24bits per pixel color scheme.
Filename Extensions
• Png
• psd
Description
• Portable Network Graphic (PNG) is a free
open source bitmap image format made to
improve an GIF which has a small file but
can handle more colors scenes its supports
24- bit per pixel color scheme and support
through color.
• Photoshop Document (PSD) native file
format for adobe Photoshop.
• Very popular
• Photoshop has the ability to read all of the
above formats and edit them.
VECTOR IMAGE OR VECTOR
GRAPHICS IMAGE FILES
• Vector Image are lossless files created using mathematical geometric equations to
represent image in digital computer graphics. It has the advantage of retaining its
quality at any desired image size.
Vector Format or Graphic
Is the preferred format for those who desire quality prints and display of images.
Examples: PDF, Encapsulated Postscript, Scalable Vector Graphics and Window
Metafile
TYPES OF VECTOR IMAGE
FORMAT
Filename Extensions
• Ai
• Drw
Description
• Adobe Illustrator File is the file extension for
graphics created using adobe illustrator
which is created using paths and lines
connected by points instead of bitmaps,
which has include objects, color and text.
• Drawing File is a generic drawing created
and stored in a vector format that uses lines
or path to represent image.
• Dxf
• Ps
• svg
• Drawing Exchange Format
developed and introduced by
Autodesk the maker of autoCAD
and is used for computer added
design (CAD) vector images.
• PostScript File is a page
description language (PDC)
developed by adobe.It can be
change in size without image
quality reduction.
• Scalable Vector Graphics file is
the most common vector graphics
format in the internet.It was
developed by the World Wide
Web (W3C) to display vector
graphics.
PRINCIPLES AND BASIC TECHNIQUE OF
IMAGE MANIPULATION
• Ways to manipulate image,resizing,cropping,adjusting
color background,balance brightness and
contrast,combining photos,combining text and photos and
adding effects.
TECHNIQUES OF IMAGE MANIPULATION
• Background color-you can change the background if it
does not match the image or the totality of
presentation.You can also add effects to the background.
• Multiple Image-you can combine multiple image to make
a print or use to highlight at your message.
• Shadow-using shadow effect will makes the image
realistic.
• Proposition-when combining images resize the image to
make it proportionate and realistic.
• Blending color-you can use blending color to match the
background with the other elements in the page.
• Texture-adding texture allows you to blend different
images.Texture add to the depth of gif art.
• Emphasis-there should be a focal point to a page that will
attract viewers.The element you want to emphasize
should be sharp,big,and most vibrant in your design.
COMBINING TEXT, GRAPHICS AND IMAGE
• Combining text, graphics and images in your
presentation, infographics or web page will make your
message clearer
TRANSPARENT SHAPES
• Add simple shapes with a slight transparency behind your
text, to clearly see the text you want to emphasize
FONTS AND SHAPES
•Fonts and shapes should complement each other
TEXT AND BACKGROUND
•Text and background should be aligned to have an
organized work
CLEAN AND CLEAR BACKGROUND
•Use clean and clear background for the
message to be readable
BASIC IMAGE MANIPULATION USING OFFLINE
OR OPEN SOURCE SOFTWARE
•Photo editing and designing tools allow you
to manipulate or edit images.
PICASA
• Googles free photo manager to edit and organize your
photos.
• Crop, straighten, rotate, red-eye removable, contrast, and
filters.
PAINT. NET
•Window based alternative to the MS
PowerPoint editor.
•Record, crop, text, rotate, multiple layers.
GOOGLE SKETCH UP
•Free 3D modeling program with tools that allows
you to create 3D model of houses, home
renovation wood working, projects and others with
dimensional accuracy.
AUTO DESK PIXLR
•Pixlr is a free photo editing tool that is similar
to photoshop and has more than 600 effects,
and borders that you can use.
ADOBE PHOTOSHOP
•Tool to create, motify, combined optimize
photo and images.
GIMP
• Image manipulation program is a free open source image
graphics editing program local for image retouching and
editing, free from drawing, painting and other specialized
tasks.
CREATING A NEW PREZI ACCOUNT
• Go to prezi.com
• Click get started on the upper right corner
• Sign up for a public account
• Fill in the boxes with the specified information
• After providing information, click create your free public account
THE PREZI CANVAS
ZOOMING IN AND OUT
•To zoom in, just scroll the mouse upwards, and to
zoom out, scroll the mouse downwards.
•To zoom in the frames, just like a frame and select
zoom into frame in the frame tool bar.
•To zoom out in the original overview, click the
home button moving around the canvas.
MOVING AROUND THE CANVAS
•To move around the canvas, click and hold,
and drag the cursor to the direction you want
to go to.
UNDO AND REDO
•To undo, just click the undo button and to
redo, click the redo button.
ADDING/ EDITING TEXTS
•To add text, just click anywhere in the canvas, and
start typing or click the sign click to add tittle and
type.
ADDING/ EDITING FRAMES
• To add a frame, select the type of frame you would like, and
drag the shape with a plus sign anywhere you want in the
canvas
• To edit the frame, click on the frame, add you can change the
color and type of thee frame or delete it in he frame toolbar.
• You can move the frame around by clicking and holding the
hand button, and then drag it at any direction.
• You can increase or decrease the size of the frame by sliding
the sizing handle outward or toward the center, or you can
use the + and – buttons.
• To add an image, shape, video, and other files to the frame,
click insert.
EDITING IMAGES
• You can move the image around by clicking and holding
the hand button and moving it to any direction you want.
• You can increase or decrease the size of the image by
dragging the sizing handle away or towards the center, or
you can use the + and – button.
• You can rotate the photo by pointing your mouse near any
sizing handle so you can click and holds a small circle
beside it, and rotate it at any direction.
• You can enhance, add effects and frames to your photo
by selecting effects at the picture toolbar.
EDITING THE BACKGROUND
• To add an image or change the background color, click
customize
• You can either change the background color by clicking
color and choosing a new color, or adding a background
imaging by selecting choose file.
• You can also change the lock of your present template by
choosing one of the themes in the theme tab.
ADDING/ EDITING ANIMATIONS
• Enter edit path mode by clicking edit path on the bottom left. A star
symbol will appear on each side of a path point or to a frame
• Click the star symbol to enter animation edit mode.
• When you click or have on an object, you’ll see a green star with a
number, this represents the order which your content will fade in.
• You can review the animation by clicking the play button on the top
right corner.
• To change the order you can click the reset on the top left corner to
remove all the animation present in the frame.
• Or you can also remove the animation individually by hovering over a
green star until you see a delete button
• If you are satisfied with the order of your animation, click done.

Mais conteúdo relacionado

Mais procurados

EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)bloodyblade06
 
Empowerment Technologies - Module 6
Empowerment Technologies - Module 6Empowerment Technologies - Module 6
Empowerment Technologies - Module 6Jesus Rances
 
Media and Information Literacy (MIL) - 10. Media and Information Literate Ind...
Media and Information Literacy (MIL) - 10. Media and Information Literate Ind...Media and Information Literacy (MIL) - 10. Media and Information Literate Ind...
Media and Information Literacy (MIL) - 10. Media and Information Literate Ind...Arniel Ping
 
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICTJazzyNF
 
Online Systems, Functions, and Platforms
Online Systems, Functions, and PlatformsOnline Systems, Functions, and Platforms
Online Systems, Functions, and PlatformsMaria Eloisa Blanza
 
Empowerment Technologies Lecture 12 (Philippines SHS)
Empowerment Technologies Lecture 12 (Philippines SHS)Empowerment Technologies Lecture 12 (Philippines SHS)
Empowerment Technologies Lecture 12 (Philippines SHS)John Bosco Javellana, MAEd.
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technologypizonaim
 
Empowerment Technologies - Module 4
Empowerment Technologies - Module 4Empowerment Technologies - Module 4
Empowerment Technologies - Module 4Jesus Rances
 
Mail-Merge-and-Label-Generation.pptx
Mail-Merge-and-Label-Generation.pptxMail-Merge-and-Label-Generation.pptx
Mail-Merge-and-Label-Generation.pptxLesterFajardo5
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Jesus Rances
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of NetiquetteACLC Antipolo
 
Emp tech q2_m12_l1_multimedia_and_ict_fv
Emp tech q2_m12_l1_multimedia_and_ict_fvEmp tech q2_m12_l1_multimedia_and_ict_fv
Emp tech q2_m12_l1_multimedia_and_ict_fvVivienPastores1
 
Empowerment Technologies - Principles of Visual Message and Design using Inf...
Empowerment  Technologies - Principles of Visual Message and Design using Inf...Empowerment  Technologies - Principles of Visual Message and Design using Inf...
Empowerment Technologies - Principles of Visual Message and Design using Inf...Lany Lyn Magdaraog
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATSJazzyNF
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologiesDeped
 

Mais procurados (20)

EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
 
Empowerment Technologies - Module 6
Empowerment Technologies - Module 6Empowerment Technologies - Module 6
Empowerment Technologies - Module 6
 
Media and Information Literacy (MIL) - 10. Media and Information Literate Ind...
Media and Information Literacy (MIL) - 10. Media and Information Literate Ind...Media and Information Literacy (MIL) - 10. Media and Information Literate Ind...
Media and Information Literacy (MIL) - 10. Media and Information Literate Ind...
 
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
 
Online Systems, Functions, and Platforms
Online Systems, Functions, and PlatformsOnline Systems, Functions, and Platforms
Online Systems, Functions, and Platforms
 
Empowerment Technologies Lecture 12 (Philippines SHS)
Empowerment Technologies Lecture 12 (Philippines SHS)Empowerment Technologies Lecture 12 (Philippines SHS)
Empowerment Technologies Lecture 12 (Philippines SHS)
 
ETECH MELCS
ETECH MELCSETECH MELCS
ETECH MELCS
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
Emp Tech 1 introduction
Emp Tech 1 introductionEmp Tech 1 introduction
Emp Tech 1 introduction
 
Empowerment Technologies - Module 4
Empowerment Technologies - Module 4Empowerment Technologies - Module 4
Empowerment Technologies - Module 4
 
EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2
 
Mail-Merge-and-Label-Generation.pptx
Mail-Merge-and-Label-Generation.pptxMail-Merge-and-Label-Generation.pptx
Mail-Merge-and-Label-Generation.pptx
 
4 types of media
4 types of media4 types of media
4 types of media
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of Netiquette
 
Emp tech q2_m12_l1_multimedia_and_ict_fv
Emp tech q2_m12_l1_multimedia_and_ict_fvEmp tech q2_m12_l1_multimedia_and_ict_fv
Emp tech q2_m12_l1_multimedia_and_ict_fv
 
Lesson 1 Empowerment Technology
Lesson 1 Empowerment TechnologyLesson 1 Empowerment Technology
Lesson 1 Empowerment Technology
 
Empowerment Technologies - Principles of Visual Message and Design using Inf...
Empowerment  Technologies - Principles of Visual Message and Design using Inf...Empowerment  Technologies - Principles of Visual Message and Design using Inf...
Empowerment Technologies - Principles of Visual Message and Design using Inf...
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologies
 

Semelhante a Empowerment technologies byShyna Gane Daleon and Galasao

1 empowerment technology_by_rey_anthon_&_elma_mea[1]
1 empowerment technology_by_rey_anthon_&_elma_mea[1]1 empowerment technology_by_rey_anthon_&_elma_mea[1]
1 empowerment technology_by_rey_anthon_&_elma_mea[1]niniogolo
 
Empowerment technology
Empowerment technology Empowerment technology
Empowerment technology jonaspalen1
 
empowerment technologies by: aiza martin and patricia obor
empowerment technologies  by: aiza martin and patricia oborempowerment technologies  by: aiza martin and patricia obor
empowerment technologies by: aiza martin and patricia obormartinaiza
 
Empowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and CatalinoEmpowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and CatalinoPadsromel
 
Divine Gono and Peter Paul Gato
Divine Gono and Peter Paul GatoDivine Gono and Peter Paul Gato
Divine Gono and Peter Paul GatoVineGono
 
empowerment technology by: kier and joveryn
empowerment technology by: kier and joverynempowerment technology by: kier and joveryn
empowerment technology by: kier and joverynkiersamaco
 
Empowerment Technology by:jewelyn,liezel,mary joy,bryll
Empowerment Technology by:jewelyn,liezel,mary joy,bryllEmpowerment Technology by:jewelyn,liezel,mary joy,bryll
Empowerment Technology by:jewelyn,liezel,mary joy,brylljoanagolo4ever
 
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...joanagolo4ever
 
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY   diana cerojales and jude bagayEMPOWERMENT TECHNOLOGY   diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagayniniogolo
 
Empowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny RocesEmpowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny RocesPadsromel
 
Empowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judithEmpowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judithmhedilyn8556
 
Empowerment technology by ybonne amor and jesha
Empowerment technology by ybonne amor and jeshaEmpowerment technology by ybonne amor and jesha
Empowerment technology by ybonne amor and jeshaYbonnica22
 
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology  by: Geraldine Salve Pepe and Lailanie PepeEpowerment Technology  by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepesalvepepe
 
Empowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosEmpowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosPadsromel
 
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONImpowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONCedricPada
 
Empowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena MastalEmpowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena MastalPadsromel
 
Empowerment Technologies : Joana Golo, Patrick Obusa, Mariemar Gilo, Edgielyn...
Empowerment Technologies : Joana Golo, Patrick Obusa, Mariemar Gilo, Edgielyn...Empowerment Technologies : Joana Golo, Patrick Obusa, Mariemar Gilo, Edgielyn...
Empowerment Technologies : Joana Golo, Patrick Obusa, Mariemar Gilo, Edgielyn...joanagolo4ever
 

Semelhante a Empowerment technologies byShyna Gane Daleon and Galasao (20)

1 empowerment technology_by_rey_anthon_&_elma_mea[1]
1 empowerment technology_by_rey_anthon_&_elma_mea[1]1 empowerment technology_by_rey_anthon_&_elma_mea[1]
1 empowerment technology_by_rey_anthon_&_elma_mea[1]
 
Empowerment technology
Empowerment technology Empowerment technology
Empowerment technology
 
empowerment technologies by: aiza martin and patricia obor
empowerment technologies  by: aiza martin and patricia oborempowerment technologies  by: aiza martin and patricia obor
empowerment technologies by: aiza martin and patricia obor
 
Empowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and CatalinoEmpowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and Catalino
 
Divine Gono and Peter Paul Gato
Divine Gono and Peter Paul GatoDivine Gono and Peter Paul Gato
Divine Gono and Peter Paul Gato
 
empowerment technology by: kier and joveryn
empowerment technology by: kier and joverynempowerment technology by: kier and joveryn
empowerment technology by: kier and joveryn
 
ICT
ICTICT
ICT
 
Empowerment Technology by:jewelyn,liezel,mary joy,bryll
Empowerment Technology by:jewelyn,liezel,mary joy,bryllEmpowerment Technology by:jewelyn,liezel,mary joy,bryll
Empowerment Technology by:jewelyn,liezel,mary joy,bryll
 
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
 
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY   diana cerojales and jude bagayEMPOWERMENT TECHNOLOGY   diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagay
 
Empowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny RocesEmpowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny Roces
 
Empowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judithEmpowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judith
 
Empowerment technology by ybonne amor and jesha
Empowerment technology by ybonne amor and jeshaEmpowerment technology by ybonne amor and jesha
Empowerment technology by ybonne amor and jesha
 
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology  by: Geraldine Salve Pepe and Lailanie PepeEpowerment Technology  by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
 
Empowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosEmpowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine Gelos
 
Gwapo
GwapoGwapo
Gwapo
 
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONImpowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
 
Empowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena MastalEmpowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena Mastal
 
Larra belle ict
Larra belle ictLarra belle ict
Larra belle ict
 
Empowerment Technologies : Joana Golo, Patrick Obusa, Mariemar Gilo, Edgielyn...
Empowerment Technologies : Joana Golo, Patrick Obusa, Mariemar Gilo, Edgielyn...Empowerment Technologies : Joana Golo, Patrick Obusa, Mariemar Gilo, Edgielyn...
Empowerment Technologies : Joana Golo, Patrick Obusa, Mariemar Gilo, Edgielyn...
 

Último

psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Último (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

Empowerment technologies byShyna Gane Daleon and Galasao

  • 2. INFORMATION COMMUNICATION TECHNOLOGY (ICT) •It is the umbrella that includes any communication device or application,encompassing;radio,television,c omputer and ect. •It is the main method of communication,getting information and education,attaining services and expressing social advocacies and awareness.
  • 3. (WWW) WORLD WIDE WEB (INTERNET TECHNOLOGY) •1st version WEB 1.0 In this stage of internet technology there were very few web content creators and many of them were so called “read only web”. • There were no USER INTERACTION. • Web Pages were STATIC. • The feedback mechanism was thru private email. • No Direct Comment available.
  • 5. 2nd Version WEB 2.0 •The term Web 2.0 was used around 2004. •Internet technology became more and more interactive (used of social media begins). •The internet became more available to everyone. •The users can now interact,contribute,and create their own internet space and content.
  • 6. Web Master Web Dynamic User’s Contribution Community
  • 7. Web 3.0 • It is discovered by Tim Berners-Lee (Father of the World Wide Web) as the read-write-execute web. • It is referred to as the semantic web or data driven web content and response.
  • 8. TECHNOLOGY CONVERGENCE • It is an evolution of technological development that merge into a new system bringing together different types of applications and media. Example: Smartphone – as it provides functionality of various individual separate and different devices now available in one year.It can function as a telephone,camera,radio,TV and gaming console.
  • 9. • Social Media- It is a collection of internet-based communicaton tools and computer-assisted channels dedicated to allow users to interact,communicate,and share information in a virtual community and network. • Facebook-is a popular free social networking site with more than a billion users around the globe that allows its users to create profiles,upload photos and videos. • Twitter-With more than 300 million users in 2016. -Allow users to microblog or broadcast short message called “tweets”.
  • 10. • Instagram-A social networking app that enables the user to share mobile photo and video either publicly or privately. • Snapchat-Designed for the mobile networking application. -Also designed for photo sharing,chat,and messaging services. -Images and videos shared in this app last only for a short time and they are gone. • Assistive Media-It is a nonprofit organization founded in 1996 in Ann Arbor,Michigan USA. -It was the first internet-based reading service for persons with visual and reading impairments.
  • 11. DANGER IN THE COMPUTER • Email Spam-known as junk email,usually unsolicited commercial email sent from one source with identical message to send to multiple recipients. • Spammer-the term used to refer to a person who creates electronic spam. • Email Spoofing-A deceitful email practice in which the sender address is changed,so that it would appear to have come from a different sources usually someone you know. -It is usually used by spammers to hide the origin of the spam. • Phishing-A deceitful practice of trying to get confidential information such as passwords and usernames,and credit and details by making it appear as if it comes from a trustworthy source.
  • 12. • Pharming-A dangerous hacker attack on a website which directs all traffic to that website to another fictitious website. -Its main objective is to obtain username and passwords,as well as credit card and financial information and use these to steal money electronically. • Spyware-It is acomputer program that is installed convertly on a personal computer to collect information or even take control over to collect information. • Computer Worm-Is a dangerous computer program that replicates itself through a network. -Some worms delete files,others disrupt the network function.
  • 13. • Trojan Horse-A malicious software fronting to perform a good task,but convertly performs undesirable function with the intention of entering the computer without the user’s consent. • Computer Virus-A program that duplicates itself and then infects the computer. -Virus can also be transeferred by the removable storage. • Hacker-who is able to enter the control other people’s computer without authorization.
  • 14. PROTECTION FROM THREAT • Security Center-place where you can set protection. Security Settings 1. Firewall-protect the unauthorized entries,viruses,worm from the interner/network. -turn on -Don’t allow exceptions 2.Automatic Updates-ON Microsoft 3.Virus Protection-ON -current antivirus/Antivirus
  • 15. • Antivirus-locate,find and remove virus threats that are already in your computer. -prevent the malicious software from (malware) entering your computer.
  • 16. UNLOCKING OF DIFFICULTIES • Contextualize-is to plase (something such as a word or activity) in a context. • Research-the collecting of information about a particular subject. • Strategy-the art of devising or employing plans or stratagems toward a goal. -careful plan or method
  • 17. • Compilation-the act or process of compiling. • Citation-an act of quoting. -the citing of a previously settled case at law.
  • 18. CONTEXTUAL SEARCH • Is an attempt to be more precise in providing the list documents according to the words used by the user to search the Internet. • A good contextual search engine would request for more information to narrow down the result of the search.
  • 19. 8 STEPS TO MAKE CONTEXTUALIZED ONLINE RESEARCH 1. Identify or choose a topic. 2. Topic or task definition. 3. Identify methods of search. 4. Identify resources of your research. 5. Make your research strategies. 6. Compiling the research results. 7. Evaluate the results of your research. 8. Create a list of your references for citation.
  • 20. RESEARCH SKILLS • Critical Thinking-it is the ability to digest,reflect,and conclude from the information searched. • Analytical Thinking-the ability to look,verbalize,conceptualize,and gather data attuned to the context of the subject. -the ability to apply synthesis,focus and critical thinking to extract the useful information.
  • 21. • Problem Solving Capability-the ability to present solutions or solve problems by presenting a decision based on the given information. -people with this ability are able to define and identify the lattitude of the problem and present all possible solutions. • Organized data mining-it is the ability to organize and catalogue all collected materials efficiently despite data size. • Research presentation-it is the ability to present ideas and draw conclusions from the research.
  • 22. -Be able to explain in writing the purpose,steps,goals and objective of the research. • Creativity and developed imagination-it is the ability to look for alternative solutions to the problems needed to solve in the research. -thinking beyond the usual approaches to the research objectives. • Computer literacy-knowledge of the various computer applications and tools.
  • 23. MAIL MERGE AND LABEL GENERATION • Mail Merge-is use to automatically add mailing address or personalized information to your publication.
  • 24. MAILINGS START GROUP COMMANDS • Mail Merge-Merges data into a publication which will be printed and mailed.Shows step by step Mail Merge Wizard. • Email Merge-Merges data into a publication that will be sent as email. • Select Recipients-Chooses the list of people you intend to send the letter to.You can type your own list,use your Outlook contacts or connect to a database.
  • 25. • Edit Recipient List-Makes changes to the list of recipients and decide which of them should receive your letter.
  • 26. WRITE AND INSERT GROUP COMMANDS • Insert Merge Field-Adds a field from your recipient list to the publication Address Block. • Greeting Line-Adds a greeting line to your letter. • Picture-Adds a picture field from your recipient list to the publication.
  • 27. • Insert Personalized Hyperlink-Insert hyperlink that are customized for each recipient. • Format-Changes the format for the field content.
  • 28. PARTS OF MAIL MERGE 1. Recipient List 2.Publication with Merge Fields 3.Merged publications
  • 29. HANDS-ON:USING MS WORD TO CREATE A MAIL MERGE • STEP 1: CREATING A RECIPIENT LIST 1. Click the Mailings tab,go to the Start Group and Click Select Recipients 2. On the list of options,select Type New List 3. On the New Address List dialog box,click New Entry and type the recipient information. 4. Click OK
  • 30. • STEP 2: PREPARE YOUR PUBLICATION 1. Create your publication in MS WORD 2. Insert any addition at text that you want to appear in every version of your mail merge publication,such as greeting.
  • 31. • STEP 3: CREATE MERGED PUBLICATION 1. PRINT a.Click Merge to a Printer b.In the print space,select the options you want and Click OK. 2.Merge to new publication a.Click Merge to New Publication b.In the new publication,click Save this Publication in the Mail Merge task pare. c.Type the name of your new publication and click Save.
  • 32. =PI ( ) * A8^7-6+1 MS Excel is use to compute costs incurred in the creation of projects,or create tables for finding the searches,and then create reports for business or research that you are doing.
  • 33. Parts of a Formula • Functions • References • Constants • Operators Excel Functions • =SUM-Calculates the sum of a range of cells. • Average-Calculate the arithmetic mean of a range of cells/values. • =MAX-Gives the maximum value in a range. • =MIN-Gives the minimum value in a range. • =COUNT-Counts the number of cells in a range
  • 34. • =IF-Shows a series of calculations using the same formula but a different value for each calculation to determine whether the formula is true/false.
  • 35. LIST OF AMERICAN SATIRICAL SITES IN THE US 1. The Onion (Theonion.com) 2.Clickhole (clickhole.com) 3.Christwire Global Media (Christwire.org)
  • 36. LIST OF TOP SOURCES OF SATIRICAL NEWS 1. Adobo Chronicles (adobochronicles.com) 2.So,what’s News? (sowhatsnews.wordpress.com) 3.Eritas Times (fritastimes.com) 4.The Professional Heckler (professionalheckler.wordpress.com
  • 37. SOURCES OF PHOTOS AND GRAPHICS There are many sources of photos and graphics.They can come direct from your camera,old pictures,free from internet or purchased from the internet or stores. 1. Personal and Professional Photos are photos taken by amateur or professional photographers using a digital camera.These images are downloaded and are stored in the computer.They are sources of images for any project that you may embark.They are original and definitely something one would like to work on.
  • 38. 2.Scanned Images are those that you transfer from printed photos and graphics using scanning devices which you can transfer to your computer for further improvement and modification.These are mostly old pictures photographed before the digital age. 3.Stock Photo Library are several photographs and created for sale.They come in CD or DVD format and many of these images are royalty-free,which means that they can be used without additional fees.
  • 39. 4.Online Stock Photo are found in the World Wide Web.The WWW is now the dominant source f photos and graphics around the globe because of the widely available choices and reasonable prices.Other sites even offer copyright free photos and other media.One advantage of this set up is that you do not have to go to places where most of these photos were taken.Another is that before you purchase or get a picture,you can view it and if you decide to buy,simply download it to your computer.
  • 40. ONLINE DIGITAL FILE FORMATS FOR IMAGES AND TEXT A computer will have a certain method of encoding information for storage in the hard drive or any form of computer storage.The ways of encoding and storing this information to storage,is called format.Digital file formats are categorized as either proprietary or open.
  • 41. PROPRIETARY FORMATS • Are owned and controlled by individuals or corporations and the file format specifications are not available to the public.They are usually covered by copyright and the owner has exclusive control of the present and future technology development of this format.An example of a proprietary format is the one used in the storage for Microsoft Word,Excel and Powerpoint.
  • 42. OPEN FORMATS • Are means and ways for storing digital information that are free,can be used by the public and are not encumbered by copyrights or patents.These formats are also called free file formats and the specifications for these formats are usually sustained and maintained by a group of individuals or organizations.Examples of these formats are used in the storage for Open office and other free or open software.
  • 43. FILE FORMAT • Uses suffixes that are added to the end of a filename,called filename extensions.The file extension is a means of identifying the format of the file,with a period before it after the filename.The file extension has usually two or more characters,although historically there were only three,but modern operating systems are not constrained anymore by that number of characters,more are now allowed.
  • 44. DIGITAL FILE FORMATS ARE CLASSIFIED INTO THREE MAJOR GROUPS: 1.Uncompressed or raw format is usually used for storing original file format,it is a flexible form but needs bigger memory to store. 2.Lossless file format is a file format that was compressed to replicate the original quality but at a reduced file size.This type is ideal for storing important files (images,audio or video0.
  • 45. 3.Lossy File Format a file format that was compressed as an approximation of the original file.
  • 46. IMAGE FILE FORMAT • Means of storing and organizing digital images,photos and illustrations. Classified into two types; 1.Raster image files 2.Vector image files
  • 47. RASTER IMAGE FILES (BITMAP IMAGES) • Means of representing digital images in bits of information for storage which translates into pixels. Pixel- is the smallest information. • Lossy • Translates into pixel,the smallest information of an image represented by dots and square comes from the word picture (Pix) and element (el) • Stored as bitmaps • Common formats you will encounter in the internet and with many digital image files,such as those coming from digital cameras.
  • 48. TYPES OF RASTER IMAGE FORMATS Filename Extensions • Bmp • Gif • jpg Description • Bitmap image file is an Image File Format developed and used in Microsoft windows environment and is stored in a graphics file format called device independent bitmap.(DIB) • Graphical interchange format very popular on the www because of its portability(small filesize) and support for animation. • JPEG Image File. (standardized by the joint photographic experts group (JPEG) common method fore photographic images as well as transmission of photos on the WWW its support 24bits per pixel color scheme.
  • 49. Filename Extensions • Png • psd Description • Portable Network Graphic (PNG) is a free open source bitmap image format made to improve an GIF which has a small file but can handle more colors scenes its supports 24- bit per pixel color scheme and support through color. • Photoshop Document (PSD) native file format for adobe Photoshop. • Very popular • Photoshop has the ability to read all of the above formats and edit them.
  • 50. VECTOR IMAGE OR VECTOR GRAPHICS IMAGE FILES • Vector Image are lossless files created using mathematical geometric equations to represent image in digital computer graphics. It has the advantage of retaining its quality at any desired image size. Vector Format or Graphic Is the preferred format for those who desire quality prints and display of images. Examples: PDF, Encapsulated Postscript, Scalable Vector Graphics and Window Metafile
  • 51. TYPES OF VECTOR IMAGE FORMAT Filename Extensions • Ai • Drw Description • Adobe Illustrator File is the file extension for graphics created using adobe illustrator which is created using paths and lines connected by points instead of bitmaps, which has include objects, color and text. • Drawing File is a generic drawing created and stored in a vector format that uses lines or path to represent image.
  • 52. • Dxf • Ps • svg • Drawing Exchange Format developed and introduced by Autodesk the maker of autoCAD and is used for computer added design (CAD) vector images. • PostScript File is a page description language (PDC) developed by adobe.It can be change in size without image quality reduction. • Scalable Vector Graphics file is the most common vector graphics format in the internet.It was developed by the World Wide Web (W3C) to display vector graphics.
  • 53. PRINCIPLES AND BASIC TECHNIQUE OF IMAGE MANIPULATION • Ways to manipulate image,resizing,cropping,adjusting color background,balance brightness and contrast,combining photos,combining text and photos and adding effects.
  • 54. TECHNIQUES OF IMAGE MANIPULATION • Background color-you can change the background if it does not match the image or the totality of presentation.You can also add effects to the background. • Multiple Image-you can combine multiple image to make a print or use to highlight at your message. • Shadow-using shadow effect will makes the image realistic. • Proposition-when combining images resize the image to make it proportionate and realistic.
  • 55. • Blending color-you can use blending color to match the background with the other elements in the page. • Texture-adding texture allows you to blend different images.Texture add to the depth of gif art. • Emphasis-there should be a focal point to a page that will attract viewers.The element you want to emphasize should be sharp,big,and most vibrant in your design.
  • 56. COMBINING TEXT, GRAPHICS AND IMAGE • Combining text, graphics and images in your presentation, infographics or web page will make your message clearer
  • 57. TRANSPARENT SHAPES • Add simple shapes with a slight transparency behind your text, to clearly see the text you want to emphasize
  • 58. FONTS AND SHAPES •Fonts and shapes should complement each other
  • 59. TEXT AND BACKGROUND •Text and background should be aligned to have an organized work
  • 60. CLEAN AND CLEAR BACKGROUND •Use clean and clear background for the message to be readable
  • 61. BASIC IMAGE MANIPULATION USING OFFLINE OR OPEN SOURCE SOFTWARE •Photo editing and designing tools allow you to manipulate or edit images.
  • 62. PICASA • Googles free photo manager to edit and organize your photos. • Crop, straighten, rotate, red-eye removable, contrast, and filters.
  • 63. PAINT. NET •Window based alternative to the MS PowerPoint editor. •Record, crop, text, rotate, multiple layers.
  • 64. GOOGLE SKETCH UP •Free 3D modeling program with tools that allows you to create 3D model of houses, home renovation wood working, projects and others with dimensional accuracy.
  • 65. AUTO DESK PIXLR •Pixlr is a free photo editing tool that is similar to photoshop and has more than 600 effects, and borders that you can use.
  • 66. ADOBE PHOTOSHOP •Tool to create, motify, combined optimize photo and images.
  • 67. GIMP • Image manipulation program is a free open source image graphics editing program local for image retouching and editing, free from drawing, painting and other specialized tasks.
  • 68. CREATING A NEW PREZI ACCOUNT • Go to prezi.com • Click get started on the upper right corner • Sign up for a public account • Fill in the boxes with the specified information • After providing information, click create your free public account
  • 69. THE PREZI CANVAS ZOOMING IN AND OUT •To zoom in, just scroll the mouse upwards, and to zoom out, scroll the mouse downwards. •To zoom in the frames, just like a frame and select zoom into frame in the frame tool bar. •To zoom out in the original overview, click the home button moving around the canvas.
  • 70. MOVING AROUND THE CANVAS •To move around the canvas, click and hold, and drag the cursor to the direction you want to go to.
  • 71. UNDO AND REDO •To undo, just click the undo button and to redo, click the redo button.
  • 72. ADDING/ EDITING TEXTS •To add text, just click anywhere in the canvas, and start typing or click the sign click to add tittle and type.
  • 73. ADDING/ EDITING FRAMES • To add a frame, select the type of frame you would like, and drag the shape with a plus sign anywhere you want in the canvas • To edit the frame, click on the frame, add you can change the color and type of thee frame or delete it in he frame toolbar. • You can move the frame around by clicking and holding the hand button, and then drag it at any direction. • You can increase or decrease the size of the frame by sliding the sizing handle outward or toward the center, or you can use the + and – buttons. • To add an image, shape, video, and other files to the frame, click insert.
  • 74. EDITING IMAGES • You can move the image around by clicking and holding the hand button and moving it to any direction you want. • You can increase or decrease the size of the image by dragging the sizing handle away or towards the center, or you can use the + and – button. • You can rotate the photo by pointing your mouse near any sizing handle so you can click and holds a small circle beside it, and rotate it at any direction. • You can enhance, add effects and frames to your photo by selecting effects at the picture toolbar.
  • 75. EDITING THE BACKGROUND • To add an image or change the background color, click customize • You can either change the background color by clicking color and choosing a new color, or adding a background imaging by selecting choose file. • You can also change the lock of your present template by choosing one of the themes in the theme tab.
  • 76. ADDING/ EDITING ANIMATIONS • Enter edit path mode by clicking edit path on the bottom left. A star symbol will appear on each side of a path point or to a frame • Click the star symbol to enter animation edit mode. • When you click or have on an object, you’ll see a green star with a number, this represents the order which your content will fade in. • You can review the animation by clicking the play button on the top right corner. • To change the order you can click the reset on the top left corner to remove all the animation present in the frame. • Or you can also remove the animation individually by hovering over a green star until you see a delete button • If you are satisfied with the order of your animation, click done.