2. INFORMATION COMMUNICATION
TECHNOLOGY
⢠Is an umbrella term that includes any communication device
or application encompassing radio, television, computer and
etc.
⢠Main method of communication, getting information and
education, attaining services and expressing social advocacies
and awareness
3. The Current States of ICT
WEB 1.0
⢠Read only web
⢠No user interaction
⢠Web page were static
⢠No direct comment available
7. WEB 3.0
⢠Discovered by TIM BERNERS-LEE ( father of
the world wide web)
⢠Refer as Semantic web
⢠It will not make the web 2.0 obsolete
8. TECHNOLOGY
CONVERGENCEď Merging one technology into one.
ďEvolution of technological development that merge into a
new system bringing together different types of applications
and media.
Examples:
SMARTPHONE - provides functionality of various individual separate
and different devices now available in one gear.
-function as camera,telephone,Radio,TV,and gaming
console.
9. SOCIAL MEDIA
- internet based application
- collection of internet base communication task, dedicated to allow
users to interact, communicate and share information.
FACEBOOK
ďźA popular free social networking site
ďźAllows users to create profile, upload photos, and videos,
create and join groups.
ďźSends message, keeping in touch with relatives and friends.
10. TWITTER
ďźMore than 300 million users in 2016
ďźAllows users to microblog or broadcast short message
called âtweetsâ
INSTAGRAM
ďźEnables users to share mobile photos and video.
SNAPCHAT
ďźDesigned for the mobile networking application
11. DIFFERENT DANGERS ONLINE
EMAIL SPAM
ďśKnown as the junk email.
ďśUsually unsolicited commercial email sent from one source with identical
message to send to multiple recipient.
EMAIL SPOOFING
ďśA deceitful email practice in which the sender address is changed, so that it
would appear to have come from a different sources.
PHISHING
ďśA deceitful practice of trying to get confidential information such as
passwords, usernames and credit card by making it appear as if it comes from
a trustworthy source.
12. PHARMING
ďśA dangerous hacker attack on a website which directs all traffic to that websites
to another fictitious website.
SPYWARE
ďśIs a computer program that is installed convertly on a personal computer to
collect information and take control over the computer without the knowledge
of the users.
COMPUTER WORM
ďśA dangerous computer program that replicates itself through a network sites.
ďśSome worms deletes file, and others.
13. COMPUTER VIRUS
ďśA program that duplicates itself and then infects the computer
ďśVirus can be also transferred by the use of removable storage.
HACKER
ďśA person who is able to enter the control other peoples computer
without authorization.
TROJAN HORSE
ďśA malicious software fronting to perform a good task.
ďśIt can erase data, can allow access of the victims computer.
14. SECURITY CENTER
⢠It is the place where you can set additional protection from
THREAT to your computer, especially when using the
internet.
ďąFIREWALL
⢠Helps in protecting your computer from unauthorized entries.
15. ďąAUTOMATIC UPDATES
⢠Another feature of windows which when turned on will automatically
download updates from Microsoft windows website.
ďąVIRUS PROTECTION
Usually about the current antivirus software installed in your computer.
ANTIVIRUS- meant to locate, find and remove virus threats that
are already in your computer
16. CONTEXTUAL SEARCH
⢠An attempt to be more precise in providing the list documents accounts to the
words use by the user to search the internet.
Steps in contextual research:
1. Identify or task definition
2. Topic or task definition
3. Identify methods of search
4. Identify resources of your research
5. Make your research strategies
6. Compiling the research results
7. Evaluate the results of your research
8. Create a list of your references for citation
17. Methods of search:
⢠Experiment âExplore âSURVEY
RESEARCH SKILLS
ďCRITICAL THINKING
- the ability to digest, reflect, and conclude from the information searched.
ď- the ability to look, verbalize, conceptualize and gather data attuned to the context of
the subject.
ďPROBLEM SOLVING CAPABILITY
- the ability to present solutions of solve problems by presenting a decision
based on the given information.
18. ďORGANIZED DATA MINING
- it is the ability to organize and catalogue all collected materials efficiently
despite data size.
ďRESEARCH PRESENTATION
- it is the ability to present ideas and draws conclusions from the research.
ďCREATIVITY AND DEVELOPED IMAGINATION
- it is the ability to look for alternative solutions to the problems needed to
solve in the research.
ďCOMPUTER LITERACY
- knowledge of the various computer applications and tools.
- skills in the use of software to write, design and present.
19. STEPS IN CONTEXTUALIZE RESEARCH:
1. Open the Google site
2. On the upper right side of the window click the Google App icon and click search
G
3. Lower right part of the window click settings and the Google search settings pop-
list will appear.
4. Click advanced search and the advance search windows will appear.
IDENTIFYING GOOD SOURCE FROM SATIRICAL SOURCE
⢠SATIRICAL SITES are websites that report untrue or false stories meant to
amuse or entertain.
20. HOW TO DETECT SATIRICAL NEWS:
1. If it is good to be true, then it must be so
2. If the news did not emanate from liable news site.
3. If they are from known satirical sites.
LIST OF TOP SOURCES OF SATIRICAL NEWS:
1. Adobo chronicles (adobchronicles.com)
2. So, what news?
3. Eritas times
4. Professional Heckler
LIST OF AMERICAN SATIRICAL SITES IN US
1. The onion
2. Clickhole
3. Christ wire global media
21. MAIL MERGE
⢠is used to automatically add mailing addresses or personalized
information to your publication.
MAILING START GROUP COMMANDS
NAME FUNCTION
MAIL MERGE Merges data into a publication which will be
printed and mailed.
EMAIL MERGE Merges data into a publication that will be sent as
e-mail.
SELECT RECEPIENTS Chooses the list of people you intended to send.
EDIT RECEPIENT LIST Make changes to the list of recipients.
INSERT MERGE FIELD Adds a field from your recipient list.
ADDRESS BLOCK Adds an address to your letter.
GREETING LINE Adds a greeting to your letter
PICTURE Adds a picture to your field.
22. HANDS ON USING MS. WORD TO CREATE A MAIL MERGE:
ďźStep 1: Creating a recipient list
ďźStep 2: Prepare your publication
ďźStep 3: Create merge publication
GENERATING LABELS
LABELSare used for envelopes that you intend to send out
to persons usually containing the name, address or telephone.
23. MS POWERPOINT
- it is an application intend in creating a slide presentation.
HOW TO CREATE A SLIDE PRESENTATION:
1.Open MS Power Point app.
2.Click new and select your preferred design template
3.Click insert tab menu and insert text, word art, or any object
needed in slide
4.Click home tab under, click insert new slide in your presentation.
24. ďśIs a spreadsheet developed by Microsoft for Windows,
macOS, Android and iOS. It features calculation, graphing
tools, pivot tables, and a macro programming language
called Visual Basic for Applications.
MS EXCEL
25. =SUM Calculates sum of average cells.
=AVERAGE Calculates the arithmetic mean of range of the
cells
=MAX Gives the maximum value in range.
=MIN Gives the minimum value in range.
=COUNT Counts the number of cells in a range.
=If Shows a series calculations
EXCEL FUNCTIONS
26. SOURCES OF PHOTOS AND GRAPHICS
They can come direct from your camera, old pictures, free from internet or
purchased from the internet.
1.PERSONAL AND PROFESSIONAL PHOTOS
- are photos taken by amateur or professional photographers.
- these images are downloaded and are stored in the computer.
2. SCANNED IMAGES
- are those that you transfer from printed photos and graphics using
scanning devices.
- these are mostly old pictures photographed before the digital age.
27. 3. STOCK PHOTO LIBRARY
- are several photographs and created images that are available for sale.
4. ONLINE STOCK PHOTO
- are found in WWW.
- advantage of this set up is that you do not have to go to places where
most of these photos were taken.
28. ONLINE DIGITAL FILE FORMATS FOR IMAGES AND TEXT
FILE FORMAT- the ways of encoding and storing this information to storage.
Digital file formats are categorized either proprietary or open:
PROPRIETARY FORMATS
⢠are owned and controlled by individuals or cooperation's.
⢠they are usually covered by copyrights and the owner has exclusive
control.
29. FILE FORMATS
FILE EXTENSIONS -are the suffixes at the end of the file name.
- is a means of identifying the format of the file
name
OPEN FORMATS
⢠are means and ways for storing digital information that are free
⢠can be used by public and are not encumbered by copyrights
30. THREE MAJOR GROUPS OF DIGITAL FILE FORMATS
1.UNCOMPRESSED OR RAW FORMAT
- is usually used for storing original file, it is flexible
form but needs a higher memory to store.
2. LOSSLESS FILE FORMAT
- is a file format that was compressed to replicate the
original quality but a reduced file size.
3.
31. IMAGE FILE FORMATS
- are standardized means of organizing and storing digital images.
ďąRASTER IMAGE FORMAT
- images faithfully display the color information.
- made of pixels
Examples:
â JPEG (Joint Photographic Expert Group)
â GIF (Graphics Interface Format)
â PNG ( Portable Network Graphics)
â BMP (Bitmap)
â TIFF (Tagged Image File Format)
â PCX (Picture Exchange)
32. ďąVECTOR IMAGES
- are lossless file created using mathematical geometric equations.
VECTOR IMAGE FORMAT OF GRAPHICS
- is preferred format for those who designed quality prints and display.
Types of formats:
1.PDF
2.Encapsulated postscript
3.Scalable Vector Graphics
4.Windows Metafile
File name extensions:
⢠.ai â .dxf
⢠.ps â .svg
⢠.drw
33. BASICS PRINCIPLES OF GRAPHICS AND LAYOUT
LAYOUT- is the process of planning and arranging graphics or text in a page or book
1.SYMMETRICAL
- there are equal weight of elements on both sides of the page
2.ASSYMETRICAL
- there is an artistic and different intensity on one side of the page.
3.TEXT
- the type should be visible legible and appropriate.
4. IMAGED
- should be appropriate with sharp color and high resolution.
34. 5. PROXIMITY AND HARMONY
- elements should be closed together and not scattered and arranged apart
from each other.
6. CONSISTENCY
- there should be uniformity of theme on each page.
7. COLOR AND SHAPED
- use color to create interest by providing variety in design like the use of
color contrast and shape.
8. EMPHASIS
- there should be one point of interest in page
35. PRINCIPLES AND BASIC TECHNIQUES OF IMAGE
MANIPULATION
Techniques of image manipulation:
oBACKGORUND AND COLOR
- change the background if it does not match the image
oMULTIPLE IMAGES
- combine multiple images to make a point or highlight message.
o SHADOW
- using shadow effect will make the image realistic.
36. oBLENDING COLOR
- use blending color to match the background with the other
elements.
oTEXTURE
- textures add to the depth of your art.
oEMPHASIS
- there should be a focal point to a page that will attract viewers.
o PROPORTION
- when combining image, resize image to make it proportionate.
37. COMBINING TEXT, GRAPHICS AND IMAGES
ď§ TRANSPARENT SHAPES
-add simple shape with a slight transparency behind your text to clearly see
the text.
ď§ FONTS AND SHAPES
- fonts and shape should complement with each other. You can use rounded
shapes with rounded fonts and sharp shapes and fonts.
ď§ TEXT AND BACKGROUND
- text and background should be aligned to have an organized look.
ď§ CLEAN AND CLEAR BACKGROUND
- use a clean and color background for the message to be readable.
38. BASIC MANIPULATION USING OFFLINE OR OPEN SOURE
SORTWARE
ďą VARIOUS OFFLINE OR OPEN SOURCE FOR IMAGE EDITING:
ď PICASA
- a Google free photo manager that edit and organize photo.
ď PAINT.NET
- it is a windows-based alternative to the MS PAINT.
ď GOOGLE SKETCH UP
- it is free 3D modeling program.
39. ďAUTODESK PIXL
- a free photo editing tool
- more than 600 effects.
ďADOBE PHOTOSHOP
- a tool to create modifying combine digital photos.
ďGIMP OR GNU
- used for image retouching and editing.
- Free, open source, image/graphic editing program
40. INSTALLING GIMP
1.Go to www.gimp.com
2.Then click download
3.Select download GIMP directly.
4.Run the GIMP installer.
5.Click install
6.Wait for it to finish the installation.
41. PRESENTATION AND VISUALIZATION
PRESENTATION
- is a graphics program that allows you to create slide shows presenting a
topic, lecture, demonstration.
- allows you to organize, summarize and format your materials.
- allows transitions and animations and sounds that will captivate the
audience.
Examples:
1. ZOHO SHOW
- online presentation that features master slides.
- ability to insert videos/images, transition and animations.
42. 2. LinkedInSlideShare
- web 2.0 based sliding hosting service.
- users can upload files privately or publicly in the FF formats
3. GOOGLE SLIDES
- create a new presentation and edit, collaborate with others and present
wherever you are free.
4. SLIDE ROCKET
- online presentation
5. MS POWERPOINT
- slide show presentation program currently developed by Microsoft.
6. PREZI
- cloud based presentation software based on a software as service model.