SlideShare a Scribd company logo
1 of 45
Empowerment Technologies
Information and Communication Technologies
It is also known as WWW or W3 introduce by Tim Berners-Lee. It consists of
different pages that are formatted in a markup language called HTML
(Hypertext Markup Language) and linked to each other that contain text,
graphics, multimedia files, hyperlinks and etc.
The first development of World Wide Web where web pages are static. It also
known as flat or stationary page and it cannot be manipulated by users.
It is a dynamic web page where user can interact with page like creating a
user account, posting comments, uploading files and images, and others.
Example: Blog sites, Facebook, Twitter, Instagram, YouTube.
users can classify and arrange information by adding tag or
label. Pound sign (#) is used in Facebook, Twitter, Instagram and other social
networking sites.
Example in tagging on Facebook: #TeamKawayan, #Single
2. Rich User Experience – user can have high interaction with the content of
the page and can achieve level of expertise.
user can put content on their own in web page like
comment, evaluation, and etc.
A site that offers services and brings individual and businesses
into selling different goods and commodities such as shopping site like OLX,
Lazada, Shopee, Zalora and others.
users can subscribe to a software when they need it
instead of purchasing them.
sharing of diverse information through universal web
access.
A new paradigm in web interaction extension of
led by World Wide Web Consortium (W3C) where
it provides framework that allows data to be
shared and reuse.
it refers to fusing
of technological advancement to
work on a similar task.
Example. Using smartphone as
camera in taking pictures instead
of DSLR camera.
an application
and website where user can
communicate, create and share
content, and participate in online
communities.
A website where people with the
same come together to share information.
Examples: Twitter, Instagram, Facebook
A website where user can post stories
and are ranked based on the popularity through
voting.
Examples: Digg, Reddit, Propeller, Slashdot, Fark
A website that
allows you to share and store
internet bookmarks, articles, posts,
blogs, images and others. Examples:
Pinterest, StumbleUpon, Dribble
A website that
allows you to share and store
multimedia files such as video,
photos and music.
Examples: Instagram, YouTube, Flickr
a website that
allows you to broadcast short
message. Examples: Twitter, Tumblr,
Meetme
a discussion
website that allows user to ask
questions and comments on a
journal posted by an individual or
group. Examples: Wordpress,
Blogger
a technology used in cellular
and other devices such netbook, laptop, tablet,
smartphones and etc.
A platform that assist people with
disability. It will guide the individual like a blind
person by using an audio recording.
The importance of internet plays a crucial part in human
development. Life becomes easy and comfortable because of this
technology. Most of us are connected to the internet via laptop,
mobile phone, tablet, personal computer and other electronic
gadgets. Behind this technology there is a risk that everyone
should be aware of. You could be at risk on scam, bullying, and
illegal activities if you will not take precautions in using internet.
We need to keep ourselves safe and secure whenever we use the
internet. That is why it is very important to know and learn the
ways on how to be safe and secured online.
Do not share your password with anyone.
Add friends you know in real life.
Do not visit untrusted websites.
Add password to your WIFI at home to make it
private.
Install and update antivirus in your computer.
Do not give your personal information to anyone
Think before you click.
Never post about your future vacation.
It happens when someone intentionally abused, harass, and mistreated by other
person using electronic communication.
It is a crime of stealing personal information for the purpose of assuming that
person’s name or identity to make any form of transactions.
A criminal practice where electronic communication is used to stalk or harass
individual or group.
The act of sending sexually explicit text messages, images, and videos.
also known as Malicious Software.
Virus – a malicious program that replicate itself by copying itself to another program.
Trojan Horse – a malicious program that disguised as legitimate program that user will accept and use but
take control of your computer.
Worm – malicious program that copy’s itself and spreads to other computers.
Spyware – A malicious program that gathers information from victim’s computer and send it back to the
hacker.
Adware – An unwanted advertisement that will pop-up several times on victim’s computer then behave
abnormally and tedious to close them.
Keylogger – A program that runs in the background and steals user credentials and confidential information
and send back to hack by recording every keystroke that a user makes on their computer or device.
Botnet – A collection of infected internet–connected devices such as PC and mobile phone that are
controlled by a common type of malware.
Rootkit – A software tools used by hackers to gain control over a computer on a network without being
exposed.
Ransomware – A ransom virus that block the user from accessing the programs or files and demands to pay
the ransom through online method for the removal of the virus.
Also known as junk email or unwanted email send by advertiser or
bot. It can be used to send malware.
A cyberattack method using deceptive emails and websites to
acquiring sensitive personal information.
A crime in which computer is used as object and tool in committing a
crime such hacking, phishing, spamming, child pornography, libel,
hate crimes, identity thief and others.
A law that deals with all forms of cybercrime.
It is a word that came from the two words “net”
and “etiquette”. It is an etiquette applied online
that shows proper manner and behavior. If you are
a member of an online society through social
media you are called netizen. And in interacting
with other netizen online, we need to maintain
good behavior which is acceptable to others in
online community.
1. Remember the human.
2. Adhere to the same standards of behavior online that you follow in
real life.
3. Know where you are in cyberspace.
4. Respect other people's time and bandwidth.
5. Make yourself look good online.
6. Share expert knowledge.
7. Help keep flame wars under control.
8. Respect other people's privacy.
9. Don't abuse your power.
10. Be forgiving of other people's mistakes.
Contextualized Online Search and
Research Skills
is a research method in
collecting and gathering information via
internet by using search engine such as
google.
is a program that allows users
to search for content on internet.
Examples of Search Engine
Google Aol Search Wow Baidu
Web Crawler Yahoo! Search MyWebSearch Wolframalpha
Bing Info Dogpile DuckDuckGo
Ask Infospace Contenko Internet
Archive
Getting the correct and reliable information is our goal
in internet research. We may rely on the capability of
search engine but sometimes it may not give us the
correct information because of the keywords we
entered into a search engine. There are techniques in
searching information that can be applied in search
engine in order to get a better result. Some search
engines allow combination of words and logic
connectors of AND, OR, and NOT.
Tips for Effective Internet Research by George Mathews
 Know what kind of research you want to do.
 Make a list of keywords you will use in your search.
 Enclose keywords in quotation marks.
 Use the minus sign (-).
 Try specialized search engines.
 Skim through search results web pages.
 Bookmark
 Review your bookmarks.
Online Research Skills by Hannah Trierweiler
Hudson
 Check Your Sources
 Ask Good Questions
 Go Beyond the Surface
 Be Patient
 Respect Ownership
 Use Your Networks
Copyright Issues
There are millions of information that we can get from the internet.
Some of this information are free but others are not. They are
protected by a copyright law.
What is Copyright?
Copyright is a protection given to the owner of the rights in an original
work such as books, musical works, films, paintings, and other works,
and computer programs. This original work is called intellectual
property which is protected under Republic Act 8293 known as the
“Intellectual Property Code of the Philippines”.
Copyright Infringement
This happens when the copyrighted work is use by other person without
permission of the author or copyright holder. Any person who is infringing the
right protected work would be liable under the law. An example of this is the case
of M.Y. Intercontinental Trading Corporation (MITC), Tedwin T. Uy, Allianz
Marketing and Publishing Corp. (Allianz), and Fujian New Technology Color
Making and Printing Company, LTD (Fujian) against St. Mary’s Publishing
Corporation (SMPC). Manila regional trial court ordered Fujian and its partners to
pay P24.7 million for the damages and cost of litigation for copyright infringement
to SMPC. Fujian and its three local partners was guilty of printing, copying,
reproducing, importing, distributing and selling of original and revised textbooks
that they have illegally sold to Department of Education in Zamboanga,
Municipality of Cabuyao in Laguna and Municipality of Matnog in Sorsogon
without the approval of SMPC, the copyright owner of the textbooks.
Fair Use
Research is important to the students and other people. Most of them rely on the
information that they can get online. Although this information is protected by a
copyright law but we can still use this information without permission in a limited
way under certain condition and purpose.
Fair use is the use of copyrighted material for comment, teaching, criticism, news
reporting, research, scholarship, and other similar purpose is not an infringement
of copyright.
Example of this is when you post a quote from a person in your Facebook wall.
Include the name of person who owns the quote in your post. Another example is
when you copy image from internet, give credit to the creator of image. The
copied image should be use for educational purpose not for commercial use.
In fair use, 5% of the content of reference can only be copied. If 20% or less of
reference copied, there must be a secondary use agreement and fee. And if 20%
or more of reference copied, it requires purchasing of creative work.
Guidelines for Fair Use
 Majority of the contents created must be
yours.
 Give credit to the owner.
 Don’t make profit of the copyrighted work.
Developing ICT content for specific purposes
Productivity Tools
It refers to the software that people use to create and
produce documents, presentations, databases, charts,
and graphs.
Productivity tools helps you create professional quality
documents, presentation, graphics, and more.
Why should you learn productivity tools?
While there are a wide range of benefits of using productivity tools, the best
reason is that it just makes essential, everyday we use computer to do different
task for more efficient.
Common productivity tools
Microsoft word
Microsoft excel
Microsoft PowerPoint
LibreOffice
Tools/Techniques Use Case
1. Mail Merge and label generation Mass email or printed letters
2. Custom animation and timing Enhance viewer experience
3. Hyperlinking in presentations
Optimizes use of related content and
references. Applies to
Word/Write document too.
4. Integrating images and external
materials in word processor
Enriches textual content. Also useful in
presentation slides and sometimes in
spreadsheets.
5. Embedded files and data Seamlessly integrates related files
6. Advanced and complex formulasand
computations
Simplifies and automates common tasks.
Mail Merge
It is a Word’s way of generating mass mailings. It involves combining a list of
names and addresses to individually address to each person / receiver on the list.
You can use Mail Merge to create envelopes or address labels, as well as form
letters.
Mail Merged involved the following documents;
Main document – this document contains text and graphics. Example body of the
letter.
Mailing list – this is your data source that is used to populate information in the
letter. It contains names and address of the recipients.
Merged document - this document the combination of the main document
Opening Microsoft Word Program. (Click Start button, type Word and click OK.
On the Mailings tab, click Start Mail Merge, and then select Letters. This will
allow you to sent letters to a group of people and personalize, the result of the
letter that each person receives.
Custom Animation
Animation is a simulation of movement created by displaying a series of pictures,
or frames. Animation on computers is one of the chief ingredients of multimedia
presentations. There are many software applications that enable you to create
animations that you can display on a computer monitor. One of this application
software are presentation software that you can use to create a slide show for
your presentation. Some of the
popular software that are available online for free or for purchase are WPS Office,
LibreOffice, and MS-PowerPoint.
Steps in applying animation effect to an object:
On a slide in Normal view, select the object you want to animate.
Select Slide Show – click Animations tab, in the Animation group, select your
desired effect or click dropdown button to choose more effects. To preview the
animation, click the Preview button to play.
Add a motion path animation effect
You can apply motion path animation effects to an object to move in a sequence
that tells an effective story.
Add a motion path to an object
Select the object that you want to animate.
On the Animation tab, click Add Animation.
Scroll down Motion Paths and select one.
- If you want to create a customize path, Select Custom Path option, and draw
path that you want the object to move.
Editing motion paths
to do things like to change the direction of the motion path, edit the individual
points of the motion path, or to lock ( make it so others can’t change your
animation ) or unlock the animation, Effect Options.
to preview the motion path, click the object on the slides, and click Animation
and select Preview.
Remove an animation effect from an object
On the slide in a Normal view, select the object from which to remove the effect.
On the Animation tab, in the Animation
group, click None to remove the effect.
Hyperlink
A hyperlink or simply a link, is a reference data that the reader can directly follow
either by clicking or tapping. Hyperlinks are found in nearly all Web pages,
allowing users to click their way from one page to another. In text hyperlinks are
often color blue and underlined. When you move the cursor over a hyperlink,
whether it is text, button or an image, the arrow cursor should be change to a
small hand pointing to the link.
Hyperlinks have to basic parts:
The Address – can be webpage, email address, or other location they are linking.
The Display – can be picture or shape.
Example:
https://www.microsoft.com - address
microsoft - display text
https://www.microsoft.com - address at the same time display text
Select Existing File or Web page, and choose the:
Text to display: type the text that you want to appear as hyperlink.
ScreenTip: Type the text that you want to appear when the user hovers over the hyperlink
(optional).
Current Folder, Browsed Pages, or Recent Files: Select where you want to link to.
Address: if you haven’t already selected a location above, insert the URL for the website you want to link to.
Link a slide in the same presentation
Opening PowerPoint program. (click Start button, type PowerPoint and press
Enter)
Select the text, shape, or picture that you want to use as a hyperlink.
Select Insert tab > Links group, click Link button and select an option:
Place in This Document: Link to a specific slide in your presentation.
Create New Document: Link from your presentation to another presentation.
E-mail Address: Link a displayed email address to open up a user's email
program.
Change the color of a hyperlink
You can also change the color of a hyperlink. If you want to change the display text
of a link to blue or any other color.
Select the hyperlink you want to re-color.
On the Home tab of the ribbon, select down arrow next to the Font Color button
to open the menu of colors.
Select the appropriate color that you want for the hyperlink.
Integrating Images
In Microsoft word processing you can do a lot of things to make your documents
look good and presentable. One of its function is to integrate image. Word
processing refers to an application program for manipulating text-based
documents; the electronic equivalent of paper, pen, typewriter, eraser, and most
likely, dictionary and thesaurus. Word processors run the scope from simple
through complex, but all ease the tasks associated with editing documents
(deleting, inserting, rewording, and so on).
Electronic Spreadsheet
According to emerald.com electronic spreadsheet is probably the most useful
general-purpose software for the microcomputer user. Almost all spreadsheets
are now packaged in combination with other applications, such as database
system and graphic capabilities. Electronic spreadsheet refers
to a collection of text and numbers laid out in a
Electronic Spreadsheet
According to emerald.com electronic spreadsheet is probably the most useful general-purpose software for the
microcomputer user. Almost all spreadsheets are now packaged in combination with other applications, such as
database system and graphic capabilities. Electronic spreadsheet refers
to a collection of text and numbers laid out in a rectangular grid. It is an application program commonly used for
budgeting, inventory management, decision making, forecasting and other finance-related tasks.
It replaces the traditional financial modeling tools, the accountant’s columnar pad, pencil and calculator. It a
spreadsheet program, data and formulas used to calculate those data are entered into ledge-like forms
(Spreadsheets or Worksheets) for analysis, tracking, planning, or “what-if” evaluations of the impact of real or
proposed changes on an economic strategy.
A great free alternative spreadsheet program is LibreOffice Calc, and OpenOffice spreadsheet program.
Arithmetic operations
Formula – is an equation that performs operation on worksheet data. A formula in Microsoft Excel always begins
with an equal sign (=).
ARITHMETIC OPERATORS /SYMBOLS OPERATION EXAMPLE
+ (Plus Sign) Addition =A1+A2
- (Minus Sign) Subtraction =A1-A2
* (Asterisk) Multiplication =A1*A2
/ (Forward Slash) Division =A1/A2
^ (Exponentiation) Raises a no. to a
power
=3^2
- (Negation) Negative -11
% (Percent Sign) Percentage =90%

More Related Content

What's hot

[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLSJazzyNF
 
Empowerment Technologies - Module 1.pptx
Empowerment Technologies - Module 1.pptxEmpowerment Technologies - Module 1.pptx
Empowerment Technologies - Module 1.pptxjoelphillipGranada2
 
DRRR Lesson 1 - Week 1-2.pdf
DRRR Lesson 1 - Week 1-2.pdfDRRR Lesson 1 - Week 1-2.pdf
DRRR Lesson 1 - Week 1-2.pdfXaviMatulac
 
Empowerment Technologies - Module 4
Empowerment Technologies - Module 4Empowerment Technologies - Module 4
Empowerment Technologies - Module 4Jesus Rances
 
Empowerment Technology Lesson 3
Empowerment Technology Lesson 3Empowerment Technology Lesson 3
Empowerment Technology Lesson 3alicelagajino
 
Emp tech q2_m12_l1_multimedia_and_ict_fv
Emp tech q2_m12_l1_multimedia_and_ict_fvEmp tech q2_m12_l1_multimedia_and_ict_fv
Emp tech q2_m12_l1_multimedia_and_ict_fvVivienPastores1
 
Lesson 3 advanced word processing skills
Lesson 3 advanced word processing skillsLesson 3 advanced word processing skills
Lesson 3 advanced word processing skillsEmmanuelaSernicul
 
Media and Information Literacy (MIL) - 3. Information Literacy - Information ...
Media and Information Literacy (MIL) - 3. Information Literacy - Information ...Media and Information Literacy (MIL) - 3. Information Literacy - Information ...
Media and Information Literacy (MIL) - 3. Information Literacy - Information ...Arniel Ping
 
Multimedia and ICT.pptx
Multimedia and ICT.pptxMultimedia and ICT.pptx
Multimedia and ICT.pptxSheilaTorino
 
Empowerment Technologies - Module 6
Empowerment Technologies - Module 6Empowerment Technologies - Module 6
Empowerment Technologies - Module 6Jesus Rances
 
Hg g11 module 3 rtp
Hg g11 module 3 rtpHg g11 module 3 rtp
Hg g11 module 3 rtpEdwin Lapat
 
DRRR Module 1.pptx
DRRR Module 1.pptxDRRR Module 1.pptx
DRRR Module 1.pptxcjoypingaron
 
Lesson 3 kinds of variables and thier uses
Lesson 3 kinds of variables and thier usesLesson 3 kinds of variables and thier uses
Lesson 3 kinds of variables and thier usesmjlobetos
 
Media and Information Literacy
Media and Information LiteracyMedia and Information Literacy
Media and Information Literacyjannanavarra
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SJuvywen
 
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptxRyanRojasRicablanca
 
Empowerment Technologies - Module 5
Empowerment Technologies - Module 5Empowerment Technologies - Module 5
Empowerment Technologies - Module 5Jesus Rances
 

What's hot (20)

[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
 
Empowerment Technologies - Module 1.pptx
Empowerment Technologies - Module 1.pptxEmpowerment Technologies - Module 1.pptx
Empowerment Technologies - Module 1.pptx
 
DRRR Lesson 1 - Week 1-2.pdf
DRRR Lesson 1 - Week 1-2.pdfDRRR Lesson 1 - Week 1-2.pdf
DRRR Lesson 1 - Week 1-2.pdf
 
Empowerment Technologies - Module 4
Empowerment Technologies - Module 4Empowerment Technologies - Module 4
Empowerment Technologies - Module 4
 
Module 4 EMPOWERMENT TECHNOLOGY
Module 4 EMPOWERMENT TECHNOLOGYModule 4 EMPOWERMENT TECHNOLOGY
Module 4 EMPOWERMENT TECHNOLOGY
 
Empowerment Technology Lesson 3
Empowerment Technology Lesson 3Empowerment Technology Lesson 3
Empowerment Technology Lesson 3
 
Emp tech q2_m12_l1_multimedia_and_ict_fv
Emp tech q2_m12_l1_multimedia_and_ict_fvEmp tech q2_m12_l1_multimedia_and_ict_fv
Emp tech q2_m12_l1_multimedia_and_ict_fv
 
Lesson 3 advanced word processing skills
Lesson 3 advanced word processing skillsLesson 3 advanced word processing skills
Lesson 3 advanced word processing skills
 
Media and Information Literacy (MIL) - 3. Information Literacy - Information ...
Media and Information Literacy (MIL) - 3. Information Literacy - Information ...Media and Information Literacy (MIL) - 3. Information Literacy - Information ...
Media and Information Literacy (MIL) - 3. Information Literacy - Information ...
 
Multimedia and ICT.pptx
Multimedia and ICT.pptxMultimedia and ICT.pptx
Multimedia and ICT.pptx
 
Empowerment Technologies - Module 6
Empowerment Technologies - Module 6Empowerment Technologies - Module 6
Empowerment Technologies - Module 6
 
Hg g11 module 3 rtp
Hg g11 module 3 rtpHg g11 module 3 rtp
Hg g11 module 3 rtp
 
DRRR Module 1.pptx
DRRR Module 1.pptxDRRR Module 1.pptx
DRRR Module 1.pptx
 
Lesson 3 kinds of variables and thier uses
Lesson 3 kinds of variables and thier usesLesson 3 kinds of variables and thier uses
Lesson 3 kinds of variables and thier uses
 
EMPOWERMENT TECHNOLOGIES - LESSON 4
EMPOWERMENT TECHNOLOGIES - LESSON 4EMPOWERMENT TECHNOLOGIES - LESSON 4
EMPOWERMENT TECHNOLOGIES - LESSON 4
 
Media and Information Literacy
Media and Information LiteracyMedia and Information Literacy
Media and Information Literacy
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1S
 
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
 
9 Interactive Multimedia
9 Interactive Multimedia9 Interactive Multimedia
9 Interactive Multimedia
 
Empowerment Technologies - Module 5
Empowerment Technologies - Module 5Empowerment Technologies - Module 5
Empowerment Technologies - Module 5
 

Similar to EMPOWERMENT.pptx

REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxRheamaeLiwan
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxJakeTorio1
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxEhraicaSaquing
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxDineLiwan
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxLiberty Aquino
 
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONImpowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONCedricPada
 
Using the Internet Safely
Using the Internet SafelyUsing the Internet Safely
Using the Internet SafelyJoanne Hewitt
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internetdevashishicai
 
Itc lec 7 website, browsers , search engines, hands on internet surfing...Pre...
Itc lec 7 website, browsers , search engines, hands on internet surfing...Pre...Itc lec 7 website, browsers , search engines, hands on internet surfing...Pre...
Itc lec 7 website, browsers , search engines, hands on internet surfing...Pre...AnzaDar3
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptxSSPTRGCELL
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centurygracestearns
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centurygracestearns
 
Issues with computers
Issues with computersIssues with computers
Issues with computersayerssaa
 

Similar to EMPOWERMENT.pptx (20)

EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
Gwapo
GwapoGwapo
Gwapo
 
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONImpowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
 
Using the Internet Safely
Using the Internet SafelyUsing the Internet Safely
Using the Internet Safely
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 
Itc lec 7 website, browsers , search engines, hands on internet surfing...Pre...
Itc lec 7 website, browsers , search engines, hands on internet surfing...Pre...Itc lec 7 website, browsers , search engines, hands on internet surfing...Pre...
Itc lec 7 website, browsers , search engines, hands on internet surfing...Pre...
 
ICT
ICTICT
ICT
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_century
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_century
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
 
Social Media Awareness
Social Media AwarenessSocial Media Awareness
Social Media Awareness
 

Recently uploaded

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Recently uploaded (20)

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

EMPOWERMENT.pptx

  • 1. Empowerment Technologies Information and Communication Technologies
  • 2. It is also known as WWW or W3 introduce by Tim Berners-Lee. It consists of different pages that are formatted in a markup language called HTML (Hypertext Markup Language) and linked to each other that contain text, graphics, multimedia files, hyperlinks and etc. The first development of World Wide Web where web pages are static. It also known as flat or stationary page and it cannot be manipulated by users. It is a dynamic web page where user can interact with page like creating a user account, posting comments, uploading files and images, and others. Example: Blog sites, Facebook, Twitter, Instagram, YouTube.
  • 3. users can classify and arrange information by adding tag or label. Pound sign (#) is used in Facebook, Twitter, Instagram and other social networking sites. Example in tagging on Facebook: #TeamKawayan, #Single 2. Rich User Experience – user can have high interaction with the content of the page and can achieve level of expertise. user can put content on their own in web page like comment, evaluation, and etc. A site that offers services and brings individual and businesses into selling different goods and commodities such as shopping site like OLX, Lazada, Shopee, Zalora and others. users can subscribe to a software when they need it instead of purchasing them. sharing of diverse information through universal web access.
  • 4. A new paradigm in web interaction extension of led by World Wide Web Consortium (W3C) where it provides framework that allows data to be shared and reuse.
  • 5. it refers to fusing of technological advancement to work on a similar task. Example. Using smartphone as camera in taking pictures instead of DSLR camera. an application and website where user can communicate, create and share content, and participate in online communities.
  • 6. A website where people with the same come together to share information. Examples: Twitter, Instagram, Facebook
  • 7. A website where user can post stories and are ranked based on the popularity through voting. Examples: Digg, Reddit, Propeller, Slashdot, Fark
  • 8. A website that allows you to share and store internet bookmarks, articles, posts, blogs, images and others. Examples: Pinterest, StumbleUpon, Dribble A website that allows you to share and store multimedia files such as video, photos and music. Examples: Instagram, YouTube, Flickr
  • 9. a website that allows you to broadcast short message. Examples: Twitter, Tumblr, Meetme a discussion website that allows user to ask questions and comments on a journal posted by an individual or group. Examples: Wordpress, Blogger
  • 10. a technology used in cellular and other devices such netbook, laptop, tablet, smartphones and etc. A platform that assist people with disability. It will guide the individual like a blind person by using an audio recording.
  • 11.
  • 12. The importance of internet plays a crucial part in human development. Life becomes easy and comfortable because of this technology. Most of us are connected to the internet via laptop, mobile phone, tablet, personal computer and other electronic gadgets. Behind this technology there is a risk that everyone should be aware of. You could be at risk on scam, bullying, and illegal activities if you will not take precautions in using internet. We need to keep ourselves safe and secure whenever we use the internet. That is why it is very important to know and learn the ways on how to be safe and secured online.
  • 13. Do not share your password with anyone. Add friends you know in real life. Do not visit untrusted websites. Add password to your WIFI at home to make it private. Install and update antivirus in your computer. Do not give your personal information to anyone Think before you click. Never post about your future vacation.
  • 14. It happens when someone intentionally abused, harass, and mistreated by other person using electronic communication. It is a crime of stealing personal information for the purpose of assuming that person’s name or identity to make any form of transactions. A criminal practice where electronic communication is used to stalk or harass individual or group. The act of sending sexually explicit text messages, images, and videos.
  • 15. also known as Malicious Software. Virus – a malicious program that replicate itself by copying itself to another program. Trojan Horse – a malicious program that disguised as legitimate program that user will accept and use but take control of your computer. Worm – malicious program that copy’s itself and spreads to other computers. Spyware – A malicious program that gathers information from victim’s computer and send it back to the hacker. Adware – An unwanted advertisement that will pop-up several times on victim’s computer then behave abnormally and tedious to close them. Keylogger – A program that runs in the background and steals user credentials and confidential information and send back to hack by recording every keystroke that a user makes on their computer or device. Botnet – A collection of infected internet–connected devices such as PC and mobile phone that are controlled by a common type of malware. Rootkit – A software tools used by hackers to gain control over a computer on a network without being exposed. Ransomware – A ransom virus that block the user from accessing the programs or files and demands to pay the ransom through online method for the removal of the virus.
  • 16. Also known as junk email or unwanted email send by advertiser or bot. It can be used to send malware. A cyberattack method using deceptive emails and websites to acquiring sensitive personal information. A crime in which computer is used as object and tool in committing a crime such hacking, phishing, spamming, child pornography, libel, hate crimes, identity thief and others. A law that deals with all forms of cybercrime.
  • 17. It is a word that came from the two words “net” and “etiquette”. It is an etiquette applied online that shows proper manner and behavior. If you are a member of an online society through social media you are called netizen. And in interacting with other netizen online, we need to maintain good behavior which is acceptable to others in online community.
  • 18. 1. Remember the human. 2. Adhere to the same standards of behavior online that you follow in real life. 3. Know where you are in cyberspace. 4. Respect other people's time and bandwidth. 5. Make yourself look good online. 6. Share expert knowledge. 7. Help keep flame wars under control. 8. Respect other people's privacy. 9. Don't abuse your power. 10. Be forgiving of other people's mistakes.
  • 19. Contextualized Online Search and Research Skills
  • 20. is a research method in collecting and gathering information via internet by using search engine such as google. is a program that allows users to search for content on internet.
  • 21. Examples of Search Engine Google Aol Search Wow Baidu Web Crawler Yahoo! Search MyWebSearch Wolframalpha Bing Info Dogpile DuckDuckGo Ask Infospace Contenko Internet Archive
  • 22. Getting the correct and reliable information is our goal in internet research. We may rely on the capability of search engine but sometimes it may not give us the correct information because of the keywords we entered into a search engine. There are techniques in searching information that can be applied in search engine in order to get a better result. Some search engines allow combination of words and logic connectors of AND, OR, and NOT.
  • 23. Tips for Effective Internet Research by George Mathews  Know what kind of research you want to do.  Make a list of keywords you will use in your search.  Enclose keywords in quotation marks.  Use the minus sign (-).  Try specialized search engines.  Skim through search results web pages.  Bookmark  Review your bookmarks.
  • 24. Online Research Skills by Hannah Trierweiler Hudson  Check Your Sources  Ask Good Questions  Go Beyond the Surface  Be Patient  Respect Ownership  Use Your Networks
  • 25. Copyright Issues There are millions of information that we can get from the internet. Some of this information are free but others are not. They are protected by a copyright law. What is Copyright? Copyright is a protection given to the owner of the rights in an original work such as books, musical works, films, paintings, and other works, and computer programs. This original work is called intellectual property which is protected under Republic Act 8293 known as the “Intellectual Property Code of the Philippines”.
  • 26. Copyright Infringement This happens when the copyrighted work is use by other person without permission of the author or copyright holder. Any person who is infringing the right protected work would be liable under the law. An example of this is the case of M.Y. Intercontinental Trading Corporation (MITC), Tedwin T. Uy, Allianz Marketing and Publishing Corp. (Allianz), and Fujian New Technology Color Making and Printing Company, LTD (Fujian) against St. Mary’s Publishing Corporation (SMPC). Manila regional trial court ordered Fujian and its partners to pay P24.7 million for the damages and cost of litigation for copyright infringement to SMPC. Fujian and its three local partners was guilty of printing, copying, reproducing, importing, distributing and selling of original and revised textbooks that they have illegally sold to Department of Education in Zamboanga, Municipality of Cabuyao in Laguna and Municipality of Matnog in Sorsogon without the approval of SMPC, the copyright owner of the textbooks.
  • 27. Fair Use Research is important to the students and other people. Most of them rely on the information that they can get online. Although this information is protected by a copyright law but we can still use this information without permission in a limited way under certain condition and purpose. Fair use is the use of copyrighted material for comment, teaching, criticism, news reporting, research, scholarship, and other similar purpose is not an infringement of copyright. Example of this is when you post a quote from a person in your Facebook wall. Include the name of person who owns the quote in your post. Another example is when you copy image from internet, give credit to the creator of image. The copied image should be use for educational purpose not for commercial use. In fair use, 5% of the content of reference can only be copied. If 20% or less of reference copied, there must be a secondary use agreement and fee. And if 20% or more of reference copied, it requires purchasing of creative work.
  • 28. Guidelines for Fair Use  Majority of the contents created must be yours.  Give credit to the owner.  Don’t make profit of the copyrighted work.
  • 29. Developing ICT content for specific purposes Productivity Tools It refers to the software that people use to create and produce documents, presentations, databases, charts, and graphs. Productivity tools helps you create professional quality documents, presentation, graphics, and more.
  • 30. Why should you learn productivity tools? While there are a wide range of benefits of using productivity tools, the best reason is that it just makes essential, everyday we use computer to do different task for more efficient. Common productivity tools Microsoft word Microsoft excel Microsoft PowerPoint LibreOffice
  • 31. Tools/Techniques Use Case 1. Mail Merge and label generation Mass email or printed letters 2. Custom animation and timing Enhance viewer experience 3. Hyperlinking in presentations Optimizes use of related content and references. Applies to Word/Write document too. 4. Integrating images and external materials in word processor Enriches textual content. Also useful in presentation slides and sometimes in spreadsheets. 5. Embedded files and data Seamlessly integrates related files 6. Advanced and complex formulasand computations Simplifies and automates common tasks.
  • 32. Mail Merge It is a Word’s way of generating mass mailings. It involves combining a list of names and addresses to individually address to each person / receiver on the list. You can use Mail Merge to create envelopes or address labels, as well as form letters. Mail Merged involved the following documents; Main document – this document contains text and graphics. Example body of the letter. Mailing list – this is your data source that is used to populate information in the letter. It contains names and address of the recipients. Merged document - this document the combination of the main document
  • 33. Opening Microsoft Word Program. (Click Start button, type Word and click OK. On the Mailings tab, click Start Mail Merge, and then select Letters. This will allow you to sent letters to a group of people and personalize, the result of the letter that each person receives.
  • 34. Custom Animation Animation is a simulation of movement created by displaying a series of pictures, or frames. Animation on computers is one of the chief ingredients of multimedia presentations. There are many software applications that enable you to create animations that you can display on a computer monitor. One of this application software are presentation software that you can use to create a slide show for your presentation. Some of the popular software that are available online for free or for purchase are WPS Office, LibreOffice, and MS-PowerPoint.
  • 35. Steps in applying animation effect to an object: On a slide in Normal view, select the object you want to animate. Select Slide Show – click Animations tab, in the Animation group, select your desired effect or click dropdown button to choose more effects. To preview the animation, click the Preview button to play.
  • 36. Add a motion path animation effect You can apply motion path animation effects to an object to move in a sequence that tells an effective story. Add a motion path to an object Select the object that you want to animate. On the Animation tab, click Add Animation. Scroll down Motion Paths and select one. - If you want to create a customize path, Select Custom Path option, and draw path that you want the object to move.
  • 37. Editing motion paths to do things like to change the direction of the motion path, edit the individual points of the motion path, or to lock ( make it so others can’t change your animation ) or unlock the animation, Effect Options. to preview the motion path, click the object on the slides, and click Animation and select Preview. Remove an animation effect from an object On the slide in a Normal view, select the object from which to remove the effect. On the Animation tab, in the Animation group, click None to remove the effect.
  • 38. Hyperlink A hyperlink or simply a link, is a reference data that the reader can directly follow either by clicking or tapping. Hyperlinks are found in nearly all Web pages, allowing users to click their way from one page to another. In text hyperlinks are often color blue and underlined. When you move the cursor over a hyperlink, whether it is text, button or an image, the arrow cursor should be change to a small hand pointing to the link. Hyperlinks have to basic parts: The Address – can be webpage, email address, or other location they are linking. The Display – can be picture or shape. Example: https://www.microsoft.com - address microsoft - display text https://www.microsoft.com - address at the same time display text
  • 39. Select Existing File or Web page, and choose the: Text to display: type the text that you want to appear as hyperlink. ScreenTip: Type the text that you want to appear when the user hovers over the hyperlink (optional). Current Folder, Browsed Pages, or Recent Files: Select where you want to link to. Address: if you haven’t already selected a location above, insert the URL for the website you want to link to.
  • 40. Link a slide in the same presentation Opening PowerPoint program. (click Start button, type PowerPoint and press Enter) Select the text, shape, or picture that you want to use as a hyperlink. Select Insert tab > Links group, click Link button and select an option: Place in This Document: Link to a specific slide in your presentation. Create New Document: Link from your presentation to another presentation. E-mail Address: Link a displayed email address to open up a user's email program.
  • 41. Change the color of a hyperlink You can also change the color of a hyperlink. If you want to change the display text of a link to blue or any other color. Select the hyperlink you want to re-color. On the Home tab of the ribbon, select down arrow next to the Font Color button to open the menu of colors. Select the appropriate color that you want for the hyperlink.
  • 42. Integrating Images In Microsoft word processing you can do a lot of things to make your documents look good and presentable. One of its function is to integrate image. Word processing refers to an application program for manipulating text-based documents; the electronic equivalent of paper, pen, typewriter, eraser, and most likely, dictionary and thesaurus. Word processors run the scope from simple through complex, but all ease the tasks associated with editing documents (deleting, inserting, rewording, and so on).
  • 43. Electronic Spreadsheet According to emerald.com electronic spreadsheet is probably the most useful general-purpose software for the microcomputer user. Almost all spreadsheets are now packaged in combination with other applications, such as database system and graphic capabilities. Electronic spreadsheet refers to a collection of text and numbers laid out in a
  • 44. Electronic Spreadsheet According to emerald.com electronic spreadsheet is probably the most useful general-purpose software for the microcomputer user. Almost all spreadsheets are now packaged in combination with other applications, such as database system and graphic capabilities. Electronic spreadsheet refers to a collection of text and numbers laid out in a rectangular grid. It is an application program commonly used for budgeting, inventory management, decision making, forecasting and other finance-related tasks. It replaces the traditional financial modeling tools, the accountant’s columnar pad, pencil and calculator. It a spreadsheet program, data and formulas used to calculate those data are entered into ledge-like forms (Spreadsheets or Worksheets) for analysis, tracking, planning, or “what-if” evaluations of the impact of real or proposed changes on an economic strategy. A great free alternative spreadsheet program is LibreOffice Calc, and OpenOffice spreadsheet program.
  • 45. Arithmetic operations Formula – is an equation that performs operation on worksheet data. A formula in Microsoft Excel always begins with an equal sign (=). ARITHMETIC OPERATORS /SYMBOLS OPERATION EXAMPLE + (Plus Sign) Addition =A1+A2 - (Minus Sign) Subtraction =A1-A2 * (Asterisk) Multiplication =A1*A2 / (Forward Slash) Division =A1/A2 ^ (Exponentiation) Raises a no. to a power =3^2 - (Negation) Negative -11 % (Percent Sign) Percentage =90%