SlideShare a Scribd company logo
1 of 68
EMPOWERMEN
T
TECHNOLOGY
Introduction
Every human has an ability to do things that
some people cannot do. People from this
generation is very advance thinker and very active
in technologies, they study about technologies
just to invent gadgets that they think that it can
give more learning in people who is very busy
about their business and to their careers. Today's
generation its so many Branded phones, tablets,
laptops, Ipods etc. many people are very ignorant
about those things but they didn't think first if
that technology can harm them, that can give
them a big problem. Humans are very active in
technologies specially Japan, they are very unique
in making gadgets. They are very skilled people.
ICT
(INFORMATION COMMUNICATION TECHNOLOGY)
uIt is an umbrella that includes any
communication devices or application,
encompassing:radio, television, computer,
etc.
uIs the main method of communication,
getting information and education,
attaining services and expressing social
advocacies and awareness.
USED IN ICT
p ICT in commerce
p ICT in Engineering and Architecture
p ICT in Education
p ICT in Health and Services
p ICT in Sports and Recreation
p ICT in Travels and Booking
WWW (WORLD WIDE WEB)
Web 1.0
l In this stage of internet technology,
there were very few content creators and
many of them were so called "read only
web".
l There is no user interaction.
l Web pages were STATIC.
l The feedback mechanism was thru private
email.
Web 2.0
l Term web 2.0 was used around 2004.
l Internet technology became more and more
interactive, (used for social media begins).
l The internet become available to anyone and
everyone.
l The user can now interact, contribute and
create their own internet space and content.
Web 3.0
l It is discovered Tim-Berners-Lee (Father
of the Worl-Wide-Web) as the "read-
write-executive" web.
l Semantic web or data drive web
content.
l Not make the web 2.0 obsolete.
TECHNOLOGY CONVERGENCE
It is an evolution of technological
development that merge into a new
system bringing together different types of
application and media.
Example:
Smartphone
Social Media
-is a collection of internet-based
communication tools and computer
assisted channel dedicated to allow
users to interact, communicate and
share information in a virtual
community.
Facebook
-is a popular free social networking
site with more than a billion users
around the globe that allows it's users
to create profiles, upload photos and
videos, create and join group.
Twitter
-with more than 300 million users in
2016.
-allows users to microblog or
broadcast short messages called
"tweets".
Instagram
-a social networking app that
enables the user to share mobile
photo and video either publicly or
privately.
Snapchat
-designed for the mobile networking
application.
-designed photo, sharing, chat, and
messaging services.
-images stared in chat and
messaging services and short time and
they are gone.
Assistive Media
It is a nonprofit organization
founded in 1996 in Arbor Michigan
USA.
It was the first internet based
reading services for person with
visual and reading impairments.
How Safe You Are Online?
What are the possible danger that makes
you unsafe online?
Email Spam
-knows as junk email, usually unsolicited
commercial email sent from one source with
identical message to send to multiple recipients.
Email Spoofing
- a deceitful changed email practice in
which the sender adress is changed, so that it
would appear have some from a different
sources usually someone you know.
Phishing
- a deceitful practice of trying to get
confidental information such as password and
usernames credit cord details by making it
appear as if it comes from a trustworthy source.
Pharming
- a dangerous hacker attack on a website wich
directs all traffic to that website to another
pictitious website.
Spyware
- is a computer program that is installed
covertly on a personal computer to collect
information or even take control over the
computer to collect without the knowledge of
the user.
Computer Worm
- is a dangerous computer program replicates
itself through a network.
Trojan Horse
- a malicious software fronting to perform a
good task, but covertly performs undesirable
function with the intention of entering the
computer without the user's consent.
Computer virus
- a program that duplicates itself and
then infects the computer.
Hacker
- a person who is able to enter the
control other people's computer without
authorization.
Possible Ways To Protect From
Dangers Online
1. Start with your password.
2. Skip the personal information.
3. Check your settings.
4. Disable location settings.
5. Share your vacation after your home.
6. Keep your password private.
7. Examine your photos.
8. Friend your friends only.
9. Log out of your accounts.
10. Use passcodes.
Security Center
• Is the place where you can set
additional protection from THREAT to
your computer, especially when
using the internet
Firewall
- helps in protecting your computer from
unauthorized entries, viruses, or worms from
the internet or network.
Automatic Updates
- another features of windows which when
turned on will automatically download updates
from microsoft windows website.
Virus Protection
- is meant to locate, find and remove
virus threats that are already in your
computer.
- is usually about the current anti virus
software installed in your computer.
- also prevents other malware from
gaining entry into your computer.
Unlocking Of Difficulties
Contextualize
* is to place (something such as a word or
activity) in a context.
Research
* the collecting of information about a
particular subject.
Strategy
* art of devising or employing plans or
strategies toward a goal.
Compilation
*the act or process of compiling.
Citation
*an act of qouting, especially
Contextualize Search
• Is an attempt to be more precise in
providing the list documents
according to the words used by the
user to search the internet.
• A good contextual search engine
would request for more information
to narrow down the results of the
search.
Steps to Make Contextualized
Online Search
1.Identify or choose a topic
2.Topic or task definition
3.Identify methods of search
4.Identify resources of your research
5.Make your research strategies
6.Compiling the research results
7.Evaluating the result of your research
8.Create a list of your references for citation
Research Skills
Critical Thinking
- is the ability to digest, reflect, and conclude
from the information searched.
Analytical Thinking
-the ability to look, verbalize, conceptualize
and gather data attuned to the context of the
subject.
Problem Solving Capability
-the ability to present solutions or solve
problems by presenting a decision based on the
given information.
Organized Data Mining
-the ability to organized and catalogue all
colleected materials efficiently despite data size.
Research Presentation
-be able to explain in writing the purpose,
steps, goal and objective of the search.
Mail Merge and Label
Generation
Mail Merge
*merges data into publication
which will be printed and mailed.
PARTS OF MAIL MERGE
u Recipient List
u Publication with Merge Fields
u Merge Publication
CREATING A RECIPIENT LIST
1.Click the mailings tool/tab, go to the
start group and click select recipients.
2. On the list of options, select type new
list.
3. On the new address list dialog box,
click new entry and type the recipients
information.
4.Click ok.
Steps in Making Contextualize
Search
1.Open the google site
2.On the upper right side of the
window.Click the google Apps icon and
click search G.
3.On the lower right part of the
window,click setting pop-up list will
appear.
4.Type the keywords that you would
uThese sites take ttheir cue
from TV shows that report
exaggerated news that are
untrue but intrigging and
funny.
uUntrue stories should not be
share to your friends,family
Identifying Good Source from
Satirical Source
How To Detect Satirical News
1.If it is good to be true,then it
is must be so.
2.If the news did not emanate
from reliable news sites.
3.If they are known from
satirical sites.
List of the Top Sourcesof
Satirical News
1.Adobe Chronicles
2.So,what's news!
3.Erita's time
4.The Professional Heckler
List of American Saterical
Sites in the U.S.
1.The Onion
2.Clickhole
3.Christwire Global Media
uMerges data into a publication w/c
will be printed and mailed.Shows
step by step mail merge wizard.
uMerges data into publication that
will be sent as e-mail.
u Choose the list of people you intend
to send the letter to.
uMakes changes to the list of
recipients and decide which of them
should recieve your letter.
FUNCTION
Mail Merge
E-mail Merge
Select Recipients
Edit Recipient List
NAME
Mailing Start Group Commands
Write and Insert Group Command
NAME
1. Insert Merge Field
2. Address Block
3. Greeting Line
4. Picture
5. Hyperlink
6. Format
FUNCTION
• Adds a field from your
recipient list to the
publication.
• Add an address to your
letter.
• Adds a greeting line to your
letter.
• Adds a picture field from
your recipients list to the
publication.
• Inserts hyperlink that are
costumized for each
1.Create your publication in Ms.
Word.
2.Insert any additional text that
you want to appear in every
version of your mail merge
publication such as greeting.
PREPARE YOUR PUBLICATION
CREATE MERGED PUBLICATION
1. Print
a. Click merge to a printer.
b. In the print space, select the option you
want and click ok.
2. Merge to New Publication
a. Click merge to new publication.
b. In the new publication in the Mail Merge
task panell.
c. Type the name of your new publication and
3. Add to Existing Publication
a. Click add to existing publication.
b. On the open publication dialog
box, locate the publication you want to
add and click OPEN.
c. Click save this publication in the
Mail Merge task pane.
GENERATING LABELS
Labels are used for envelopes
that you intend to send out to
person's usually containing the
name, address, or telephone.
STEPS IN GENERATING LABELS
1. Start a new document in Ms. Word.
2.Go to the mailings tab in the create
group, click labels and the envelope and
labels dialog box will appear.
3. In the address box, type the text you
want to be placed on the label.
4. Click the insert address stored in the
electronic address book.
5. Change the font and paragraph formatting,
select the text, right-click and select the
option from the drop-down menu.
6. Click options button and the label options
dialog box will appear.
7. Select the settings like the type of printer, the
supplier that produced your label sheets and
others.
8. After you make the settings, click ok.
9. Under print, select full page of the same label
or single label. Then in the row and column
boxes, enter the numbers of rows and
columns on the label sheet for the label that
MICROSOFT POWERPOINT
It is an application
intended for creating a
slide presentation.
How to Create Slide
Presentation?
1. Open the Ms. Powerpoint
applications.
2. Click new and select your preferred
design template.
3. Click insert tab menu and insert
text, word art or any object in the
slide.
4. Click home tab to insert new slide.
Ms. Excell (Work Book)
It is use to compute costs
incurred in the creation of projects
or create tables for finding the
researches then create reports for
business or research that you are
doing.
Parts of Formula
• Function
• References
• Constants
• Operators
EXCEL FUNCTIONS
SUM = calculate the sum of a range of a
cells.
AVERAGE = calculate the arithmetic mean
of a range of cells/values.
MAX = gives the maximum value in a
range.
SOURCES OF PHOTOS AND GRAPHICS
1. Personal and Professional Photos
- are photos taken by amateur or
professional photographers using a digital
camera.
2. Scanned Images
- are those that you transfer from pointed
photos and graphics using scanning devices.
3. Stock Photo Library
- are several photographs and created
images that are available for sale. They come in
CD or DVD format and many of these images are
royalty-free, which means that they can be used
without additional fees.
4. Online Stock Photos
-are found in the World Wide Web. The
WWW is the dominant source of photos and
graphics around the globe.
ONLINE DIGITAL FILE FORMATS
FOR IMAGES AND TEXT
A computer will have a certain
method of encoding information for
storage in the hard drive or any form
of computer storage in the hard drive
or any form of computer storage. The
ways of encoding and storing this
information to storage is scanned file
format.
2 Category of Digital File
Format
Proprietary Formats
- are owned and controlled by individuals or
cooperation and the file format specifications
are not available to the public.
Open Format
- are available to everyone. It is specifically
availed by public.
BASIC PRINCIPLES OF GRAPHICS
AND LAYOUT
Layout
*is the process of planning and
arranging graphics in a page.
Graphics
*is an image or visual representation.
Assymetrical
* not balance
Symmetrical
* equal weights or measurements and
balance.
Text
* legible, appropriate font face, left justified,
right justified, centered.
Image
*proportionate, and sharpen.
Proximity and Harmony
* should be close together.
Consistency
*uniformity of the theme.
Color and Shape
* create interest by providing variety in
the design.
Emphasis
* one point of interest in page.
PRINCIPLES AND BASIC
TECHNIQUES OF IMAGE
MANIPULATION
1. Background Color
- you can change the background if it does
not match the image or the totality of the
presentation.
2. Multiple Images
- you can combine images to make a point or
use a highlight your image.
3. Shadow
-using shadow effect can make the
image realistic.
4. Proportion
-when combining images, resize the
image to make it proportionate and
realistic.
5. Blending color
- you can use color to match the
background with the other elements in the
6. Texture
- allows you blend different image. Texture
add to the depth of your art. Blending with
allows smooth transition of one image to
another.
7. Emphasis
- there should be a focal point to a page that
will attract with the viewers. The element you
want to emphasize should be sharp, big and
most vibrant in your design.
COMBINING TEXT, GRAPHICS
AND IMAGES
Combining - will make your message
clearer.
Transparent Shapes
- add simple shapes with a slight
transparency behind your text.
Fonts and Shapes
- should complement with each other.
Text and Background
- should be aligned and organized to
have an organized look.
Clean and Clear Background
- background should not be washed out
your message and to be readable.
BASIC MANIPULATION USING
OFFLINE OR OPEN SOURCES
SOFTWARE
Photo editing and designing tools
allows you to make manipulate or edit
images, apply any effects and filters.
VARIOUS OFFLINE OR OPEN
SOURCE FOR IMAGE EDITING
1. Picasa
- limited tools and will edit and organized your
photo.
2. Paint.net
- window based alternative to the Ms. Paint
Editor.
3. Google Sketch Up
- 3D modeling program with tools to allow you
to create 3D models of houses and home
4. Autodesk Pixlr
- is similar to photoshop and has more than
600 effects.
5. Adobe Photoshop
- is a tool to create, modify and combine
image.
6. GIMP or GNU Image Manipulation
Program
- used for image retouching and editing, free
form drawing/ painting, and other specialized
task.
INSTALLING GIMP
1. Go to www.gimp.org.
2. Then click download.
3. Select download gimp directly.
4. Run the Gimp Installer.
5. Click Install.
6. Wait for it to finish the installation, then
click finish.
PARTS OF THE WINDOW
1. Toolbox
2. Tool option
3. Image manipulation
4. Layers dialog
5. Brushes/patterns/gradients
Parts of Image Window
• Tab or Image Menu
• Ruler Guide
• Scroll Bar
• Task Bar
• Workspace

More Related Content

What's hot

Empowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena MastalEmpowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena MastalPadsromel
 
Melanie g done 6565
Melanie g done 6565Melanie g done 6565
Melanie g done 6565pizonaim
 
Ashpiaaaaa
AshpiaaaaaAshpiaaaaa
Ashpiaaaaapizonaim
 
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY   diana cerojales and jude bagayEMPOWERMENT TECHNOLOGY   diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagayniniogolo
 
Empowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny RocesEmpowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny RocesPadsromel
 
1 empowerment technology_by_rey_anthon_&_elma_mea[1]
1 empowerment technology_by_rey_anthon_&_elma_mea[1]1 empowerment technology_by_rey_anthon_&_elma_mea[1]
1 empowerment technology_by_rey_anthon_&_elma_mea[1]niniogolo
 
Empowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and CatalinoEmpowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and CatalinoPadsromel
 
Empowerment technology by ybonne amor and jesha
Empowerment technology by ybonne amor and jeshaEmpowerment technology by ybonne amor and jesha
Empowerment technology by ybonne amor and jeshaYbonnica22
 
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYkillersmile1
 
Empowerment Technology By: JOAN GOZO AND KENNETH MACUTO
Empowerment Technology By: JOAN GOZO AND KENNETH MACUTOEmpowerment Technology By: JOAN GOZO AND KENNETH MACUTO
Empowerment Technology By: JOAN GOZO AND KENNETH MACUTOPadsromel
 
Empowerment Technology
Empowerment TechnologyEmpowerment Technology
Empowerment TechnologyLardizabal21
 
empowerment technology by: kier and joveryn
empowerment technology by: kier and joverynempowerment technology by: kier and joveryn
empowerment technology by: kier and joverynkiersamaco
 
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO LEIBE MAE GERONA APRIL ROSE GARON...
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO  LEIBE MAE GERONA APRIL ROSE GARON...EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO  LEIBE MAE GERONA APRIL ROSE GARON...
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO LEIBE MAE GERONA APRIL ROSE GARON...LanieGailGato
 
EMPOWERMENT TECHNOLOGIES
EMPOWERMENT TECHNOLOGIESEMPOWERMENT TECHNOLOGIES
EMPOWERMENT TECHNOLOGIESagielyn
 
Empowerment
EmpowermentEmpowerment
Empowermentrairuta
 
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...joanagolo4ever
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Jesus Rances
 

What's hot (20)

Empowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena MastalEmpowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena Mastal
 
ICT
ICTICT
ICT
 
Melanie g done 6565
Melanie g done 6565Melanie g done 6565
Melanie g done 6565
 
Ashpiaaaaa
AshpiaaaaaAshpiaaaaa
Ashpiaaaaa
 
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY   diana cerojales and jude bagayEMPOWERMENT TECHNOLOGY   diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagay
 
Empowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny RocesEmpowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny Roces
 
1 empowerment technology_by_rey_anthon_&_elma_mea[1]
1 empowerment technology_by_rey_anthon_&_elma_mea[1]1 empowerment technology_by_rey_anthon_&_elma_mea[1]
1 empowerment technology_by_rey_anthon_&_elma_mea[1]
 
Empowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and CatalinoEmpowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and Catalino
 
Empowerment technology by ybonne amor and jesha
Empowerment technology by ybonne amor and jeshaEmpowerment technology by ybonne amor and jesha
Empowerment technology by ybonne amor and jesha
 
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
 
Empowerment Technology By: JOAN GOZO AND KENNETH MACUTO
Empowerment Technology By: JOAN GOZO AND KENNETH MACUTOEmpowerment Technology By: JOAN GOZO AND KENNETH MACUTO
Empowerment Technology By: JOAN GOZO AND KENNETH MACUTO
 
Empowerment Technology
Empowerment TechnologyEmpowerment Technology
Empowerment Technology
 
empowerment technology by: kier and joveryn
empowerment technology by: kier and joverynempowerment technology by: kier and joveryn
empowerment technology by: kier and joveryn
 
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO LEIBE MAE GERONA APRIL ROSE GARON...
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO  LEIBE MAE GERONA APRIL ROSE GARON...EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO  LEIBE MAE GERONA APRIL ROSE GARON...
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO LEIBE MAE GERONA APRIL ROSE GARON...
 
EMPOWERMENT TECHNOLOGIES
EMPOWERMENT TECHNOLOGIESEMPOWERMENT TECHNOLOGIES
EMPOWERMENT TECHNOLOGIES
 
Larra belle ict
Larra belle ictLarra belle ict
Larra belle ict
 
Empowerment
EmpowermentEmpowerment
Empowerment
 
Christine
ChristineChristine
Christine
 
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3
 

Similar to Divine Gono and Peter Paul Gato

Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyesandregoron
 
Empowerment technology
Empowerment technology Empowerment technology
Empowerment technology jonaspalen1
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technologypizonaim
 
Empowerment technologies byShyna Gane Daleon and Galasao
Empowerment technologies byShyna Gane  Daleon and Galasao Empowerment technologies byShyna Gane  Daleon and Galasao
Empowerment technologies byShyna Gane Daleon and Galasao janelle17
 
Ict information communication technology
Ict  information communication technologyIct  information communication technology
Ict information communication technologyniniogolo
 
Migo my labs
Migo my labsMigo my labs
Migo my labsrairuta
 
empowerment technologies by: aiza martin and patricia obor
empowerment technologies  by: aiza martin and patricia oborempowerment technologies  by: aiza martin and patricia obor
empowerment technologies by: aiza martin and patricia obormartinaiza
 
Empowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judithEmpowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judithmhedilyn8556
 
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumela
Empowerment Technology  by: Jhames Andre M. Goron and Elijohn G. GumelaEmpowerment Technology  by: Jhames Andre M. Goron and Elijohn G. Gumela
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumelaandregoron
 
The-Current-State-of-ICT-Empowerment Technology.pptx
The-Current-State-of-ICT-Empowerment Technology.pptxThe-Current-State-of-ICT-Empowerment Technology.pptx
The-Current-State-of-ICT-Empowerment Technology.pptxMarieChileMutia
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxRheamaeLiwan
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxJakeTorio1
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxEhraicaSaquing
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxDineLiwan
 

Similar to Divine Gono and Peter Paul Gato (20)

Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
 
Empowerment technology
Empowerment technology Empowerment technology
Empowerment technology
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
Empowerment technologies byShyna Gane Daleon and Galasao
Empowerment technologies byShyna Gane  Daleon and Galasao Empowerment technologies byShyna Gane  Daleon and Galasao
Empowerment technologies byShyna Gane Daleon and Galasao
 
Ict information communication technology
Ict  information communication technologyIct  information communication technology
Ict information communication technology
 
Migo my labs
Migo my labsMigo my labs
Migo my labs
 
empowerment technologies by: aiza martin and patricia obor
empowerment technologies  by: aiza martin and patricia oborempowerment technologies  by: aiza martin and patricia obor
empowerment technologies by: aiza martin and patricia obor
 
Empowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judithEmpowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judith
 
Shane
ShaneShane
Shane
 
Jovanie garin ict
Jovanie garin ictJovanie garin ict
Jovanie garin ict
 
Abegail
AbegailAbegail
Abegail
 
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumela
Empowerment Technology  by: Jhames Andre M. Goron and Elijohn G. GumelaEmpowerment Technology  by: Jhames Andre M. Goron and Elijohn G. Gumela
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumela
 
The-Current-State-of-ICT-Empowerment Technology.pptx
The-Current-State-of-ICT-Empowerment Technology.pptxThe-Current-State-of-ICT-Empowerment Technology.pptx
The-Current-State-of-ICT-Empowerment Technology.pptx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 

Recently uploaded

Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 

Recently uploaded (20)

Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 

Divine Gono and Peter Paul Gato

  • 2. Introduction Every human has an ability to do things that some people cannot do. People from this generation is very advance thinker and very active in technologies, they study about technologies just to invent gadgets that they think that it can give more learning in people who is very busy about their business and to their careers. Today's generation its so many Branded phones, tablets, laptops, Ipods etc. many people are very ignorant about those things but they didn't think first if that technology can harm them, that can give them a big problem. Humans are very active in technologies specially Japan, they are very unique in making gadgets. They are very skilled people.
  • 3. ICT (INFORMATION COMMUNICATION TECHNOLOGY) uIt is an umbrella that includes any communication devices or application, encompassing:radio, television, computer, etc. uIs the main method of communication, getting information and education, attaining services and expressing social advocacies and awareness.
  • 4. USED IN ICT p ICT in commerce p ICT in Engineering and Architecture p ICT in Education p ICT in Health and Services p ICT in Sports and Recreation p ICT in Travels and Booking
  • 5. WWW (WORLD WIDE WEB) Web 1.0 l In this stage of internet technology, there were very few content creators and many of them were so called "read only web". l There is no user interaction. l Web pages were STATIC. l The feedback mechanism was thru private email.
  • 6. Web 2.0 l Term web 2.0 was used around 2004. l Internet technology became more and more interactive, (used for social media begins). l The internet become available to anyone and everyone. l The user can now interact, contribute and create their own internet space and content.
  • 7. Web 3.0 l It is discovered Tim-Berners-Lee (Father of the Worl-Wide-Web) as the "read- write-executive" web. l Semantic web or data drive web content. l Not make the web 2.0 obsolete.
  • 8. TECHNOLOGY CONVERGENCE It is an evolution of technological development that merge into a new system bringing together different types of application and media. Example: Smartphone
  • 9. Social Media -is a collection of internet-based communication tools and computer assisted channel dedicated to allow users to interact, communicate and share information in a virtual community.
  • 10. Facebook -is a popular free social networking site with more than a billion users around the globe that allows it's users to create profiles, upload photos and videos, create and join group.
  • 11. Twitter -with more than 300 million users in 2016. -allows users to microblog or broadcast short messages called "tweets".
  • 12. Instagram -a social networking app that enables the user to share mobile photo and video either publicly or privately.
  • 13. Snapchat -designed for the mobile networking application. -designed photo, sharing, chat, and messaging services. -images stared in chat and messaging services and short time and they are gone.
  • 14. Assistive Media It is a nonprofit organization founded in 1996 in Arbor Michigan USA. It was the first internet based reading services for person with visual and reading impairments.
  • 15. How Safe You Are Online? What are the possible danger that makes you unsafe online? Email Spam -knows as junk email, usually unsolicited commercial email sent from one source with identical message to send to multiple recipients.
  • 16. Email Spoofing - a deceitful changed email practice in which the sender adress is changed, so that it would appear have some from a different sources usually someone you know. Phishing - a deceitful practice of trying to get confidental information such as password and usernames credit cord details by making it appear as if it comes from a trustworthy source.
  • 17. Pharming - a dangerous hacker attack on a website wich directs all traffic to that website to another pictitious website. Spyware - is a computer program that is installed covertly on a personal computer to collect information or even take control over the computer to collect without the knowledge of the user.
  • 18. Computer Worm - is a dangerous computer program replicates itself through a network. Trojan Horse - a malicious software fronting to perform a good task, but covertly performs undesirable function with the intention of entering the computer without the user's consent.
  • 19. Computer virus - a program that duplicates itself and then infects the computer. Hacker - a person who is able to enter the control other people's computer without authorization.
  • 20. Possible Ways To Protect From Dangers Online 1. Start with your password. 2. Skip the personal information. 3. Check your settings. 4. Disable location settings. 5. Share your vacation after your home. 6. Keep your password private. 7. Examine your photos. 8. Friend your friends only. 9. Log out of your accounts. 10. Use passcodes.
  • 21. Security Center • Is the place where you can set additional protection from THREAT to your computer, especially when using the internet
  • 22. Firewall - helps in protecting your computer from unauthorized entries, viruses, or worms from the internet or network. Automatic Updates - another features of windows which when turned on will automatically download updates from microsoft windows website.
  • 23. Virus Protection - is meant to locate, find and remove virus threats that are already in your computer. - is usually about the current anti virus software installed in your computer. - also prevents other malware from gaining entry into your computer.
  • 24. Unlocking Of Difficulties Contextualize * is to place (something such as a word or activity) in a context. Research * the collecting of information about a particular subject.
  • 25. Strategy * art of devising or employing plans or strategies toward a goal. Compilation *the act or process of compiling. Citation *an act of qouting, especially
  • 26. Contextualize Search • Is an attempt to be more precise in providing the list documents according to the words used by the user to search the internet. • A good contextual search engine would request for more information to narrow down the results of the search.
  • 27. Steps to Make Contextualized Online Search 1.Identify or choose a topic 2.Topic or task definition 3.Identify methods of search 4.Identify resources of your research 5.Make your research strategies 6.Compiling the research results 7.Evaluating the result of your research 8.Create a list of your references for citation
  • 28. Research Skills Critical Thinking - is the ability to digest, reflect, and conclude from the information searched. Analytical Thinking -the ability to look, verbalize, conceptualize and gather data attuned to the context of the subject.
  • 29. Problem Solving Capability -the ability to present solutions or solve problems by presenting a decision based on the given information. Organized Data Mining -the ability to organized and catalogue all colleected materials efficiently despite data size. Research Presentation -be able to explain in writing the purpose, steps, goal and objective of the search.
  • 30. Mail Merge and Label Generation Mail Merge *merges data into publication which will be printed and mailed.
  • 31. PARTS OF MAIL MERGE u Recipient List u Publication with Merge Fields u Merge Publication
  • 32. CREATING A RECIPIENT LIST 1.Click the mailings tool/tab, go to the start group and click select recipients. 2. On the list of options, select type new list. 3. On the new address list dialog box, click new entry and type the recipients information. 4.Click ok.
  • 33. Steps in Making Contextualize Search 1.Open the google site 2.On the upper right side of the window.Click the google Apps icon and click search G. 3.On the lower right part of the window,click setting pop-up list will appear. 4.Type the keywords that you would
  • 34. uThese sites take ttheir cue from TV shows that report exaggerated news that are untrue but intrigging and funny. uUntrue stories should not be share to your friends,family Identifying Good Source from Satirical Source
  • 35. How To Detect Satirical News 1.If it is good to be true,then it is must be so. 2.If the news did not emanate from reliable news sites. 3.If they are known from satirical sites.
  • 36. List of the Top Sourcesof Satirical News 1.Adobe Chronicles 2.So,what's news! 3.Erita's time 4.The Professional Heckler
  • 37. List of American Saterical Sites in the U.S. 1.The Onion 2.Clickhole 3.Christwire Global Media
  • 38. uMerges data into a publication w/c will be printed and mailed.Shows step by step mail merge wizard. uMerges data into publication that will be sent as e-mail. u Choose the list of people you intend to send the letter to. uMakes changes to the list of recipients and decide which of them should recieve your letter. FUNCTION Mail Merge E-mail Merge Select Recipients Edit Recipient List NAME Mailing Start Group Commands
  • 39. Write and Insert Group Command NAME 1. Insert Merge Field 2. Address Block 3. Greeting Line 4. Picture 5. Hyperlink 6. Format FUNCTION • Adds a field from your recipient list to the publication. • Add an address to your letter. • Adds a greeting line to your letter. • Adds a picture field from your recipients list to the publication. • Inserts hyperlink that are costumized for each
  • 40. 1.Create your publication in Ms. Word. 2.Insert any additional text that you want to appear in every version of your mail merge publication such as greeting. PREPARE YOUR PUBLICATION
  • 41. CREATE MERGED PUBLICATION 1. Print a. Click merge to a printer. b. In the print space, select the option you want and click ok. 2. Merge to New Publication a. Click merge to new publication. b. In the new publication in the Mail Merge task panell. c. Type the name of your new publication and
  • 42. 3. Add to Existing Publication a. Click add to existing publication. b. On the open publication dialog box, locate the publication you want to add and click OPEN. c. Click save this publication in the Mail Merge task pane.
  • 43. GENERATING LABELS Labels are used for envelopes that you intend to send out to person's usually containing the name, address, or telephone.
  • 44. STEPS IN GENERATING LABELS 1. Start a new document in Ms. Word. 2.Go to the mailings tab in the create group, click labels and the envelope and labels dialog box will appear. 3. In the address box, type the text you want to be placed on the label. 4. Click the insert address stored in the electronic address book.
  • 45. 5. Change the font and paragraph formatting, select the text, right-click and select the option from the drop-down menu. 6. Click options button and the label options dialog box will appear. 7. Select the settings like the type of printer, the supplier that produced your label sheets and others. 8. After you make the settings, click ok. 9. Under print, select full page of the same label or single label. Then in the row and column boxes, enter the numbers of rows and columns on the label sheet for the label that
  • 46. MICROSOFT POWERPOINT It is an application intended for creating a slide presentation.
  • 47. How to Create Slide Presentation? 1. Open the Ms. Powerpoint applications. 2. Click new and select your preferred design template. 3. Click insert tab menu and insert text, word art or any object in the slide. 4. Click home tab to insert new slide.
  • 48. Ms. Excell (Work Book) It is use to compute costs incurred in the creation of projects or create tables for finding the researches then create reports for business or research that you are doing.
  • 49. Parts of Formula • Function • References • Constants • Operators
  • 50. EXCEL FUNCTIONS SUM = calculate the sum of a range of a cells. AVERAGE = calculate the arithmetic mean of a range of cells/values. MAX = gives the maximum value in a range.
  • 51. SOURCES OF PHOTOS AND GRAPHICS 1. Personal and Professional Photos - are photos taken by amateur or professional photographers using a digital camera. 2. Scanned Images - are those that you transfer from pointed photos and graphics using scanning devices.
  • 52. 3. Stock Photo Library - are several photographs and created images that are available for sale. They come in CD or DVD format and many of these images are royalty-free, which means that they can be used without additional fees. 4. Online Stock Photos -are found in the World Wide Web. The WWW is the dominant source of photos and graphics around the globe.
  • 53. ONLINE DIGITAL FILE FORMATS FOR IMAGES AND TEXT A computer will have a certain method of encoding information for storage in the hard drive or any form of computer storage in the hard drive or any form of computer storage. The ways of encoding and storing this information to storage is scanned file format.
  • 54. 2 Category of Digital File Format Proprietary Formats - are owned and controlled by individuals or cooperation and the file format specifications are not available to the public. Open Format - are available to everyone. It is specifically availed by public.
  • 55. BASIC PRINCIPLES OF GRAPHICS AND LAYOUT Layout *is the process of planning and arranging graphics in a page. Graphics *is an image or visual representation. Assymetrical * not balance
  • 56. Symmetrical * equal weights or measurements and balance. Text * legible, appropriate font face, left justified, right justified, centered. Image *proportionate, and sharpen. Proximity and Harmony * should be close together.
  • 57. Consistency *uniformity of the theme. Color and Shape * create interest by providing variety in the design. Emphasis * one point of interest in page.
  • 58. PRINCIPLES AND BASIC TECHNIQUES OF IMAGE MANIPULATION 1. Background Color - you can change the background if it does not match the image or the totality of the presentation. 2. Multiple Images - you can combine images to make a point or use a highlight your image.
  • 59. 3. Shadow -using shadow effect can make the image realistic. 4. Proportion -when combining images, resize the image to make it proportionate and realistic. 5. Blending color - you can use color to match the background with the other elements in the
  • 60. 6. Texture - allows you blend different image. Texture add to the depth of your art. Blending with allows smooth transition of one image to another. 7. Emphasis - there should be a focal point to a page that will attract with the viewers. The element you want to emphasize should be sharp, big and most vibrant in your design.
  • 61. COMBINING TEXT, GRAPHICS AND IMAGES Combining - will make your message clearer. Transparent Shapes - add simple shapes with a slight transparency behind your text. Fonts and Shapes - should complement with each other.
  • 62. Text and Background - should be aligned and organized to have an organized look. Clean and Clear Background - background should not be washed out your message and to be readable.
  • 63. BASIC MANIPULATION USING OFFLINE OR OPEN SOURCES SOFTWARE Photo editing and designing tools allows you to make manipulate or edit images, apply any effects and filters.
  • 64. VARIOUS OFFLINE OR OPEN SOURCE FOR IMAGE EDITING 1. Picasa - limited tools and will edit and organized your photo. 2. Paint.net - window based alternative to the Ms. Paint Editor. 3. Google Sketch Up - 3D modeling program with tools to allow you to create 3D models of houses and home
  • 65. 4. Autodesk Pixlr - is similar to photoshop and has more than 600 effects. 5. Adobe Photoshop - is a tool to create, modify and combine image. 6. GIMP or GNU Image Manipulation Program - used for image retouching and editing, free form drawing/ painting, and other specialized task.
  • 66. INSTALLING GIMP 1. Go to www.gimp.org. 2. Then click download. 3. Select download gimp directly. 4. Run the Gimp Installer. 5. Click Install. 6. Wait for it to finish the installation, then click finish.
  • 67. PARTS OF THE WINDOW 1. Toolbox 2. Tool option 3. Image manipulation 4. Layers dialog 5. Brushes/patterns/gradients
  • 68. Parts of Image Window • Tab or Image Menu • Ruler Guide • Scroll Bar • Task Bar • Workspace