SlideShare a Scribd company logo
1 of 59
Republic of the Philippines
DEPARTMENT OF EDUCATION
Paulino Legaspi Sr. Memorial National High School
Tuban, Sablayan, Occicental Mindoro
We are now in the age of modern technology
people use modern tools and equipment to make
their lives more comfortable. Most people right
now use computers to improve the quality of their
lives and to make easier their work and task.
Every day we read the newspaper,
watching television and listen to the radio to
know what is happening and references,
and read our books to increase our
knowledge
Advantages of Computer
Calculate
faster
Can be
entertaining
(play music , videos, playing
computers games)
Advantages of Computer
Access lots of
information with the use
of internet
Store lots of data and
information
Advantages of Computer
Allow quick
searches through
data, documents,
files, etc.
Save the user from needing
paper works
Advantages of Computer
Can encourage social
activity
Convenience in
Limits physical and
healthy activity
Cyber sex
It may damage your
studier and life
ADDICTION
Can require a lot of maintenance
Has a possibility of data
lost, file corruption and
damage to hardware. Can cause eye
blindness
Computer addiction: A disorder in which the
individual turns to the Internet or plays computer
games in an attempt to change moods,
overcome anxiety, deal with depression, reduce
isolation or loneliness, or distract themselves
from overwhelming problems.
The Parts
of a
Computer
The TOWER
contains
all of the parts of
a computer
The MOTHERBOARD
is the backbone of a
computer – all other
parts plug into it
The CPU
(Central Processing Unit)
is the brain of a computer
– it tells the other parts
what to do
The RAM
(Random Access Memory)
is the temporary memory
of a computer
The ROM
(Random Only Memory)
is the permanent memory
of a computer
An INPUT DEVICE
lets you TALK TO the
computer
An OUTPUT DEVICE
lets the computer
TALK TO you
Is any part of your computer that has a
physical structure, such as the keyboard
or mouse. It also includes all of the
computers internal parts.
Is any set of instructions that tells the
hardware what to do and how to do it.
Examples of software includes web
browsers, games, and word processor
 In mathematics and digital electronics, a binary number is
a number expressed in the base-2 numeral
system or binary numeral system, which uses only two
symbols: typically 0 (zero) and 1 (one).
 ASCII is the acronym for the American Standard Code
for Information Interchange. It is a code for representing 128
English characters as numbers, with each letter assigned a
number from 0 to 127. For example, the ASCII code
for uppercase M is 77. Most computers use ASCII codes to
represent text, which makes it possible to transfer data from
one computer to another.
 How is a letter converted to binary form and back?
Step 1.
The user presses
the capital letter D
(shift+D key) on
the keyboard.
Step 2.
An electronic signal for the
capital letter D is sent to the
system unit.
Step 3.
The signal for the capital letter D
is converted to its ASCII binary
code (01000100) and is stored in
memory for processing.
Step 4.
After processing, the binary
code for the capital letter D is
converted to an image, and
displayed on the output device.
Term Abbreviation Approximate Size
Kilobyte KB or K 1 thousand bytes
Megabyte MB 1 million bytes
Gigabyte GB 1 billion bytes
Terabyte TB 1 trillion bytes
 By number of bytes available for storage
The MOTHERBOARD is the of
a computer
A) Brains
B) Backbone
C) Foot
ROM is the memory of a computer
A) Permanent
B) Smart
C) Temporary
The CPU is the of a computer
A) Brains
B) Backbone
C) Foot
RAM is the memory of a computer
A) Permanent
B) Smart
C) Temporary
An example of an INPUT DEVICE is:
A) Printer
B) Monitor
C) Mouse
An example of an OUTPUT DEVICE is:
A) Keyboard
B) Monitor
C) Mouse
Managing File and Folder
• File and extension names
• Directories
• Folders
• Copying , moving, deleting and renaming files
WHAT IS FOLDER MANAGEMENT
Window Folder Provides easy access
to common file and folder
management tasks.
When you open any folder in your
computer a list of hyperlinked task is
displayed next to the folder content
 You can select a file or
folder then click a task to
rename, copy, move or
delete it
File and extension names
A file name extension is an identifier specified as a suffix to the
name of a computer file.
It helps an operating system, like windows, determine which
program on your computer the file is associated with
In Microsoft windows, The file name extension is a period
followed by three characters but may also be one, two or four
characters long.
COMMON WINDOWS FILE EXTENSIONS
 .docx- Word document
 .docm- Word Macro-enable document, same as
docx but may contain macros and scripts.
 .dotx- Word template
 .dotm- Word Macro-enabled template same as
docx but may contain macro and scripts.
 .docb- Word binary document, introduced in
Microsoft office 2007.
 .tif - Tagged Image File
 .psd - Photoshop Document
 .pdf - Portable Document Format
 .eps - Encapsulated Postscript
 .ai – Adobe Illustrator Document
COMMON WINDOWS FILE EXTENSIONS
.wpd - Word Perfect document
.jpeg or jpg - Joint photographic
Experts Group
.png - Portable Network Graphics
.gif – Graphics Interchange Format
 .odt - Open office writer
document file
 .pdf - PDF file
 .rtf - Real Text File
 .tex - A latex document file
 .txt - Plain text file
 .wks and .wps – Microsoft works
file
Directories/Folders
 A directory is a location for storing files on your computer.
 Directory is a file that acts as a folder for other files.
 A folder also called a directory, is a special type of file on your
compute’s file system which contains other files and folders.
 When you browsing the files on your computer using a file
Manager, such as Windows explorer, the icon for folder will
typically look similar to the image at the right.
COPYING AND PASTING
If you wish to copy any part of your document to paste to
another part, you first have to select the text that you want
copied. This is done by clicking and dragging over top the
text to copy. Click and hold the mouse button at the begging
of the text, then carefully drag it to the end of the text. All of
the text you selected will appear highlighted. If you highlight
too much, or not enough, do not worry, just try again.
Time Savers: Using key’s
Highlight the files or text you want to
copies, Press Ctrl-c, then go to the
place you want to paste the text or
files that you copied and press Ctrl-v.
Did you know?
File names can be up to 255 characters. You
can use spaces and underscores in names, but
you can’t use the following characters: @ * : < > |
? “  or /. Remember the best way to keep your
files organized is with a consistent naming
convention.
MOVING THE FILES ONE PLACE TO ANOTHER
 If you wish to move some text or files from one
place to another, you might want to cut the text or
files instead of copying it. Cutting and copying are
the same, except that cutting removes the text but
still puts it on the virtual clipboard. To do so click
and drag over the text or files that you want cut.
COMPUTER ETHICS and LAW
Computer ethics Is a system of moral standards or
values used as a guideline for computer users.
Law is a legal system comprising of rules and principles
that govern the affairs of a community and controlled
by a political authority
THE TEN COMMANDMENTS OF COMPUTER ETHICS
You shall not use a computer to harm other people
You shall not interfere with other people’s computer work
You shall not snoop around in other peoples computer files
You shall not use a computer to steal
You shall not use a computer to bear false witness
You shall not copy or use proprietary software for which you have not paid
You shall not use other peoples computer resources without authorization or proper
compensation
You shall not appropriate other people’s intellectual output
You shall think about the social consequences of the program you are writing or the
system you are designing.
You shall always use a computer in ways that ensure consideration and respct for your
fellow human.
Action Keyboard Shortcut
Make Letters Bold Ctrl + B
Make Letters Italic Ctrl + I
Make Letters underlined Ctrl + U
Decrease font size one value Ctrl + Shift + <
Increase font size one value Ctrl + Shift + >
Decrease font size 1 point Ctrl + [
Increase font size 1 point Ctrl + ]
Copy the selected text or object Ctrl + C
Cut the selected text or object Ctrl + X
Paste text or an object Ctrl + V
Action Keyboard Shortcut
Undo the last action Ctrl + Z
Redo the last action Ctrl + Y
Create a new Documents Ctrl + N
Open a Document Ctrl + O
Close a Document Ctrl + W
Split the document window Alt + Ctrl + S
Remove the document window split Alt + Shift + C or Alt + Ctrl + S
Save a document Ctrl + S
Go to the beginning of the document Home
Go to the end of the document End
Print document Ctrl + P
Action Keyboard Shortcut
Insert a hyperlink Ctrl + K
Delete one character to the left Backspace
Delete one word to the left Ctrl + Backspace
Delete one character to the right Delete
Delete one word to the right Ctrl + Delete
The copy right symbol Alt + Ctrl + C
The registered trademark symbol Alt + Ctrl + R
The Trademark symbol Alt + Ctrl + T
Single-space lines Ctrl + 1
Double-space lines Ctrl + 2
Set 1.5- line spacing Ctrl + 5
Action Keyboard Shortcut
Switch a paragraph between centered and left-aligned Ctrl + E
Switch a paragraph between justified and left-aligned Ctrl + J
Switch a paragraph between right-aligned and left-aligned Ctrl + R
Left align a paragraph Ctrl + L
Display the save as page Alt + F + S
Cancel an action ESC
Change the font/ font size Ctrl + Shift + F or Ctrl + Shift + P
Open the Help window F1
Open the find dialog box Ctrl + F
To close the current application Alt + F4
Switch between help window and the active program Alt + Tab
IF YOU DO THIS . . .
 You will keyboard faster.
 You will make fewer mistakes.
 You will be able to type longer without getting as
tired.
 It will be less likely that you will have health
problems with your hands and wrists.
Empowerment Technology.pptx

More Related Content

Similar to Empowerment Technology.pptx

Beginning computer basics
Beginning computer basics Beginning computer basics
Beginning computer basics Vicente Antofina
 
Grade 4-MT 1.pptx
Grade 4-MT 1.pptxGrade 4-MT 1.pptx
Grade 4-MT 1.pptxMjMj96
 
Computer applications for management
Computer applications for managementComputer applications for management
Computer applications for managementDharshanaa.C Mohan
 
Computer Internet Basics I
Computer Internet Basics IComputer Internet Basics I
Computer Internet Basics Idebbie43
 
English basic computer vocabulary
English  basic computer vocabularyEnglish  basic computer vocabulary
English basic computer vocabularyRoberto Rodriguez
 
DIGITAL LITERACY_beginner.pptx
DIGITAL LITERACY_beginner.pptxDIGITAL LITERACY_beginner.pptx
DIGITAL LITERACY_beginner.pptxlgusanfernando
 
Introduction to computers 2
Introduction to computers 2Introduction to computers 2
Introduction to computers 2Heather Lambert
 
Computer Lecture 1.pdf
Computer Lecture 1.pdfComputer Lecture 1.pdf
Computer Lecture 1.pdfaqsaessa
 
Introductiontobasiccomputerconceptspresentation 120501031836-phpapp02
Introductiontobasiccomputerconceptspresentation 120501031836-phpapp02Introductiontobasiccomputerconceptspresentation 120501031836-phpapp02
Introductiontobasiccomputerconceptspresentation 120501031836-phpapp02Azhar khan
 
Basic concept of computer by muhmmad saeed
Basic concept of computer   by muhmmad saeedBasic concept of computer   by muhmmad saeed
Basic concept of computer by muhmmad saeedMuhammad Saeed
 
Alpha Tech
Alpha TechAlpha Tech
Alpha Techthinkict
 
Basic computer and_intenet_terminologies
Basic computer and_intenet_terminologiesBasic computer and_intenet_terminologies
Basic computer and_intenet_terminologiesaticar
 
What a teacher needs to know about computers
What a teacher needs to know about computersWhat a teacher needs to know about computers
What a teacher needs to know about computersNelson Urbina
 
Microsoft windows operating concept
Microsoft windows operating conceptMicrosoft windows operating concept
Microsoft windows operating conceptMi L
 

Similar to Empowerment Technology.pptx (20)

ICT Skills.pptx
ICT Skills.pptxICT Skills.pptx
ICT Skills.pptx
 
Beginning computer basics
Beginning computer basics Beginning computer basics
Beginning computer basics
 
Grade 4-MT 1.pptx
Grade 4-MT 1.pptxGrade 4-MT 1.pptx
Grade 4-MT 1.pptx
 
Computer applications for management
Computer applications for managementComputer applications for management
Computer applications for management
 
Computer Internet Basics I
Computer Internet Basics IComputer Internet Basics I
Computer Internet Basics I
 
Session 1
Session 1Session 1
Session 1
 
English basic computer vocabulary
English  basic computer vocabularyEnglish  basic computer vocabulary
English basic computer vocabulary
 
Know your pc
Know your pc Know your pc
Know your pc
 
Basic computer skills of BSc IT
Basic computer skills of BSc ITBasic computer skills of BSc IT
Basic computer skills of BSc IT
 
Computer
ComputerComputer
Computer
 
DIGITAL LITERACY_beginner.pptx
DIGITAL LITERACY_beginner.pptxDIGITAL LITERACY_beginner.pptx
DIGITAL LITERACY_beginner.pptx
 
Introduction to computers 2
Introduction to computers 2Introduction to computers 2
Introduction to computers 2
 
Computer Lecture 1.pdf
Computer Lecture 1.pdfComputer Lecture 1.pdf
Computer Lecture 1.pdf
 
MS-WINDOWS.pptx
MS-WINDOWS.pptxMS-WINDOWS.pptx
MS-WINDOWS.pptx
 
Introductiontobasiccomputerconceptspresentation 120501031836-phpapp02
Introductiontobasiccomputerconceptspresentation 120501031836-phpapp02Introductiontobasiccomputerconceptspresentation 120501031836-phpapp02
Introductiontobasiccomputerconceptspresentation 120501031836-phpapp02
 
Basic concept of computer by muhmmad saeed
Basic concept of computer   by muhmmad saeedBasic concept of computer   by muhmmad saeed
Basic concept of computer by muhmmad saeed
 
Alpha Tech
Alpha TechAlpha Tech
Alpha Tech
 
Basic computer and_intenet_terminologies
Basic computer and_intenet_terminologiesBasic computer and_intenet_terminologies
Basic computer and_intenet_terminologies
 
What a teacher needs to know about computers
What a teacher needs to know about computersWhat a teacher needs to know about computers
What a teacher needs to know about computers
 
Microsoft windows operating concept
Microsoft windows operating conceptMicrosoft windows operating concept
Microsoft windows operating concept
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Empowerment Technology.pptx

  • 1. Republic of the Philippines DEPARTMENT OF EDUCATION Paulino Legaspi Sr. Memorial National High School Tuban, Sablayan, Occicental Mindoro
  • 2.
  • 3. We are now in the age of modern technology people use modern tools and equipment to make their lives more comfortable. Most people right now use computers to improve the quality of their lives and to make easier their work and task.
  • 4. Every day we read the newspaper, watching television and listen to the radio to know what is happening and references, and read our books to increase our knowledge
  • 5. Advantages of Computer Calculate faster Can be entertaining (play music , videos, playing computers games)
  • 6. Advantages of Computer Access lots of information with the use of internet Store lots of data and information
  • 7. Advantages of Computer Allow quick searches through data, documents, files, etc. Save the user from needing paper works
  • 8. Advantages of Computer Can encourage social activity Convenience in
  • 9. Limits physical and healthy activity Cyber sex
  • 10. It may damage your studier and life ADDICTION
  • 11. Can require a lot of maintenance
  • 12. Has a possibility of data lost, file corruption and damage to hardware. Can cause eye blindness
  • 13. Computer addiction: A disorder in which the individual turns to the Internet or plays computer games in an attempt to change moods, overcome anxiety, deal with depression, reduce isolation or loneliness, or distract themselves from overwhelming problems.
  • 14.
  • 15.
  • 17. The TOWER contains all of the parts of a computer
  • 18. The MOTHERBOARD is the backbone of a computer – all other parts plug into it
  • 19. The CPU (Central Processing Unit) is the brain of a computer – it tells the other parts what to do
  • 20. The RAM (Random Access Memory) is the temporary memory of a computer
  • 21. The ROM (Random Only Memory) is the permanent memory of a computer
  • 22. An INPUT DEVICE lets you TALK TO the computer
  • 23. An OUTPUT DEVICE lets the computer TALK TO you
  • 24.
  • 25. Is any part of your computer that has a physical structure, such as the keyboard or mouse. It also includes all of the computers internal parts.
  • 26. Is any set of instructions that tells the hardware what to do and how to do it. Examples of software includes web browsers, games, and word processor
  • 27.  In mathematics and digital electronics, a binary number is a number expressed in the base-2 numeral system or binary numeral system, which uses only two symbols: typically 0 (zero) and 1 (one).
  • 28.  ASCII is the acronym for the American Standard Code for Information Interchange. It is a code for representing 128 English characters as numbers, with each letter assigned a number from 0 to 127. For example, the ASCII code for uppercase M is 77. Most computers use ASCII codes to represent text, which makes it possible to transfer data from one computer to another.
  • 29.  How is a letter converted to binary form and back? Step 1. The user presses the capital letter D (shift+D key) on the keyboard. Step 2. An electronic signal for the capital letter D is sent to the system unit. Step 3. The signal for the capital letter D is converted to its ASCII binary code (01000100) and is stored in memory for processing. Step 4. After processing, the binary code for the capital letter D is converted to an image, and displayed on the output device.
  • 30. Term Abbreviation Approximate Size Kilobyte KB or K 1 thousand bytes Megabyte MB 1 million bytes Gigabyte GB 1 billion bytes Terabyte TB 1 trillion bytes  By number of bytes available for storage
  • 31.
  • 32. The MOTHERBOARD is the of a computer A) Brains B) Backbone C) Foot
  • 33. ROM is the memory of a computer A) Permanent B) Smart C) Temporary
  • 34. The CPU is the of a computer A) Brains B) Backbone C) Foot
  • 35. RAM is the memory of a computer A) Permanent B) Smart C) Temporary
  • 36. An example of an INPUT DEVICE is: A) Printer B) Monitor C) Mouse
  • 37. An example of an OUTPUT DEVICE is: A) Keyboard B) Monitor C) Mouse
  • 38. Managing File and Folder • File and extension names • Directories • Folders • Copying , moving, deleting and renaming files
  • 39. WHAT IS FOLDER MANAGEMENT Window Folder Provides easy access to common file and folder management tasks. When you open any folder in your computer a list of hyperlinked task is displayed next to the folder content  You can select a file or folder then click a task to rename, copy, move or delete it
  • 40. File and extension names A file name extension is an identifier specified as a suffix to the name of a computer file. It helps an operating system, like windows, determine which program on your computer the file is associated with In Microsoft windows, The file name extension is a period followed by three characters but may also be one, two or four characters long.
  • 41. COMMON WINDOWS FILE EXTENSIONS  .docx- Word document  .docm- Word Macro-enable document, same as docx but may contain macros and scripts.  .dotx- Word template  .dotm- Word Macro-enabled template same as docx but may contain macro and scripts.  .docb- Word binary document, introduced in Microsoft office 2007.  .tif - Tagged Image File  .psd - Photoshop Document  .pdf - Portable Document Format  .eps - Encapsulated Postscript  .ai – Adobe Illustrator Document
  • 42. COMMON WINDOWS FILE EXTENSIONS .wpd - Word Perfect document .jpeg or jpg - Joint photographic Experts Group .png - Portable Network Graphics .gif – Graphics Interchange Format  .odt - Open office writer document file  .pdf - PDF file  .rtf - Real Text File  .tex - A latex document file  .txt - Plain text file  .wks and .wps – Microsoft works file
  • 43. Directories/Folders  A directory is a location for storing files on your computer.  Directory is a file that acts as a folder for other files.  A folder also called a directory, is a special type of file on your compute’s file system which contains other files and folders.  When you browsing the files on your computer using a file Manager, such as Windows explorer, the icon for folder will typically look similar to the image at the right.
  • 44. COPYING AND PASTING If you wish to copy any part of your document to paste to another part, you first have to select the text that you want copied. This is done by clicking and dragging over top the text to copy. Click and hold the mouse button at the begging of the text, then carefully drag it to the end of the text. All of the text you selected will appear highlighted. If you highlight too much, or not enough, do not worry, just try again.
  • 45. Time Savers: Using key’s Highlight the files or text you want to copies, Press Ctrl-c, then go to the place you want to paste the text or files that you copied and press Ctrl-v.
  • 46. Did you know? File names can be up to 255 characters. You can use spaces and underscores in names, but you can’t use the following characters: @ * : < > | ? “ or /. Remember the best way to keep your files organized is with a consistent naming convention.
  • 47. MOVING THE FILES ONE PLACE TO ANOTHER  If you wish to move some text or files from one place to another, you might want to cut the text or files instead of copying it. Cutting and copying are the same, except that cutting removes the text but still puts it on the virtual clipboard. To do so click and drag over the text or files that you want cut.
  • 48.
  • 49. COMPUTER ETHICS and LAW Computer ethics Is a system of moral standards or values used as a guideline for computer users. Law is a legal system comprising of rules and principles that govern the affairs of a community and controlled by a political authority
  • 50. THE TEN COMMANDMENTS OF COMPUTER ETHICS You shall not use a computer to harm other people You shall not interfere with other people’s computer work You shall not snoop around in other peoples computer files You shall not use a computer to steal You shall not use a computer to bear false witness You shall not copy or use proprietary software for which you have not paid You shall not use other peoples computer resources without authorization or proper compensation You shall not appropriate other people’s intellectual output You shall think about the social consequences of the program you are writing or the system you are designing. You shall always use a computer in ways that ensure consideration and respct for your fellow human.
  • 51.
  • 52.
  • 53. Action Keyboard Shortcut Make Letters Bold Ctrl + B Make Letters Italic Ctrl + I Make Letters underlined Ctrl + U Decrease font size one value Ctrl + Shift + < Increase font size one value Ctrl + Shift + > Decrease font size 1 point Ctrl + [ Increase font size 1 point Ctrl + ] Copy the selected text or object Ctrl + C Cut the selected text or object Ctrl + X Paste text or an object Ctrl + V
  • 54. Action Keyboard Shortcut Undo the last action Ctrl + Z Redo the last action Ctrl + Y Create a new Documents Ctrl + N Open a Document Ctrl + O Close a Document Ctrl + W Split the document window Alt + Ctrl + S Remove the document window split Alt + Shift + C or Alt + Ctrl + S Save a document Ctrl + S Go to the beginning of the document Home Go to the end of the document End Print document Ctrl + P
  • 55. Action Keyboard Shortcut Insert a hyperlink Ctrl + K Delete one character to the left Backspace Delete one word to the left Ctrl + Backspace Delete one character to the right Delete Delete one word to the right Ctrl + Delete The copy right symbol Alt + Ctrl + C The registered trademark symbol Alt + Ctrl + R The Trademark symbol Alt + Ctrl + T Single-space lines Ctrl + 1 Double-space lines Ctrl + 2 Set 1.5- line spacing Ctrl + 5
  • 56. Action Keyboard Shortcut Switch a paragraph between centered and left-aligned Ctrl + E Switch a paragraph between justified and left-aligned Ctrl + J Switch a paragraph between right-aligned and left-aligned Ctrl + R Left align a paragraph Ctrl + L Display the save as page Alt + F + S Cancel an action ESC Change the font/ font size Ctrl + Shift + F or Ctrl + Shift + P Open the Help window F1 Open the find dialog box Ctrl + F To close the current application Alt + F4 Switch between help window and the active program Alt + Tab
  • 57.
  • 58. IF YOU DO THIS . . .  You will keyboard faster.  You will make fewer mistakes.  You will be able to type longer without getting as tired.  It will be less likely that you will have health problems with your hands and wrists.

Editor's Notes

  1. Indeed, people can makes their lives better through the use of computer. This is the reason why we can find computers almost anywhere, especially in school , home , offices , banks ,department store , cafe , hospitals and even in a convenience stores
  2. At times, we surf the internet to check out the latest trends, news, and even fashion. Almost anything you know is run or made by computers. Even most of jobs today require the use of computers
  3. What is computer? A computer is an electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data. You may already know that you can use a computer to type documents, send email, paly games, and browse the web. You can also use it to edit or create spreadsheets, presentations and even videos.
  4. The elderly, as well as children and adolescents, are particularly vulnerable because they may not realize the extent of their dependency. In many instances, individuals with computer addiction may seek help for another condition, such as depression, phobias or other addictions.
  5. Computers play important roles in our lives. Computers is a powerful tools for you and the organization, because Computers enable to more easier and effectively and can help you do many things. Use computer properly and in the positive way.
  6. Everything you do on your computer will rely on both hardware and software. Example viewing in a web browser (software) and using your mouse (hardware) to click from page to page.
  7. In general ethics is a moral philosophy where a person makes a specific moral choice and sticks to it. On the other hand, ethics in computing means moral guidelines to refer to when using the computer and computer networks. This includes the internet. Law differs from one country to another, in the era of technology, computer law is needed to clarify goods or actions that fall under the computer law. Computer law refers to all areas in law that requires an understanding of computer technology such as hardware, software and internet. Why do we need Ethics and law in Computing? Respecting Ownership- we must respect ownership by not stealing other people’s work either by duplicating or Respecting Privacy- we should respect other people’s privacy and confidentiality by refraining ourselves from reading their mails or files without their permission. If we do so, it is considered as violating an individual’s right to privacy and confidentiality Respecting Property- property here means ownership, since individual data and information are considered as property, therefore, an act of tampering and changing electronic information is considered as vandalism and disrespect for other people’s property