SlideShare a Scribd company logo
1 of 58
Download to read offline
Studocu is not sponsored or endorsed by any college or university
Empowerment Technologies Lessons 1-15 – Empowerment
Technology
Culminating Activity (Pontifical and Royal University of Santo Tomas, The Catholic
University of the Philippines)
Studocu is not sponsored or endorsed by any college or university
Empowerment Technologies Lessons 1-15 – Empowerment
Technology
Culminating Activity (Pontifical and Royal University of Santo Tomas, The Catholic
University of the Philippines)
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 1/57
Empowerment Technology
Empowerment Technologies LESSONS 1-15
March 31, 2018April 1, 2018 regisjoyce
LESSON 1: INTRODUCTION TO ICT
ICT3 Information and Communication-
It deals with the use of different communication technologies such as mobile phones, telephone,
Internet to locate, save, send and edit information
Is a study of computers as data processing tools. It introduces students to the fundamental of using
computer systems in an internet environment.
ICT in the Philippines
Philippines is dub as the 89ICT Hub of Asia= because of huge growth of ICT-related jobs, one of
which is BPO, Business Process Outsourcing, or call centers.
ICT Department in the Philippines is responsible for the planning, development and promotion
of the country9s information and communications technology (ICT) agenda in support of national
development.
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 2/57
Computer3 an electronic device for storing and processing data, typically in binary form, according to
instructions given to it in a variable program.
Internet3 is the global system of interconnected computer networks that use the internet protocol suite
(TCIP/IP) to link billions of devices worldwide.
Means of connecting a computer to any other computer anywhere in the world via dedicated
routers and servers.
Sometimes called simply 89the Net99, is a worldwide system of computer networks- a network of
networks in which the users at any one computer can get information from any other computer.
World Wide Web
An information system on the internet that allows documents to be connected to other
documents by hypertext links, enabling the user to search for information by moving from one
document to another.
Is an information space where documents and other web resources are identiûed by URLs,
interlinked by hypertext links, and can be accessed via the Internet.
Invented by Tim-Berners Lee
Web Pages
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 3/57
Web page is a hypertext document connected to the World Wide Web. It is a document that is
suitable for the World Wide Web.
The different online platforms of World Wide Web:
1. Web 1.0 3 refers to the ûrst stage in the World Wide Web, which was entirely made up of the Web
pages connected by hyperlinks.
2. Web 2.0 3 is the evolution of Web 1.0 by adding dynamic pages. The user is able to see a website
differently than others.
3 Allows users to interact with the page; instead of just reading the page, the user may be able to
comment or create user account.
3. Web 3.0 3 this platform is all about semantic web.
3 Aims to have machines (or servers) understand the user9s preferences to be able to deliver web
content.
Static Web Page- is known as a üat page or stationary age in the sense that the page is 89as is99 and cannot
be manipulated by the user. The content is also the same for all users that is referred to as Web 1.0
Dynamic Web Pages3 web 2.0 is the evolution of web 1.0 by adding dynamic web pages. The user is able
to see website differently than others e.g. social networking sites, wikis, video sharing sites.
FEATURES OF WEB 2.0
1. Folksonomy- allows user to categorize and classify information using freely chosen keywords e.g.
tagging by FB, Twi er, use tags that start with the sign #, referred to as hashtag.
2. Rich User Experience – content is dynamic and is responsive to user9s input
3. User Participation- The owner of the website is not the only one who is able to put content. Others
are able to place a content of their own by means of comments, reviews and evaluation e.g. Lazada,
Amazon.
4. Long Tail3 services that are offered on demand rather than on a one-time purchase. This is
synonymous to subscribing to a data plan that charges you for the amount of time you spent in the
internet.
5. Software as a services- users will be subscribe to a software only when needed rather than
purchasing them e.g. Google docs used to create and edit word processing and spread sheet.
6. Mass Participation3 diverse information sharing through universal web access. Web 2.09s content is
based on people from various cultures.
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 4/57
TRENDS IN ICT
1. Convergence3 is the synergy of technological advancements to work on a similar goal or task. For
example, besides using your personal computer to create word documents, you can now use your
smartphone.
2. Social Media3 is a website, application, or online channel that enables web users web users
to create , co-create, discuss modify, and exchange user generated content.
Six types of Social Media:
a)Social Networks 3 These are sites that allows you to connect with other people with the same interests
or background. Once the user creates his/her account, he/she can set up a proûle, add people, share
content, etc
Example: Facebook and Google+
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 5/57
b)Bookmarking Sites 3 Sites that allow you to store and manage links to various website and resources.
Most of the sites allow you to create a tag to others.
Stumble Upon, Pinterest
c) Social News 3 Sites that allow users to post their own news items or links to other news sources.
The users can also comment on the post and comments may also be rank.
Ex. Reddit and Digg
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 6/57
d) Media Sharing – sites that allow you to upload and share media content like images, music and
video.
Ex. Flickr, YouTube and Instagram
e) Microblogging – focus on short updates from the user. Those that subscribed to the user will be able
to receive these updates.
Ex. Twi er and Plurk
f) Blogs and Forums – allow user to post their content. Other users are able to comment on
the said topic.
Ex. Blogger, WordPress and Tumblr
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 7/57
3. Mobile Technologies3 The popularity of smartphones and tablets has taken a major rise over the
years. This is largely because of the devices capability to do the tasks that were originally found in
PCs. Several of these devices are capable of using a high-speed internet. Today the latest model
devices use 4G Networking (LTE), which is currently the fastest.
MOBILE OS
iOS 3 use in apple devices such as iPhone and iPad
Android 3 an open source OS developed by Google. Being open source means mobile phone
companies use this OS for free.
Blackberry OS 3 use in blackberry devices
Windows phone OS 3 A closed source and proprietary operating system developed by Microsoft.
Symbian 3 the original smartphone OS. Used by Nokia devices
WebOS- originally used in smartphone; now in smart TVs.
Windows Mobile 3 developed by Microsoft for smartphones and pocket PCs
4. Assistive Media3 is a non- proût service designed to help people who have visual and
reading impairments. A database of audio recordings is used to read to the user.
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 8/57
5. e.g. Yahoo!, Gmail, HotmailCloud computing-distributed computing on internet or delivery of
computing service over the internet.
-Instead of running an e-mail program on your computer, you log in to a Web
e-mail account remotely. The software and storage for your account doesn9t exist
on your computer 3 it9s on the service9s computer cloud.
It has three components
1. Client computers 3 clients are the device that the end user interact with cloud.
2. Distributed Servers 3 Often servers are in geographically different places, but server acts as if they
are working next to each other.
3. Datacenters 3 It is collection of servers where application is placed and is accessed via Internet.
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 9/57
TYPES OF CLOUDS
PUBLIC CLOUD allows systems and services to be easily accessible to the general public. Public cloud
may be less secured because of its openness, e.g. e-mail
PRIVATE CLOUD allows systems and services to be accessible within an organization. It offers
increased security because of its private nature.
COMMUNITY CLOUD allows systems and services to be accessible by group of organizations.
HYBRID CLOUD is a mixture of public and private cloud. However, the critical activities are performed
using private cloud while the non-critical activities are performed using public cloud.
LESSON 2: ONLINE SAFETY, SECURITY AND
RULES OF NETIQUETTE
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 10/57
INTERNET SAFETY- it refers to the online security or safety of people and their information when
using internet.
NETIQUETTE- is network etique e, the do9s and don9ts of online communication.
TEN RULES OF NETIQUETTE
Rule No. 1: Remember the human
You need to remember that you are talking to a real person when you are online.
The internet brings people together who would otherwise never meet.
Remember this saying when sending an email: Would I say this to the person9s face.
Rule No. 2: Adhere to the same standards online that you follow in real life.
You need to behave the same way online that you do in real life.
You need to remember that you can get caught doing things you should not be doing online
just like you can in real life.
You are still talking to a real person with feelings even though you can9t see them.
Rule no. 3: Know where you are in cyberspace.
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 11/57
Always take a look around when you enter a new domain when surûng the web.
Get a sense of what the discussion group is about before you join it.
Rule no. 4: Respect other people9s time and bandwidth.
Remember people have other things to do besides read your email. You are not the center of
their world.
Keep your post and emails to minimum by saying what you want to say.
Remember everyone won9t answer your questions.
Rule no. 5: Make yourself look good online.
Be polite and pleasant to everyone.
Always check your spelling and grammar before posting.
· Know what you are talking about and make sense saying it.
Rule no. 6: Share expert knowledge
Ask questions online
Share what you know online.
Post the answers to your questions online because someone may have the same question
you do.
Rule no. 7: Help keep üame wars under control
Netique e does not forgive üaming.
Netique e does however forbid people who are üaming to hurt discussion groups by pu ing the
group down.
Rule no. 8: Respect other people9s privacy.
Do not read other people9s mail without their permission.
Going through other people9s things could cost you, your job or you could even go to jail.
Not respecting other people9s privacy is a bad netique e.
Rule no. 9: Don9t abuse your power.
Do not take advantage of other people just because you have more knowledge or power than
them.
Treat others as you would want them to treat you if the roles were reversed.
Rule no. 10: Be forgiving of other people9s mistake.
Do not point out mistakes to people online.
Remember that you were once the new kid on the block.
You still need to have a good manners even though you are online and cannot see the
person face to face.
Internet security
Security Requirement Triad
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 12/57
ConfidentIality
Data conûdentiality
Privacy
Integrity
Data integerity System integrity
Availability
Threat Consequence Threat Action ( A ack)
Unauthorized Disclosure
A circumstance or event whereby
an entity gains access to data for
which the entity is not authorized.
Exposure: Sensitive data are directly released
to an unauthorized entity.
Interception: An unauthorized entity directly
accesses sensitive data traveling between
authorized sources and destinations.
Inference: A threat action whereby an
unauthorized entity indirectly accesses
sensitive data by reasoning from
characteristics or byproducts of
communications.
Intrusion: an unauthorized entity gains access
to sensitive data by circumventing a system9s
security protections.
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 13/57
Disruption
A circumstances or even that
interrupts or prevents the correct
operation of system services and
functions.
Deception
A circumstance or event that may
result in an authorized entity
receiving false data and believing it
to be true.
Incapacitation: prevents or interrupts system
operation by disabling a system component.
Corruption: Undesirably alters system
operation by adversely modifying system
functions or data.
Obstruction: A threat action that interrupts
delivery of system services by hindering
system operation.
Masquerade: An unauthorized entity gains
access to a system or performs a malicious act
by posing as an authorized entity.
Falsification: False data deceive an authorized
entity.
Repudiation: An entity deceives another by
falsely denying responsibility for an act.
Usurpation
A circumstances or event that
results in control of system services
or functions by an unauthorized
entity.
Misappropriation: An entity assumes
unauthorized logical or physical control of a
system resource.
Misuse: Causes a system component to perform a function or service that is detrimental to system
security.
Types of System Intruders
Masquerader
Hackers
Clandestine user
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 14/57
Parts of Virus
Infection mechanism
Trigger
PayloaD
Virus stages
Dormant phase Virus is
idle.
Propagation phase Virus
places an identical copy of itself into other programs or into certain system areas on t the disk.
Triggering phase Virus is
activated to perform the function for which it was intended. Caused by a
variety of system events
Execution phase
Function is performed
Key Terms
Cyber crime- a crime commi ed or assisted through the use of the Internet.
Privacy Policy/Terms of Services (ToS) 3 tells the user how the website will handle its data.
Malware- stands for malicious software.
Virus- a malicious program designed to transfer from one computer to another in any means possible.
Worms3 a malicious program designed to replicate itself and transfer from one ûle folder to another and
also transfer to other computers.
Trojan-a malicious program designed that is disguised as a useful program but once downloaded or
installed, leaves your PC unprotected and allows hacker to get your information.
Spyware3 a program that runs in the background without you knowing it. It has the ability to monitor
what you are currently doing and typing through key logging.
Adware- a program designed to send you advertisement, mostly pop-ups.
Spam3 unwanted email mostly from bots or advertisers.
Phishing- acquires sensitive personal information like passwords and credits card details.
Pharming- a more complicated way of phishing where it exploits the DNS system.
Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your consent is
punishable by law.
Fair Use- means that an intellectual property may be used w/o consent as long as it is used in
commentaries, criticism, parodies, research and etc.
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 15/57
Keyloggers- used to record the keystrokes done by user. This is done to steal passwords or any other
sensitive information.
Rogue security softwares3 is a form of malicious software and internet fraud that misleads users into
believing there is a virus on their computer, and manipulates them into paying money for a fake
malware removal tool.
Four search strategies
Keyword searching
Enter terms to search
Use quotation marks to search as a phrase and keep the words linked together
Common words are ignored (That, to, which, a, the …)
+ and 3 can be used to include or exclude a word
Boolean
AND 3 enter words connect with AND- it will include sites where both words and found
Uses: joining different topics (i.e. global warming AND California)
OR 3 requires at least one of the terms is found.
Uses: join similar or synonymous topics (i.e. global warming OR greenhouse effect)
NOT – searches for the ûrst term and excludes sites that have the second term.
(i.e. Washington NOT school)
Question
a question may be entered in the search ûeld of search engine
Advanced Features are
offered on many engines by going to an <Advanced search= page and making selections. Effective in
narrowing search returns to a speciûc topic or phrase.
LESSON 3: Advanced Word Processing Skills
Lesson Discussion
In the professional world, sending out information to convey important information is vital. Because of
ICT, things are now sent much faster than the traditional newsle ers or postal mail. You can now send
much faster than the traditional newsle ers or postal mail. You can now use the Internet to send out
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 16/57
information you need to share. What if we could still do things much faster 3 an automated way of
creating and sending uniform le ers with different recipients? Would that not be more convenient?
I. Mail Merge and Label Generation
A. Mail Merge
One of the important reasons in using computers per se is its ability to do recurring tasks
automatically. But this ability has to be honed by learning the characteristics and features of the software
you use with your computer. After all, no ma er how good or advance your computer and software
may be, it can only be as good as the person using it.
In this particular part of our lesson, we will learn one of the most powerful and commonly used
features of Microsoft Word called Mail Merge. As the name suggests, this feature allows you to create
documents and combine or merge them with another document or data ûle. It is commonly used when
sending out advertising materials to various recipients.
The simplest solution for the scenario above is to create a document and just copy and paste it
several times then just replace the details depending on whom you send it to. But what if you have
hundreds or thousands of recipients? Would not that take too many hours? What if you have a small
database of information where you can automatically generate those le ers?
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 17/57
Two Components of Mail Merge
1. Form Document
The ûrst component of our mail merged document is the form document. It is generally the
document that contains the main body of the message we want to convey or send. The main body of the
message is the part of the form document that remains the same no ma er whom you send it to from
among your list.
Also included in the form document is what we call place holders, also referred to as data ûelds or
merge ûelds. This marks the position on your form document where individual data or information will
be inserted. From our sample document, the place holders are denoted or marked by the text with
double-headed arrows (<< >>) on each side and with a gray background. On a printed standard form,
this will be the underlined spaces that you will see and use as a guide to where you need to write the
information that you need to ûll out. In its simplest form, a form document is literally a <form= that you
ûll out with individual information. A common example of a form document is your regular tax form or
application form.
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 18/57
2. List or Data File
The second component of our mail merged document is the list or data ûle. This is where the
individual information or data that needs to be plugged in (merged) to the form document is placed and
maintained. One of the best things about the mail merge feature is that it allows data ûle to be created
fro within the Microsoft Word application itself, or it gets data from a ûle created in Microsoft Excel or
other data formats. In this way, ûelds that needed to be ûlled up on the form document can easily be
maintained without accidentally altering the form or main document. You can also easily add, remove,
modify, or extract your data more efficiently by using other data management applications like Excel or
Access and import them in Word during the mail merge process.
B. Label Generation
Included in the mail merge feature on Microsoft Word is the Label Generator. It just makes sense
that after you print out your form le ers, you will need to send it to individual recipients in an envelope
with the matching address printed directly on the envelope or on a mailing label to stick on. By using
virtually the same process as a standard mail merge, Microsoft Word will print individual addresses to a
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 19/57
standard form that it has already pre-forma ed. Simply put, it creates a blank form document that
simulates either a blank label or envelope of pre-deûned size and will use the data ûle that you selected
to print the information, typically individual addresses. So even in generating labels, the two essential
components of creating a merged document are present: the form document and the data ûle. Only in
this case, you did not have to type or create the form document yourself because it was already created
and pre-forma ed in Microsoft Word. All you need to do is select the correct or appropriate size for the
label or envelope and select the data ûle that contains the addresses (data) to be printed. You can also
preview your merged labels before printing if you want to.
II. Integrating Images and External Materials
Integrating or inserting pictures in your document is fun and it improves the impression of your
document. A common use of inserting a picture on a document is when you are creating your resume.
Though seemingly simple to do, your knowledge on the different kinds of materials that you can insert
or integrate in a Word document and its characteristics can help you create a more efficient, richer
document not only in content but also in physical form. A be er understanding of the physical form of
your document as well as the different materials you would integrate in it would allow you to be more
efficient and versatile in using Microsoft Word.
A. Kinds of Materials
There are various kinds of materials Microsoft Word is capable of integrating to make the
documents richer, more impressive, and more informative.
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 20/57
1. Pictures
Generally, these are electronic or digital pictures or photographs you have saved in any local
storage device. There are three commonly used types of picture ûles. You can identify them by the
extension on their ûle names.
a. .JPG/JPEG
This is pronounced as <jay-peg< and is the short form of .jpeg or Joint Photographic Experts
Group. Like all the rest of the image ûle extensions, it identiûes the kind of data compression process
that it uses to make it more compatible and portable through the Internet. This type of image ûle can
support 16.7 million colors that is why it is suitable for use when working with full color photographic
images. Unfortunately, it does not support transparency and therefore, images of this ûle type can be
difficult to integrate in terms of blending with other materials or elements in your document. But if you
are looking for the best quality image to integrate with your document then this is the image ûle type for
you. .JPG does not work well on le ering, line drawings, or simple graphics. .JPG images are relatively
small in ûle size.
b. .GIF
This stands for Graphics Interchange Format. This type of image ûle is capable of displaying
transparencies. Therefore, it is good for blending with other materials or elements in your document. It
is also capable of displaying simple animation. Apparently, this may not be too useful on a printed
document but if you are sending documents electronically or through email, or even post documents
into a website, then this could be quite impressive. The downside is that it can only support up to 256
colors so it is good mostly on logos and art decors with very limited, and generally solid colors. .GIF is
much be er for logos, drawings, small text, black and white images, or low-resolution ûles.
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 21/57
Example of a .gif format picture.
c. .PNG
This is pronounced as <ping<. It stands for Portable Network Graphics. It was built around the
capabilities of .GIF. Its development was basically for the purpose of transporting images on the Internet
at faster rates. It is also good with transparencies but unlike .GIFs, it does not support animation but it
can display up to 16 million colors, so image quality for this image ûle type is also remarkably
improved. .PNG allows the control of the transparency level or opacity of images.
Example of .png format picture.
2. Clip Art
This is generally a .GIF type; line art drawings or images used as generic representation for ideas
and objects that you might want to integrate in your document. Microsoft Word has a library of clip arts
that is built in or can be downloaded and used freely. There are still other clip arts that you can either
purchase or freely download and use that come from third-party providers.
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 22/57
Clip Art Icon in Microsoft Office 2010.
3. Shapes
These are printable objects or materials that you can integrate in your document to enhance its
appearance or allow you to have some tools to use for composing and representing ideas or messages. If
you are designing the layout for a poster or other graphic material for advertising, you might ûnd this
useful.
Shapes Icon under the Insert ribbon tab.
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 23/57
4. Smart Art
Generally, these are predeûned sets of different shapes grouped together to form ideas that are
organizational or structural in nature. If you want to graphically represent an organization, process,
relationships, or üow for infographic documents, then you will ûnd this easy and handy to use.
Image result for smart art icon in microsoft word 2010 office
Smart Art
5. Chart
Another type of material that you can integrate in your Word document that allows you to represent
data characteristics and trends. This is quite useful when you are preparing reports that correlate and
present data in a graphical manner. You can create charts that can be integrate in your document either
directly in Microsoft Word or imported from external ûles like Microsoft Excel.
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 24/57
Chart – Used to illustrate and compare data.
6. Screenshot
Sometimes, creating reports or manuals for training or procedures will require the integration of a more
realistic image of what you are discussing on your report or manual. Nothing can get you a more
realistic image than a screenshot. Microsoft Word even provides a snipping tool for your screen shots so
you can select and display only the part that you exactly like to capture on your screen.
III. Image Placement
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 25/57
Layout of text wrapping options.
A. In Line with Text
This is the default se ing for images that are inserted or integrated in your document. It treats your
image like a text font with the bo om side totally aligned with the text line. This se ing is usually used
when you need to place your image at the beginning of a paragraph. When placed between texts in a
paragraph or a sentence, it distorts the overall appearance and arrangement of the texts in the paragraph
because it will take up the space it needs vertically, pushing whole lines of texts upward.
B. Square
This se ing allows the image you inserted to be placed anywhere with the paragraph with the text going
around the image in a square pa ern like frame.
C. Tight
This is almost the same as the Square se ing, but here the text <hug= or conforms to the general shape of
the image. This allows you to get a more creative effect on your document. This se ing can mostly be
achieved if you are using an image that supports transparency like a .GIF or .PNG ûle.
D. Through
This se ing allows the text on your document to üow even tighter taking the contours and shape of the
image. Again, this can be best used with .GIF or .PNG type of image.
E. Top and Bo om
This se ing pushes the texts away vertically to the top and/or the bo om of the image so that the image
occupies a whole text line on its own.
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 26/57
p
F. Behind Text
This allows your image to be dragged and placed anywhere on your document but with all the texts
üoating in front of it. It effectively makes your image look like a background.
G. In Front of Text
As it suggests, this se ing allows your image to be placed right on top of the text as if your image was
dropped right on it. That means whatever part of the text you placed the image on, it will be covered by
the image.
IV. Key Terms
Mail Merge 3 a feature that allows you to create documents and combine or merge them with
another document or data ûle.
Form Document 3 the document that contains the main body of the message we want to convey or
send.
Data File 3 includes the individual information or data or the recipient9s information.
Merge Field/Place Holder 3 marks the position on your form document where individual data or
information will be inserted.
.JPG 3 ûle extension for the Joint Photographic Experts Group picture ûle.
.PNG 3 ûle extension for Portable Network Graphics image ûle.
.GIF 3 ûle extension for the Graphics Interchange Format image ûle.
Clipart 3 line art drawings or images used as a generic representation for ideas and objects.
Smart Art 3 predeûned sets of different shapes grouped together to form ideas that are
organizational or structural in nature.
Text Wrap 3 adjusts how the image behaves around other objects or text.
LESSON 4: Advanced Spreadsheet Skills
1. What is a Spreadsheet Software? • allows users to organize data in rows an columns and perform
calculations on the data • These rows and columns collectively are called worksheet.
2. 3. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment-
technologies-advanced-spreadsheet-skills-3-638.jpg?cb=1516067681)Examples of Spreadsheet
Software: • LibreOffice Calc • OpenOffice.org Calc • Google Sheets • Apple iWork Numbers •
Kingsoft Office Spreadsheets • StarOffice Calc • Microsoft Excel
3. 4. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment-
technologies-advanced-spreadsheet-skills-4-638.jpg?cb=1516067681)MICROSOFT EXCEL
4. 5. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment-
technologies-advanced-spreadsheet-skills-5-638.jpg?cb=1516067681)To open Microsoft Excel, Press
<Windows Logo= + R then type <excel= then enter.
5. 6. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment-
technologies-advanced-spreadsheet-skills-6-638.jpg?cb=1516067681)Key Terms in MS Excel: • Row 3
horizontal line of entries in a table • Column 3 vertical line of entries in a table • Cell 3 the place
where info. is held in a spreadsheet
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 27/57
6. 7. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment-
technologies-advanced-spreadsheet-skills-7-638.jpg?cb=1516067681)Key Terms in MS Excel: • Active
Cell 3 the selected cell • Column Heading 3 the box at the top of each column containing a le er •
Row Heading 3 the row number
7. 8. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment-
technologies-advanced-spreadsheet-skills-8-638.jpg?cb=1516067681)Key Terms in MS Excel: • Cell
Reference 3 the cell address of the cell usually combine le er and number (ex. A1, B4, C2) • Merge 3
combining or joining two or more cells • Formula 3 is an expression which calculates the value of a
cell.
8. 9. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment-
technologies-advanced-spreadsheet-skills-9-638.jpg?cb=1516067681)Key Terms in MS Excel: •
Functions 3 are predeûned formulas and are already available in Excel • Formula Bar 3 the bar that
displays the contents of a cell
9. 10. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment-
technologies-advanced-spreadsheet-skills-10-638.jpg?cb=1516067681)FUNCTIONS
10. 11. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment-
technologies-advanced-spreadsheet-skills-11-638.jpg?cb=1516067681)BASIC MATH OPERATIONS: •
=SUM(x,y) or =SUM(range) 3 returns the sum of x and y or (all the numbers within the range) •
=PRODUCT(x,y) 3 returns the product of x and y • =QUOTIENT(x,y) 3 returns the quotient of x
divided by y • =x-y 3 returns the difference of x subtracted by y
11. 12. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment-
technologies-advanced-spreadsheet-skills-12-638.jpg?cb=1516067681)BASIC MATH OPERATIONS: •
=x+y 3 returns the sum of x and y • =x*y 3 returns the product of x and y • =x/y 3 returns the quotient
of x divided by y • =x-y 3 returns the difference of x subtracted by y
12. 13. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment-
technologies-advanced-spreadsheet-skills-13-638.jpg?cb=1516067681)OTHER FUNCTIONS: •
=ABS(x) 3 returns the absolute value of x • =AVERAGE(x,y) 3 returns the average of x and y •
=CONCATENATE(x,y) 3 joins x and y
13. 14. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment-
technologies-advanced-spreadsheet-skills-14-638.jpg?cb=1516067681)OTHER FUNCTIONS: •
=IF(Condition, x, y) 3 returns x if the condition is true, else it returns y • =ISEVEN(x) 3 returns true if
x is an even number • =ISODD(x) 3 returns true if x is an odd number
14. 15. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment-
technologies-advanced-spreadsheet-skills-15-638.jpg?cb=1516067681)OTHER FUNCTIONS: •
=COUNT(range) 3 counts the number of cell containing a number within a range •
=COUNTIF(range, criteria) 3 count the number of cell that ûts with the criteria within the range
15. 16. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment-
technologies-advanced-spreadsheet-skills-16-638.jpg?cb=1516067681)OTHER FUNCTIONS: •
=ISNUMBER(x) 3 returns true if x is a number • =ISTEXT(x) 3 returns true if x is a text • =LEN(x) 3
returns the length of characters in x • =PROPER(x) 3 returns the proper casing of x
16. 17. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment-
technologies-advanced-spreadsheet-skills-17-638.jpg?cb=1516067681)OTHER FUNCTIONS: •
=LEFT(x,y) 3 returns the characters of x speciûed by y (from the left) • =RIGHT(x,y) 3 returns the
characters of x speciûed by y (from the right) • =PI() 3 returns the value of pi
17. 18. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment-
technologies-advanced-spreadsheet-skills-18-638.jpg?cb=1516067681)OTHER FUNCTIONS: •
=MIN(x,y) 3 returns the smallest number between x and y • =MAX(x,y) 3 returns the largest number
between x and y • =MIN(range) 3 returns the smallest number within the range • =MAX(range) 3
returns the largest number within the range
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 28/57
18. 19. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment-
technologies-advanced-spreadsheet-skills-19-638.jpg?cb=1516067681)OTHER FUNCTIONS: •
=POWER(x,y) 3 returns the value of x raised to the power of y • =ROUND(x,y) 3 rounds x to a
speciûed number of digits (y) =COLUMN(x) 3 returns the column number of x • =ROW(x) 3 returns
the row number of x
19. 20. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment-
technologies-advanced-spreadsheet-skills-20-638.jpg?cb=1516067681)OTHER FUNCTIONS: •
=SQRT(x) 3 returns the square root of x • =TRIM(x) 3 removes extra spaces in x • =UPPER(x) 3
returns x in all capital form • =LOWER(x) 3 returns x in non- capital form
20. 21. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment-
technologies-advanced-spreadsheet-skills-21-638.jpg?cb=1516067681)OTHER FUNCTIONS: •
=TODAY() 3 returns the current date • =NOW() 3 returns the current date and time
21. 22. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment-
technologies-advanced-spreadsheet-skills-22-638.jpg?cb=1516067681)EXERCISES
22. 23. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment-
technologies-advanced-spreadsheet-skills-23-638.jpg?cb=1516067681)Consider this data: NAME
MATH GRADE SCIENCE GRADE FILIPINO GRADE ENGLISH GRADE A.P GRADE MARK 75 70
78 81 78 PETE 84 87 86 88 85 ANA 91 92 95 90 90 REA 73 75 74 75 70
23. 24. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment-
technologies-advanced-spreadsheet-skills-24-638.jpg?cb=1516067681)Give the formulas to get : •
Mark9s , Pete9s, Ana9s and Rea9s averages • The highest grade that Ana got • The lowest grade that
Mark got? • Sum of all Math Grade? Science? A.P.? • Sum of all Rea9s Grades • The Lowest Number
among all grades • The remarks (Passed or Failed)
24. 25. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment-
technologies-advanced-spreadsheet-skills-25-638.jpg?cb=1516067681)Now, consider this data: FIRST
NAME MIDDLE NAME LAST NAME MARK CURTIS WILLIAMS PETE MCCLOEY HARRISON
ANA MONROE FRITZ REA TAN COLLINS
25. 26. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment-
technologies-advanced-spreadsheet-skills-26-638.jpg?cb=1516067681)Give the formulas to get : •
Mark9s Full Name • Ana9s Full Name in Proper Case • Count the number of le ers that Pete9s Last
Name has • <COLL= from Rea9s Last Name • <LOEY= from Pete9s Middle Name • Combining
<WILL= and <LINS= from Mark and Rea9s Last Names respectively
LESSON 5: Advanced Presentation Skills
Powerpoint is a highly innovative and versatile program that can ensure a successful communication
whether you9re presenting in front of potential investors, a lecture theatre or simply in front of your
colleagues. The following are the ûve features you should be using-if youy aren9t already. Learn
everything about these tips: they will improve your presentation skills and allow you to communicate
your message successfully. The ûve features of powerpoint was
1)adding smart art
2)Inserting Shapes
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 29/57
3)Inserting and Image
4)Slide Transitions
5)Adding Animations
Creating an Effective Presentation
1. Minimize: Keep slides counts to a minimum to maintain a clear message and to keep the audience
a entive. Remember that the presentation is just a visual aid. Most information should still come from
the reporter.
2.Clarity: Avoid being to fancy by using font style that is easy to read. Make sure that it is also big
enough to be read by the audience. Once you start making your presentation, consider how big the
screen is during your report.
3.Simplicity: Use bullets or short sentences. Summarize the information on the screen to have your
audience focus on what the speaker is saying than on reading the slide. Limit the content to six lines and
seven words per line. This is known as the 6 x 7 rule.
4. Visual: Use graphics to help in your presentation but not too many to distract the audience. In
addition, instead of using table of data, use charts and graphs.
5. Consistency: Make your design uniform. Avoid having different font styles and backgrounds.
6. Contrast: Use a light font on dark background or vice versa. This is done so that it is easier to read. In
most instances, it is easier to read on screen if the background is dark. This is due to the brightness of the
screen.
LESSON 6: Imaging and Design for Online
Environment
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 30/57
PHOTO EDITING
Photo editing encompasses the processes of altering images, whether they are digital photographs,
traditional photo chemical photographs, or illustrations. Traditional analog image editing is known
as photo retouching, using tools such as an airbrush to modify photographs, or editing illustrations
with any traditional art medium.
Graphic software programs
Which can be broadly grouped into vector graphics editors, raster graphics editors, and 3D modelers
are the primary tools with which a user may manipulate, enhance, and transform images. Many
image editing programs are also used to render or create computer art from scratch.
BASIC OF IMAGE EDITING
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 31/57
1. RASTER IMAGESare stored in a computer in the form of a grid of picture elements or pixels.
2. VECTOR IMAGESsuch as Adobe Illustrator, Inkscape and etc. are used to create and modify vector
images, which are stored as descriptions of lines, Bezier curves and text instead of pixels.
DIFFERENCE BETWEEN RASTER AND VECTOR IMAGES
RASTER IMAGESuse many colored pixels or individual building blocks to form a complete image
JPEGs, GIFs and PNGs are common raster image types. Almost all of the photos found on the web and
in print catalogs are raster images.
VECTOR IMAGES alternatively, allow for more üexibility. Constructed using mathematical
formulas rather than individual colored blocks, vector ûle types such as EPS, AI and PDF are
excellent for creating graphics that frequently require resizing.
3. 3D MODELING (OR MODELLING) is the process of developing a mathematical representation
of any three dimensional surface of an object via specialized software. The product is called a 3D
model. It can be displayed as a two-dimensional image through a process called 3D rendering or
used in a computer simulation or physical phenomena. The model can also be physically created
using 3D printing devices.
IMAGE FORMATS
Ø JPEG is a commonly used method of lossy compression for digital images, particularly for those
images produced by a digital photography.
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 32/57
Ø PNG (PORTABLE NETWORK GRAPHICS) is a raster graphics ûle format that supports lossless
data compression.
Ø GIF a lossless format for image ûles that supports both animated and static images.
Ø BMP is a raster graphics image used to store bitmap digital images
Ø EPS used in vector-based images in Adobe Illustrator.
Ø SVG is an XML-based vector image format for two-dimensional graphics w/ support for interactivity
and animation
Ø .3ds is one of the ûle formats used by the Autodesk 3Ds Max 3D Modelling, animation and rendering
software.
Ø . x is an exchange format, in particular for interoperability between Autodesk products and other
digital content creation software
FEATURES OF IMAGE EDITORS
SELECTION One of the prerequisites for many of the app mentioned below is a method of selecting
part(s) of an image, thus applying a change selectively without affecting the entire picture
Ø MARQUEE TOOL for selecting rectangular or other regular polygon-shaped regions
Ø LASSO TOOL for freehand selection of a region
Ø MAGIC WAND TOOL selects objects or regions in the image deûned by proximity of color or
luminance
LAYERS which are analogous to sheets of transparent acetate, stacked on top of each other, each capable
of being individually positioned, altered and blended with the layers below, w/o affecting any of the
elements on the other layers.
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 33/57
IMAGE SIZE resize images in a process often called image scaling, making them larger, or smaller.
High image resolution cameras can produce large images which are often reduced in size for Internet
use.
CROPPING creates a new image by selecting a desired rectangular portion from the image being
cropped. The unwanted part of the image is discarded. Image cropping does not reduce the resolution of
the area cropped.
CLONING uses the current brush to copy from an image or pa ern. It has many uses: one of the most
important is to repair problem areas in digital photos.
IMAGE ORIENTATION – Image editors are capable of altering an image to be rotated in any direction
and to any degree. Mirror images can be created and images can be horizontally üipped or vertically
üopped. Rotated image usually require cropping afterwards, in order to remove the resulting gaps at the
image edges.
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 34/57
PERSPECTIVE – is the art of drawing solid objects on a two- dimensional surface so as to give the right
impression of their height, width, depth and position in relation to each other when viewed from a
particular point.
SHARPENING AND SOFTENING– Sharpening makes images clearer. Too much sharpening causes
grains on the surface of the image. Softening makes images softer that removes some of the highly
visible üaws. Too much causes the image to blur.
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 35/57
SATURATION- is an expression for the relative bandwidth of the visible output from a light source. As
saturation increase, colors appear more <pure.99 As saturation decreases, colors appear more 89 washed-
out.99
CONTRAST AND BRIGHTENING
Contrast of images and brighten or darken the image. Underexposed images can be often be improved
by using this feature.
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 36/57
Brightening lightens the image so the photo brightens up. Brightness is a relative expression of the
intensity of the energy output of a visible light source.
Adjusting contrast means adjusting brightness because they work together to make a be er image.
PHOTO MANIPULATION
Photo manipulation involves transforming or altering a photograph using various methods and
techniques to achieve desired results. Some photo manipulations are considered skillful artwork while
others are frowned upon as unethical practices, especially when used to deceive the public, such as hat
used for political propaganda , or to make a product or person look be er.
DIFFERENCES
PHOTO EDITING 3 signiûes the regular process used to enhance photos and to create them 89Actual
editing simple process99. Also includes some of the regular programs used for editing and expose how to
use them.
PHOTO MANIPULATION 3 includes all simple editing techniques and have some manipulation
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 37/57
techniques like erasing, adding objects , adding some graphical effects, background correction, creating
incredible effect, change elements in an image, adding styles , eliminating blemishes from a person9s
face and changing the features of a person9s body.
b.) Infographics
also known as data visualization, information design, and communication design
It is any graphic that display and explains information, whether that be data or words. When we use
the term 89infographics99, we9re using it as a general term used to describe data presented in a visual
way.
Infographics are important because they change the way people ûnd and experience stories.
Infographics are being used to augment editorial content on the web, it create a new way of seeing
the world of data, and they help communicate complex ideas in a clear and beautiful way.
TYPES OF INFOGRAPHICS
1. Statistical
2. Process Flow
3. Geographic
PROCESS OF MAKING INFOGRAPHICS
1. Research
2. a)Know what is needed
3. b)Take a reference
4. c)Know the audience
5. d)Decide the type of infographics
6. Brainstorm
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 38/57
7. a)Gather ideas
8. b)Build thought process
9. Design
10. a) Choose your tool and start designing
11. Review
12. a) Cross check the data to deliver üawless output
13. Launch
14. a) Make it viral
15. b) Share on social network
BEST PRACTICES WHEN CREATING INFOGRAPHICS
1. a)Maintain a structure
2. b)Don9t use more than 3 color palletes
3. c)Typography ma ers a lot
4. d)Include source and references
LESSON 7: Online Platforms for ICT Content
Development
1.Facebook
(https://onlineplatformsweb.wordpress.com/2017/02/13/first
-blog-post/)
Posted on February 13, 2017
1. Marketplace 3 allows members to post, read and respond to classiûed ads.
2. Groups 3 allows members who have common interests to ûnd each other and interact.
3. Events 3 allows members to publicize an event, invite guests and track who plans to a end.
4. Pages 3 allows members to create and promote a public page built around a speciûc topic.
5. Presence technology 3 allows members to see which contacts are online and chat.
Within each member9s personal proûle, there are several key networking components. The most popular
is arguably the Wall, which is essentially a virtual bulletin board. Messages left on a member9s Wall can
be text, video or photos. Another popular component is the virtual Photo Album. Photos can be
uploaded from the desktop or directly from a smartphone
(h p://searchmobilecomputing.techtarget.com/deûnition/smartphone) camera. There is no limitation on
quantity, but Facebook staff will remove inappropriate or copyrighted images. An interactive album
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 39/57
feature allows the member9s contacts (who are called generically called <friends=) to comment on each
other9s photos and identify (tag) people in the photos. Another popular proûle component is status
updates, a microblogging
(h p://searchmobilecomputing.techtarget.com/deûnition/microblogging)feature that allows members to
broadcast short Twi er-like announcements to their friends. All interactions are published in a news
feed, which is distributed in real-time to the member9s friends.
Facebook offers a range of privacy
(h p://searchdatamanagement.techtarget.com/deûnition/privacy) options to its members. A member
can make all his communications visible to everyone, he can block speciûc connections or he can keep all
his communications private. Members can choose whether or not to be searchable, decide which parts of
their proûle are public, decide what not to put in their news feed and determine exactly who can see
their posts. For those members who wish to use Facebook to communicate privately, there is a message
feature, which closely resembles email.
2. Instagram
Instagram is an online mobile (h ps://en.wikipedia.org/wiki/Mobile_social_network) photo-sharing
(h ps://en.wikipedia.org/wiki/Photo_sharing) site that allows its users to share pictures and videos
either publicly or privately on the app, as well as through a variety of other social networking platforms,
such as Facebook (h ps://en.wikipedia.org/wiki/Facebook), Twi er
(h ps://en.wikipedia.org/wiki/Twi er), Tumblr (h ps://en.wikipedia.org/wiki/Tumblr), and Flickr
(h ps://en.wikipedia.org/wiki/Flickr). Originally, a distinctive feature was that it conûned photos to a
square shape, similar to Kodak Instamatic and Polaroid SX-70 images, in contrast to the 4:3 aspect ratio
typically used by mobile device cameras. In August 2015, version 7.5 was released, allowing users to
upload media captured in any aspect ratio. Users can also apply digital ûlters
(h ps://en.wikipedia.org/wiki/Photographic_ûlter) to their images. Videos on Instagram debuted in June
2013, allowing prerecorded square standard deûnition (h ps://en.wikipedia.org/wiki/Standard-
deûnition_television) resolution clips of up to 15 seconds to be shared; later improvements added
support for widescreen (h ps://en.wikipedia.org/wiki/Widescreen)resolutions of up to 1080p
(h ps://en.wikipedia.org/wiki/1080p) and longer recording times for either prerecorded (up to one
minute) or disappearing live (up to one hour) videos.
Instagram was created by Kevin Systrom (h ps://en.wikipedia.org/wiki/Kevin_Systrom) and Mike
Krieger (h ps://en.wikipedia.org/wiki/Mike_Krieger), and launched in October 2010 as a free mobile
app (h ps://en.wikipedia.org/wiki/Mobile_app). The service rapidly gained popularity, with over 100
[10] (h // iki di / iki/I t # it t i 10)
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 40/57
million active users as of April 2012
and over 300 million as of December 2014.
Instagram is distributed through the
Apple App Store (h ps://en.wikipedia.org/wiki/App_Store_(iOS)) and Google Play
(h ps://en.wikipedia.org/wiki/Google_Play).
Support for the app is available for iPhone (h ps://en.wikipedia.org/wiki/IPhone), iPad
(h ps://en.wikipedia.org/wiki/IPad), iPod Touch (h ps://en.wikipedia.org/wiki/IPod_Touch), Windows
10 (h ps://en.wikipedia.org/wiki/Windows_10_Mobile) devices and Android
(h ps://en.wikipedia.org/wiki/Android_(operating_system)) handsets, while third-party Instagram apps
are available for BlackBerry 10 (h ps://en.wikipedia.org/wiki/BlackBerry_10) and Nokia-Symbian
(h ps://en.wikipedia.org/wiki/Symbian) Devices.
3. Twitter
Twi er is an online news (h ps://en.wikipedia.org/wiki/News) and social networking
(h ps://en.wikipedia.org/wiki/Social_networking_service) service where users post and interact with
messages, <tweets,= restricted to 140 characters
(h ps://en.wikipedia.org/wiki/Character_(computing)). Registered
(h ps://en.wikipedia.org/wiki/User_registration) users can post tweets, but those who are unregistered
can only read them. Users access Twi er through its website interface, SMS
(h ps://en.wikipedia.org/wiki/Short_Message_Service) or a mobile device app
(h ps://en.wikipedia.org/wiki/Application_software).
Twi er Inc. is based in San Francisco
(h ps://en.wikipedia.org/wiki/San_Francisco), California
(h ps://en.wikipedia.org/wiki/California), United States (h ps://en.wikipedia.org/wiki/United_States),
and has more than 25 offices around the world.
Twitter is about learning and adding value
It is also about adding value to others by giving or sharing something valuable to them so that they are
able to learn something. That is why I usually tweet about stuff that I read, learned or have good value. I
have learned so much from the others that is why I love twi er. It is also about helping others, I disagree
with many8experts9 that say you should only follow 8influential9 users because I don9t judge someone that
[10] (h ps://en.wikipedia.org/wiki/Instagram#cite_note-igpress-10)
[11] (h ps://en.wikipedia.org/wiki/Instagram#cite_note-11)
[12] (h ps://en.wikipedia.org/wiki/Instagram#cite_note-12)
[13] (h ps://en.wikipedia.org/wiki/Instagram#cite_note-
Engadget-13)
[10]
(h ps://en.wikipedia.org/wiki/Twi er#cite_note-10)
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 41/57
way, and because I believe the people at Twi er don9t believe in them either. I also disagree that you
should only share your own stuff otherwise you will dilute your brand. Sure it makes sense but 24/7
sharing your own blog post and following inüuential people?
BLOGGING SITES
1. Weebly
Weebly is one of the easiest website builders in the market
(h p://www.websitebuilderexpert.com/go/weeblyvswp). They allow you to drag and drop content into
a website, so it9s very intuitive to use (click here to see our opinion on Weebly
(h p://www.websitebuilderexpert.com/weebly-review/)).
By using Weebly9s website building elements, you can literally drag them into your website and have a
website built relatively quickly, and painlessly. The beauty of this system is that you can pre y much
drag the elements to wherever you want 3 so it9s not very restrictive on where and how you place your
website content.
Weebly9s elements include pictures, paragraphs, videos, bu ons, maps, contact forms 3 basically all the
basics for website building.
2. Tumblr
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 42/57
Tumblr is a popular microblogging platform designed for creative self-expression. It is considered a
mindful alternative to Facebook and other social media websites where users blog on a myriad of topics.
You can link your Tumblr account to other social networks you use and you can feed your traditional
blog or other RSS feed (h ps://www.lifewire.com/lessons-in-rss-3476628) to your Tumblelog. You can
also create static pages such as your own Questions page that people are automatically taken to when
they ask you a question. If you want to make your Tumblelog look more lie a traditional website, you
can do it by adding pages. You can make your Tumblelog private or just make speciûc posts private as
needed, and you can schedule posts to publish in the future.
Tumblr is perfect for people who don9t need a full blog to publish lengthy posts. It9s also great for
people who prefer to publish quick multimedia posts, particularly from their mobile devices. Tumblr is
also a great choice for people who want to join a larger community. If a blog is too much or too big for
you, but Twi er is too small or too li le for you and Instagram isn9t versatile enough for you, then
Tumblr might be just right for you.
It9s also easy to invite other people to contribute to your Tumblelog.
If you want to track your stats, you can add any analytics tracking code (h ps://www.lifewire.com/top-
blog-statistics-trackers-3476176) to your Tumblelog. Some users will even burn a feed with Feedburner,
create custom themes, and use their own domain names
3. Pinterest
Pinterest is a free website that requires registration to use.Users can upload, save, sort, and manage
images4known as pins4and other media content (e.g., videos) through collections known as
pinboards. Pinterest acts as a personalized media platform. Users can browse the content of others in
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 43/57
their feed. Users can then save individual pins to one of their own boards using the <Pin It= bu on, with
pinboards typically organized by a central topic or theme. Users can personalize their experience by
pinning items, creating boards, and interacting with other members. The end result is that the <pin feed=
of each user displays unique, personalized results.
Content can also be found outside of Pinterest and similarly uploaded to a board via the <Pin It= bu on,
which can be downloaded to the bookmark
(h ps://en.wikipedia.org/wiki/Bookmark_(World_Wide_Web)) bar on a web browser, or be
implemented by a webmaster directly on the website. They also have the option of sending a pin to other
Pinterest users and email accounts through the <Send= bu on. Some websites include red and white
<pin it= bu ons on items, which allow Pinterest users to pin them directly.
Initially, there were several ways to register a new Pinterest account. Potential users could either receive
an invitation from an already registered friend, or they could request an invitation directly from the
Pinterest website that could take some time to receive. An account can also be created and accessed by
linking Pinterest to a Facebook (h ps://en.wikipedia.org/wiki/Facebook) or Twi er
(h ps://en.wikipedia.org/wiki/Twi er) proûle. When a user re-posts or re-pins an image to their own
board, they have the option of notifying their Facebook and Twi er followers. This feature can be
managed on the se ings page.
On the main Pinterest page, a <pin feed= appears, displaying the chronological activity from the
Pinterest boards that a user follows.
A <board= is where the user9s pins are located. Users can have several boards for various items such as
quotes, travel or, most popularly, weddings. A <pin= is an image that has either been uploaded or linked
from a website. Once users create boards and add pins, other users can now repin, meaning they
can pin one user9s image to their board as well. Once the user has set up their account and boards, they
can browse, comment, and like other pins. Users might be discouraged by repeated images and difficult-
to-follow direct linking features. Pinterest has also added the option of making boards <secret= so that
the user can pin to and view boards that only the user can see when logged into their own account.
Pinterest does not generate its own content; rather, it draws from many resources around the web and
compiles them in one convenient location for users.
LESSON 8: Basic Web Page Creation
1.) What are the advantages and disadvantages of a WYSIWYG editor?
ADVANTAGE :
-You don9t need any scripting/coding experience.
3 It9s simple and easy for beginners.
3 Everything moves üuently, and you can easily preview what you want.
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 44/57
DISADVANTAGE :
-A lot of HTML code churned out by the editors is superüuous which makes the web pages bulky in ûle
size
-WYSIWYG editors let you ignore certain aspects that are important.
-WYSIWYG editors simply do not provide enough support and help in optimizing your web site for
search engines.
2.) List Down (3) more WYSIWYG web hosting services and their URL.
3 Weebly Web Builder ( h ps://www.weebly.com/ (h ps://www.weebly.com/) )
3 Wix Web Builder ( h ps://www.wix.com/ (h ps://www.wix.com/) )
3 Siteground Builder ( h ps://www.siteground.com (h ps://www.siteground.com/)/)
LESSON 9: Collaborative ICT Development
Web portal
a website that contains information from different sources and places them in one location in a uniform
way
Yahoo!
example of a web portal
yahoo.com
offers a web portal where news, email, weather, etc. are found in one place
Facebook groups ; WordPress ; Google Drive ; Microsoft Office Online ; Microsoft9s
Yammer ; Trello
examples of online collaborative tools
Facebook groups
used to create a group page that will allow people in your group to communicate your ideas
WordPress
allows you to multiple contributors for a single blog
Google Drive and Microsoft Office Online
allow multiple people to work on different office ûles and even have their own group9s cloud storage
Microsoft’s Yammer
offers companies to have their own social network that allows sharing and managing content
Trello
offer an online to-do checklist for your entire team
LESSON 10: Interactive Multimedia
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 45/57
World Wide Web
world-wide-wait
WWW
CNN
now hosts videos placed on their home page, which was unthinkable in the past because of slow internet
speed
on-demand
Videos way back then were never on the home page and can be viewed <____________= or only when a
user clicks on it.
videos (youtube)
sound, music, or audio (soundcloud)
online games (farmville)
online tests (iq and personality test)
courseware (e-learning courses)
podcasts (ted talks, ear biscuits, the starters, stuff you should know)
vodcasts (video game high school and gmm)
multimedia contents (7)
online tests
online survey forms and tests that automatically display the results when ûnished
courseware
online courses that stimulate the classroom online
podcasts
an episodic series of audio or text ûles streamed online
embed
to place an object from one site to another
LESSON 11: ICT as Platform for Change
The Role of ICT in Recent History
Throughout recent history, the Philippines have been one of a few nations that demonstrate unity for
a call to action or social change. These campaigns for social change would have not been successful if it
were not for ICT.
1. EDSA (PEOPLE POWER REVOLUTION). The people power revolution lasted from 1083 to 1986.
During a radio broadcast of Radio Veritas, Cardinal Sin encouraged the Filipinos to help end the
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 46/57
regime of then President Ferdinand Marcos. A major protest took place along the EDSA from
February 22 to 25, 1986 involving two million Filipinos from different sectors. These included
civilians, political parties, the military and religious groups.
2. EDSA DOS.This is also known as the 2001 EDSA Revolution, happened during January 17 to 21,
2001. It was fueled after 11 prosecutors of the President Joseph Estrada walked out of the
impeachment trial. As a result, the crowd in EDSA grew over the course of a few days through text
brigades.
3. Million People March.This is a series pf protest that mainly took place in Luneta Park from august
22 to 26, 2013. There were also several demonstrations that happened around key cities in the
Philippines and some location overseas. The organizers and promoters of the Million People March
used Facebook and Change.org as their, mediums.
4. Yolanda People Finder.Recent storms in Philippines history gave birth to the People ûnder database
powered by Google. During typhoon Yolanda, the people ûnder was a vital tool for people across the
globe to track the situation of their relatives. This proved to be successful and is now adapted by
more organizations to help people track relatives during calamities.
Change.org
Change.org is dubbed as the <world9s platform for change= where anyone from the online
community can create a petition and ask others to sign in it. During the past times petitions are only
done through signing a paper, usually done by a group asking for signatures via travel. Change.org
gives access to more people by allowing the online community to affix their digital signatures on
petition.
Signing an Online Petition
1. VisitChange.org
2. Change.org works this way. If this is your ûrst time to use Change.org, click Sign up or log in with
Facebook. Otherwise, just input your log in details.
3. You can then start your own petition, but for now click on any petition you want under tending
petitions.
4. Read the petitions description to see if this petition ma ers to you. If it is, sign the petition by ûlling
up the information on the right side of the screen.
5. Share the petition on Facebook to promote it.
Alternatively, you can check out petitions of your friends on Facebook, and then click on those
petitions to read about it and sign it.
LESSON 12: ICT Project for Social Change
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 47/57
Before starting your project, your group should be able to do the necessary paperwork. This allows
experts to see if your project is doable over the time frame that was given and if it is signiûcant enough
to be made into reality.
Five elements of a concept paper
1.Introduction-includes tour group9s mission and vision and a brief introduction of your project.
2.Purpose-includes the reasons why this project is worth your group and your sponsor9s time, effort and
money.
3.Description-includes all the necessary information about the project. In ICT, it involves the sites you
are going to produce and the purpose of each and how they work in unison.
4.Support-contains the budget needed for the project. Some concept papers do not specify any amount
requested from the sponsor.
5.Contact information-includes information on how the group be contacted.
Simplified ICT Project Process Overview
1.Planning-Involves the following task (but not limited to):
1. Conceptualizing your project project
2. Researching on available data about your topic
3. Se ing deadlines and meetings
4. Assigning people to various tasks
5. Finding a web or blog host
6. Creating a site map for tour website
7. Listing down all applications, that you need including web apps
8. Funding (If applicable)
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 48/57
2.Development-involves the actual creation of the website(s), involves the production of images,
infographics, etc.
3.Release and Promotion-involves the actual release of the website for public view and promoting it.
Promotion typically starts before the actual release.
4.Maintenance-involves responding to feedback of your site visitors and continuing to improve your
website.
LESSON 13: ICT Project Publication and
Statistics
Monitoring Site Statistics on Different Platforms
1. WordPress
Once you log in to your WordPress account, you are on the Reader tab by default. Simply click on My
Sites and from there you will see the statistics for your blog.
2. Facebook
In your Facebook page, a summary of the statistics will appear on the right side of your cover photo:
Hovering your mouse pointer over <Post Reach= will give you more insights on which recent post
reached the most people: Clicking on the Insights tab will give more in-depth statistics:
1. Overview3 contains the summary of statistics about your page
Deûnition of terms on your Facebook statistics:
Reach: Organic 3 your posts seen through the page9s wall, shares by users, and the news feed
Reach: Paid 3 your posts seen through paid ads
Post Clicks 3 number of clicks done to your posts
Likes, Comments, and Shares 3 actual interaction done by your audience either through liking the post,
commenting on it, or sharing it on their walls.
1. Likes3 contains the statistics about the trend of page likes
2. Reach3 contains information about the number of people who was reached by your post
3. Visits3 contains data of the number of times your page tabs (like the Timeline) are visited
4. Post3 contains data showing when (day and time) you site visitors visit your site
5. People3 contains statistics about your audience9s demographics (age, location, gender, language, and
country). It is also includes demographics about the people you have reached and engaged with.
Demographics refers to the statistics characterizing human population usually divided by age, gender,
income, location, and language.
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 49/57
LESSON 14: ICT Project Maintenance
Creating online surveys feedbacks forms.
The Internet will give you a lot of options in gathering your audience9s feedback. The only difference
that you and your group may notice is how these services are presented. Some of them, because they are
free to use, may have too many ads or some features are lacking. In any case, it9s your group9s choice
which of these services is t cumbersome to reach your objective.
Google offers one of the easiest ways to gather user9s feedback. Google forms allow your audience to
answer a set of questions you have set. These can be used for surveys, feedback, online registrations, and
customer care support.
4. You will be taken to Google Form9s interface:
Next is !
Lets move on to !
6. Once you are done editing the question, click Done.
7. To add a new question or item, click on Add Item, clicking on the drop down arrow at the right side of
the Add Item bu on will bring up other options for layout:
a. Section Header 3 adds a header for a speciûc a part of your survey.
b. Page break- adds a page break which means that the items at the bu on of the page will be added to
the next page: necessarily if your survey is too long.
c. Image- adds an image to your survey
d. Video- adds a video to your survey
iii. Multiple Choice 3 can be answered by only one answer in a set of options
Creating feedback forms using Google forms
Lesson objectives
• Evaluate the effectiveness of their online campaign through user feedback;
• Improve the online campaign using various tools; and
• Check the impact of their online campaign.
Steps !
1) Open your browser and go to drive.google.com
2) Sign in or create an account.
3) On the left hand hair of your My Drive page,
click New> More> Google Forms
Steps !
5. You may now ûll out the form questions:
A. Question Title- Includes the question that will be answered by your audience.
B. Help Text- Creates a subtext under the question to give more information about a question.
C. Question Type- changes the type question according to your preference. These questions include:
i. Text 3 can be answered in a short text.
ii. Paragraph Text 3 can be answered in a long text.
iv. Checkboxes 3 a question that can be answered with multiple answers in a set of options.
v. Choose from a list- similar to a multiple-choice question but options are revealed in a drop-down list.
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 50/57
vi. Scale- a question that can be answered with a numerical range.
vii. Grid- a question that contains sub questions with similar options as shown;
• Date- a question that can be answered with a speciûed date
• Time- a question that can be answered with a speciûed time
.
d. Advanced Se ings: Contains more options for the speciûed question type.
8. Edit the Conûrmation Page option at the bo om as you see ût.
A. Show link to submit another response- allows the user to answer the same form again.
B. Publish and show a public link to form results- allows users to see the summarized results for your
survey.
C. Allow responders to edits responses after submi ing- allows users to back and edit their answers
.
9. Click the Send Form bu on. The Send Form dialog box will appear these options as you see ût.
a. Link to share- contains the URL that you can share on your website.
b. Embed- contains an embed code to a ach to your HTML.
c. Short URL- generates a shorter URL necessary for limited spaces like sharing on twi er.
d. Share link via- allows you to share the link to Google+, Facebook, and Twi er.
e. Send form via email- allows you to share the form via email.
f. Add collaborators- Allows others to edit your form, necessary when working on groups.
1. The easiest way to view the result is viewing a summary of the responses. Click on Responses>
Summary of Responses.
2. You will be taken to a Summary of Responses page. This is particularly useful for viewing your results
from time to time.
However, after a set amount of time, you may want to use this data in a spreadsheet and eventually
create your own charts.
3. To use the data collected through responses, click View Responses bu on found on the upper part of
the page.
Analyzing your Google Forms Result
4. Choose if you want to create a new Google Sheet as the destination of your response results or if you
want to put it on an existing Google Sheet.
LESSON 15: Disadvantages of ICT
Cybercrimes are illegal acts done through the use of the internet. People all over the world use the
Internet to commit a host of crimes, some of which the public doesn9t even know are capable of being
done electronically.
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 51/57
1. Phishing and Spoofing
(h ps://ictcom444251764.ûles.wordpress.com/2018/03/eef31-email-spooûng-main-image.jpg)
Spoofing a ack is when a malicious party impersonates another device or user on a network in order to
launch a acks against network hosts, steal data, spread malware or bypass access controls. There are
several different types of spooûng a acks that malicious parties can use to accomplish this.
Phishing is the a empt to acquire sensitive information such as usernames, passwords, and credit card
details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a
trustworthy entity in an electronic communication.
2. Blackmail/Extortion
(h ps://ictcom444251764.ûles.wordpress.com/2018/03/be0be-images.jpg)
Extortion (also called blackmail, shakedown, out wresting, and exaction) is a criminal offence of
unlawfully obtaining money, property, or services from a person, entity, or institution, through coercion.
Refraining from doing harm is sometimes euphemistically called protection. Using the Internet to
threaten to cause damage with the intent to extort from any person any money or other thing of value.
3. Accessing Stored Communications
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 52/57
(h ps://ictcom444251764.ûles.wordpress.com/2018/03/5e9e9-hackers.jpg)
Accessing Stored Communications or hacking; Intentionally accessing, without authorization, a facility
through which an electronic communication service is provided. The act of obtaining unauthorized
access to data from computer network. This is typically done to commercial and government sites to
threaten its owner. In late 2015, a group of Anonymous Philippines hacked the Twi er account of
actress Maine Mendoza, who plays the famous character Yaya Dub of the popular AlDub tandem
and posted links and messages on the account
4. Sports Betting
(h ps://ictcom444251764.ûles.wordpress.com/2018/03/7b8d5-sportschuchu.jpg)
Sports Beating is engaging in the business of be ing or wagering on any sporting event or contest over
the Internet. In some countries, gambling (including sports be ing) is illegal even if you are doing it over
the Internet.
5. Non-Delivery of Merchandise
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 53/57
(h ps://ictcom444251764.ûles.wordpress.com/2018/03/31069-online-shopping-ecom.png)
Devising any scheme to defraud, or for obtaining money or property by means of false or fraudulent
pretenses, or promises, and using the Internet for the purpose of executing the scheme. The non-delivery
scam occurs when the scammer places an item up for sale when there is actually no item at all. The item
is subsequently never delivered to the buyer after they purchase the item.
6. Electronic/ Cyber Harassment
(h ps://ictcom444251764.ûles.wordpress.com/2018/03/08578-harassment.jpg)
Cyber harassment refers to online harassment. Cyber harassment or bullying is the use of email, instant
messaging, and derogatory websites to bully or otherwise harass an individual or group through
personal a acks. Cyber harassment can be in the form of üames, comments made in chat rooms, sending
of offensive or cruel e-mail, or even harassing others by posting on blogs or social networking sites.
Cyber harassment is often difficult to track as the person responsible for the acts of cyber harassment
remains anonymous while threatening others online. This usually applies to school-age children.
7. Child Pornography
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 54/57
(h ps://ictcom444251764.ûles.wordpress.com/2018/03/53ad9-crycry.png)
Using the Internet to transmit child pornography. Child pornography is distributed nowadays mainly
through the Internet. Child pornography are produced not only on a professional scale by commercial
providers, but also privately using victims from the producer9s own environment, from the exploitation
of children by clients of child prostitutes. Child pornography is sold over commercial websites and also
exchanged in closed groups or via peer-to-peer networks. Criminal groups also use the Internet to make
big money selling child pornography.
8. Prostitution
(h ps://ictcom444251764.ûles.wordpress.com/2018/03/0f4f0-download.jpg)
Persuading, inducing, enticing, or coercing any individual to travel in interstate commerce to engage in
prostitution.The internet has become one of the preferred methods of communication for prostitution, as
clients and prostitutes are less vulnerable to arrest or assault and for its convenience
9. Drug Trafficking
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 55/57
(h ps://ictcom444251764.ûles.wordpress.com/2018/03/ae389-drugs.jpg)
Delivering, distributing, or dispensing a controlled substance by means of the Internet. Darknet
markets are used to buy and sell recreational drugs online. Some drug traffickers use
encrypted messaging tools to communicate with drug mules. The dark web site Silk Road was a major
online marketplace for drugs before it was shut down by law enforcement (then reopened under new
management, and then shut down by law enforcement again)
10. Criminal Copyright Infringement
(h ps://ictcom444251764.ûles.wordpress.com/2018/03/28f35-pirata.jpg)
Criminal Copyright Infringement, the act of piracy mainly for ûnancial gain. In late 2014, the number
one pirate website, The PirateBay, was raided for the second time due to years of pirating movies, music,
games, books, and other software. These kinds of websites earn money through advertsing.
Published by regisjoyce
View all posts by regisjoyce
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 56/57
14 thoughts on <Empowerment Technologies LESSONS 1-
15=
1.
DEMETRIO M. CAMPADO says:
July 14, 2020 at 5:08 am
Thank you po! maam and sir for sharing us
Reply →
2.
ROLLY PUJANES says:
July 22, 2020 at 3:22 am
Good Day, this is a very good module, can I use this module as my reference? Thank you.
Reply →
3.
CARINGALJOELS says:
July 24, 2020 at 2:47 am
Absolutely comprehensive! Thank you!
Reply →
4.
TEACHER EREL says:
August 20, 2020 at 8:38 am
thank you for sharing this online. New teacher here. not my piece of pie but it was assigned to me
this school year. can i use this for my class? thank you in advance.
Reply →
5.
BARANI, JAMALODI B. says:
October 15, 2020 at 2:58 am
I have learned a lot in this lesson.
This lesson helped me understand more about this subject.
Reply →
6.
ENCLONAR ROJANA MARIE says:
December 18, 2020 at 2:40 pm
No coomment
Reply →
7.
ARSENIO CUPIDO JR says:
March 4, 2021 at 7:13 am
Will it9s okey
Reply →
8. Pingback: CENTENO9S EMTECH BLOG 3 Site Title
9.
BERNADETH RAMOS says:
June 1, 2021 at 7:42 am
I learned a lot because of this lessons.
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804
1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 57/57
Reply →
10.
ELMER T. GABINI says:
June 16, 2021 at 2:51 am
There are a lot of crimes in social media that we need to careful our social media accounts.
Reply →
11.
ELMER GABINI says:
June 16, 2021 at 2:53 am
There are a lot of crimes in social media that we need to careful our social media accounts.
Reply →
12.
ANGELYNSANJOSETUTOL says:
June 16, 2021 at 11:01 pm
From grade 12 Loreal
Reply →
13.
KEVIN DUMDUM says:
June 18, 2021 at 1:34 am
Baliwagan,Balamban,Cebu
Reply →
14.
CABALLERO, JOHNREY J says:
June 25, 2021 at 4:44 am
Reply →
BLOG AT WORDPRESS.COM.
Empowerment Technology Project
Empowerment Technology Project
Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com)
lOMoARcPSD|19576804

More Related Content

Similar to empowerment-technologies-lessons-1-15-empowerment-technology.pdf

LESSON 1 Em Tech.pptx
LESSON 1 Em Tech.pptxLESSON 1 Em Tech.pptx
LESSON 1 Em Tech.pptxDixsonCaluag2
 
LESSON 3 Em Tech.pptx
LESSON 3 Em Tech.pptxLESSON 3 Em Tech.pptx
LESSON 3 Em Tech.pptxDixsonCaluag2
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SJuvywen
 
empowerment technology 12.pptx
empowerment technology 12.pptxempowerment technology 12.pptx
empowerment technology 12.pptxJasonPDelosSantos
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxclaireolitres
 
Empowerment Technology_Introduction.pptx
 Empowerment Technology_Introduction.pptx Empowerment Technology_Introduction.pptx
Empowerment Technology_Introduction.pptxCliffordBorromeo
 
Lesson 1 2 Edited
Lesson 1 2 EditedLesson 1 2 Edited
Lesson 1 2 EditedJuvywen
 
Empowerment Tech Lesson 1 What is ICT.pptx
Empowerment Tech Lesson 1 What is ICT.pptxEmpowerment Tech Lesson 1 What is ICT.pptx
Empowerment Tech Lesson 1 What is ICT.pptxNicoleBitgue
 
lesson1-empowermenttechnology-161103003208 (1).pptx
lesson1-empowermenttechnology-161103003208 (1).pptxlesson1-empowermenttechnology-161103003208 (1).pptx
lesson1-empowermenttechnology-161103003208 (1).pptxMariaCatherineErfeLa
 
ICT-EMPOWERMENT.pptx
ICT-EMPOWERMENT.pptxICT-EMPOWERMENT.pptx
ICT-EMPOWERMENT.pptxJoyceNolos
 
Information and Communications Technology.pptx
Information and Communications Technology.pptxInformation and Communications Technology.pptx
Information and Communications Technology.pptxRupertGarryTorres1
 
L1-Introduction-to-Information-and-Communication-Technology.pptx
L1-Introduction-to-Information-and-Communication-Technology.pptxL1-Introduction-to-Information-and-Communication-Technology.pptx
L1-Introduction-to-Information-and-Communication-Technology.pptxlodie_93
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxarchied4
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxJustinGallardo3
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxMaeAmir
 

Similar to empowerment-technologies-lessons-1-15-empowerment-technology.pdf (20)

Lesson 1 Empowerment Technology
Lesson 1 Empowerment TechnologyLesson 1 Empowerment Technology
Lesson 1 Empowerment Technology
 
etech.pptx
etech.pptxetech.pptx
etech.pptx
 
unit1-181110135541.pptx
unit1-181110135541.pptxunit1-181110135541.pptx
unit1-181110135541.pptx
 
LESSON 1 Em Tech.pptx
LESSON 1 Em Tech.pptxLESSON 1 Em Tech.pptx
LESSON 1 Em Tech.pptx
 
LESSON 3 Em Tech.pptx
LESSON 3 Em Tech.pptxLESSON 3 Em Tech.pptx
LESSON 3 Em Tech.pptx
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1S
 
empowerment technology 12.pptx
empowerment technology 12.pptxempowerment technology 12.pptx
empowerment technology 12.pptx
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptx
 
Empowerment Technology_Introduction.pptx
 Empowerment Technology_Introduction.pptx Empowerment Technology_Introduction.pptx
Empowerment Technology_Introduction.pptx
 
Lesson 1 2 Edited
Lesson 1 2 EditedLesson 1 2 Edited
Lesson 1 2 Edited
 
Empowerment Tech Lesson 1 What is ICT.pptx
Empowerment Tech Lesson 1 What is ICT.pptxEmpowerment Tech Lesson 1 What is ICT.pptx
Empowerment Tech Lesson 1 What is ICT.pptx
 
lesson1-empowermenttechnology-161103003208 (1).pptx
lesson1-empowermenttechnology-161103003208 (1).pptxlesson1-empowermenttechnology-161103003208 (1).pptx
lesson1-empowermenttechnology-161103003208 (1).pptx
 
ICT-EMPOWERMENT.pptx
ICT-EMPOWERMENT.pptxICT-EMPOWERMENT.pptx
ICT-EMPOWERMENT.pptx
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Information and Communications Technology.pptx
Information and Communications Technology.pptxInformation and Communications Technology.pptx
Information and Communications Technology.pptx
 
L1-Introduction-to-Information-and-Communication-Technology.pptx
L1-Introduction-to-Information-and-Communication-Technology.pptxL1-Introduction-to-Information-and-Communication-Technology.pptx
L1-Introduction-to-Information-and-Communication-Technology.pptx
 
E-tech lesson 1.pptx
E-tech lesson 1.pptxE-tech lesson 1.pptx
E-tech lesson 1.pptx
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptx
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptx
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptx
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

empowerment-technologies-lessons-1-15-empowerment-technology.pdf

  • 1. Studocu is not sponsored or endorsed by any college or university Empowerment Technologies Lessons 1-15 – Empowerment Technology Culminating Activity (Pontifical and Royal University of Santo Tomas, The Catholic University of the Philippines) Studocu is not sponsored or endorsed by any college or university Empowerment Technologies Lessons 1-15 – Empowerment Technology Culminating Activity (Pontifical and Royal University of Santo Tomas, The Catholic University of the Philippines) Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 2. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 1/57 Empowerment Technology Empowerment Technologies LESSONS 1-15 March 31, 2018April 1, 2018 regisjoyce LESSON 1: INTRODUCTION TO ICT ICT3 Information and Communication- It deals with the use of different communication technologies such as mobile phones, telephone, Internet to locate, save, send and edit information Is a study of computers as data processing tools. It introduces students to the fundamental of using computer systems in an internet environment. ICT in the Philippines Philippines is dub as the 89ICT Hub of Asia= because of huge growth of ICT-related jobs, one of which is BPO, Business Process Outsourcing, or call centers. ICT Department in the Philippines is responsible for the planning, development and promotion of the country9s information and communications technology (ICT) agenda in support of national development. Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 3. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 2/57 Computer3 an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program. Internet3 is the global system of interconnected computer networks that use the internet protocol suite (TCIP/IP) to link billions of devices worldwide. Means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers. Sometimes called simply 89the Net99, is a worldwide system of computer networks- a network of networks in which the users at any one computer can get information from any other computer. World Wide Web An information system on the internet that allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another. Is an information space where documents and other web resources are identiûed by URLs, interlinked by hypertext links, and can be accessed via the Internet. Invented by Tim-Berners Lee Web Pages Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 4. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 3/57 Web page is a hypertext document connected to the World Wide Web. It is a document that is suitable for the World Wide Web. The different online platforms of World Wide Web: 1. Web 1.0 3 refers to the ûrst stage in the World Wide Web, which was entirely made up of the Web pages connected by hyperlinks. 2. Web 2.0 3 is the evolution of Web 1.0 by adding dynamic pages. The user is able to see a website differently than others. 3 Allows users to interact with the page; instead of just reading the page, the user may be able to comment or create user account. 3. Web 3.0 3 this platform is all about semantic web. 3 Aims to have machines (or servers) understand the user9s preferences to be able to deliver web content. Static Web Page- is known as a üat page or stationary age in the sense that the page is 89as is99 and cannot be manipulated by the user. The content is also the same for all users that is referred to as Web 1.0 Dynamic Web Pages3 web 2.0 is the evolution of web 1.0 by adding dynamic web pages. The user is able to see website differently than others e.g. social networking sites, wikis, video sharing sites. FEATURES OF WEB 2.0 1. Folksonomy- allows user to categorize and classify information using freely chosen keywords e.g. tagging by FB, Twi er, use tags that start with the sign #, referred to as hashtag. 2. Rich User Experience – content is dynamic and is responsive to user9s input 3. User Participation- The owner of the website is not the only one who is able to put content. Others are able to place a content of their own by means of comments, reviews and evaluation e.g. Lazada, Amazon. 4. Long Tail3 services that are offered on demand rather than on a one-time purchase. This is synonymous to subscribing to a data plan that charges you for the amount of time you spent in the internet. 5. Software as a services- users will be subscribe to a software only when needed rather than purchasing them e.g. Google docs used to create and edit word processing and spread sheet. 6. Mass Participation3 diverse information sharing through universal web access. Web 2.09s content is based on people from various cultures. Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 5. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 4/57 TRENDS IN ICT 1. Convergence3 is the synergy of technological advancements to work on a similar goal or task. For example, besides using your personal computer to create word documents, you can now use your smartphone. 2. Social Media3 is a website, application, or online channel that enables web users web users to create , co-create, discuss modify, and exchange user generated content. Six types of Social Media: a)Social Networks 3 These are sites that allows you to connect with other people with the same interests or background. Once the user creates his/her account, he/she can set up a proûle, add people, share content, etc Example: Facebook and Google+ Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 6. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 5/57 b)Bookmarking Sites 3 Sites that allow you to store and manage links to various website and resources. Most of the sites allow you to create a tag to others. Stumble Upon, Pinterest c) Social News 3 Sites that allow users to post their own news items or links to other news sources. The users can also comment on the post and comments may also be rank. Ex. Reddit and Digg Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 7. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 6/57 d) Media Sharing – sites that allow you to upload and share media content like images, music and video. Ex. Flickr, YouTube and Instagram e) Microblogging – focus on short updates from the user. Those that subscribed to the user will be able to receive these updates. Ex. Twi er and Plurk f) Blogs and Forums – allow user to post their content. Other users are able to comment on the said topic. Ex. Blogger, WordPress and Tumblr Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 8. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 7/57 3. Mobile Technologies3 The popularity of smartphones and tablets has taken a major rise over the years. This is largely because of the devices capability to do the tasks that were originally found in PCs. Several of these devices are capable of using a high-speed internet. Today the latest model devices use 4G Networking (LTE), which is currently the fastest. MOBILE OS iOS 3 use in apple devices such as iPhone and iPad Android 3 an open source OS developed by Google. Being open source means mobile phone companies use this OS for free. Blackberry OS 3 use in blackberry devices Windows phone OS 3 A closed source and proprietary operating system developed by Microsoft. Symbian 3 the original smartphone OS. Used by Nokia devices WebOS- originally used in smartphone; now in smart TVs. Windows Mobile 3 developed by Microsoft for smartphones and pocket PCs 4. Assistive Media3 is a non- proût service designed to help people who have visual and reading impairments. A database of audio recordings is used to read to the user. Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 9. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 8/57 5. e.g. Yahoo!, Gmail, HotmailCloud computing-distributed computing on internet or delivery of computing service over the internet. -Instead of running an e-mail program on your computer, you log in to a Web e-mail account remotely. The software and storage for your account doesn9t exist on your computer 3 it9s on the service9s computer cloud. It has three components 1. Client computers 3 clients are the device that the end user interact with cloud. 2. Distributed Servers 3 Often servers are in geographically different places, but server acts as if they are working next to each other. 3. Datacenters 3 It is collection of servers where application is placed and is accessed via Internet. Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 10. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 9/57 TYPES OF CLOUDS PUBLIC CLOUD allows systems and services to be easily accessible to the general public. Public cloud may be less secured because of its openness, e.g. e-mail PRIVATE CLOUD allows systems and services to be accessible within an organization. It offers increased security because of its private nature. COMMUNITY CLOUD allows systems and services to be accessible by group of organizations. HYBRID CLOUD is a mixture of public and private cloud. However, the critical activities are performed using private cloud while the non-critical activities are performed using public cloud. LESSON 2: ONLINE SAFETY, SECURITY AND RULES OF NETIQUETTE Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 11. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 10/57 INTERNET SAFETY- it refers to the online security or safety of people and their information when using internet. NETIQUETTE- is network etique e, the do9s and don9ts of online communication. TEN RULES OF NETIQUETTE Rule No. 1: Remember the human You need to remember that you are talking to a real person when you are online. The internet brings people together who would otherwise never meet. Remember this saying when sending an email: Would I say this to the person9s face. Rule No. 2: Adhere to the same standards online that you follow in real life. You need to behave the same way online that you do in real life. You need to remember that you can get caught doing things you should not be doing online just like you can in real life. You are still talking to a real person with feelings even though you can9t see them. Rule no. 3: Know where you are in cyberspace. Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 12. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 11/57 Always take a look around when you enter a new domain when surûng the web. Get a sense of what the discussion group is about before you join it. Rule no. 4: Respect other people9s time and bandwidth. Remember people have other things to do besides read your email. You are not the center of their world. Keep your post and emails to minimum by saying what you want to say. Remember everyone won9t answer your questions. Rule no. 5: Make yourself look good online. Be polite and pleasant to everyone. Always check your spelling and grammar before posting. · Know what you are talking about and make sense saying it. Rule no. 6: Share expert knowledge Ask questions online Share what you know online. Post the answers to your questions online because someone may have the same question you do. Rule no. 7: Help keep üame wars under control Netique e does not forgive üaming. Netique e does however forbid people who are üaming to hurt discussion groups by pu ing the group down. Rule no. 8: Respect other people9s privacy. Do not read other people9s mail without their permission. Going through other people9s things could cost you, your job or you could even go to jail. Not respecting other people9s privacy is a bad netique e. Rule no. 9: Don9t abuse your power. Do not take advantage of other people just because you have more knowledge or power than them. Treat others as you would want them to treat you if the roles were reversed. Rule no. 10: Be forgiving of other people9s mistake. Do not point out mistakes to people online. Remember that you were once the new kid on the block. You still need to have a good manners even though you are online and cannot see the person face to face. Internet security Security Requirement Triad Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 13. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 12/57 ConfidentIality Data conûdentiality Privacy Integrity Data integerity System integrity Availability Threat Consequence Threat Action ( A ack) Unauthorized Disclosure A circumstance or event whereby an entity gains access to data for which the entity is not authorized. Exposure: Sensitive data are directly released to an unauthorized entity. Interception: An unauthorized entity directly accesses sensitive data traveling between authorized sources and destinations. Inference: A threat action whereby an unauthorized entity indirectly accesses sensitive data by reasoning from characteristics or byproducts of communications. Intrusion: an unauthorized entity gains access to sensitive data by circumventing a system9s security protections. Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 14. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 13/57 Disruption A circumstances or even that interrupts or prevents the correct operation of system services and functions. Deception A circumstance or event that may result in an authorized entity receiving false data and believing it to be true. Incapacitation: prevents or interrupts system operation by disabling a system component. Corruption: Undesirably alters system operation by adversely modifying system functions or data. Obstruction: A threat action that interrupts delivery of system services by hindering system operation. Masquerade: An unauthorized entity gains access to a system or performs a malicious act by posing as an authorized entity. Falsification: False data deceive an authorized entity. Repudiation: An entity deceives another by falsely denying responsibility for an act. Usurpation A circumstances or event that results in control of system services or functions by an unauthorized entity. Misappropriation: An entity assumes unauthorized logical or physical control of a system resource. Misuse: Causes a system component to perform a function or service that is detrimental to system security. Types of System Intruders Masquerader Hackers Clandestine user Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 15. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 14/57 Parts of Virus Infection mechanism Trigger PayloaD Virus stages Dormant phase Virus is idle. Propagation phase Virus places an identical copy of itself into other programs or into certain system areas on t the disk. Triggering phase Virus is activated to perform the function for which it was intended. Caused by a variety of system events Execution phase Function is performed Key Terms Cyber crime- a crime commi ed or assisted through the use of the Internet. Privacy Policy/Terms of Services (ToS) 3 tells the user how the website will handle its data. Malware- stands for malicious software. Virus- a malicious program designed to transfer from one computer to another in any means possible. Worms3 a malicious program designed to replicate itself and transfer from one ûle folder to another and also transfer to other computers. Trojan-a malicious program designed that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hacker to get your information. Spyware3 a program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing and typing through key logging. Adware- a program designed to send you advertisement, mostly pop-ups. Spam3 unwanted email mostly from bots or advertisers. Phishing- acquires sensitive personal information like passwords and credits card details. Pharming- a more complicated way of phishing where it exploits the DNS system. Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your consent is punishable by law. Fair Use- means that an intellectual property may be used w/o consent as long as it is used in commentaries, criticism, parodies, research and etc. Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 16. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 15/57 Keyloggers- used to record the keystrokes done by user. This is done to steal passwords or any other sensitive information. Rogue security softwares3 is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer, and manipulates them into paying money for a fake malware removal tool. Four search strategies Keyword searching Enter terms to search Use quotation marks to search as a phrase and keep the words linked together Common words are ignored (That, to, which, a, the …) + and 3 can be used to include or exclude a word Boolean AND 3 enter words connect with AND- it will include sites where both words and found Uses: joining different topics (i.e. global warming AND California) OR 3 requires at least one of the terms is found. Uses: join similar or synonymous topics (i.e. global warming OR greenhouse effect) NOT – searches for the ûrst term and excludes sites that have the second term. (i.e. Washington NOT school) Question a question may be entered in the search ûeld of search engine Advanced Features are offered on many engines by going to an <Advanced search= page and making selections. Effective in narrowing search returns to a speciûc topic or phrase. LESSON 3: Advanced Word Processing Skills Lesson Discussion In the professional world, sending out information to convey important information is vital. Because of ICT, things are now sent much faster than the traditional newsle ers or postal mail. You can now send much faster than the traditional newsle ers or postal mail. You can now use the Internet to send out Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 17. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 16/57 information you need to share. What if we could still do things much faster 3 an automated way of creating and sending uniform le ers with different recipients? Would that not be more convenient? I. Mail Merge and Label Generation A. Mail Merge One of the important reasons in using computers per se is its ability to do recurring tasks automatically. But this ability has to be honed by learning the characteristics and features of the software you use with your computer. After all, no ma er how good or advance your computer and software may be, it can only be as good as the person using it. In this particular part of our lesson, we will learn one of the most powerful and commonly used features of Microsoft Word called Mail Merge. As the name suggests, this feature allows you to create documents and combine or merge them with another document or data ûle. It is commonly used when sending out advertising materials to various recipients. The simplest solution for the scenario above is to create a document and just copy and paste it several times then just replace the details depending on whom you send it to. But what if you have hundreds or thousands of recipients? Would not that take too many hours? What if you have a small database of information where you can automatically generate those le ers? Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 18. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 17/57 Two Components of Mail Merge 1. Form Document The ûrst component of our mail merged document is the form document. It is generally the document that contains the main body of the message we want to convey or send. The main body of the message is the part of the form document that remains the same no ma er whom you send it to from among your list. Also included in the form document is what we call place holders, also referred to as data ûelds or merge ûelds. This marks the position on your form document where individual data or information will be inserted. From our sample document, the place holders are denoted or marked by the text with double-headed arrows (<< >>) on each side and with a gray background. On a printed standard form, this will be the underlined spaces that you will see and use as a guide to where you need to write the information that you need to ûll out. In its simplest form, a form document is literally a <form= that you ûll out with individual information. A common example of a form document is your regular tax form or application form. Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 19. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 18/57 2. List or Data File The second component of our mail merged document is the list or data ûle. This is where the individual information or data that needs to be plugged in (merged) to the form document is placed and maintained. One of the best things about the mail merge feature is that it allows data ûle to be created fro within the Microsoft Word application itself, or it gets data from a ûle created in Microsoft Excel or other data formats. In this way, ûelds that needed to be ûlled up on the form document can easily be maintained without accidentally altering the form or main document. You can also easily add, remove, modify, or extract your data more efficiently by using other data management applications like Excel or Access and import them in Word during the mail merge process. B. Label Generation Included in the mail merge feature on Microsoft Word is the Label Generator. It just makes sense that after you print out your form le ers, you will need to send it to individual recipients in an envelope with the matching address printed directly on the envelope or on a mailing label to stick on. By using virtually the same process as a standard mail merge, Microsoft Word will print individual addresses to a Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 20. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 19/57 standard form that it has already pre-forma ed. Simply put, it creates a blank form document that simulates either a blank label or envelope of pre-deûned size and will use the data ûle that you selected to print the information, typically individual addresses. So even in generating labels, the two essential components of creating a merged document are present: the form document and the data ûle. Only in this case, you did not have to type or create the form document yourself because it was already created and pre-forma ed in Microsoft Word. All you need to do is select the correct or appropriate size for the label or envelope and select the data ûle that contains the addresses (data) to be printed. You can also preview your merged labels before printing if you want to. II. Integrating Images and External Materials Integrating or inserting pictures in your document is fun and it improves the impression of your document. A common use of inserting a picture on a document is when you are creating your resume. Though seemingly simple to do, your knowledge on the different kinds of materials that you can insert or integrate in a Word document and its characteristics can help you create a more efficient, richer document not only in content but also in physical form. A be er understanding of the physical form of your document as well as the different materials you would integrate in it would allow you to be more efficient and versatile in using Microsoft Word. A. Kinds of Materials There are various kinds of materials Microsoft Word is capable of integrating to make the documents richer, more impressive, and more informative. Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 21. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 20/57 1. Pictures Generally, these are electronic or digital pictures or photographs you have saved in any local storage device. There are three commonly used types of picture ûles. You can identify them by the extension on their ûle names. a. .JPG/JPEG This is pronounced as <jay-peg< and is the short form of .jpeg or Joint Photographic Experts Group. Like all the rest of the image ûle extensions, it identiûes the kind of data compression process that it uses to make it more compatible and portable through the Internet. This type of image ûle can support 16.7 million colors that is why it is suitable for use when working with full color photographic images. Unfortunately, it does not support transparency and therefore, images of this ûle type can be difficult to integrate in terms of blending with other materials or elements in your document. But if you are looking for the best quality image to integrate with your document then this is the image ûle type for you. .JPG does not work well on le ering, line drawings, or simple graphics. .JPG images are relatively small in ûle size. b. .GIF This stands for Graphics Interchange Format. This type of image ûle is capable of displaying transparencies. Therefore, it is good for blending with other materials or elements in your document. It is also capable of displaying simple animation. Apparently, this may not be too useful on a printed document but if you are sending documents electronically or through email, or even post documents into a website, then this could be quite impressive. The downside is that it can only support up to 256 colors so it is good mostly on logos and art decors with very limited, and generally solid colors. .GIF is much be er for logos, drawings, small text, black and white images, or low-resolution ûles. Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 22. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 21/57 Example of a .gif format picture. c. .PNG This is pronounced as <ping<. It stands for Portable Network Graphics. It was built around the capabilities of .GIF. Its development was basically for the purpose of transporting images on the Internet at faster rates. It is also good with transparencies but unlike .GIFs, it does not support animation but it can display up to 16 million colors, so image quality for this image ûle type is also remarkably improved. .PNG allows the control of the transparency level or opacity of images. Example of .png format picture. 2. Clip Art This is generally a .GIF type; line art drawings or images used as generic representation for ideas and objects that you might want to integrate in your document. Microsoft Word has a library of clip arts that is built in or can be downloaded and used freely. There are still other clip arts that you can either purchase or freely download and use that come from third-party providers. Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 23. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 22/57 Clip Art Icon in Microsoft Office 2010. 3. Shapes These are printable objects or materials that you can integrate in your document to enhance its appearance or allow you to have some tools to use for composing and representing ideas or messages. If you are designing the layout for a poster or other graphic material for advertising, you might ûnd this useful. Shapes Icon under the Insert ribbon tab. Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 24. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 23/57 4. Smart Art Generally, these are predeûned sets of different shapes grouped together to form ideas that are organizational or structural in nature. If you want to graphically represent an organization, process, relationships, or üow for infographic documents, then you will ûnd this easy and handy to use. Image result for smart art icon in microsoft word 2010 office Smart Art 5. Chart Another type of material that you can integrate in your Word document that allows you to represent data characteristics and trends. This is quite useful when you are preparing reports that correlate and present data in a graphical manner. You can create charts that can be integrate in your document either directly in Microsoft Word or imported from external ûles like Microsoft Excel. Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 25. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 24/57 Chart – Used to illustrate and compare data. 6. Screenshot Sometimes, creating reports or manuals for training or procedures will require the integration of a more realistic image of what you are discussing on your report or manual. Nothing can get you a more realistic image than a screenshot. Microsoft Word even provides a snipping tool for your screen shots so you can select and display only the part that you exactly like to capture on your screen. III. Image Placement Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 26. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 25/57 Layout of text wrapping options. A. In Line with Text This is the default se ing for images that are inserted or integrated in your document. It treats your image like a text font with the bo om side totally aligned with the text line. This se ing is usually used when you need to place your image at the beginning of a paragraph. When placed between texts in a paragraph or a sentence, it distorts the overall appearance and arrangement of the texts in the paragraph because it will take up the space it needs vertically, pushing whole lines of texts upward. B. Square This se ing allows the image you inserted to be placed anywhere with the paragraph with the text going around the image in a square pa ern like frame. C. Tight This is almost the same as the Square se ing, but here the text <hug= or conforms to the general shape of the image. This allows you to get a more creative effect on your document. This se ing can mostly be achieved if you are using an image that supports transparency like a .GIF or .PNG ûle. D. Through This se ing allows the text on your document to üow even tighter taking the contours and shape of the image. Again, this can be best used with .GIF or .PNG type of image. E. Top and Bo om This se ing pushes the texts away vertically to the top and/or the bo om of the image so that the image occupies a whole text line on its own. Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 27. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 26/57 p F. Behind Text This allows your image to be dragged and placed anywhere on your document but with all the texts üoating in front of it. It effectively makes your image look like a background. G. In Front of Text As it suggests, this se ing allows your image to be placed right on top of the text as if your image was dropped right on it. That means whatever part of the text you placed the image on, it will be covered by the image. IV. Key Terms Mail Merge 3 a feature that allows you to create documents and combine or merge them with another document or data ûle. Form Document 3 the document that contains the main body of the message we want to convey or send. Data File 3 includes the individual information or data or the recipient9s information. Merge Field/Place Holder 3 marks the position on your form document where individual data or information will be inserted. .JPG 3 ûle extension for the Joint Photographic Experts Group picture ûle. .PNG 3 ûle extension for Portable Network Graphics image ûle. .GIF 3 ûle extension for the Graphics Interchange Format image ûle. Clipart 3 line art drawings or images used as a generic representation for ideas and objects. Smart Art 3 predeûned sets of different shapes grouped together to form ideas that are organizational or structural in nature. Text Wrap 3 adjusts how the image behaves around other objects or text. LESSON 4: Advanced Spreadsheet Skills 1. What is a Spreadsheet Software? • allows users to organize data in rows an columns and perform calculations on the data • These rows and columns collectively are called worksheet. 2. 3. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment- technologies-advanced-spreadsheet-skills-3-638.jpg?cb=1516067681)Examples of Spreadsheet Software: • LibreOffice Calc • OpenOffice.org Calc • Google Sheets • Apple iWork Numbers • Kingsoft Office Spreadsheets • StarOffice Calc • Microsoft Excel 3. 4. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment- technologies-advanced-spreadsheet-skills-4-638.jpg?cb=1516067681)MICROSOFT EXCEL 4. 5. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment- technologies-advanced-spreadsheet-skills-5-638.jpg?cb=1516067681)To open Microsoft Excel, Press <Windows Logo= + R then type <excel= then enter. 5. 6. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment- technologies-advanced-spreadsheet-skills-6-638.jpg?cb=1516067681)Key Terms in MS Excel: • Row 3 horizontal line of entries in a table • Column 3 vertical line of entries in a table • Cell 3 the place where info. is held in a spreadsheet Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 28. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 27/57 6. 7. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment- technologies-advanced-spreadsheet-skills-7-638.jpg?cb=1516067681)Key Terms in MS Excel: • Active Cell 3 the selected cell • Column Heading 3 the box at the top of each column containing a le er • Row Heading 3 the row number 7. 8. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment- technologies-advanced-spreadsheet-skills-8-638.jpg?cb=1516067681)Key Terms in MS Excel: • Cell Reference 3 the cell address of the cell usually combine le er and number (ex. A1, B4, C2) • Merge 3 combining or joining two or more cells • Formula 3 is an expression which calculates the value of a cell. 8. 9. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment- technologies-advanced-spreadsheet-skills-9-638.jpg?cb=1516067681)Key Terms in MS Excel: • Functions 3 are predeûned formulas and are already available in Excel • Formula Bar 3 the bar that displays the contents of a cell 9. 10. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment- technologies-advanced-spreadsheet-skills-10-638.jpg?cb=1516067681)FUNCTIONS 10. 11. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment- technologies-advanced-spreadsheet-skills-11-638.jpg?cb=1516067681)BASIC MATH OPERATIONS: • =SUM(x,y) or =SUM(range) 3 returns the sum of x and y or (all the numbers within the range) • =PRODUCT(x,y) 3 returns the product of x and y • =QUOTIENT(x,y) 3 returns the quotient of x divided by y • =x-y 3 returns the difference of x subtracted by y 11. 12. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment- technologies-advanced-spreadsheet-skills-12-638.jpg?cb=1516067681)BASIC MATH OPERATIONS: • =x+y 3 returns the sum of x and y • =x*y 3 returns the product of x and y • =x/y 3 returns the quotient of x divided by y • =x-y 3 returns the difference of x subtracted by y 12. 13. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment- technologies-advanced-spreadsheet-skills-13-638.jpg?cb=1516067681)OTHER FUNCTIONS: • =ABS(x) 3 returns the absolute value of x • =AVERAGE(x,y) 3 returns the average of x and y • =CONCATENATE(x,y) 3 joins x and y 13. 14. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment- technologies-advanced-spreadsheet-skills-14-638.jpg?cb=1516067681)OTHER FUNCTIONS: • =IF(Condition, x, y) 3 returns x if the condition is true, else it returns y • =ISEVEN(x) 3 returns true if x is an even number • =ISODD(x) 3 returns true if x is an odd number 14. 15. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment- technologies-advanced-spreadsheet-skills-15-638.jpg?cb=1516067681)OTHER FUNCTIONS: • =COUNT(range) 3 counts the number of cell containing a number within a range • =COUNTIF(range, criteria) 3 count the number of cell that ûts with the criteria within the range 15. 16. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment- technologies-advanced-spreadsheet-skills-16-638.jpg?cb=1516067681)OTHER FUNCTIONS: • =ISNUMBER(x) 3 returns true if x is a number • =ISTEXT(x) 3 returns true if x is a text • =LEN(x) 3 returns the length of characters in x • =PROPER(x) 3 returns the proper casing of x 16. 17. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment- technologies-advanced-spreadsheet-skills-17-638.jpg?cb=1516067681)OTHER FUNCTIONS: • =LEFT(x,y) 3 returns the characters of x speciûed by y (from the left) • =RIGHT(x,y) 3 returns the characters of x speciûed by y (from the right) • =PI() 3 returns the value of pi 17. 18. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment- technologies-advanced-spreadsheet-skills-18-638.jpg?cb=1516067681)OTHER FUNCTIONS: • =MIN(x,y) 3 returns the smallest number between x and y • =MAX(x,y) 3 returns the largest number between x and y • =MIN(range) 3 returns the smallest number within the range • =MAX(range) 3 returns the largest number within the range Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 29. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 28/57 18. 19. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment- technologies-advanced-spreadsheet-skills-19-638.jpg?cb=1516067681)OTHER FUNCTIONS: • =POWER(x,y) 3 returns the value of x raised to the power of y • =ROUND(x,y) 3 rounds x to a speciûed number of digits (y) =COLUMN(x) 3 returns the column number of x • =ROW(x) 3 returns the row number of x 19. 20. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment- technologies-advanced-spreadsheet-skills-20-638.jpg?cb=1516067681)OTHER FUNCTIONS: • =SQRT(x) 3 returns the square root of x • =TRIM(x) 3 removes extra spaces in x • =UPPER(x) 3 returns x in all capital form • =LOWER(x) 3 returns x in non- capital form 20. 21. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment- technologies-advanced-spreadsheet-skills-21-638.jpg?cb=1516067681)OTHER FUNCTIONS: • =TODAY() 3 returns the current date • =NOW() 3 returns the current date and time 21. 22. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment- technologies-advanced-spreadsheet-skills-22-638.jpg?cb=1516067681)EXERCISES 22. 23. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment- technologies-advanced-spreadsheet-skills-23-638.jpg?cb=1516067681)Consider this data: NAME MATH GRADE SCIENCE GRADE FILIPINO GRADE ENGLISH GRADE A.P GRADE MARK 75 70 78 81 78 PETE 84 87 86 88 85 ANA 91 92 95 90 90 REA 73 75 74 75 70 23. 24. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment- technologies-advanced-spreadsheet-skills-24-638.jpg?cb=1516067681)Give the formulas to get : • Mark9s , Pete9s, Ana9s and Rea9s averages • The highest grade that Ana got • The lowest grade that Mark got? • Sum of all Math Grade? Science? A.P.? • Sum of all Rea9s Grades • The Lowest Number among all grades • The remarks (Passed or Failed) 24. 25. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment- technologies-advanced-spreadsheet-skills-25-638.jpg?cb=1516067681)Now, consider this data: FIRST NAME MIDDLE NAME LAST NAME MARK CURTIS WILLIAMS PETE MCCLOEY HARRISON ANA MONROE FRITZ REA TAN COLLINS 25. 26. (h ps://image.slidesharecdn.com/4c-advancedspreadsheetskills-171214023623/95/empowerment- technologies-advanced-spreadsheet-skills-26-638.jpg?cb=1516067681)Give the formulas to get : • Mark9s Full Name • Ana9s Full Name in Proper Case • Count the number of le ers that Pete9s Last Name has • <COLL= from Rea9s Last Name • <LOEY= from Pete9s Middle Name • Combining <WILL= and <LINS= from Mark and Rea9s Last Names respectively LESSON 5: Advanced Presentation Skills Powerpoint is a highly innovative and versatile program that can ensure a successful communication whether you9re presenting in front of potential investors, a lecture theatre or simply in front of your colleagues. The following are the ûve features you should be using-if youy aren9t already. Learn everything about these tips: they will improve your presentation skills and allow you to communicate your message successfully. The ûve features of powerpoint was 1)adding smart art 2)Inserting Shapes Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 30. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 29/57 3)Inserting and Image 4)Slide Transitions 5)Adding Animations Creating an Effective Presentation 1. Minimize: Keep slides counts to a minimum to maintain a clear message and to keep the audience a entive. Remember that the presentation is just a visual aid. Most information should still come from the reporter. 2.Clarity: Avoid being to fancy by using font style that is easy to read. Make sure that it is also big enough to be read by the audience. Once you start making your presentation, consider how big the screen is during your report. 3.Simplicity: Use bullets or short sentences. Summarize the information on the screen to have your audience focus on what the speaker is saying than on reading the slide. Limit the content to six lines and seven words per line. This is known as the 6 x 7 rule. 4. Visual: Use graphics to help in your presentation but not too many to distract the audience. In addition, instead of using table of data, use charts and graphs. 5. Consistency: Make your design uniform. Avoid having different font styles and backgrounds. 6. Contrast: Use a light font on dark background or vice versa. This is done so that it is easier to read. In most instances, it is easier to read on screen if the background is dark. This is due to the brightness of the screen. LESSON 6: Imaging and Design for Online Environment Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 31. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 30/57 PHOTO EDITING Photo editing encompasses the processes of altering images, whether they are digital photographs, traditional photo chemical photographs, or illustrations. Traditional analog image editing is known as photo retouching, using tools such as an airbrush to modify photographs, or editing illustrations with any traditional art medium. Graphic software programs Which can be broadly grouped into vector graphics editors, raster graphics editors, and 3D modelers are the primary tools with which a user may manipulate, enhance, and transform images. Many image editing programs are also used to render or create computer art from scratch. BASIC OF IMAGE EDITING Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 32. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 31/57 1. RASTER IMAGESare stored in a computer in the form of a grid of picture elements or pixels. 2. VECTOR IMAGESsuch as Adobe Illustrator, Inkscape and etc. are used to create and modify vector images, which are stored as descriptions of lines, Bezier curves and text instead of pixels. DIFFERENCE BETWEEN RASTER AND VECTOR IMAGES RASTER IMAGESuse many colored pixels or individual building blocks to form a complete image JPEGs, GIFs and PNGs are common raster image types. Almost all of the photos found on the web and in print catalogs are raster images. VECTOR IMAGES alternatively, allow for more üexibility. Constructed using mathematical formulas rather than individual colored blocks, vector ûle types such as EPS, AI and PDF are excellent for creating graphics that frequently require resizing. 3. 3D MODELING (OR MODELLING) is the process of developing a mathematical representation of any three dimensional surface of an object via specialized software. The product is called a 3D model. It can be displayed as a two-dimensional image through a process called 3D rendering or used in a computer simulation or physical phenomena. The model can also be physically created using 3D printing devices. IMAGE FORMATS Ø JPEG is a commonly used method of lossy compression for digital images, particularly for those images produced by a digital photography. Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 33. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 32/57 Ø PNG (PORTABLE NETWORK GRAPHICS) is a raster graphics ûle format that supports lossless data compression. Ø GIF a lossless format for image ûles that supports both animated and static images. Ø BMP is a raster graphics image used to store bitmap digital images Ø EPS used in vector-based images in Adobe Illustrator. Ø SVG is an XML-based vector image format for two-dimensional graphics w/ support for interactivity and animation Ø .3ds is one of the ûle formats used by the Autodesk 3Ds Max 3D Modelling, animation and rendering software. Ø . x is an exchange format, in particular for interoperability between Autodesk products and other digital content creation software FEATURES OF IMAGE EDITORS SELECTION One of the prerequisites for many of the app mentioned below is a method of selecting part(s) of an image, thus applying a change selectively without affecting the entire picture Ø MARQUEE TOOL for selecting rectangular or other regular polygon-shaped regions Ø LASSO TOOL for freehand selection of a region Ø MAGIC WAND TOOL selects objects or regions in the image deûned by proximity of color or luminance LAYERS which are analogous to sheets of transparent acetate, stacked on top of each other, each capable of being individually positioned, altered and blended with the layers below, w/o affecting any of the elements on the other layers. Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 34. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 33/57 IMAGE SIZE resize images in a process often called image scaling, making them larger, or smaller. High image resolution cameras can produce large images which are often reduced in size for Internet use. CROPPING creates a new image by selecting a desired rectangular portion from the image being cropped. The unwanted part of the image is discarded. Image cropping does not reduce the resolution of the area cropped. CLONING uses the current brush to copy from an image or pa ern. It has many uses: one of the most important is to repair problem areas in digital photos. IMAGE ORIENTATION – Image editors are capable of altering an image to be rotated in any direction and to any degree. Mirror images can be created and images can be horizontally üipped or vertically üopped. Rotated image usually require cropping afterwards, in order to remove the resulting gaps at the image edges. Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 35. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 34/57 PERSPECTIVE – is the art of drawing solid objects on a two- dimensional surface so as to give the right impression of their height, width, depth and position in relation to each other when viewed from a particular point. SHARPENING AND SOFTENING– Sharpening makes images clearer. Too much sharpening causes grains on the surface of the image. Softening makes images softer that removes some of the highly visible üaws. Too much causes the image to blur. Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 36. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 35/57 SATURATION- is an expression for the relative bandwidth of the visible output from a light source. As saturation increase, colors appear more <pure.99 As saturation decreases, colors appear more 89 washed- out.99 CONTRAST AND BRIGHTENING Contrast of images and brighten or darken the image. Underexposed images can be often be improved by using this feature. Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 37. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 36/57 Brightening lightens the image so the photo brightens up. Brightness is a relative expression of the intensity of the energy output of a visible light source. Adjusting contrast means adjusting brightness because they work together to make a be er image. PHOTO MANIPULATION Photo manipulation involves transforming or altering a photograph using various methods and techniques to achieve desired results. Some photo manipulations are considered skillful artwork while others are frowned upon as unethical practices, especially when used to deceive the public, such as hat used for political propaganda , or to make a product or person look be er. DIFFERENCES PHOTO EDITING 3 signiûes the regular process used to enhance photos and to create them 89Actual editing simple process99. Also includes some of the regular programs used for editing and expose how to use them. PHOTO MANIPULATION 3 includes all simple editing techniques and have some manipulation Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 38. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 37/57 techniques like erasing, adding objects , adding some graphical effects, background correction, creating incredible effect, change elements in an image, adding styles , eliminating blemishes from a person9s face and changing the features of a person9s body. b.) Infographics also known as data visualization, information design, and communication design It is any graphic that display and explains information, whether that be data or words. When we use the term 89infographics99, we9re using it as a general term used to describe data presented in a visual way. Infographics are important because they change the way people ûnd and experience stories. Infographics are being used to augment editorial content on the web, it create a new way of seeing the world of data, and they help communicate complex ideas in a clear and beautiful way. TYPES OF INFOGRAPHICS 1. Statistical 2. Process Flow 3. Geographic PROCESS OF MAKING INFOGRAPHICS 1. Research 2. a)Know what is needed 3. b)Take a reference 4. c)Know the audience 5. d)Decide the type of infographics 6. Brainstorm Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 39. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 38/57 7. a)Gather ideas 8. b)Build thought process 9. Design 10. a) Choose your tool and start designing 11. Review 12. a) Cross check the data to deliver üawless output 13. Launch 14. a) Make it viral 15. b) Share on social network BEST PRACTICES WHEN CREATING INFOGRAPHICS 1. a)Maintain a structure 2. b)Don9t use more than 3 color palletes 3. c)Typography ma ers a lot 4. d)Include source and references LESSON 7: Online Platforms for ICT Content Development 1.Facebook (https://onlineplatformsweb.wordpress.com/2017/02/13/first -blog-post/) Posted on February 13, 2017 1. Marketplace 3 allows members to post, read and respond to classiûed ads. 2. Groups 3 allows members who have common interests to ûnd each other and interact. 3. Events 3 allows members to publicize an event, invite guests and track who plans to a end. 4. Pages 3 allows members to create and promote a public page built around a speciûc topic. 5. Presence technology 3 allows members to see which contacts are online and chat. Within each member9s personal proûle, there are several key networking components. The most popular is arguably the Wall, which is essentially a virtual bulletin board. Messages left on a member9s Wall can be text, video or photos. Another popular component is the virtual Photo Album. Photos can be uploaded from the desktop or directly from a smartphone (h p://searchmobilecomputing.techtarget.com/deûnition/smartphone) camera. There is no limitation on quantity, but Facebook staff will remove inappropriate or copyrighted images. An interactive album Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 40. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 39/57 feature allows the member9s contacts (who are called generically called <friends=) to comment on each other9s photos and identify (tag) people in the photos. Another popular proûle component is status updates, a microblogging (h p://searchmobilecomputing.techtarget.com/deûnition/microblogging)feature that allows members to broadcast short Twi er-like announcements to their friends. All interactions are published in a news feed, which is distributed in real-time to the member9s friends. Facebook offers a range of privacy (h p://searchdatamanagement.techtarget.com/deûnition/privacy) options to its members. A member can make all his communications visible to everyone, he can block speciûc connections or he can keep all his communications private. Members can choose whether or not to be searchable, decide which parts of their proûle are public, decide what not to put in their news feed and determine exactly who can see their posts. For those members who wish to use Facebook to communicate privately, there is a message feature, which closely resembles email. 2. Instagram Instagram is an online mobile (h ps://en.wikipedia.org/wiki/Mobile_social_network) photo-sharing (h ps://en.wikipedia.org/wiki/Photo_sharing) site that allows its users to share pictures and videos either publicly or privately on the app, as well as through a variety of other social networking platforms, such as Facebook (h ps://en.wikipedia.org/wiki/Facebook), Twi er (h ps://en.wikipedia.org/wiki/Twi er), Tumblr (h ps://en.wikipedia.org/wiki/Tumblr), and Flickr (h ps://en.wikipedia.org/wiki/Flickr). Originally, a distinctive feature was that it conûned photos to a square shape, similar to Kodak Instamatic and Polaroid SX-70 images, in contrast to the 4:3 aspect ratio typically used by mobile device cameras. In August 2015, version 7.5 was released, allowing users to upload media captured in any aspect ratio. Users can also apply digital ûlters (h ps://en.wikipedia.org/wiki/Photographic_ûlter) to their images. Videos on Instagram debuted in June 2013, allowing prerecorded square standard deûnition (h ps://en.wikipedia.org/wiki/Standard- deûnition_television) resolution clips of up to 15 seconds to be shared; later improvements added support for widescreen (h ps://en.wikipedia.org/wiki/Widescreen)resolutions of up to 1080p (h ps://en.wikipedia.org/wiki/1080p) and longer recording times for either prerecorded (up to one minute) or disappearing live (up to one hour) videos. Instagram was created by Kevin Systrom (h ps://en.wikipedia.org/wiki/Kevin_Systrom) and Mike Krieger (h ps://en.wikipedia.org/wiki/Mike_Krieger), and launched in October 2010 as a free mobile app (h ps://en.wikipedia.org/wiki/Mobile_app). The service rapidly gained popularity, with over 100 [10] (h // iki di / iki/I t # it t i 10) Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 41. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 40/57 million active users as of April 2012 and over 300 million as of December 2014. Instagram is distributed through the Apple App Store (h ps://en.wikipedia.org/wiki/App_Store_(iOS)) and Google Play (h ps://en.wikipedia.org/wiki/Google_Play). Support for the app is available for iPhone (h ps://en.wikipedia.org/wiki/IPhone), iPad (h ps://en.wikipedia.org/wiki/IPad), iPod Touch (h ps://en.wikipedia.org/wiki/IPod_Touch), Windows 10 (h ps://en.wikipedia.org/wiki/Windows_10_Mobile) devices and Android (h ps://en.wikipedia.org/wiki/Android_(operating_system)) handsets, while third-party Instagram apps are available for BlackBerry 10 (h ps://en.wikipedia.org/wiki/BlackBerry_10) and Nokia-Symbian (h ps://en.wikipedia.org/wiki/Symbian) Devices. 3. Twitter Twi er is an online news (h ps://en.wikipedia.org/wiki/News) and social networking (h ps://en.wikipedia.org/wiki/Social_networking_service) service where users post and interact with messages, <tweets,= restricted to 140 characters (h ps://en.wikipedia.org/wiki/Character_(computing)). Registered (h ps://en.wikipedia.org/wiki/User_registration) users can post tweets, but those who are unregistered can only read them. Users access Twi er through its website interface, SMS (h ps://en.wikipedia.org/wiki/Short_Message_Service) or a mobile device app (h ps://en.wikipedia.org/wiki/Application_software). Twi er Inc. is based in San Francisco (h ps://en.wikipedia.org/wiki/San_Francisco), California (h ps://en.wikipedia.org/wiki/California), United States (h ps://en.wikipedia.org/wiki/United_States), and has more than 25 offices around the world. Twitter is about learning and adding value It is also about adding value to others by giving or sharing something valuable to them so that they are able to learn something. That is why I usually tweet about stuff that I read, learned or have good value. I have learned so much from the others that is why I love twi er. It is also about helping others, I disagree with many8experts9 that say you should only follow 8influential9 users because I don9t judge someone that [10] (h ps://en.wikipedia.org/wiki/Instagram#cite_note-igpress-10) [11] (h ps://en.wikipedia.org/wiki/Instagram#cite_note-11) [12] (h ps://en.wikipedia.org/wiki/Instagram#cite_note-12) [13] (h ps://en.wikipedia.org/wiki/Instagram#cite_note- Engadget-13) [10] (h ps://en.wikipedia.org/wiki/Twi er#cite_note-10) Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 42. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 41/57 way, and because I believe the people at Twi er don9t believe in them either. I also disagree that you should only share your own stuff otherwise you will dilute your brand. Sure it makes sense but 24/7 sharing your own blog post and following inüuential people? BLOGGING SITES 1. Weebly Weebly is one of the easiest website builders in the market (h p://www.websitebuilderexpert.com/go/weeblyvswp). They allow you to drag and drop content into a website, so it9s very intuitive to use (click here to see our opinion on Weebly (h p://www.websitebuilderexpert.com/weebly-review/)). By using Weebly9s website building elements, you can literally drag them into your website and have a website built relatively quickly, and painlessly. The beauty of this system is that you can pre y much drag the elements to wherever you want 3 so it9s not very restrictive on where and how you place your website content. Weebly9s elements include pictures, paragraphs, videos, bu ons, maps, contact forms 3 basically all the basics for website building. 2. Tumblr Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 43. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 42/57 Tumblr is a popular microblogging platform designed for creative self-expression. It is considered a mindful alternative to Facebook and other social media websites where users blog on a myriad of topics. You can link your Tumblr account to other social networks you use and you can feed your traditional blog or other RSS feed (h ps://www.lifewire.com/lessons-in-rss-3476628) to your Tumblelog. You can also create static pages such as your own Questions page that people are automatically taken to when they ask you a question. If you want to make your Tumblelog look more lie a traditional website, you can do it by adding pages. You can make your Tumblelog private or just make speciûc posts private as needed, and you can schedule posts to publish in the future. Tumblr is perfect for people who don9t need a full blog to publish lengthy posts. It9s also great for people who prefer to publish quick multimedia posts, particularly from their mobile devices. Tumblr is also a great choice for people who want to join a larger community. If a blog is too much or too big for you, but Twi er is too small or too li le for you and Instagram isn9t versatile enough for you, then Tumblr might be just right for you. It9s also easy to invite other people to contribute to your Tumblelog. If you want to track your stats, you can add any analytics tracking code (h ps://www.lifewire.com/top- blog-statistics-trackers-3476176) to your Tumblelog. Some users will even burn a feed with Feedburner, create custom themes, and use their own domain names 3. Pinterest Pinterest is a free website that requires registration to use.Users can upload, save, sort, and manage images4known as pins4and other media content (e.g., videos) through collections known as pinboards. Pinterest acts as a personalized media platform. Users can browse the content of others in Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 44. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 43/57 their feed. Users can then save individual pins to one of their own boards using the <Pin It= bu on, with pinboards typically organized by a central topic or theme. Users can personalize their experience by pinning items, creating boards, and interacting with other members. The end result is that the <pin feed= of each user displays unique, personalized results. Content can also be found outside of Pinterest and similarly uploaded to a board via the <Pin It= bu on, which can be downloaded to the bookmark (h ps://en.wikipedia.org/wiki/Bookmark_(World_Wide_Web)) bar on a web browser, or be implemented by a webmaster directly on the website. They also have the option of sending a pin to other Pinterest users and email accounts through the <Send= bu on. Some websites include red and white <pin it= bu ons on items, which allow Pinterest users to pin them directly. Initially, there were several ways to register a new Pinterest account. Potential users could either receive an invitation from an already registered friend, or they could request an invitation directly from the Pinterest website that could take some time to receive. An account can also be created and accessed by linking Pinterest to a Facebook (h ps://en.wikipedia.org/wiki/Facebook) or Twi er (h ps://en.wikipedia.org/wiki/Twi er) proûle. When a user re-posts or re-pins an image to their own board, they have the option of notifying their Facebook and Twi er followers. This feature can be managed on the se ings page. On the main Pinterest page, a <pin feed= appears, displaying the chronological activity from the Pinterest boards that a user follows. A <board= is where the user9s pins are located. Users can have several boards for various items such as quotes, travel or, most popularly, weddings. A <pin= is an image that has either been uploaded or linked from a website. Once users create boards and add pins, other users can now repin, meaning they can pin one user9s image to their board as well. Once the user has set up their account and boards, they can browse, comment, and like other pins. Users might be discouraged by repeated images and difficult- to-follow direct linking features. Pinterest has also added the option of making boards <secret= so that the user can pin to and view boards that only the user can see when logged into their own account. Pinterest does not generate its own content; rather, it draws from many resources around the web and compiles them in one convenient location for users. LESSON 8: Basic Web Page Creation 1.) What are the advantages and disadvantages of a WYSIWYG editor? ADVANTAGE : -You don9t need any scripting/coding experience. 3 It9s simple and easy for beginners. 3 Everything moves üuently, and you can easily preview what you want. Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 45. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 44/57 DISADVANTAGE : -A lot of HTML code churned out by the editors is superüuous which makes the web pages bulky in ûle size -WYSIWYG editors let you ignore certain aspects that are important. -WYSIWYG editors simply do not provide enough support and help in optimizing your web site for search engines. 2.) List Down (3) more WYSIWYG web hosting services and their URL. 3 Weebly Web Builder ( h ps://www.weebly.com/ (h ps://www.weebly.com/) ) 3 Wix Web Builder ( h ps://www.wix.com/ (h ps://www.wix.com/) ) 3 Siteground Builder ( h ps://www.siteground.com (h ps://www.siteground.com/)/) LESSON 9: Collaborative ICT Development Web portal a website that contains information from different sources and places them in one location in a uniform way Yahoo! example of a web portal yahoo.com offers a web portal where news, email, weather, etc. are found in one place Facebook groups ; WordPress ; Google Drive ; Microsoft Office Online ; Microsoft9s Yammer ; Trello examples of online collaborative tools Facebook groups used to create a group page that will allow people in your group to communicate your ideas WordPress allows you to multiple contributors for a single blog Google Drive and Microsoft Office Online allow multiple people to work on different office ûles and even have their own group9s cloud storage Microsoft’s Yammer offers companies to have their own social network that allows sharing and managing content Trello offer an online to-do checklist for your entire team LESSON 10: Interactive Multimedia Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 46. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 45/57 World Wide Web world-wide-wait WWW CNN now hosts videos placed on their home page, which was unthinkable in the past because of slow internet speed on-demand Videos way back then were never on the home page and can be viewed <____________= or only when a user clicks on it. videos (youtube) sound, music, or audio (soundcloud) online games (farmville) online tests (iq and personality test) courseware (e-learning courses) podcasts (ted talks, ear biscuits, the starters, stuff you should know) vodcasts (video game high school and gmm) multimedia contents (7) online tests online survey forms and tests that automatically display the results when ûnished courseware online courses that stimulate the classroom online podcasts an episodic series of audio or text ûles streamed online embed to place an object from one site to another LESSON 11: ICT as Platform for Change The Role of ICT in Recent History Throughout recent history, the Philippines have been one of a few nations that demonstrate unity for a call to action or social change. These campaigns for social change would have not been successful if it were not for ICT. 1. EDSA (PEOPLE POWER REVOLUTION). The people power revolution lasted from 1083 to 1986. During a radio broadcast of Radio Veritas, Cardinal Sin encouraged the Filipinos to help end the Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 47. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 46/57 regime of then President Ferdinand Marcos. A major protest took place along the EDSA from February 22 to 25, 1986 involving two million Filipinos from different sectors. These included civilians, political parties, the military and religious groups. 2. EDSA DOS.This is also known as the 2001 EDSA Revolution, happened during January 17 to 21, 2001. It was fueled after 11 prosecutors of the President Joseph Estrada walked out of the impeachment trial. As a result, the crowd in EDSA grew over the course of a few days through text brigades. 3. Million People March.This is a series pf protest that mainly took place in Luneta Park from august 22 to 26, 2013. There were also several demonstrations that happened around key cities in the Philippines and some location overseas. The organizers and promoters of the Million People March used Facebook and Change.org as their, mediums. 4. Yolanda People Finder.Recent storms in Philippines history gave birth to the People ûnder database powered by Google. During typhoon Yolanda, the people ûnder was a vital tool for people across the globe to track the situation of their relatives. This proved to be successful and is now adapted by more organizations to help people track relatives during calamities. Change.org Change.org is dubbed as the <world9s platform for change= where anyone from the online community can create a petition and ask others to sign in it. During the past times petitions are only done through signing a paper, usually done by a group asking for signatures via travel. Change.org gives access to more people by allowing the online community to affix their digital signatures on petition. Signing an Online Petition 1. VisitChange.org 2. Change.org works this way. If this is your ûrst time to use Change.org, click Sign up or log in with Facebook. Otherwise, just input your log in details. 3. You can then start your own petition, but for now click on any petition you want under tending petitions. 4. Read the petitions description to see if this petition ma ers to you. If it is, sign the petition by ûlling up the information on the right side of the screen. 5. Share the petition on Facebook to promote it. Alternatively, you can check out petitions of your friends on Facebook, and then click on those petitions to read about it and sign it. LESSON 12: ICT Project for Social Change Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 48. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 47/57 Before starting your project, your group should be able to do the necessary paperwork. This allows experts to see if your project is doable over the time frame that was given and if it is signiûcant enough to be made into reality. Five elements of a concept paper 1.Introduction-includes tour group9s mission and vision and a brief introduction of your project. 2.Purpose-includes the reasons why this project is worth your group and your sponsor9s time, effort and money. 3.Description-includes all the necessary information about the project. In ICT, it involves the sites you are going to produce and the purpose of each and how they work in unison. 4.Support-contains the budget needed for the project. Some concept papers do not specify any amount requested from the sponsor. 5.Contact information-includes information on how the group be contacted. Simplified ICT Project Process Overview 1.Planning-Involves the following task (but not limited to): 1. Conceptualizing your project project 2. Researching on available data about your topic 3. Se ing deadlines and meetings 4. Assigning people to various tasks 5. Finding a web or blog host 6. Creating a site map for tour website 7. Listing down all applications, that you need including web apps 8. Funding (If applicable) Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 49. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 48/57 2.Development-involves the actual creation of the website(s), involves the production of images, infographics, etc. 3.Release and Promotion-involves the actual release of the website for public view and promoting it. Promotion typically starts before the actual release. 4.Maintenance-involves responding to feedback of your site visitors and continuing to improve your website. LESSON 13: ICT Project Publication and Statistics Monitoring Site Statistics on Different Platforms 1. WordPress Once you log in to your WordPress account, you are on the Reader tab by default. Simply click on My Sites and from there you will see the statistics for your blog. 2. Facebook In your Facebook page, a summary of the statistics will appear on the right side of your cover photo: Hovering your mouse pointer over <Post Reach= will give you more insights on which recent post reached the most people: Clicking on the Insights tab will give more in-depth statistics: 1. Overview3 contains the summary of statistics about your page Deûnition of terms on your Facebook statistics: Reach: Organic 3 your posts seen through the page9s wall, shares by users, and the news feed Reach: Paid 3 your posts seen through paid ads Post Clicks 3 number of clicks done to your posts Likes, Comments, and Shares 3 actual interaction done by your audience either through liking the post, commenting on it, or sharing it on their walls. 1. Likes3 contains the statistics about the trend of page likes 2. Reach3 contains information about the number of people who was reached by your post 3. Visits3 contains data of the number of times your page tabs (like the Timeline) are visited 4. Post3 contains data showing when (day and time) you site visitors visit your site 5. People3 contains statistics about your audience9s demographics (age, location, gender, language, and country). It is also includes demographics about the people you have reached and engaged with. Demographics refers to the statistics characterizing human population usually divided by age, gender, income, location, and language. Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 50. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 49/57 LESSON 14: ICT Project Maintenance Creating online surveys feedbacks forms. The Internet will give you a lot of options in gathering your audience9s feedback. The only difference that you and your group may notice is how these services are presented. Some of them, because they are free to use, may have too many ads or some features are lacking. In any case, it9s your group9s choice which of these services is t cumbersome to reach your objective. Google offers one of the easiest ways to gather user9s feedback. Google forms allow your audience to answer a set of questions you have set. These can be used for surveys, feedback, online registrations, and customer care support. 4. You will be taken to Google Form9s interface: Next is ! Lets move on to ! 6. Once you are done editing the question, click Done. 7. To add a new question or item, click on Add Item, clicking on the drop down arrow at the right side of the Add Item bu on will bring up other options for layout: a. Section Header 3 adds a header for a speciûc a part of your survey. b. Page break- adds a page break which means that the items at the bu on of the page will be added to the next page: necessarily if your survey is too long. c. Image- adds an image to your survey d. Video- adds a video to your survey iii. Multiple Choice 3 can be answered by only one answer in a set of options Creating feedback forms using Google forms Lesson objectives • Evaluate the effectiveness of their online campaign through user feedback; • Improve the online campaign using various tools; and • Check the impact of their online campaign. Steps ! 1) Open your browser and go to drive.google.com 2) Sign in or create an account. 3) On the left hand hair of your My Drive page, click New> More> Google Forms Steps ! 5. You may now ûll out the form questions: A. Question Title- Includes the question that will be answered by your audience. B. Help Text- Creates a subtext under the question to give more information about a question. C. Question Type- changes the type question according to your preference. These questions include: i. Text 3 can be answered in a short text. ii. Paragraph Text 3 can be answered in a long text. iv. Checkboxes 3 a question that can be answered with multiple answers in a set of options. v. Choose from a list- similar to a multiple-choice question but options are revealed in a drop-down list. Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 51. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 50/57 vi. Scale- a question that can be answered with a numerical range. vii. Grid- a question that contains sub questions with similar options as shown; • Date- a question that can be answered with a speciûed date • Time- a question that can be answered with a speciûed time . d. Advanced Se ings: Contains more options for the speciûed question type. 8. Edit the Conûrmation Page option at the bo om as you see ût. A. Show link to submit another response- allows the user to answer the same form again. B. Publish and show a public link to form results- allows users to see the summarized results for your survey. C. Allow responders to edits responses after submi ing- allows users to back and edit their answers . 9. Click the Send Form bu on. The Send Form dialog box will appear these options as you see ût. a. Link to share- contains the URL that you can share on your website. b. Embed- contains an embed code to a ach to your HTML. c. Short URL- generates a shorter URL necessary for limited spaces like sharing on twi er. d. Share link via- allows you to share the link to Google+, Facebook, and Twi er. e. Send form via email- allows you to share the form via email. f. Add collaborators- Allows others to edit your form, necessary when working on groups. 1. The easiest way to view the result is viewing a summary of the responses. Click on Responses> Summary of Responses. 2. You will be taken to a Summary of Responses page. This is particularly useful for viewing your results from time to time. However, after a set amount of time, you may want to use this data in a spreadsheet and eventually create your own charts. 3. To use the data collected through responses, click View Responses bu on found on the upper part of the page. Analyzing your Google Forms Result 4. Choose if you want to create a new Google Sheet as the destination of your response results or if you want to put it on an existing Google Sheet. LESSON 15: Disadvantages of ICT Cybercrimes are illegal acts done through the use of the internet. People all over the world use the Internet to commit a host of crimes, some of which the public doesn9t even know are capable of being done electronically. Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 52. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 51/57 1. Phishing and Spoofing (h ps://ictcom444251764.ûles.wordpress.com/2018/03/eef31-email-spooûng-main-image.jpg) Spoofing a ack is when a malicious party impersonates another device or user on a network in order to launch a acks against network hosts, steal data, spread malware or bypass access controls. There are several different types of spooûng a acks that malicious parties can use to accomplish this. Phishing is the a empt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication. 2. Blackmail/Extortion (h ps://ictcom444251764.ûles.wordpress.com/2018/03/be0be-images.jpg) Extortion (also called blackmail, shakedown, out wresting, and exaction) is a criminal offence of unlawfully obtaining money, property, or services from a person, entity, or institution, through coercion. Refraining from doing harm is sometimes euphemistically called protection. Using the Internet to threaten to cause damage with the intent to extort from any person any money or other thing of value. 3. Accessing Stored Communications Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 53. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 52/57 (h ps://ictcom444251764.ûles.wordpress.com/2018/03/5e9e9-hackers.jpg) Accessing Stored Communications or hacking; Intentionally accessing, without authorization, a facility through which an electronic communication service is provided. The act of obtaining unauthorized access to data from computer network. This is typically done to commercial and government sites to threaten its owner. In late 2015, a group of Anonymous Philippines hacked the Twi er account of actress Maine Mendoza, who plays the famous character Yaya Dub of the popular AlDub tandem and posted links and messages on the account 4. Sports Betting (h ps://ictcom444251764.ûles.wordpress.com/2018/03/7b8d5-sportschuchu.jpg) Sports Beating is engaging in the business of be ing or wagering on any sporting event or contest over the Internet. In some countries, gambling (including sports be ing) is illegal even if you are doing it over the Internet. 5. Non-Delivery of Merchandise Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 54. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 53/57 (h ps://ictcom444251764.ûles.wordpress.com/2018/03/31069-online-shopping-ecom.png) Devising any scheme to defraud, or for obtaining money or property by means of false or fraudulent pretenses, or promises, and using the Internet for the purpose of executing the scheme. The non-delivery scam occurs when the scammer places an item up for sale when there is actually no item at all. The item is subsequently never delivered to the buyer after they purchase the item. 6. Electronic/ Cyber Harassment (h ps://ictcom444251764.ûles.wordpress.com/2018/03/08578-harassment.jpg) Cyber harassment refers to online harassment. Cyber harassment or bullying is the use of email, instant messaging, and derogatory websites to bully or otherwise harass an individual or group through personal a acks. Cyber harassment can be in the form of üames, comments made in chat rooms, sending of offensive or cruel e-mail, or even harassing others by posting on blogs or social networking sites. Cyber harassment is often difficult to track as the person responsible for the acts of cyber harassment remains anonymous while threatening others online. This usually applies to school-age children. 7. Child Pornography Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 55. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 54/57 (h ps://ictcom444251764.ûles.wordpress.com/2018/03/53ad9-crycry.png) Using the Internet to transmit child pornography. Child pornography is distributed nowadays mainly through the Internet. Child pornography are produced not only on a professional scale by commercial providers, but also privately using victims from the producer9s own environment, from the exploitation of children by clients of child prostitutes. Child pornography is sold over commercial websites and also exchanged in closed groups or via peer-to-peer networks. Criminal groups also use the Internet to make big money selling child pornography. 8. Prostitution (h ps://ictcom444251764.ûles.wordpress.com/2018/03/0f4f0-download.jpg) Persuading, inducing, enticing, or coercing any individual to travel in interstate commerce to engage in prostitution.The internet has become one of the preferred methods of communication for prostitution, as clients and prostitutes are less vulnerable to arrest or assault and for its convenience 9. Drug Trafficking Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 56. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 55/57 (h ps://ictcom444251764.ûles.wordpress.com/2018/03/ae389-drugs.jpg) Delivering, distributing, or dispensing a controlled substance by means of the Internet. Darknet markets are used to buy and sell recreational drugs online. Some drug traffickers use encrypted messaging tools to communicate with drug mules. The dark web site Silk Road was a major online marketplace for drugs before it was shut down by law enforcement (then reopened under new management, and then shut down by law enforcement again) 10. Criminal Copyright Infringement (h ps://ictcom444251764.ûles.wordpress.com/2018/03/28f35-pirata.jpg) Criminal Copyright Infringement, the act of piracy mainly for ûnancial gain. In late 2014, the number one pirate website, The PirateBay, was raided for the second time due to years of pirating movies, music, games, books, and other software. These kinds of websites earn money through advertsing. Published by regisjoyce View all posts by regisjoyce Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 57. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 56/57 14 thoughts on <Empowerment Technologies LESSONS 1- 15= 1. DEMETRIO M. CAMPADO says: July 14, 2020 at 5:08 am Thank you po! maam and sir for sharing us Reply → 2. ROLLY PUJANES says: July 22, 2020 at 3:22 am Good Day, this is a very good module, can I use this module as my reference? Thank you. Reply → 3. CARINGALJOELS says: July 24, 2020 at 2:47 am Absolutely comprehensive! Thank you! Reply → 4. TEACHER EREL says: August 20, 2020 at 8:38 am thank you for sharing this online. New teacher here. not my piece of pie but it was assigned to me this school year. can i use this for my class? thank you in advance. Reply → 5. BARANI, JAMALODI B. says: October 15, 2020 at 2:58 am I have learned a lot in this lesson. This lesson helped me understand more about this subject. Reply → 6. ENCLONAR ROJANA MARIE says: December 18, 2020 at 2:40 pm No coomment Reply → 7. ARSENIO CUPIDO JR says: March 4, 2021 at 7:13 am Will it9s okey Reply → 8. Pingback: CENTENO9S EMTECH BLOG 3 Site Title 9. BERNADETH RAMOS says: June 1, 2021 at 7:42 am I learned a lot because of this lessons. Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804
  • 58. 1/13/22, 4:11 PM Empowerment Technologies LESSONS 1-15 – Empowerment Technology https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ 57/57 Reply → 10. ELMER T. GABINI says: June 16, 2021 at 2:51 am There are a lot of crimes in social media that we need to careful our social media accounts. Reply → 11. ELMER GABINI says: June 16, 2021 at 2:53 am There are a lot of crimes in social media that we need to careful our social media accounts. Reply → 12. ANGELYNSANJOSETUTOL says: June 16, 2021 at 11:01 pm From grade 12 Loreal Reply → 13. KEVIN DUMDUM says: June 18, 2021 at 1:34 am Baliwagan,Balamban,Cebu Reply → 14. CABALLERO, JOHNREY J says: June 25, 2021 at 4:44 am Reply → BLOG AT WORDPRESS.COM. Empowerment Technology Project Empowerment Technology Project Downloaded by Jillian Agape Damaso (jillianagapedamaso@gmail.com) lOMoARcPSD|19576804