SlideShare a Scribd company logo
1 of 42
EMPOWERMENT
TECHNOLOGY
INFORMATION COMMUNICATION
TECHNOLOGY
• Is an umbrella term that includes any communication device
or application encompassing radio, television, computer and
etc.
• Main method of communication, getting information and
education, attaining services and expressing social advocacies
and awareness
The Current States of ICT
WEB 1.0
• Read only web
• No user interaction
• Web page were static
• No direct comment available
WEBMASTERS
STATIC WEB
USERS
ILLUSTRATION FOR THE WEB 1.O
WEB 2.0
• DYNAMIC WEB
• Use around 2004
• The users now interact, contribute and create
their own internet space and content.
WEBMASTERS
USERS
CONTRIBUTION
WEB DYNAMICS
COMMUNITY
ILLUSTRATION FOR THE
WEB 2.0
WEB 3.0
• Discovered by TIM BERNERS-LEE ( father of
the world wide web)
• Refer as Semantic web
• It will not make the web 2.0 obsolete
TECHNOLOGY
CONVERGENCE Merging one technology into one.
Evolution of technological development that merge into a
new system bringing together different types of applications
and media.
Examples:
SMARTPHONE - provides functionality of various individual separate
and different devices now available in one gear.
-function as camera,telephone,Radio,TV,and gaming
console.
SOCIAL MEDIA
- internet based application
- collection of internet base communication task, dedicated to allow
users to interact, communicate and share information.
FACEBOOK
A popular free social networking site
Allows users to create profile, upload photos, and videos,
create and join groups.
Sends message, keeping in touch with relatives and friends.
TWITTER
More than 300 million users in 2016
Allows users to microblog or broadcast short message
called “tweets”
INSTAGRAM
Enables users to share mobile photos and video.
SNAPCHAT
Designed for the mobile networking application
DIFFERENT DANGERS ONLINE
EMAIL SPAM
Known as the junk email.
Usually unsolicited commercial email sent from one source with identical
message to send to multiple recipient.
EMAIL SPOOFING
A deceitful email practice in which the sender address is changed, so that it
would appear to have come from a different sources.
PHISHING
A deceitful practice of trying to get confidential information such as
passwords, usernames and credit card by making it appear as if it comes from
a trustworthy source.
PHARMING
A dangerous hacker attack on a website which directs all traffic to that websites
to another fictitious website.
SPYWARE
Is a computer program that is installed convertly on a personal computer to
collect information and take control over the computer without the knowledge
of the users.
COMPUTER WORM
A dangerous computer program that replicates itself through a network sites.
Some worms deletes file, and others.
COMPUTER VIRUS
A program that duplicates itself and then infects the computer
Virus can be also transferred by the use of removable storage.
HACKER
A person who is able to enter the control other peoples computer
without authorization.
TROJAN HORSE
A malicious software fronting to perform a good task.
It can erase data, can allow access of the victims computer.
SECURITY CENTER
• It is the place where you can set additional protection from
THREAT to your computer, especially when using the
internet.
FIREWALL
• Helps in protecting your computer from unauthorized entries.
AUTOMATIC UPDATES
• Another feature of windows which when turned on will automatically
download updates from Microsoft windows website.
VIRUS PROTECTION
Usually about the current antivirus software installed in your computer.
ANTIVIRUS- meant to locate, find and remove virus threats that
are already in your computer
CONTEXTUAL SEARCH
• An attempt to be more precise in providing the list documents accounts to the
words use by the user to search the internet.
Steps in contextual research:
1. Identify or task definition
2. Topic or task definition
3. Identify methods of search
4. Identify resources of your research
5. Make your research strategies
6. Compiling the research results
7. Evaluate the results of your research
8. Create a list of your references for citation
Methods of search:
• Experiment ●Explore ●SURVEY
RESEARCH SKILLS
CRITICAL THINKING
- the ability to digest, reflect, and conclude from the information searched.
- the ability to look, verbalize, conceptualize and gather data attuned to the context of
the subject.
PROBLEM SOLVING CAPABILITY
- the ability to present solutions of solve problems by presenting a decision
based on the given information.
ORGANIZED DATA MINING
- it is the ability to organize and catalogue all collected materials efficiently
despite data size.
RESEARCH PRESENTATION
- it is the ability to present ideas and draws conclusions from the research.
CREATIVITY AND DEVELOPED IMAGINATION
- it is the ability to look for alternative solutions to the problems needed to
solve in the research.
COMPUTER LITERACY
- knowledge of the various computer applications and tools.
- skills in the use of software to write, design and present.
STEPS IN CONTEXTUALIZE RESEARCH:
1. Open the Google site
2. On the upper right side of the window click the Google App icon and click search
G
3. Lower right part of the window click settings and the Google search settings pop-
list will appear.
4. Click advanced search and the advance search windows will appear.
IDENTIFYING GOOD SOURCE FROM SATIRICAL SOURCE
• SATIRICAL SITES are websites that report untrue or false stories meant to
amuse or entertain.
HOW TO DETECT SATIRICAL NEWS:
1. If it is good to be true, then it must be so
2. If the news did not emanate from liable news site.
3. If they are from known satirical sites.
LIST OF TOP SOURCES OF SATIRICAL NEWS:
1. Adobo chronicles (adobchronicles.com)
2. So, what news?
3. Eritas times
4. Professional Heckler
LIST OF AMERICAN SATIRICAL SITES IN US
1. The onion
2. Clickhole
3. Christ wire global media
MAIL MERGE
• is used to automatically add mailing addresses or personalized
information to your publication.
MAILING START GROUP COMMANDS
NAME FUNCTION
MAIL MERGE Merges data into a publication which will be
printed and mailed.
EMAIL MERGE Merges data into a publication that will be sent as
e-mail.
SELECT RECEPIENTS Chooses the list of people you intended to send.
EDIT RECEPIENT LIST Make changes to the list of recipients.
INSERT MERGE FIELD Adds a field from your recipient list.
ADDRESS BLOCK Adds an address to your letter.
GREETING LINE Adds a greeting to your letter
PICTURE Adds a picture to your field.
HANDS ON USING MS. WORD TO CREATE A MAIL MERGE:
Step 1: Creating a recipient list
Step 2: Prepare your publication
Step 3: Create merge publication
GENERATING LABELS
LABELSare used for envelopes that you intend to send out
to persons usually containing the name, address or telephone.
MS POWERPOINT
- it is an application intend in creating a slide presentation.
HOW TO CREATE A SLIDE PRESENTATION:
1.Open MS Power Point app.
2.Click new and select your preferred design template
3.Click insert tab menu and insert text, word art, or any object
needed in slide
4.Click home tab under, click insert new slide in your presentation.
Is a spreadsheet developed by Microsoft for Windows,
macOS, Android and iOS. It features calculation, graphing
tools, pivot tables, and a macro programming language
called Visual Basic for Applications.
MS EXCEL
=SUM Calculates sum of average cells.
=AVERAGE Calculates the arithmetic mean of range of the
cells
=MAX Gives the maximum value in range.
=MIN Gives the minimum value in range.
=COUNT Counts the number of cells in a range.
=If Shows a series calculations
EXCEL FUNCTIONS
SOURCES OF PHOTOS AND GRAPHICS
They can come direct from your camera, old pictures, free from internet or
purchased from the internet.
1.PERSONAL AND PROFESSIONAL PHOTOS
- are photos taken by amateur or professional photographers.
- these images are downloaded and are stored in the computer.
2. SCANNED IMAGES
- are those that you transfer from printed photos and graphics using
scanning devices.
- these are mostly old pictures photographed before the digital age.
3. STOCK PHOTO LIBRARY
- are several photographs and created images that are available for sale.
4. ONLINE STOCK PHOTO
- are found in WWW.
- advantage of this set up is that you do not have to go to places where
most of these photos were taken.
ONLINE DIGITAL FILE FORMATS FOR IMAGES AND TEXT
FILE FORMAT- the ways of encoding and storing this information to storage.
Digital file formats are categorized either proprietary or open:
PROPRIETARY FORMATS
• are owned and controlled by individuals or cooperation's.
• they are usually covered by copyrights and the owner has exclusive
control.
FILE FORMATS
FILE EXTENSIONS -are the suffixes at the end of the file name.
- is a means of identifying the format of the file
name
OPEN FORMATS
• are means and ways for storing digital information that are free
• can be used by public and are not encumbered by copyrights
THREE MAJOR GROUPS OF DIGITAL FILE FORMATS
1.UNCOMPRESSED OR RAW FORMAT
- is usually used for storing original file, it is flexible
form but needs a higher memory to store.
2. LOSSLESS FILE FORMAT
- is a file format that was compressed to replicate the
original quality but a reduced file size.
3.
IMAGE FILE FORMATS
- are standardized means of organizing and storing digital images.
RASTER IMAGE FORMAT
- images faithfully display the color information.
- made of pixels
Examples:
● JPEG (Joint Photographic Expert Group)
● GIF (Graphics Interface Format)
● PNG ( Portable Network Graphics)
● BMP (Bitmap)
● TIFF (Tagged Image File Format)
● PCX (Picture Exchange)
VECTOR IMAGES
- are lossless file created using mathematical geometric equations.
VECTOR IMAGE FORMAT OF GRAPHICS
- is preferred format for those who designed quality prints and display.
Types of formats:
1.PDF
2.Encapsulated postscript
3.Scalable Vector Graphics
4.Windows Metafile
File name extensions:
• .ai ● .dxf
• .ps ● .svg
• .drw
BASICS PRINCIPLES OF GRAPHICS AND LAYOUT
LAYOUT- is the process of planning and arranging graphics or text in a page or book
1.SYMMETRICAL
- there are equal weight of elements on both sides of the page
2.ASSYMETRICAL
- there is an artistic and different intensity on one side of the page.
3.TEXT
- the type should be visible legible and appropriate.
4. IMAGED
- should be appropriate with sharp color and high resolution.
5. PROXIMITY AND HARMONY
- elements should be closed together and not scattered and arranged apart
from each other.
6. CONSISTENCY
- there should be uniformity of theme on each page.
7. COLOR AND SHAPED
- use color to create interest by providing variety in design like the use of
color contrast and shape.
8. EMPHASIS
- there should be one point of interest in page
PRINCIPLES AND BASIC TECHNIQUES OF IMAGE
MANIPULATION
Techniques of image manipulation:
oBACKGORUND AND COLOR
- change the background if it does not match the image
oMULTIPLE IMAGES
- combine multiple images to make a point or highlight message.
o SHADOW
- using shadow effect will make the image realistic.
oBLENDING COLOR
- use blending color to match the background with the other
elements.
oTEXTURE
- textures add to the depth of your art.
oEMPHASIS
- there should be a focal point to a page that will attract viewers.
o PROPORTION
- when combining image, resize image to make it proportionate.
COMBINING TEXT, GRAPHICS AND IMAGES
 TRANSPARENT SHAPES
-add simple shape with a slight transparency behind your text to clearly see
the text.
 FONTS AND SHAPES
- fonts and shape should complement with each other. You can use rounded
shapes with rounded fonts and sharp shapes and fonts.
 TEXT AND BACKGROUND
- text and background should be aligned to have an organized look.
 CLEAN AND CLEAR BACKGROUND
- use a clean and color background for the message to be readable.
BASIC MANIPULATION USING OFFLINE OR OPEN SOURE
SORTWARE
 VARIOUS OFFLINE OR OPEN SOURCE FOR IMAGE EDITING:
 PICASA
- a Google free photo manager that edit and organize photo.
 PAINT.NET
- it is a windows-based alternative to the MS PAINT.
 GOOGLE SKETCH UP
- it is free 3D modeling program.
AUTODESK PIXL
- a free photo editing tool
- more than 600 effects.
ADOBE PHOTOSHOP
- a tool to create modifying combine digital photos.
GIMP OR GNU
- used for image retouching and editing.
- Free, open source, image/graphic editing program
INSTALLING GIMP
1.Go to www.gimp.com
2.Then click download
3.Select download GIMP directly.
4.Run the GIMP installer.
5.Click install
6.Wait for it to finish the installation.
PRESENTATION AND VISUALIZATION
PRESENTATION
- is a graphics program that allows you to create slide shows presenting a
topic, lecture, demonstration.
- allows you to organize, summarize and format your materials.
- allows transitions and animations and sounds that will captivate the
audience.
Examples:
1. ZOHO SHOW
- online presentation that features master slides.
- ability to insert videos/images, transition and animations.
2. LinkedInSlideShare
- web 2.0 based sliding hosting service.
- users can upload files privately or publicly in the FF formats
3. GOOGLE SLIDES
- create a new presentation and edit, collaborate with others and present
wherever you are free.
4. SLIDE ROCKET
- online presentation
5. MS POWERPOINT
- slide show presentation program currently developed by Microsoft.
6. PREZI
- cloud based presentation software based on a software as service model.

More Related Content

What's hot

Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology  by: Geraldine Salve Pepe and Lailanie PepeEpowerment Technology  by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepesalvepepe
 
EMPOWERMENT TECHNOLOGIES
EMPOWERMENT TECHNOLOGIESEMPOWERMENT TECHNOLOGIES
EMPOWERMENT TECHNOLOGIESagielyn
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technologypizonaim
 
Basic internet pnhs inset
Basic internet   pnhs insetBasic internet   pnhs inset
Basic internet pnhs insetMaxie Santos
 
Computer Internet Basics I
Computer Internet Basics IComputer Internet Basics I
Computer Internet Basics Idebbie43
 
Empowerment Technologies : Joana Golo, Patrick Obusa, Mariemar Gilo, Edgielyn...
Empowerment Technologies : Joana Golo, Patrick Obusa, Mariemar Gilo, Edgielyn...Empowerment Technologies : Joana Golo, Patrick Obusa, Mariemar Gilo, Edgielyn...
Empowerment Technologies : Joana Golo, Patrick Obusa, Mariemar Gilo, Edgielyn...joanagolo4ever
 
Internet basics
Internet basicsInternet basics
Internet basicsosuchin
 
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumela
Empowerment Technology  by: Jhames Andre M. Goron and Elijohn G. GumelaEmpowerment Technology  by: Jhames Andre M. Goron and Elijohn G. Gumela
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumelaandregoron
 
Basic Internet Concepts
Basic Internet ConceptsBasic Internet Concepts
Basic Internet ConceptsKiran Budhrani
 
Larra belle ict
Larra belle ictLarra belle ict
Larra belle ictJovanieGarin
 
Activity wendy fritz jamaica 123
Activity wendy fritz jamaica 123Activity wendy fritz jamaica 123
Activity wendy fritz jamaica 123Ybonnica22
 
Internet Basics
Internet BasicsInternet Basics
Internet BasicsSue Pelman
 
Tutorial 6 - User-Generated Content on the Internet
Tutorial 6 - User-Generated Content on the InternetTutorial 6 - User-Generated Content on the Internet
Tutorial 6 - User-Generated Content on the Internetdpd
 
Internet basics
Internet basicsInternet basics
Internet basicscetrosoft
 
Internet basic
Internet basicInternet basic
Internet basicargusacademy
 
Internet application
Internet applicationInternet application
Internet applicationRezaul Rahat
 

What's hot (20)

Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology  by: Geraldine Salve Pepe and Lailanie PepeEpowerment Technology  by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
 
Gwapo
GwapoGwapo
Gwapo
 
EMPOWERMENT TECHNOLOGIES
EMPOWERMENT TECHNOLOGIESEMPOWERMENT TECHNOLOGIES
EMPOWERMENT TECHNOLOGIES
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
Basic internet pnhs inset
Basic internet   pnhs insetBasic internet   pnhs inset
Basic internet pnhs inset
 
Computer Internet Basics I
Computer Internet Basics IComputer Internet Basics I
Computer Internet Basics I
 
Christine
ChristineChristine
Christine
 
Empowerment Technologies : Joana Golo, Patrick Obusa, Mariemar Gilo, Edgielyn...
Empowerment Technologies : Joana Golo, Patrick Obusa, Mariemar Gilo, Edgielyn...Empowerment Technologies : Joana Golo, Patrick Obusa, Mariemar Gilo, Edgielyn...
Empowerment Technologies : Joana Golo, Patrick Obusa, Mariemar Gilo, Edgielyn...
 
Internet basics
Internet basicsInternet basics
Internet basics
 
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumela
Empowerment Technology  by: Jhames Andre M. Goron and Elijohn G. GumelaEmpowerment Technology  by: Jhames Andre M. Goron and Elijohn G. Gumela
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumela
 
Basic Internet Concepts
Basic Internet ConceptsBasic Internet Concepts
Basic Internet Concepts
 
Group 5
Group 5Group 5
Group 5
 
Larra belle ict
Larra belle ictLarra belle ict
Larra belle ict
 
What is Internet
What is InternetWhat is Internet
What is Internet
 
Activity wendy fritz jamaica 123
Activity wendy fritz jamaica 123Activity wendy fritz jamaica 123
Activity wendy fritz jamaica 123
 
Internet Basics
Internet BasicsInternet Basics
Internet Basics
 
Tutorial 6 - User-Generated Content on the Internet
Tutorial 6 - User-Generated Content on the InternetTutorial 6 - User-Generated Content on the Internet
Tutorial 6 - User-Generated Content on the Internet
 
Internet basics
Internet basicsInternet basics
Internet basics
 
Internet basic
Internet basicInternet basic
Internet basic
 
Internet application
Internet applicationInternet application
Internet application
 

Similar to empowerment technologies by: aiza martin and patricia obor

1 empowerment technology_by_rey_anthon_&_elma_mea[1]
1 empowerment technology_by_rey_anthon_&_elma_mea[1]1 empowerment technology_by_rey_anthon_&_elma_mea[1]
1 empowerment technology_by_rey_anthon_&_elma_mea[1]niniogolo
 
Empowerment technologies byShyna Gane Daleon and Galasao
Empowerment technologies byShyna Gane  Daleon and Galasao Empowerment technologies byShyna Gane  Daleon and Galasao
Empowerment technologies byShyna Gane Daleon and Galasao janelle17
 
Empowerment technology
Empowerment technology Empowerment technology
Empowerment technology jonaspalen1
 
Empowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and CatalinoEmpowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and CatalinoPadsromel
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyesandregoron
 
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...joanagolo4ever
 
Divine Gono and Peter Paul Gato
Divine Gono and Peter Paul GatoDivine Gono and Peter Paul Gato
Divine Gono and Peter Paul GatoVineGono
 
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONImpowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONCedricPada
 
Lea pagoyo final(1)
Lea pagoyo final(1)Lea pagoyo final(1)
Lea pagoyo final(1)jonaspalen1
 
Empowerment technology by: Irene Petere
Empowerment technology by: Irene PetereEmpowerment technology by: Irene Petere
Empowerment technology by: Irene PetereJuliezaMaeGermo
 
Empowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena MastalEmpowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena MastalPadsromel
 
Empowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judithEmpowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judithmhedilyn8556
 
Empowerment Technology by:jewelyn,liezel,mary joy,bryll
Empowerment Technology by:jewelyn,liezel,mary joy,bryllEmpowerment Technology by:jewelyn,liezel,mary joy,bryll
Empowerment Technology by:jewelyn,liezel,mary joy,brylljoanagolo4ever
 
Melanie g done 6565
Melanie g done 6565Melanie g done 6565
Melanie g done 6565pizonaim
 
empowerment technologies
empowerment technologies empowerment technologies
empowerment technologies RicciGozon
 
Empowerment technology Josua De Guzman and Chariza
Empowerment technology Josua De Guzman and CharizaEmpowerment technology Josua De Guzman and Chariza
Empowerment technology Josua De Guzman and CharizaPadsromel
 
Empowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosEmpowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosPadsromel
 
EMPOWERMENT TECHNOLOGY by jessabel & mary grace
EMPOWERMENT TECHNOLOGY by jessabel & mary graceEMPOWERMENT TECHNOLOGY by jessabel & mary grace
EMPOWERMENT TECHNOLOGY by jessabel & mary graceobus25
 
Migo my labs
Migo my labsMigo my labs
Migo my labsrairuta
 

Similar to empowerment technologies by: aiza martin and patricia obor (20)

1 empowerment technology_by_rey_anthon_&_elma_mea[1]
1 empowerment technology_by_rey_anthon_&_elma_mea[1]1 empowerment technology_by_rey_anthon_&_elma_mea[1]
1 empowerment technology_by_rey_anthon_&_elma_mea[1]
 
Empowerment technologies byShyna Gane Daleon and Galasao
Empowerment technologies byShyna Gane  Daleon and Galasao Empowerment technologies byShyna Gane  Daleon and Galasao
Empowerment technologies byShyna Gane Daleon and Galasao
 
Empowerment technology
Empowerment technology Empowerment technology
Empowerment technology
 
Empowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and CatalinoEmpowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and Catalino
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
 
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
 
Divine Gono and Peter Paul Gato
Divine Gono and Peter Paul GatoDivine Gono and Peter Paul Gato
Divine Gono and Peter Paul Gato
 
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONImpowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
 
ICT
ICTICT
ICT
 
Lea pagoyo final(1)
Lea pagoyo final(1)Lea pagoyo final(1)
Lea pagoyo final(1)
 
Empowerment technology by: Irene Petere
Empowerment technology by: Irene PetereEmpowerment technology by: Irene Petere
Empowerment technology by: Irene Petere
 
Empowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena MastalEmpowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena Mastal
 
Empowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judithEmpowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judith
 
Empowerment Technology by:jewelyn,liezel,mary joy,bryll
Empowerment Technology by:jewelyn,liezel,mary joy,bryllEmpowerment Technology by:jewelyn,liezel,mary joy,bryll
Empowerment Technology by:jewelyn,liezel,mary joy,bryll
 
Melanie g done 6565
Melanie g done 6565Melanie g done 6565
Melanie g done 6565
 
empowerment technologies
empowerment technologies empowerment technologies
empowerment technologies
 
Empowerment technology Josua De Guzman and Chariza
Empowerment technology Josua De Guzman and CharizaEmpowerment technology Josua De Guzman and Chariza
Empowerment technology Josua De Guzman and Chariza
 
Empowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosEmpowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine Gelos
 
EMPOWERMENT TECHNOLOGY by jessabel & mary grace
EMPOWERMENT TECHNOLOGY by jessabel & mary graceEMPOWERMENT TECHNOLOGY by jessabel & mary grace
EMPOWERMENT TECHNOLOGY by jessabel & mary grace
 
Migo my labs
Migo my labsMigo my labs
Migo my labs
 

Recently uploaded

Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 

Recently uploaded (20)

Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 

empowerment technologies by: aiza martin and patricia obor

  • 2. INFORMATION COMMUNICATION TECHNOLOGY • Is an umbrella term that includes any communication device or application encompassing radio, television, computer and etc. • Main method of communication, getting information and education, attaining services and expressing social advocacies and awareness
  • 3. The Current States of ICT WEB 1.0 • Read only web • No user interaction • Web page were static • No direct comment available
  • 5. WEB 2.0 • DYNAMIC WEB • Use around 2004 • The users now interact, contribute and create their own internet space and content.
  • 7. WEB 3.0 • Discovered by TIM BERNERS-LEE ( father of the world wide web) • Refer as Semantic web • It will not make the web 2.0 obsolete
  • 8. TECHNOLOGY CONVERGENCE Merging one technology into one. Evolution of technological development that merge into a new system bringing together different types of applications and media. Examples: SMARTPHONE - provides functionality of various individual separate and different devices now available in one gear. -function as camera,telephone,Radio,TV,and gaming console.
  • 9. SOCIAL MEDIA - internet based application - collection of internet base communication task, dedicated to allow users to interact, communicate and share information. FACEBOOK A popular free social networking site Allows users to create profile, upload photos, and videos, create and join groups. Sends message, keeping in touch with relatives and friends.
  • 10. TWITTER More than 300 million users in 2016 Allows users to microblog or broadcast short message called “tweets” INSTAGRAM Enables users to share mobile photos and video. SNAPCHAT Designed for the mobile networking application
  • 11. DIFFERENT DANGERS ONLINE EMAIL SPAM Known as the junk email. Usually unsolicited commercial email sent from one source with identical message to send to multiple recipient. EMAIL SPOOFING A deceitful email practice in which the sender address is changed, so that it would appear to have come from a different sources. PHISHING A deceitful practice of trying to get confidential information such as passwords, usernames and credit card by making it appear as if it comes from a trustworthy source.
  • 12. PHARMING A dangerous hacker attack on a website which directs all traffic to that websites to another fictitious website. SPYWARE Is a computer program that is installed convertly on a personal computer to collect information and take control over the computer without the knowledge of the users. COMPUTER WORM A dangerous computer program that replicates itself through a network sites. Some worms deletes file, and others.
  • 13. COMPUTER VIRUS A program that duplicates itself and then infects the computer Virus can be also transferred by the use of removable storage. HACKER A person who is able to enter the control other peoples computer without authorization. TROJAN HORSE A malicious software fronting to perform a good task. It can erase data, can allow access of the victims computer.
  • 14. SECURITY CENTER • It is the place where you can set additional protection from THREAT to your computer, especially when using the internet. FIREWALL • Helps in protecting your computer from unauthorized entries.
  • 15. AUTOMATIC UPDATES • Another feature of windows which when turned on will automatically download updates from Microsoft windows website. VIRUS PROTECTION Usually about the current antivirus software installed in your computer. ANTIVIRUS- meant to locate, find and remove virus threats that are already in your computer
  • 16. CONTEXTUAL SEARCH • An attempt to be more precise in providing the list documents accounts to the words use by the user to search the internet. Steps in contextual research: 1. Identify or task definition 2. Topic or task definition 3. Identify methods of search 4. Identify resources of your research 5. Make your research strategies 6. Compiling the research results 7. Evaluate the results of your research 8. Create a list of your references for citation
  • 17. Methods of search: • Experiment ●Explore ●SURVEY RESEARCH SKILLS CRITICAL THINKING - the ability to digest, reflect, and conclude from the information searched. - the ability to look, verbalize, conceptualize and gather data attuned to the context of the subject. PROBLEM SOLVING CAPABILITY - the ability to present solutions of solve problems by presenting a decision based on the given information.
  • 18. ORGANIZED DATA MINING - it is the ability to organize and catalogue all collected materials efficiently despite data size. RESEARCH PRESENTATION - it is the ability to present ideas and draws conclusions from the research. CREATIVITY AND DEVELOPED IMAGINATION - it is the ability to look for alternative solutions to the problems needed to solve in the research. COMPUTER LITERACY - knowledge of the various computer applications and tools. - skills in the use of software to write, design and present.
  • 19. STEPS IN CONTEXTUALIZE RESEARCH: 1. Open the Google site 2. On the upper right side of the window click the Google App icon and click search G 3. Lower right part of the window click settings and the Google search settings pop- list will appear. 4. Click advanced search and the advance search windows will appear. IDENTIFYING GOOD SOURCE FROM SATIRICAL SOURCE • SATIRICAL SITES are websites that report untrue or false stories meant to amuse or entertain.
  • 20. HOW TO DETECT SATIRICAL NEWS: 1. If it is good to be true, then it must be so 2. If the news did not emanate from liable news site. 3. If they are from known satirical sites. LIST OF TOP SOURCES OF SATIRICAL NEWS: 1. Adobo chronicles (adobchronicles.com) 2. So, what news? 3. Eritas times 4. Professional Heckler LIST OF AMERICAN SATIRICAL SITES IN US 1. The onion 2. Clickhole 3. Christ wire global media
  • 21. MAIL MERGE • is used to automatically add mailing addresses or personalized information to your publication. MAILING START GROUP COMMANDS NAME FUNCTION MAIL MERGE Merges data into a publication which will be printed and mailed. EMAIL MERGE Merges data into a publication that will be sent as e-mail. SELECT RECEPIENTS Chooses the list of people you intended to send. EDIT RECEPIENT LIST Make changes to the list of recipients. INSERT MERGE FIELD Adds a field from your recipient list. ADDRESS BLOCK Adds an address to your letter. GREETING LINE Adds a greeting to your letter PICTURE Adds a picture to your field.
  • 22. HANDS ON USING MS. WORD TO CREATE A MAIL MERGE: Step 1: Creating a recipient list Step 2: Prepare your publication Step 3: Create merge publication GENERATING LABELS LABELSare used for envelopes that you intend to send out to persons usually containing the name, address or telephone.
  • 23. MS POWERPOINT - it is an application intend in creating a slide presentation. HOW TO CREATE A SLIDE PRESENTATION: 1.Open MS Power Point app. 2.Click new and select your preferred design template 3.Click insert tab menu and insert text, word art, or any object needed in slide 4.Click home tab under, click insert new slide in your presentation.
  • 24. Is a spreadsheet developed by Microsoft for Windows, macOS, Android and iOS. It features calculation, graphing tools, pivot tables, and a macro programming language called Visual Basic for Applications. MS EXCEL
  • 25. =SUM Calculates sum of average cells. =AVERAGE Calculates the arithmetic mean of range of the cells =MAX Gives the maximum value in range. =MIN Gives the minimum value in range. =COUNT Counts the number of cells in a range. =If Shows a series calculations EXCEL FUNCTIONS
  • 26. SOURCES OF PHOTOS AND GRAPHICS They can come direct from your camera, old pictures, free from internet or purchased from the internet. 1.PERSONAL AND PROFESSIONAL PHOTOS - are photos taken by amateur or professional photographers. - these images are downloaded and are stored in the computer. 2. SCANNED IMAGES - are those that you transfer from printed photos and graphics using scanning devices. - these are mostly old pictures photographed before the digital age.
  • 27. 3. STOCK PHOTO LIBRARY - are several photographs and created images that are available for sale. 4. ONLINE STOCK PHOTO - are found in WWW. - advantage of this set up is that you do not have to go to places where most of these photos were taken.
  • 28. ONLINE DIGITAL FILE FORMATS FOR IMAGES AND TEXT FILE FORMAT- the ways of encoding and storing this information to storage. Digital file formats are categorized either proprietary or open: PROPRIETARY FORMATS • are owned and controlled by individuals or cooperation's. • they are usually covered by copyrights and the owner has exclusive control.
  • 29. FILE FORMATS FILE EXTENSIONS -are the suffixes at the end of the file name. - is a means of identifying the format of the file name OPEN FORMATS • are means and ways for storing digital information that are free • can be used by public and are not encumbered by copyrights
  • 30. THREE MAJOR GROUPS OF DIGITAL FILE FORMATS 1.UNCOMPRESSED OR RAW FORMAT - is usually used for storing original file, it is flexible form but needs a higher memory to store. 2. LOSSLESS FILE FORMAT - is a file format that was compressed to replicate the original quality but a reduced file size. 3.
  • 31. IMAGE FILE FORMATS - are standardized means of organizing and storing digital images. RASTER IMAGE FORMAT - images faithfully display the color information. - made of pixels Examples: ● JPEG (Joint Photographic Expert Group) ● GIF (Graphics Interface Format) ● PNG ( Portable Network Graphics) ● BMP (Bitmap) ● TIFF (Tagged Image File Format) ● PCX (Picture Exchange)
  • 32. VECTOR IMAGES - are lossless file created using mathematical geometric equations. VECTOR IMAGE FORMAT OF GRAPHICS - is preferred format for those who designed quality prints and display. Types of formats: 1.PDF 2.Encapsulated postscript 3.Scalable Vector Graphics 4.Windows Metafile File name extensions: • .ai ● .dxf • .ps ● .svg • .drw
  • 33. BASICS PRINCIPLES OF GRAPHICS AND LAYOUT LAYOUT- is the process of planning and arranging graphics or text in a page or book 1.SYMMETRICAL - there are equal weight of elements on both sides of the page 2.ASSYMETRICAL - there is an artistic and different intensity on one side of the page. 3.TEXT - the type should be visible legible and appropriate. 4. IMAGED - should be appropriate with sharp color and high resolution.
  • 34. 5. PROXIMITY AND HARMONY - elements should be closed together and not scattered and arranged apart from each other. 6. CONSISTENCY - there should be uniformity of theme on each page. 7. COLOR AND SHAPED - use color to create interest by providing variety in design like the use of color contrast and shape. 8. EMPHASIS - there should be one point of interest in page
  • 35. PRINCIPLES AND BASIC TECHNIQUES OF IMAGE MANIPULATION Techniques of image manipulation: oBACKGORUND AND COLOR - change the background if it does not match the image oMULTIPLE IMAGES - combine multiple images to make a point or highlight message. o SHADOW - using shadow effect will make the image realistic.
  • 36. oBLENDING COLOR - use blending color to match the background with the other elements. oTEXTURE - textures add to the depth of your art. oEMPHASIS - there should be a focal point to a page that will attract viewers. o PROPORTION - when combining image, resize image to make it proportionate.
  • 37. COMBINING TEXT, GRAPHICS AND IMAGES  TRANSPARENT SHAPES -add simple shape with a slight transparency behind your text to clearly see the text.  FONTS AND SHAPES - fonts and shape should complement with each other. You can use rounded shapes with rounded fonts and sharp shapes and fonts.  TEXT AND BACKGROUND - text and background should be aligned to have an organized look.  CLEAN AND CLEAR BACKGROUND - use a clean and color background for the message to be readable.
  • 38. BASIC MANIPULATION USING OFFLINE OR OPEN SOURE SORTWARE  VARIOUS OFFLINE OR OPEN SOURCE FOR IMAGE EDITING:  PICASA - a Google free photo manager that edit and organize photo.  PAINT.NET - it is a windows-based alternative to the MS PAINT.  GOOGLE SKETCH UP - it is free 3D modeling program.
  • 39. AUTODESK PIXL - a free photo editing tool - more than 600 effects. ADOBE PHOTOSHOP - a tool to create modifying combine digital photos. GIMP OR GNU - used for image retouching and editing. - Free, open source, image/graphic editing program
  • 40. INSTALLING GIMP 1.Go to www.gimp.com 2.Then click download 3.Select download GIMP directly. 4.Run the GIMP installer. 5.Click install 6.Wait for it to finish the installation.
  • 41. PRESENTATION AND VISUALIZATION PRESENTATION - is a graphics program that allows you to create slide shows presenting a topic, lecture, demonstration. - allows you to organize, summarize and format your materials. - allows transitions and animations and sounds that will captivate the audience. Examples: 1. ZOHO SHOW - online presentation that features master slides. - ability to insert videos/images, transition and animations.
  • 42. 2. LinkedInSlideShare - web 2.0 based sliding hosting service. - users can upload files privately or publicly in the FF formats 3. GOOGLE SLIDES - create a new presentation and edit, collaborate with others and present wherever you are free. 4. SLIDE ROCKET - online presentation 5. MS POWERPOINT - slide show presentation program currently developed by Microsoft. 6. PREZI - cloud based presentation software based on a software as service model.