SlideShare a Scribd company logo
1 of 118
Download to read offline
IMPOWERMENT
TECHNOLOGY
ICT
• It is the umbrella that includes any communication device or application,
encompassing, radio, television, computer, etc.
• Main method of communication getting information and education attaining
services and expressing social advocacies and awereness.
USEFUL AT:
• HOME
• TRANSPORTATION
• SCHOOL
• MALL
• BUSINESS
WORLD WIDE WEB(WWW)
• Though internet
• Belong to internet technology
• WEBSITE
• TWITTER
• CELLPHONE
• MEDIA
1 STAGE(WEB 1.0)
• Develop by web master.
• Were very few web content creators and many of them were called “READ ONLY
WEB”.
• There no user interaction
• Web pages were STATIC.
• The feedback mechanism was thru private email.
• No direct comment available.
• No social media.
Web
master
Static
web
users
2ND STAGE(WEB 2.0)
• DYNAMIC
• The term WEB 2.0 was used around 2004.
• Internet technology become more and more interactive(used of social media
begins).
• The internet become more available to everyone.
• The user can now interact, contribute, and create their own, internet space and
content, sharing video, picture, and movies.
•
3RD STAGE(WEB 3.0)
• It is discovered by TIM-BERNER’S-LEE(father of the WWW) as the “READ-WRITE-
EXECUTE-WEB”.
• It is reffered to as the SEMANTIC WEB.
TECHNOLOGY CONVERGENCE
• Bringing together
FACEBOOK
• Popular free social networking site create profile, upload, photos, videos, create, and
join groups, react to friends.
TWITTER
• 300 million users in 2016
• Allows users to microblogor broadcast short message”tweets”.
INTRAGAM
• A social networking app that enables the users to share mobile photo and video
either publicly or privately.
SNAPCHAT
• Designed for the mobile networking applications
• Also designed for photo sharing, chat, and messaging services
• Images and video share in this app last only for a short time and they are done.
ASSISTIVE MEDIA
• It is not a nonprofit organization founded in 1996 in Ann Arbor, Michigan USA
• It was the first internet based reading service for persons with visual and reading
impairments.
DANGER IN ONLINE
• EMAIL SPAM
• EMAIL SPOOFING
• PHISHING
• PHARMING
• SPY WARE
• COMPUTER WORM
• TROJAN HORSE
• COMPUTER VIRUS
• HACKER
EMAIL SPAM
• Know as the JUNK EMAIL, usually unsolicited commercial email sent from one
source with identical message to send to multiple recipient.
• Spammer is the term used to refer to a person who creates electronic spam.
EMAIL SPOOFING
• A deceitful email practice in which the sender address is changed that is would
appear to have come from a different sources usually someone you know.
• It is usually used by spammers to hide the origin of the spam.
• Technique of EMAIL SPAMMING.
PHISHING
• A deceitful practice of trying to get the confidential information such as passwords,
users name, and credit card details by making it appear as if it corner from a trust
worthy sources.
PHARMING
• A dangerous hacker attack on a website which directs all traffic to that website to
another fictitious website.
SPY WARE
• Physical spy ware
• It is a computer program that is installed covertly on a personal computer to collect
information or even take control over the computer without the knowledge of the
users.
COMPUTER WORM
• Is a dangerous computer program that replicates itself through a networking.
• Some worm’s delete files, other disrupt the networking function and still , others
send junk mail from infected computer.
TROJAN HORSE
• A malicious software fronting to perform a good tasks but covertly perform
undesirable function with the intention of entering the computer without user’s
consent.
• It can erase data, can allow access of the victim’s computer, can corrupt files, and
can be used in phishing for bank account’s.
COMPUTER VIRUS
• A program that duplicates itself and then infects the computer.
• It spreads like areal biological virus wherein it attaches itself to a lost program and
infect other computers if it is received by a computer through the internet.
• Virus can also be transferred by the use of removable storage.
HACKER
• A person who is able to enter and control other people’s computer without
authorization.
• Be able to enter another’s computer, usually vandalizes the victims website, steals
personal information
SETTINGS THAT HELPS TO PROTECT COMPUTER
• FIREWALL
• AUTOMATIC UPDATES
• VIRUS PROTECTION
FIREWALL
Help’s in protecting you’re computer
from unauthorized entries, viruses, or
worms from the internet or network.
AUTOMATIC UPDATES
Another features of windows which when
turned on will, automatically download
updates from Microsoft windows
website.
VIRUSPROTECTION
Is usually about the current anti-virus
software installed in you’re computer.
Anti-virus software is meant to locate,
find and remove virus threats that are
already in you’re computer.
UNLOCKING
OF
DIFFICULTIES
• CONTEXTUALIZE
• RESEARCH
• STRATEGY
• COMPILATION
• CITATION
CONTEXTUALIZE
• Is to place something such as words or activity in a context.
RESEARCH
• The collecting of information about a particular subject.
STRATEGY
Art of devising, or employing plans or stratagies towards a goal.
A careful plan or method.
COMPILATION
• The act or process of compiling
CITATION
• The act of quoting, especially the citing of a previously settled case at low.
CONTEXTUAL SEARCH
• An attempt to be more precise in providing the list documents account to the words
used by the user to search the internet
• A good contextual search engine would request for more information to narrow
down the result of the search.
1. Identify or choose a topic.
2. Topic or task definition.
3. Identify methods of search.
4. Identify resources of you’re research.
5. Make you’re research strategies.
6. Compiling the research result.
7. Evaluate the results of you’re research.
8. Create a list of you’re references for citation.
SKILL/RESEARCH
SKILLS
CRITICAL THINKING
• It is the ability to digest, reflect, and conclude from the information searched.
• ANALYTICAL THINGKING
• The ability to work, verbalize, conceptualize, and gather data attuned to the contex
of the subject.
• People with this ability are able to define and identify the latitude of the problem
and present all possible solutions.
ORGANIZING DATA MINING
• It is the ability to organize and catalagoe all collected materials efficiently despite
data size.
• RESEARCH PRESENTATION
• It is the ability to present ideas and draw conclusions from the research.
• Be able to explain in writing the purpose steps goals and objective of the research.
CREATIVITY AND DEVELOPED IMAGINATION
• It is the ability to look for the alternative solutions to the problems needed to solve
in the research.
• Thinking beyond the usual approaches to the research objectives.
•COMPUTER LITERACY
• Knowledge of the various computer application and tools.
• Skills in the use of software to write, design and present.
STEP IN
CONTEXTUALIZE
ENGINE RESEARCH
1. Open the Google Site.
2. On the upper right side of the window, click the Google Apps Icon and search G.
3. On the lower right part of the window, click setting and the Google Settings pop-
up list will appear.
4. Click advanced search and the advanced search window will appear.
5. Type and Click.
IDENTIFYING GOOD
SOURCE FROM
SATIRICAL SOURCE
• Satirical sites are website that report untrue or false stories means to amuse or
entertain.
• Take their cue from TV shows that report exaggerated news.
• Started as spoofs of real public figures.
HOW TO DETECT
SATIRICAL NEWS
1. It is too good to be true, then it must be so.
2. If the news did not emanate from reliable news site.
3. If they are from know satirical sites.
LIST OF TOP SOURCES OF SATIRICAL NEWS
1. Adobo Chronicles(adobochronicles.com)
2. So What’s New?
3. Eritas Time
4. The Professional Heckler
AMERICAN SATIRICAL SITES IN THE US.
1. The Onion(theonion.com)
2. Click Hole(clickhole,com)
3. Christ Wire Global Media(christwire.com)
MAIL MERGE AND LABEL GENERATION
• Is used to automatically add mailing address or personalized information.
MAILING START
GROUP COMMAND
MAIL MERGE• Merge data into a publication which will be printed and mailed.
• Shows step by step mail merge wizard.
• EMAIL MERGE
• Merges data into a publication that will be sent as email.
SELECT RECIPIENTS• Chooses the list of people you intend to send the letter to.
• You can type your own list, use you’re outlook contacts or connect to a data page.
• EDIT RECIPIENT LIST
• Makes changes to the list of recipient and decide which of them should receive
you’re letter.
WRITE AND INSERT
GROUP COMMANDS
INSERT MERGE MAIL
• Adds a field from you’re recipient list to the publication.
• ADDRESS BLOCK
• Adds an address to you’re letter.
• GREETING LINE
• Adds a greeting line to you’re letter.
PICTURE
• Adds a picture field from you’re recipient list to the publication.
•INSERT PERSONALIZED HYPER LINK
• Inserts hyperlinked that are customized for each recipient.
• FORMAT
• Changes the format for the content
STEP 1:CREATING A RECIPIENT LIST
1. Click the Mailing tab, go to start group and click select Recipient.
2. On the list of option, select Type New List.
3. On the New Address List dialog box, click New Entry, and type the recipient
information.
4. Click OK.
STEP 2:PREPARE YOU’RE PUBLICATION
1. Insert any additional text that you want to appear in every version of you’re mail
merge publication, such as greetings.
STEP 3:CREATE MERGED PUBLICATION
1. PRINT
A. Click Merge to a printer.
B. In the print space, select the options you want and click OK.
2. Merge to New Publication
A. Click Merge to New Publication.
B. In the New Publication, click save this publication in the Mail Merge task.
C. Type the name of you’re New Publication and Save,
3.Add to Existing Publication
A. Click Add to Existing Publication.
• B. On the Publication dialog box, locate the publication you want to add
and Click Open.
C .Click save this Publication in the Mail Merge.
GENERATING LABELS
• Labels are used for envelopes that you intend to send out to persons usually
containing the names, address, or telephone numbers.
STEPS IN
GENERATING
LABELS
1. Start a new documents in MS WORD.
2. Go to Mailings tab, in the Create word, Click labels and the envelope and labels
dialog box will appear.
3. In the Address Box, type the text you want to be placed on the label.
4. Click the Insert Address icon if you have an address stored in the electronics
address book.
5. To change the Font or Paragraph formatting, select the text, right click and select
the option from the drop-down menu.
6. Click options button and the label options dialog box will appear.
7. Select the settings like the type of printer, the supplier that produced you’re label
sheets and others.
8. After you make the settings, click OK.
9. Under print, select full page of the same label or single label. Then in the row
and columns boxes enter the numbers that match the numbers of raws and
columns on the label sheet for the label that you want to print.
10. Click Print
MS EXCEL
• Is used to compute costs incurred in the certain of projects, or create tables for
finding the researches you are doing.
PARTS OF FORMULA
• FUNCTIONS
• REFERENCES
• CONSTANT
• OPERATION
EXCEL FUNCTIONS
=SUM-calculate the sum of a range of cells.
=AVERAGE-the arithmetic mean of a range of cells/values.
=MAX-gives the maximum value in a range.
=MIN-gives the minimum value in a range.
=COUNT-counts the number of cells in a range.
=IF-shows a series calculation using the same formula but a different value for
• EXAMPLE
=If(c5>=50 ”VG Sales” , if (c5>45 ”G Sales”, “B Sales”))
SECOND SEMESTER
SOURCES OF PHOTOS
AND GRAPHICS
• There are many sources of photos and graphics. They can come direct from you’re
camera , old friends, free from internet or purchased from the internet or store etc.
1.PERSONAL AND PROFESSIONAL PHOTOS
• Are photos taken by the amateur or professional photographers using a digital
camera. These images are downloaded and are stored in the computer. They are
source of image for any project that you may embark. They are original and
definitely something one would like work on.
2.SCANNED IMAGES
• Are those that you transfer from printed photos and graphics using scanning
devices which you can transfer to you’re computer for further improvement and
modification. These are mostly old picture photographed before the digital age.
3.STOCK PHOTO LIBRARY
• Are several photographs and created images that are available for sale. They come
in CD or DVD format and many of these images are royalty free, which means that
they can be used without additional fees.
4.ONLINE STOCK PHOTOS
• Are found in the World Wide Web. The WWW is now dominant source of photos
and graphics around the globe because of the widely available choices and
reasonable.
• Other sites even offer copyright free photos and other media. One advantages of
this set up is that you do not have to go to place where most of these photos were
taken. Another is that before you purchase or get a picture, you can view it and if
you decide to buy, simply download it to you’re computer.
ONLINE DIGITAL FILE
• A computer will have a certain method of coding information for storage in the hard
drive or any form of computer storage. The ways of encoding and storing this
information to storage, is called FILE FORMAT. Digital file format are categorized as
either proprietary or open.
PROPRIETARY FORMATS
• Are found owned and controlled by individuals or corporations and the file format
specification are not available to the public. They are usually covered by copy right
and the owner has exclusive control of the present and future technology
development of this format. An example a proprietary format is the one who used in
the storage for Microsoft word, Excel and Power Piont.
OPEN FORMATS
• Are means and ways for storing digital information that are free, can be used by the
public and are not embarrassed by copyrights or patents. These formats are called
FREE FILE FORMATS are usually sustained and maintained by a group of
individuals or organization.
• Example of this format are used in the storage for open offices and other free or
open software.
FILE FORMAT
• Uses suffixes that are added to the end of a Filename, called FILENAME
EXTENSIONS. The file extension is a means of identifying the format of the file, with
with a period before it after the filename.
• The File extensions has usually two or more character, although historically there
were only three, but modern operating systems are not constrained anymore by
that number of character, more are now allowed.
DIGITAL FILE FORMAT
ARE CLASSIFIED INTO
THREE:
1.UNCOMPRESSEDOR RAW FORMAT
• Is usually used for storing original file format, it is a flexible form but needs bigger
memory to store.
•2.LOSSLESS FILE FORMAT
• Is a file formats that was compressed to replicate the original but at a reduced file
size. This type is ideal for storing, important files(images, audio or video.
IMAGE FILE FORMAT
• Are standard means of organizing and storing digital images.
• May store data in uncompressed, compressed, vector formats.
• Are composed of digital data in one of these formats that can be rasterized for use
on a computer display or printer.
• RASTER IMAGE FORMAT
• Images faithfully display the color information of an image making them a great
choice to display detailed image.
WHAT ARE THEY:
• JPEG/JPG
• GIF
• PNG
• RMP
• TIFF
• PCX
JOINT PHOTOGRAPHICS GROUP (JPEG)
• An extremely common format, and is typically use for sharing photographs.
• Image can contain more than 16 million colors.
•GRAPHICS INTERFACE FORMAT(GIF)
• One of the most common image format on the web.
• Supported for animation has made it incredibly popular
BITMAP (BMP)
• One of the simplest file format in raster graphics.
•TAGGED IMAGE FILE FORMAT(TIFF)
• Commonly used file format in the fields of printing, graphic design, and popular
photography.
PORTABLE NETWORK GRAPHICS(PNG)
• Most use lossless image format on the internet.
•PICTURE EXCHANGE(PCX)
• Was created in 1985 to serve as the native file format of the PC Paint Brush
Software.
• Extended to support true color images.
VECTOR IMAGES AND
VECTOR GRAPHICS
VECTOR IMAGES
• Are lossless files created using mathematical geometry equations to represent
image in digital computer graphics.
•VECTOR GRAPHICS
• It has the advantages of retaining its quality at any desired images, size unliked
raster image that appear pixilated when displayed in expnded images size.
• Is the preffered format for those who desire quality prints and displays images.
FILENAME EXTEANSION:
• .ai
• .drw
• .dxf
• .ps
• .svg
ADOBE ILLUSTRATOR(.AI)
• Created using paths and lines connected by points instead of bitmap.
• Object, color, text.
•DRAWING EXCHANGE FORMAT(.dxf)
• Drawing format developed and introduced by auto-desk the makes of auto-CAD.
Similar to drawing file but its universal so that auto-CAD can be opened using other
program.
DRAWING FILE(.DRW)
• Generic drawing created and stored in a vector format that uses lines or path to
represent image.
•SCALABLE VECTOR/GRAPHICS(.svg)
• Most common vector format on the internet.
• Developed by the WWW to display vector graphics
• Open format and can be opened by adobe, corel, and open graphics programs.
BASIC PRINCIPLE OF
GRAPHICS AND
LAYOUT
LAYOUT
• Is the process of planning and arranging graphics.
• A good layout should have a balance make up and alignment of elements.
•SYMMETRICAL
• There are equal weight of element
•ASSYMMETRICAL
• There are an artistic and different intensity on one side of the page
TEXT
• Should be legible appropriate font page.
•IMAGE
• Should be proportionate with sharp color and high resolution
•PROXIMITY AND HARMONY
• Should be close together and not scattered and arrange apart.
CONSISTENCY
• Should be uniformity of theme on each page.
•COLOR AND SHAPE
Create and interest by providing variety in design like the use of color contrast and
shape.
EMPHASIS
Should be one point of interest in a page.
Should have a different size, colors, shape, or background.
PRINCIPLE AND BASIC
TECHNIQUE OF IMAGES
MANIPULATION
BACKGROUND COLOR
• You can change the background if it does not match the image or the totally of the
presentation.
• You can also add effects to the background.
•MULTIPLE IMAGE
• To make a point or use to highlight you’re message.
•SHADOW
• Using shadow effect will make the image realistic.
PROPORTION
• When combining images, resize the image to make it proportionate and realistic.
•BLENDING COLOR
• You can us color blending to match the background with the other elements in the
page.
•TEXTURE
• Allows you to blend different images, textures add to the depth of you’re art.
Blending will allow smooth transition of the image to another.
EMPHASIS
• There should be focal point to a page, that will attract viewers. The element you
want to emphasize should be sharp, big and most vibrant in you’re design.
COMBINING TEXT,
GRAPHICS AND
IMAGES
• Combining text, graphics, and image in you’re presentation, in graphics or web
pages will make you’re message clearer.
TRANSPARENT SHAPES
• Add simple shapes with a slight transparency behind you’re text to clearly see the
text you want to emphasize.
•TEXT AND BACKGROUND
• Text and background should ne aligned to have an organized look. You can align
text with shapes or geometric figures in the images.
FONTS AND SHAPE
• Fonts and shape should complement with each other. You can use rounded shape
with rounded fonts and sharp shapes with rounded fonts.
•CLEAR AND CLEAND BACKGROUND
• Use a clean and clear background for the message to be readable. Background
should npt wash out you’re message.
BASIC MANIPULATION
USING OFFLINE OR
OPEN SOURCE
SOFTWARE
• Photo editing and designing tools allow to make manipulate or edit images, apply
effects, filters, add frames, crop, add text, change background color, make photo
collage and photo album that you would like to do in an image.
VARIOUS OFFLINE OR
OPEN-SOURCE FOR
IMAGE EDITING
1. PICASA
• It is a Google’s free photo manager to edit and organize you’re photos.
•2.PAINT.NET
• it is a window’s-based alternative manager to edit and organize you’re photos.
•3.GOOGLE SKETCH UP
• It is a free, 3d modeling program with tools that allow you to create 3D models of
houses, home reservation wood working project.
4.AUTODESKPIXL
• A free photo editing tool with more than 600 effects.
•5.ADOBE PHOTOSHOP
• A tool to create, modifying, combine and optimize digital image and photo.
•6.IMAGE MANIPULATION PROGRAM(GIMP/ GNU)
• Is a free, open-source, image/ graphics editing program used for image retouching
and editing, free-form drawing/painting and other specialized tasks.
INSTALLING GIMP
1. Go to WWW.gmp.com
2. Then click download
3. Select download GIMP derictly
4. Run the GIMP Installer
5. Click Install
6. Wait for it to finish the installation then click finish
PRESENTATION
OR
VISUALIZATION
PRESENTATION
• Is a graphics program that allows you to create slide shows presenting a topic,
lecture, demonstrator, to enlighten, educate, communicate, or persuade the
audience.
• Allows you to organize, summarize and format you’re materials illustrator you’re
presentation with image or clip art, animation, graphics, and other multi media
components.
• Allows transition, animation, and sounds that will captivate the audience and keep
them interested.
EXAMPLE OF
PRESENTATION
TOOLS
1. ZOHOSHOW
• It is online presentation that features master slides, template, customization the
ability to insert videos/ images, transition animations, images editing, shape effects,
and easy flowchart building .
• Useful particularly in business man.
2. LINKED IN SLIDE SHARE
• Web 2.0 based sliding hosting service. Users can upload files privately and publicy in
the ff formats. Power point, Pdf, Keynote or open Documents Presentation.
4. GOOGLE SLIDES
• Create a new presentation and edit, collaborate with others present wherever you
are free.
5.MS POWER POINT
• Slide show presentation program currently developed by Microsoft.
6.PREZI
• Cloude-base presentation software based on a software as service model. The
products employs a zooming user interface(ZUI) which allows users to zoom in and
out of their presentation media.
CREATING NEW PREZI ACCOUNT
1. Go to PREZI.COM
2. Click get started on the upper right corner,
3. Sing for a public account.
4. Fill in the boxes with the specified information.
5. After providing information, click create you’re free public accounts.
Empowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny Roces

More Related Content

What's hot

Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technologypizonaim
 
Melanie g done 6565
Melanie g done 6565Melanie g done 6565
Melanie g done 6565pizonaim
 
Empowerment technology by: Irene Petere
Empowerment technology by: Irene PetereEmpowerment technology by: Irene Petere
Empowerment technology by: Irene PetereJuliezaMaeGermo
 
Ashpiaaaaa
AshpiaaaaaAshpiaaaaa
Ashpiaaaaapizonaim
 
empowerment technologies
empowerment technologies empowerment technologies
empowerment technologies RicciGozon
 
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY   diana cerojales and jude bagayEMPOWERMENT TECHNOLOGY   diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagayniniogolo
 
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYkillersmile1
 
EMPOWERMENT TECHNOLOGY by jessabel & mary grace
EMPOWERMENT TECHNOLOGY by jessabel & mary graceEMPOWERMENT TECHNOLOGY by jessabel & mary grace
EMPOWERMENT TECHNOLOGY by jessabel & mary graceobus25
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Empowerment Technology by:jewelyn,liezel,mary joy,bryll
Empowerment Technology by:jewelyn,liezel,mary joy,bryllEmpowerment Technology by:jewelyn,liezel,mary joy,bryll
Empowerment Technology by:jewelyn,liezel,mary joy,brylljoanagolo4ever
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)John Bosco Javellana, MAEd.
 
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology  by: Geraldine Salve Pepe and Lailanie PepeEpowerment Technology  by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepesalvepepe
 
Empowerment Technologies Lecture 12 (Philippines SHS)
Empowerment Technologies Lecture 12 (Philippines SHS)Empowerment Technologies Lecture 12 (Philippines SHS)
Empowerment Technologies Lecture 12 (Philippines SHS)John Bosco Javellana, MAEd.
 
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...joanagolo4ever
 
Divine Gono and Peter Paul Gato
Divine Gono and Peter Paul GatoDivine Gono and Peter Paul Gato
Divine Gono and Peter Paul GatoVineGono
 
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONImpowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONCedricPada
 
Information and Communication Technology (ICT) - Empowerment Technologies
Information and Communication Technology (ICT) - Empowerment TechnologiesInformation and Communication Technology (ICT) - Empowerment Technologies
Information and Communication Technology (ICT) - Empowerment TechnologiesMark Jhon Oxillo
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologiesDeped
 

What's hot (20)

Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
Melanie g done 6565
Melanie g done 6565Melanie g done 6565
Melanie g done 6565
 
Empowerment technology by: Irene Petere
Empowerment technology by: Irene PetereEmpowerment technology by: Irene Petere
Empowerment technology by: Irene Petere
 
Ashpiaaaaa
AshpiaaaaaAshpiaaaaa
Ashpiaaaaa
 
empowerment technologies
empowerment technologies empowerment technologies
empowerment technologies
 
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY   diana cerojales and jude bagayEMPOWERMENT TECHNOLOGY   diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagay
 
ICT
ICTICT
ICT
 
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
 
EMPOWERMENT TECHNOLOGY by jessabel & mary grace
EMPOWERMENT TECHNOLOGY by jessabel & mary graceEMPOWERMENT TECHNOLOGY by jessabel & mary grace
EMPOWERMENT TECHNOLOGY by jessabel & mary grace
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Empowerment Technology by:jewelyn,liezel,mary joy,bryll
Empowerment Technology by:jewelyn,liezel,mary joy,bryllEmpowerment Technology by:jewelyn,liezel,mary joy,bryll
Empowerment Technology by:jewelyn,liezel,mary joy,bryll
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology  by: Geraldine Salve Pepe and Lailanie PepeEpowerment Technology  by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
 
Gwapo
GwapoGwapo
Gwapo
 
Empowerment Technologies Lecture 12 (Philippines SHS)
Empowerment Technologies Lecture 12 (Philippines SHS)Empowerment Technologies Lecture 12 (Philippines SHS)
Empowerment Technologies Lecture 12 (Philippines SHS)
 
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
 
Divine Gono and Peter Paul Gato
Divine Gono and Peter Paul GatoDivine Gono and Peter Paul Gato
Divine Gono and Peter Paul Gato
 
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONImpowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
 
Information and Communication Technology (ICT) - Empowerment Technologies
Information and Communication Technology (ICT) - Empowerment TechnologiesInformation and Communication Technology (ICT) - Empowerment Technologies
Information and Communication Technology (ICT) - Empowerment Technologies
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologies
 

Similar to Empowerment Technology By: Zyrhell Rafer and Bretny Roces

Empowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judithEmpowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judithmhedilyn8556
 
EMPOWERMENT TECHNOLOGIES
EMPOWERMENT TECHNOLOGIESEMPOWERMENT TECHNOLOGIES
EMPOWERMENT TECHNOLOGIESagielyn
 
Empowerment technologies byShyna Gane Daleon and Galasao
Empowerment technologies byShyna Gane  Daleon and Galasao Empowerment technologies byShyna Gane  Daleon and Galasao
Empowerment technologies byShyna Gane Daleon and Galasao janelle17
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyesandregoron
 
empowerment technologies by: aiza martin and patricia obor
empowerment technologies  by: aiza martin and patricia oborempowerment technologies  by: aiza martin and patricia obor
empowerment technologies by: aiza martin and patricia obormartinaiza
 
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO LEIBE MAE GERONA APRIL ROSE GARON...
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO  LEIBE MAE GERONA APRIL ROSE GARON...EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO  LEIBE MAE GERONA APRIL ROSE GARON...
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO LEIBE MAE GERONA APRIL ROSE GARON...LanieGailGato
 
Empowerment technology
Empowerment technology Empowerment technology
Empowerment technology jonaspalen1
 
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumela
Empowerment Technology  by: Jhames Andre M. Goron and Elijohn G. GumelaEmpowerment Technology  by: Jhames Andre M. Goron and Elijohn G. Gumela
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumelaandregoron
 
Lea pagoyo final(1)
Lea pagoyo final(1)Lea pagoyo final(1)
Lea pagoyo final(1)jonaspalen1
 
empowerment technology by: kier and joveryn
empowerment technology by: kier and joverynempowerment technology by: kier and joveryn
empowerment technology by: kier and joverynkiersamaco
 
Activity wendy fritz jamaica 123
Activity wendy fritz jamaica 123Activity wendy fritz jamaica 123
Activity wendy fritz jamaica 123Ybonnica22
 
Presentation social networking service
Presentation social networking servicePresentation social networking service
Presentation social networking serviceManish S Thingalaya
 
October 19_Crisis Communication Plan
October 19_Crisis Communication PlanOctober 19_Crisis Communication Plan
October 19_Crisis Communication PlanOhio University
 
Online Trends August 2009
Online Trends August 2009Online Trends August 2009
Online Trends August 2009Bjorn Elmberg
 
2. ETECH Module 2 - Internet Safety and Security.pptx
2. ETECH Module 2 - Internet Safety and Security.pptx2. ETECH Module 2 - Internet Safety and Security.pptx
2. ETECH Module 2 - Internet Safety and Security.pptxKarmel7
 

Similar to Empowerment Technology By: Zyrhell Rafer and Bretny Roces (20)

Empowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judithEmpowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judith
 
EMPOWERMENT TECHNOLOGIES
EMPOWERMENT TECHNOLOGIESEMPOWERMENT TECHNOLOGIES
EMPOWERMENT TECHNOLOGIES
 
Empowerment technologies byShyna Gane Daleon and Galasao
Empowerment technologies byShyna Gane  Daleon and Galasao Empowerment technologies byShyna Gane  Daleon and Galasao
Empowerment technologies byShyna Gane Daleon and Galasao
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
 
empowerment technologies by: aiza martin and patricia obor
empowerment technologies  by: aiza martin and patricia oborempowerment technologies  by: aiza martin and patricia obor
empowerment technologies by: aiza martin and patricia obor
 
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO LEIBE MAE GERONA APRIL ROSE GARON...
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO  LEIBE MAE GERONA APRIL ROSE GARON...EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO  LEIBE MAE GERONA APRIL ROSE GARON...
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO LEIBE MAE GERONA APRIL ROSE GARON...
 
Empowerment technology
Empowerment technology Empowerment technology
Empowerment technology
 
Christine
ChristineChristine
Christine
 
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumela
Empowerment Technology  by: Jhames Andre M. Goron and Elijohn G. GumelaEmpowerment Technology  by: Jhames Andre M. Goron and Elijohn G. Gumela
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumela
 
Lea pagoyo final(1)
Lea pagoyo final(1)Lea pagoyo final(1)
Lea pagoyo final(1)
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
empowerment technology by: kier and joveryn
empowerment technology by: kier and joverynempowerment technology by: kier and joveryn
empowerment technology by: kier and joveryn
 
Activity wendy fritz jamaica 123
Activity wendy fritz jamaica 123Activity wendy fritz jamaica 123
Activity wendy fritz jamaica 123
 
Presentation social networking service
Presentation social networking servicePresentation social networking service
Presentation social networking service
 
Shane
ShaneShane
Shane
 
Abegail
AbegailAbegail
Abegail
 
Jovanie garin ict
Jovanie garin ictJovanie garin ict
Jovanie garin ict
 
October 19_Crisis Communication Plan
October 19_Crisis Communication PlanOctober 19_Crisis Communication Plan
October 19_Crisis Communication Plan
 
Online Trends August 2009
Online Trends August 2009Online Trends August 2009
Online Trends August 2009
 
2. ETECH Module 2 - Internet Safety and Security.pptx
2. ETECH Module 2 - Internet Safety and Security.pptx2. ETECH Module 2 - Internet Safety and Security.pptx
2. ETECH Module 2 - Internet Safety and Security.pptx
 

Recently uploaded

Employablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptxEmployablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptxryandux83rd
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
How to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineHow to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineCeline George
 
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...HetalPathak10
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptxmary850239
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...Nguyen Thanh Tu Collection
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17Celine George
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
Objectives n learning outcoms - MD 20240404.pptx
Objectives n learning outcoms - MD 20240404.pptxObjectives n learning outcoms - MD 20240404.pptx
Objectives n learning outcoms - MD 20240404.pptxMadhavi Dharankar
 

Recently uploaded (20)

Employablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptxEmployablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptx
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
How to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineHow to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command Line
 
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx
 
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
Objectives n learning outcoms - MD 20240404.pptx
Objectives n learning outcoms - MD 20240404.pptxObjectives n learning outcoms - MD 20240404.pptx
Objectives n learning outcoms - MD 20240404.pptx
 

Empowerment Technology By: Zyrhell Rafer and Bretny Roces

  • 2. ICT • It is the umbrella that includes any communication device or application, encompassing, radio, television, computer, etc. • Main method of communication getting information and education attaining services and expressing social advocacies and awereness.
  • 3. USEFUL AT: • HOME • TRANSPORTATION • SCHOOL • MALL • BUSINESS
  • 4. WORLD WIDE WEB(WWW) • Though internet • Belong to internet technology
  • 5. • WEBSITE • TWITTER • CELLPHONE • MEDIA
  • 6. 1 STAGE(WEB 1.0) • Develop by web master. • Were very few web content creators and many of them were called “READ ONLY WEB”. • There no user interaction • Web pages were STATIC. • The feedback mechanism was thru private email. • No direct comment available. • No social media.
  • 8. 2ND STAGE(WEB 2.0) • DYNAMIC • The term WEB 2.0 was used around 2004. • Internet technology become more and more interactive(used of social media begins). • The internet become more available to everyone. • The user can now interact, contribute, and create their own, internet space and content, sharing video, picture, and movies. •
  • 9. 3RD STAGE(WEB 3.0) • It is discovered by TIM-BERNER’S-LEE(father of the WWW) as the “READ-WRITE- EXECUTE-WEB”. • It is reffered to as the SEMANTIC WEB.
  • 11. FACEBOOK • Popular free social networking site create profile, upload, photos, videos, create, and join groups, react to friends.
  • 12. TWITTER • 300 million users in 2016 • Allows users to microblogor broadcast short message”tweets”.
  • 13. INTRAGAM • A social networking app that enables the users to share mobile photo and video either publicly or privately.
  • 14. SNAPCHAT • Designed for the mobile networking applications • Also designed for photo sharing, chat, and messaging services • Images and video share in this app last only for a short time and they are done.
  • 15. ASSISTIVE MEDIA • It is not a nonprofit organization founded in 1996 in Ann Arbor, Michigan USA • It was the first internet based reading service for persons with visual and reading impairments.
  • 16. DANGER IN ONLINE • EMAIL SPAM • EMAIL SPOOFING • PHISHING • PHARMING • SPY WARE • COMPUTER WORM • TROJAN HORSE • COMPUTER VIRUS • HACKER
  • 17. EMAIL SPAM • Know as the JUNK EMAIL, usually unsolicited commercial email sent from one source with identical message to send to multiple recipient. • Spammer is the term used to refer to a person who creates electronic spam.
  • 18. EMAIL SPOOFING • A deceitful email practice in which the sender address is changed that is would appear to have come from a different sources usually someone you know. • It is usually used by spammers to hide the origin of the spam. • Technique of EMAIL SPAMMING.
  • 19. PHISHING • A deceitful practice of trying to get the confidential information such as passwords, users name, and credit card details by making it appear as if it corner from a trust worthy sources.
  • 20. PHARMING • A dangerous hacker attack on a website which directs all traffic to that website to another fictitious website.
  • 21. SPY WARE • Physical spy ware • It is a computer program that is installed covertly on a personal computer to collect information or even take control over the computer without the knowledge of the users.
  • 22. COMPUTER WORM • Is a dangerous computer program that replicates itself through a networking. • Some worm’s delete files, other disrupt the networking function and still , others send junk mail from infected computer.
  • 23. TROJAN HORSE • A malicious software fronting to perform a good tasks but covertly perform undesirable function with the intention of entering the computer without user’s consent. • It can erase data, can allow access of the victim’s computer, can corrupt files, and can be used in phishing for bank account’s.
  • 24. COMPUTER VIRUS • A program that duplicates itself and then infects the computer. • It spreads like areal biological virus wherein it attaches itself to a lost program and infect other computers if it is received by a computer through the internet. • Virus can also be transferred by the use of removable storage.
  • 25. HACKER • A person who is able to enter and control other people’s computer without authorization. • Be able to enter another’s computer, usually vandalizes the victims website, steals personal information
  • 26. SETTINGS THAT HELPS TO PROTECT COMPUTER • FIREWALL • AUTOMATIC UPDATES • VIRUS PROTECTION
  • 27. FIREWALL Help’s in protecting you’re computer from unauthorized entries, viruses, or worms from the internet or network. AUTOMATIC UPDATES Another features of windows which when turned on will, automatically download updates from Microsoft windows website. VIRUSPROTECTION Is usually about the current anti-virus software installed in you’re computer. Anti-virus software is meant to locate, find and remove virus threats that are already in you’re computer.
  • 29. • CONTEXTUALIZE • RESEARCH • STRATEGY • COMPILATION • CITATION
  • 30. CONTEXTUALIZE • Is to place something such as words or activity in a context. RESEARCH • The collecting of information about a particular subject. STRATEGY Art of devising, or employing plans or stratagies towards a goal. A careful plan or method.
  • 31. COMPILATION • The act or process of compiling CITATION • The act of quoting, especially the citing of a previously settled case at low.
  • 32. CONTEXTUAL SEARCH • An attempt to be more precise in providing the list documents account to the words used by the user to search the internet • A good contextual search engine would request for more information to narrow down the result of the search.
  • 33. 1. Identify or choose a topic. 2. Topic or task definition. 3. Identify methods of search. 4. Identify resources of you’re research. 5. Make you’re research strategies. 6. Compiling the research result. 7. Evaluate the results of you’re research. 8. Create a list of you’re references for citation.
  • 35. CRITICAL THINKING • It is the ability to digest, reflect, and conclude from the information searched. • ANALYTICAL THINGKING • The ability to work, verbalize, conceptualize, and gather data attuned to the contex of the subject. • People with this ability are able to define and identify the latitude of the problem and present all possible solutions.
  • 36. ORGANIZING DATA MINING • It is the ability to organize and catalagoe all collected materials efficiently despite data size. • RESEARCH PRESENTATION • It is the ability to present ideas and draw conclusions from the research. • Be able to explain in writing the purpose steps goals and objective of the research.
  • 37. CREATIVITY AND DEVELOPED IMAGINATION • It is the ability to look for the alternative solutions to the problems needed to solve in the research. • Thinking beyond the usual approaches to the research objectives. •COMPUTER LITERACY • Knowledge of the various computer application and tools. • Skills in the use of software to write, design and present.
  • 39. 1. Open the Google Site. 2. On the upper right side of the window, click the Google Apps Icon and search G. 3. On the lower right part of the window, click setting and the Google Settings pop- up list will appear. 4. Click advanced search and the advanced search window will appear. 5. Type and Click.
  • 41. • Satirical sites are website that report untrue or false stories means to amuse or entertain. • Take their cue from TV shows that report exaggerated news. • Started as spoofs of real public figures.
  • 43. 1. It is too good to be true, then it must be so. 2. If the news did not emanate from reliable news site. 3. If they are from know satirical sites.
  • 44. LIST OF TOP SOURCES OF SATIRICAL NEWS 1. Adobo Chronicles(adobochronicles.com) 2. So What’s New? 3. Eritas Time 4. The Professional Heckler
  • 45. AMERICAN SATIRICAL SITES IN THE US. 1. The Onion(theonion.com) 2. Click Hole(clickhole,com) 3. Christ Wire Global Media(christwire.com)
  • 46. MAIL MERGE AND LABEL GENERATION • Is used to automatically add mailing address or personalized information.
  • 48. MAIL MERGE• Merge data into a publication which will be printed and mailed. • Shows step by step mail merge wizard. • EMAIL MERGE • Merges data into a publication that will be sent as email.
  • 49. SELECT RECIPIENTS• Chooses the list of people you intend to send the letter to. • You can type your own list, use you’re outlook contacts or connect to a data page. • EDIT RECIPIENT LIST • Makes changes to the list of recipient and decide which of them should receive you’re letter.
  • 51. INSERT MERGE MAIL • Adds a field from you’re recipient list to the publication. • ADDRESS BLOCK • Adds an address to you’re letter. • GREETING LINE • Adds a greeting line to you’re letter.
  • 52. PICTURE • Adds a picture field from you’re recipient list to the publication. •INSERT PERSONALIZED HYPER LINK • Inserts hyperlinked that are customized for each recipient. • FORMAT • Changes the format for the content
  • 53. STEP 1:CREATING A RECIPIENT LIST 1. Click the Mailing tab, go to start group and click select Recipient. 2. On the list of option, select Type New List. 3. On the New Address List dialog box, click New Entry, and type the recipient information. 4. Click OK.
  • 54. STEP 2:PREPARE YOU’RE PUBLICATION 1. Insert any additional text that you want to appear in every version of you’re mail merge publication, such as greetings.
  • 55. STEP 3:CREATE MERGED PUBLICATION 1. PRINT A. Click Merge to a printer. B. In the print space, select the options you want and click OK. 2. Merge to New Publication A. Click Merge to New Publication. B. In the New Publication, click save this publication in the Mail Merge task. C. Type the name of you’re New Publication and Save, 3.Add to Existing Publication A. Click Add to Existing Publication.
  • 56. • B. On the Publication dialog box, locate the publication you want to add and Click Open. C .Click save this Publication in the Mail Merge.
  • 57. GENERATING LABELS • Labels are used for envelopes that you intend to send out to persons usually containing the names, address, or telephone numbers.
  • 59. 1. Start a new documents in MS WORD. 2. Go to Mailings tab, in the Create word, Click labels and the envelope and labels dialog box will appear. 3. In the Address Box, type the text you want to be placed on the label. 4. Click the Insert Address icon if you have an address stored in the electronics address book. 5. To change the Font or Paragraph formatting, select the text, right click and select the option from the drop-down menu. 6. Click options button and the label options dialog box will appear. 7. Select the settings like the type of printer, the supplier that produced you’re label sheets and others. 8. After you make the settings, click OK.
  • 60. 9. Under print, select full page of the same label or single label. Then in the row and columns boxes enter the numbers that match the numbers of raws and columns on the label sheet for the label that you want to print. 10. Click Print
  • 61. MS EXCEL • Is used to compute costs incurred in the certain of projects, or create tables for finding the researches you are doing.
  • 62. PARTS OF FORMULA • FUNCTIONS • REFERENCES • CONSTANT • OPERATION
  • 64. =SUM-calculate the sum of a range of cells. =AVERAGE-the arithmetic mean of a range of cells/values. =MAX-gives the maximum value in a range. =MIN-gives the minimum value in a range. =COUNT-counts the number of cells in a range. =IF-shows a series calculation using the same formula but a different value for
  • 65. • EXAMPLE =If(c5>=50 ”VG Sales” , if (c5>45 ”G Sales”, “B Sales”))
  • 68. • There are many sources of photos and graphics. They can come direct from you’re camera , old friends, free from internet or purchased from the internet or store etc.
  • 69. 1.PERSONAL AND PROFESSIONAL PHOTOS • Are photos taken by the amateur or professional photographers using a digital camera. These images are downloaded and are stored in the computer. They are source of image for any project that you may embark. They are original and definitely something one would like work on.
  • 70. 2.SCANNED IMAGES • Are those that you transfer from printed photos and graphics using scanning devices which you can transfer to you’re computer for further improvement and modification. These are mostly old picture photographed before the digital age.
  • 71. 3.STOCK PHOTO LIBRARY • Are several photographs and created images that are available for sale. They come in CD or DVD format and many of these images are royalty free, which means that they can be used without additional fees.
  • 72. 4.ONLINE STOCK PHOTOS • Are found in the World Wide Web. The WWW is now dominant source of photos and graphics around the globe because of the widely available choices and reasonable. • Other sites even offer copyright free photos and other media. One advantages of this set up is that you do not have to go to place where most of these photos were taken. Another is that before you purchase or get a picture, you can view it and if you decide to buy, simply download it to you’re computer.
  • 74. • A computer will have a certain method of coding information for storage in the hard drive or any form of computer storage. The ways of encoding and storing this information to storage, is called FILE FORMAT. Digital file format are categorized as either proprietary or open.
  • 75. PROPRIETARY FORMATS • Are found owned and controlled by individuals or corporations and the file format specification are not available to the public. They are usually covered by copy right and the owner has exclusive control of the present and future technology development of this format. An example a proprietary format is the one who used in the storage for Microsoft word, Excel and Power Piont.
  • 76. OPEN FORMATS • Are means and ways for storing digital information that are free, can be used by the public and are not embarrassed by copyrights or patents. These formats are called FREE FILE FORMATS are usually sustained and maintained by a group of individuals or organization. • Example of this format are used in the storage for open offices and other free or open software.
  • 77. FILE FORMAT • Uses suffixes that are added to the end of a Filename, called FILENAME EXTENSIONS. The file extension is a means of identifying the format of the file, with with a period before it after the filename. • The File extensions has usually two or more character, although historically there were only three, but modern operating systems are not constrained anymore by that number of character, more are now allowed.
  • 78. DIGITAL FILE FORMAT ARE CLASSIFIED INTO THREE:
  • 79. 1.UNCOMPRESSEDOR RAW FORMAT • Is usually used for storing original file format, it is a flexible form but needs bigger memory to store. •2.LOSSLESS FILE FORMAT • Is a file formats that was compressed to replicate the original but at a reduced file size. This type is ideal for storing, important files(images, audio or video.
  • 80. IMAGE FILE FORMAT • Are standard means of organizing and storing digital images. • May store data in uncompressed, compressed, vector formats. • Are composed of digital data in one of these formats that can be rasterized for use on a computer display or printer. • RASTER IMAGE FORMAT • Images faithfully display the color information of an image making them a great choice to display detailed image.
  • 81. WHAT ARE THEY: • JPEG/JPG • GIF • PNG • RMP • TIFF • PCX
  • 82. JOINT PHOTOGRAPHICS GROUP (JPEG) • An extremely common format, and is typically use for sharing photographs. • Image can contain more than 16 million colors. •GRAPHICS INTERFACE FORMAT(GIF) • One of the most common image format on the web. • Supported for animation has made it incredibly popular
  • 83. BITMAP (BMP) • One of the simplest file format in raster graphics. •TAGGED IMAGE FILE FORMAT(TIFF) • Commonly used file format in the fields of printing, graphic design, and popular photography.
  • 84. PORTABLE NETWORK GRAPHICS(PNG) • Most use lossless image format on the internet. •PICTURE EXCHANGE(PCX) • Was created in 1985 to serve as the native file format of the PC Paint Brush Software. • Extended to support true color images.
  • 86. VECTOR IMAGES • Are lossless files created using mathematical geometry equations to represent image in digital computer graphics. •VECTOR GRAPHICS • It has the advantages of retaining its quality at any desired images, size unliked raster image that appear pixilated when displayed in expnded images size. • Is the preffered format for those who desire quality prints and displays images.
  • 87. FILENAME EXTEANSION: • .ai • .drw • .dxf • .ps • .svg
  • 88. ADOBE ILLUSTRATOR(.AI) • Created using paths and lines connected by points instead of bitmap. • Object, color, text. •DRAWING EXCHANGE FORMAT(.dxf) • Drawing format developed and introduced by auto-desk the makes of auto-CAD. Similar to drawing file but its universal so that auto-CAD can be opened using other program.
  • 89. DRAWING FILE(.DRW) • Generic drawing created and stored in a vector format that uses lines or path to represent image. •SCALABLE VECTOR/GRAPHICS(.svg) • Most common vector format on the internet. • Developed by the WWW to display vector graphics • Open format and can be opened by adobe, corel, and open graphics programs.
  • 91. LAYOUT • Is the process of planning and arranging graphics. • A good layout should have a balance make up and alignment of elements. •SYMMETRICAL • There are equal weight of element •ASSYMMETRICAL • There are an artistic and different intensity on one side of the page
  • 92. TEXT • Should be legible appropriate font page. •IMAGE • Should be proportionate with sharp color and high resolution •PROXIMITY AND HARMONY • Should be close together and not scattered and arrange apart.
  • 93. CONSISTENCY • Should be uniformity of theme on each page. •COLOR AND SHAPE Create and interest by providing variety in design like the use of color contrast and shape. EMPHASIS Should be one point of interest in a page. Should have a different size, colors, shape, or background.
  • 94. PRINCIPLE AND BASIC TECHNIQUE OF IMAGES MANIPULATION
  • 95. BACKGROUND COLOR • You can change the background if it does not match the image or the totally of the presentation. • You can also add effects to the background. •MULTIPLE IMAGE • To make a point or use to highlight you’re message. •SHADOW • Using shadow effect will make the image realistic.
  • 96. PROPORTION • When combining images, resize the image to make it proportionate and realistic. •BLENDING COLOR • You can us color blending to match the background with the other elements in the page. •TEXTURE • Allows you to blend different images, textures add to the depth of you’re art. Blending will allow smooth transition of the image to another.
  • 97. EMPHASIS • There should be focal point to a page, that will attract viewers. The element you want to emphasize should be sharp, big and most vibrant in you’re design.
  • 99. • Combining text, graphics, and image in you’re presentation, in graphics or web pages will make you’re message clearer.
  • 100. TRANSPARENT SHAPES • Add simple shapes with a slight transparency behind you’re text to clearly see the text you want to emphasize. •TEXT AND BACKGROUND • Text and background should ne aligned to have an organized look. You can align text with shapes or geometric figures in the images.
  • 101. FONTS AND SHAPE • Fonts and shape should complement with each other. You can use rounded shape with rounded fonts and sharp shapes with rounded fonts. •CLEAR AND CLEAND BACKGROUND • Use a clean and clear background for the message to be readable. Background should npt wash out you’re message.
  • 102. BASIC MANIPULATION USING OFFLINE OR OPEN SOURCE SOFTWARE
  • 103. • Photo editing and designing tools allow to make manipulate or edit images, apply effects, filters, add frames, crop, add text, change background color, make photo collage and photo album that you would like to do in an image.
  • 104. VARIOUS OFFLINE OR OPEN-SOURCE FOR IMAGE EDITING
  • 105. 1. PICASA • It is a Google’s free photo manager to edit and organize you’re photos. •2.PAINT.NET • it is a window’s-based alternative manager to edit and organize you’re photos. •3.GOOGLE SKETCH UP • It is a free, 3d modeling program with tools that allow you to create 3D models of houses, home reservation wood working project.
  • 106. 4.AUTODESKPIXL • A free photo editing tool with more than 600 effects. •5.ADOBE PHOTOSHOP • A tool to create, modifying, combine and optimize digital image and photo. •6.IMAGE MANIPULATION PROGRAM(GIMP/ GNU) • Is a free, open-source, image/ graphics editing program used for image retouching and editing, free-form drawing/painting and other specialized tasks.
  • 107. INSTALLING GIMP 1. Go to WWW.gmp.com 2. Then click download 3. Select download GIMP derictly 4. Run the GIMP Installer 5. Click Install 6. Wait for it to finish the installation then click finish
  • 109. PRESENTATION • Is a graphics program that allows you to create slide shows presenting a topic, lecture, demonstrator, to enlighten, educate, communicate, or persuade the audience. • Allows you to organize, summarize and format you’re materials illustrator you’re presentation with image or clip art, animation, graphics, and other multi media components. • Allows transition, animation, and sounds that will captivate the audience and keep them interested.
  • 111. 1. ZOHOSHOW • It is online presentation that features master slides, template, customization the ability to insert videos/ images, transition animations, images editing, shape effects, and easy flowchart building . • Useful particularly in business man.
  • 112. 2. LINKED IN SLIDE SHARE • Web 2.0 based sliding hosting service. Users can upload files privately and publicy in the ff formats. Power point, Pdf, Keynote or open Documents Presentation.
  • 113. 4. GOOGLE SLIDES • Create a new presentation and edit, collaborate with others present wherever you are free.
  • 114. 5.MS POWER POINT • Slide show presentation program currently developed by Microsoft.
  • 115. 6.PREZI • Cloude-base presentation software based on a software as service model. The products employs a zooming user interface(ZUI) which allows users to zoom in and out of their presentation media.
  • 116. CREATING NEW PREZI ACCOUNT 1. Go to PREZI.COM 2. Click get started on the upper right corner, 3. Sing for a public account. 4. Fill in the boxes with the specified information. 5. After providing information, click create you’re free public accounts.