2. Every human has an ability to do things that
some people cannot do. People from this generation
is very advance thinker and very active in
technologies, they study about technologies just to
invent gadgets that they think that it can give more
learning in people who is very busy about their
business and to their careers. Today's generation its
so many Branded phones, tablets, laptops, Ipods
etc. many people are very ignorant about those
things but they didn't think first if that technology
can harm them, that can give them a big problem.
Humans are very active in technologies specially
Japan, they are very unique in making gadgets.
They are very skilled people.
3. uis an umbrella that includes any
communication devices or application,
encompassing:radio, television, computer,
etc.
uIs the main method of communication,
getting information and expressing social
advocacies and awareness.
4. p ICT in commerce
p ICT in Engineering and Architecture
p ICT in Education
p ICT in Health and Services
p ICT in Sports and Recreation
p ICT in Travels and Booking
5. l In this stage of internet technology, there were very few content
creators and many of them were so called "read only web".
l There is no user interaction.
l Web pages were STATIC.
l The feedback mechanism was thru private email.
l No direct comment available.
6. l Term web 2.0 was used around 2004.
l Internet technology became more and more interactive, (used
for social media begins).
l The internet become available to anyone and everyone.
l The user can now interact, contribute and create their own
internet space and content.
7. l It is discovered Tim-Berners-Lee (Father
of the World-Wide-Web) as the "read-
write-executive" web.
l Semantic web or data drive web content.
l Not make the web 2.0 obsolete.
8. It is an evolution of technological
development that merge into a new system
bringing together different types of application
and media.
Example:
Smartphone
9. -is a collection of internet-based
communication tools and computer
assisted channel dedicated to allow users
to interact, communicate and share
information in a virtual community.
10. -is a popular free social networking
site with more than a billion users
around the globe that allows it's users to
create profiles, upload photos and
videos, create and join group.
11. -with more than 300 million users in 2016.
-allows users to microblog or broadcast
short messages called "tweets".
13. Snapchat
-designed for the mobile networking
application.
-designed photo, sharing, chat, and
messaging services.
-images stared in chat and messaging
services and short time and they are gone.
14. Assistive Media
It is a nonprofit organization
founded in 1996 in Arbor Michigan
USA.
It was the first internet based
reading services for person with
visual and reading impairments.
15. How Safe You Are Online?
What are the possible danger that makes
you unsafe online?
Email Spam
-knows as junk email, usually unsolicited commercial
email sent from one source with identical message to send to
multiple recipients.
16. Email Spoofing
- a deceitful changed email practice in which the sender adress
is changed, so that it would appear have some from a different
sources usually someone you know.
Phishing
- a deceitful practice of trying to get confidental information
such as password and usernames credit cord details by making it
appear as if it comes from a trustworthy source.
17. Pharming
- a dangerous hacker attack on a website wich directs all traffic
to that website to another pictitious website.
Spyware
- is a computer program that is installed covertly on a personal
computer to collect information or even take control over the
computer to collect without the knowledge of the user.
18. Computer Worm
- is a dangerous computer program replicates itself through a
network.
Trojan Horse
- a malicious software fronting to perform a good task, but
covertly performs undesirable function with the intention of
entering the computer without the user's consent.
19. Computer virus
- a program that duplicates itself and then
infects the computer.
Hacker
- a person who is able to enter the control
other people's computer without
authorization.
20. Possible Ways To Protect From
Dangers Online1. Start with your password.
2. Skip the personal information.
3. Check your settings.
4. Disable location settings.
5. Share your vacation after your home.
6. Keep your password private.
7. Examine your photos.
8. Friend your friends only.
9. Log out of your accounts.
10. Use passcodes.
21. Security Center
• Is the place where you can set additional
protection from THREAT to your computer,
especially when using the internet
22. Firewall
- helps in protecting your computer from unauthorized entries,
viruses, or worms from the internet or network.
Automatic Updates
- another features of windows which when turned on will
automatically download updates from microsoft windows website.
23. Virus Protection
- is meant to locate, find and remove virus
threats that are already in your computer.
- is usually about the current anti virus
software installed in your computer.
- also prevents other malware from
gaining entry into your computer.
24. Unlocking Of Difficulties
Contextualize
* is to place (something such as a word or activity) in a
context.
Research
* the collecting of information about a particular subject.
25. Strategy
* art of devising or employing plans or strategies toward a goal.
Compilation
*the act or process of compiling.
Citation
*an act of qouting, especially
26. Contextualize Search
• Is an attempt to be more precise in
providing the list documents according
to the words used by the user to search
the internet.
• A good contextual search engine would
request for more information to narrow
down the results of the search.
27. Steps to Make
Contextualized Online
Search
1. Identify or choose a topic
2. Topic or task definition
3. Identify methods of search
4. Identify resources of your research
5. Make your research strategies
6. Compiling the research results
7. Evaluating the result of your research
8. Create a list of your references for citation
28. Research Skills
Critical Thinking
- is the ability to digest, reflect, and conclude from
the information searched.
Analytical Thinking
-the ability to look, verbalize, conceptualize and
gather data attuned to the context of the subject.
29. Problem Solving Capability
-the ability to present solutions or solve problems by presenting
a decision based on the given information.
Organized Data Mining
-the ability to organized and catalogue all colleected materials
efficiently despite data size.
Research Presentation
-be able to explain in writing the purpose, steps, goal and
objective of the search.
30. Mail Merge and Label
Generation
Mail Merge
*merges data into
publication which will be
printed and mailed.
31. PARTS OF MAIL
MERGE
u Recipient List
u Publication with Merge Fields
u Merge Publication
32. CREATING A
RECIPIENT LIST
1.Click the mailings tool/tab, go to the start
group and click select recipients.
2. On the list of options, select type new list.
3. On the new address list dialog box, click
new entry and type the recipients
information.
4.Click ok.
33. Steps in Making Contextualize
Search1.Open the google site
2.On the upper right side of the
window.Click the google Apps icon and
click search G.
3.On the lower right part of the
window,click setting pop-up list will appear.
4.Type the keywords that you would wish to
search for click the advanced search.
34. Identifying Good Source from
Satirical Source
uThese sites take ttheir cue from TV
shows that report exaggerated news
that are untrue but intrigging and
funny.
uUntrue stories should not be share
to your friends,family and contract
35. How To Detect Satirical News
1.If it is good to be true,then it is
must be so.
2.If the news did not emanate from
reliable news sites.
3.If they are known from satirical
sites.
36. List of the Top
Sourcesof Satirical
News1.Adobe Chronicles
2.So,what's news!
3.Erita's time
4.The Professional Heckler
37. List of American Saterical
Sites in the U.S.
1.The Onion
2.Clickhole
3.Christwire Global
Media
38. Mailing Start Group Commands
NAME
Mail Merge
E-mail Merge
Select Recipients
Edit Recipient List
FUNCTION
uMerges data into a publication w/c will be
printed and mailed.Shows step by step
mail merge wizard.
uMerges data into publication that will be
sent as e-mail.
u Choose the list of people you intend to
send the letter to.
uMakes changes to the list of recipients
and decide which of them should recieve
your letter.
39. Write and Insert Group
Command
NAME
1. Insert Merge Field
2. Address Block
3. Greeting Line
4. Picture
5. Hyperlink
6. Format
FUNCTION
• Adds a field from your recipient
list to the publication.
• Add an address to your letter.
• Adds a greeting line to your
letter.
• Adds a picture field from your
recipients list to the publication.
• Inserts hyperlink that are
costumized for each recipients.
• Changes the format for the field
content
40. PREPARE YOUR
PUBLICATION
1.Create your publication in Ms.
Word.
2.Insert any additional text that you
want to appear in every version of
your mail merge publication such
as greeting.
41. CREATE MERGED
PUBLICATION1. Print
a. Click merge to a printer.
b. In the print space, select the option you want and click ok.
2. Merge to New Publication
a. Click merge to new publication.
b. In the new publication in the Mail Merge task panell.
c. Type the name of your new publication and click save.
42. 3. Add to Existing Publication
a. Click add to existing publication.
b. On the open publication dialog
box, locate the publication you want to
add and click OPEN.
c. Click save this publication in the
Mail Merge task pane.
43. GENERATING
LABELS
Labels are used for envelopes
that you intend to send out to
person's usually containing the
name, address, or telephone.
44. STEPS IN GENERATING
LABELS
1. Start a new document in Ms. Word.
2.Go to the mailings tab in the create group,
click labels and the envelope and labels dialog
box will appear.
3. In the address box, type the text you want to
be placed on the label.
4. Click the insert address stored in the
electronic address book.
45. 5. Change the font and paragraph formatting, select the text, right-
click and select the option from the drop-down menu.
6. Click options button and the label options dialog box will appear.
7. Select the settings like the type of printer, the supplier that
produced your label sheets and others.
8. After you make the settings, click ok.
9. Under print, select full page of the same label or single label.
Then in the row and column boxes, enter the numbers of rows
and columns on the label sheet for the label that you want to
print.
10. Click PRINT.
47. How to Create Slide
Presentation?
1. Open the Ms. Powerpoint applications.
2. Click new and select your preferred
design template.
3. Click insert tab menu and insert text,
word art or any object in the slide.
4. Click home tab to insert new slide.
48. Ms. Excell (Work Book)
It is use to compute costs
incurred in the creation of
projects or create tables for
finding the researches then
create reports for business or
research that you are doing.
50. EXCEL FUNCTIONS
SUM = calculate the sum of a range of a cells.
AVERAGE = calculate the arithmetic mean of
a range of cells/values.
MAX = gives the maximum value in a range.
51. SOURCES OF PHOTOS AND
GRAPHICS
1. Personal and Professional Photos
- are photos taken by amateur or professional
photographers using a digital camera.
2. Scanned Images
- are those that you transfer from pointed photos
and graphics using scanning devices.
52. 3. Stock Photo Library
- are several photographs and created images that are available
for sale. They come in CD or DVD format and many of these
images are royalty-free, which means that they can be used without
additional fees.
4. Online Stock Photos
-are found in the World Wide Web. The WWW is the dominant
source of photos and graphics around the globe.
53. ONLINE DIGITAL FILE
FORMATS FOR IMAGES
AND TEXT
A computer will have a certain
method of encoding information for
storage in the hard drive or any form
of computer storage in the hard drive
or any form of computer storage. The
ways of encoding and storing this
information to storage is scanned file
format.
54. 2 Category of Digital File
Format
Proprietary Formats
- are owned and controlled by individuals or cooperation
and the file format specifications are not available to the
public.
Open Format
- are available to everyone. It is specifically availed by
public.
55. BASIC PRINCIPLES OF
GRAPHICS AND LAYOUT
Layout
*is the process of planning and arranging
graphics in a page.
Graphics
*is an image or visual representation.
Assymetrical
* not balance
56. Symmetrical
* equal weights or measurements and balance.
Text
* legible, appropriate font face, left justified, right justified,
centered.
Image
*proportionate, and sharpen.
Proximity and Harmony
* should be close together.
57. Consistency
*uniformity of the theme.
Color and Shape
* create interest by providing variety in
the design.
Emphasis
* one point of interest in page.
58. PRINCIPLES AND BASIC
TECHNIQUES OF IMAGE
MANIPULATION
1. Background Color
- you can change the background if it does not match the image
or the totality of the presentation.
2. Multiple Images
- you can combine images to make a point or use a highlight
your image.
59. 3. Shadow
-using shadow effect can make the image
realistic.
4. Proportion
-when combining images, resize the image to
make it proportionate and realistic.
5. Blending color
- you can use color to match the background
with the other elements in the page.
60. 6. Texture
- allows you blend different image. Texture add to the
depth of your art. Blending with allows smooth transition of
one image to another.
7. Emphasis
- there should be a focal point to a page that will attract
with the viewers. The element you want to emphasize should
be sharp, big and most vibrant in your design.
61. COMBINING TEXT,
GRAPHICS AND IMAGES
Combining - will make your message clearer.
Transparent Shapes
- add simple shapes with a slight
transparency behind your text.
Fonts and Shapes
- should complement with each other.
62. Text and Background
- should be aligned and organized to have
an organized look.
Clean and Clear Background
- background should not be washed out
your message and to be readable.
63. BASIC MANIPULATION USING
OFFLINE OR OPEN SOURCES
SOFTWARE
Photo editing and designing tools
allows you to make manipulate or edit
images, apply any effects and filters.
64. VARIOUS OFFLINE OR OPEN
SOURCE FOR IMAGE
EDITING
1. Picasa
- limited tools and will edit and organized your photo.
2. Paint.net
- window based alternative to the Ms. Paint Editor.
3. Google Sketch Up
- 3D modeling program with tools to allow you to create
3D models of houses and home renovation.
65. 4. Autodesk Pixlr
- is similar to photoshop and has more than 600 effects.
5. Adobe Photoshop
- is a tool to create, modify and combine image.
6. GIMP or GNU Image
Manipulation Program
- used for image retouching and editing, free form drawing/
painting, and other specialized task.
66. INSTALLING GIMP
1. Go to www.gimp.org.
2. Then click download.
3. Select download gimp directly.
4. Run the Gimp Installer.
5. Click Install.
6. Wait for it to finish the installation, then click
finish.
67. PARTS OF THE WINDOW
1. Toolbox
2. Tool option
3. Image manipulation
4. Layers dialog
5. Brushes/patterns/gradients
68. Parts of Image Window
• Tab or Image Menu
• Ruler Guide
• Scroll Bar
• Task Bar
• Workspace