SlideShare a Scribd company logo
1 of 51
EMPOWERMENT
TECHNOLOGY
By: Melanie Gozon
Reno Lastra
ICT
 It is the umbrella that includes any
communication device or application,
encompassing; radio, television, computer and
etc.
 Is the main method of communication ,getting
information and education , attaining services
and expressing social advocacies.
THE CURRENT STATE OF AN ICT
Web 1.0
 There is no user interaction
 Read only web
 Web pages were static
 No direct comment available
 WEB 2.0
 USED AROUND 2004
 BECOME MORE AND MORE
INTERACTIVE
 USED OF SOCIAL MEDIA BEGINS
 THE USER CAN
INTERACT,CONTRIBUTE,AND CREATE
THEIR OWN INTERNET SPACE AND
CONTENT.
WEB 3.0
 DISCOVERED BY TIM
BERNER’S LEE
 REFERRED TO AS SEMANTIC
WEB OR DATA DRIVEN WEB
CONTENT AND RESPONSE
TECHNOLOGY CONVERGENCE
 IT IS AN EVOLUTION OF
TECHNOLOGICAL DEVELOPMENT
THAT MERGE INTO A NEW
SYSTEM BRINGING TOGETHER
DIFFERENT TYPES OF
APPLICATION AND MEDIA
SOME ARE THE DIFFERENT TYPE OF APPLICATIONTHAT CONVERGE
NOWADAYS
SOCIAL MEDIA -IT IS A COLLECTION OF INTERNET BASED
COMMUNICATION TOOLS
-DEDICATED TO ALLOW USER TO INTERACT
FACEBOOK -IT IS A FREE SOCIAL NETWORKING SITE
-ALLOWS IT USER TO CREATE PROFILES
TWEETER -300 MILLION USERS IN 2016
-ALLOWS USER TO MICROBLOG OR
BROADCAST SHORT MESSAGES
CALLED “TWEETS”
INSTAGRAM -ENABLES TO USER TO FREE SHARE
MOBILE PHOTO AND VIDEO EITHER
PUBLICY OR PRIVATELY
SNAPCHAT -DESIGNED FOR PHOTO
SHARING,CHAT,AND MESSAGING
SERVICES
ASSISTIVE MEDIA -FOUNDED IN 1996
-READING SERVICES WITH VISUAL
AND READING IMPAIRMENTS
DANGEROUS ON
ONLINE
EMAILSPAM
 KNOWN AS JUNK EMAIL,USUALLY UNSOLICITED
COMMERCIAL EMAIL SENT FROM ONE SOURCE WITH
IDENTICAL MESSAGE TO SENT TO MULTIPLE
RECIPIENTS.
 SPAMMER IS TERM USED TO REFER TO A PERSON WHO
CREATES ELECTRONIC SPAM.
EMAILSPOOFING
 A DECEITFUL EMAIL PRACTICE IN WHICH THE SENDER IS CHANGE, SO THAT IT
WOULD APPEAR TO HAVE CAME FROM DIFFERENT SOURCES USUALLY SOMEONE
YOU KNOW.
 USUALLY USED BY SPAMMER TO HIDE THE ORIGIN OF THE SPAM.
 PHISHING
 A DECEITFUL PRACTICE OF TRYING TO GET
CONFIDENTIAL INFORMATION SUH AS PASSWORDS
AND USERNAME AND CREDIT CARD DETAILS BY
MAKING IT APPEAR AS IT COMES FROM
TRUSTWORTHY SOURCE.
 PHARMING
 A DANGEROUS HACKER ATTACK ON A WEBSITE WHICH
DIRECTS ALL TRAFFIC TO THAT WEBSITE TO ANOTHER
FICTITIOUS WEBSITE.
SPYWARE
 IT IS A COMPUTER PROGRAM THAT IT IS INSTALLED
CONVERTLY ON A PERSON COMPUTER TO COLLECT
INFORMATION OR EVEN TAKE CONTROL OVER THE
COMPUTER WITHOUT KNOWLEDGE OF THE USER.
COMPUTER WORM
 IS A DANGEROUS COMPUTER PROGRAM THAT
REPLICATES ITSELF THROUGH A NETWORK.
 SOME WORMS DELETE FILES OTHERS DISRUPT
THE NETWORK FUNCTION AND STILL,OTHERS
SEND JUNK MAIL FROM EFFECTED FILES.
 TROJANHORSE
 A MALLICIOUS SOFTWARE FRONTING TO PERFORM A
GOOD TASK BUT CORRECTLY PERFORMS UNDESIRABLE
FUNCTIONS WITH INTENTIONS OF ENTERING THE
COMPUTER WITHOUT THE USER CONSENT.
 CAN ERASE DATA ,CAN ALLOW ACCESS THE COMPUTER
VICTIMS
 COMPUTERVIRUS
 PROGRAM THAT DUPLICATES ITSELF AND INFECTS THE
COMPUTER VIRUS,WHEREIN IT ATTACKS ITSELF TO HOST
PROGRAM AND INFECT OTHER COMPUTER.
 ITS SPREAD LIKE A BIOLOGICAL worm
HACKER
 A PERSON WHO IS ABLE TO ENTER THE CONTROL OTHERS PEOPLE
WITHOUT AUTHORIZATION
 BE ABLE TO ENTER ANOTHERS COMPUTER,USUALLR VANDALIZES
THE VICTIMS WEBSITE, STEALS PERSON INFORMATION,OBTAINS
INTELLECTUAL PROPERTY AND PERFOMS CREDIT CARD FRAUD.
SOME POSSIBLE WAYS
TO PROTECT IN
DANGER ONLINE
 SECURITY CENTER
THE PLACE WHERE YOU CAN SET
ADDITIONAL PROTECTION FROM
THREAT TO YOUR
COMPUTER,ESPECIALLY WHEN USING
THE INTERNET.
FIREWALL
HELPS IN PROTECTING YOUR COMPUTER FROM
UNAUTORIZED ENTRIES,VIRUSES OR WORMS
FROM THE INTERNET.
AUTHOMATIC UPDATES
 ANOTHER FEATURE OF WINDOWS WHICH WHEN TURNED ON WILL
AUTOMICALLY DOWNLOAD UPDATES FROM MICROSOFT WINDOWS WEBSITE.
 VIRUS PROTECTION
 IS USUALLY ABOUT THE CURRENT ANTIVIRUS SOFTWARE INSTALLED IN
YOUR COMPUTER.
 ANTIVIRUS
 SOFTWARE IS MEANT TO LOCATE,FIND AND REMOVE VIRUS THREATS THAT
ALREADY IN YOUR COMPUTER
CONTEXTUAL SEARCH
ATTEMPT TO BE MORE PRECISE IN
PROVIDING THE LIST DOCUMENTS
ACCORDING THE WORDS USED BY
THE USER TO SEARCH THE
INTERNET
A GOOD CONTEXTUAL SEARCH
ENGINE WOULD FOR MORE
INFORMATION TO NARROW DOWN
THE RESULT OF THE SEARCH.
STEPS FOR RESEARCH
 IDENTIFY OR CHOOSE A TOPIC
 TOPIC OR TASK DEFINITION
 IDENTIFY METHODS OF RESEARCH
 IDENTIFY RESOURCES OF YOUR RESEARCH
 COMPILING THE RESEARCH RESULTS
 EVALUATE THE RESULT OF YOUR RESEARCH
 CREATE A LIST OF YOUR REFENCES FOR CITATION
SKILLS IN RESEARCH
 CRITICAL THINKING
 IT IS THE ABILITY TO DIGEST, REFLECT,AND
CONCLUDE FROM THE INFORMATION SEARCHED.
ANALYTICAL THINKING
 THE ABILITY TO LOOK, VARBALIZE, CONCEPTUALIZE,
AND GATHER DATA ATTUNED TO THE CONTEXT OF
THE SUBJECT.
 THE ABILITY TO APPLY SYNTHESIS, FOCUS AND
CRITICAL THINKING TO EXTRACT THE USEFUL
INFORMATION.
PROBLEM SOLVING CAPABILITY
 THE ABILITY TO PRESENT SOLUTIONS OR SOLVE PROBLEMS BY
PRESENTING A DECITION BASED ON THE GIVEN INFORMATION.
 PEOPLE WITH THIS ABILITY ARE ABLE TO DEFINE AND IDENTIFY
THE LATITUDE OF THE PROBLEM AND PRESENT ALL POSSIBLE
SOLUTIONS.
ORGANIZED DATA MINING
 IT IS THE ABILITY TO ORGANIZED AND CATALOGUE ALL
COLLECTED MATERIALS EFFICIENTLY DESPITE DATA SIZE.
 ARCH PRESENTATION
 IT RESEIS THE ABILITY TO PRESENT
IDEAS AND DRAW CONCLUSIONS
FROM THE RESEARCH.
 BE ABLE TO EXPLAIN IN WRITING
THE PURPOSE, STEPS,GOALS AND
OBJECTIVE OF THE RESEARCH.
CREATIVITY AND
DEVELOPMENT IMAGINATION
 IT IS THE ABILITY TO LOOK FOR
ALTERNATIVE SOLUTIONS TO THE
PROBLEMS NEEDED TO SOLVE IN
THE RESEARCH.
COMPUTER LITERACY
 KNOWLEDGE OF THE VARIOUS
COMPUTER APPLICATIONS AND
TOOLS.
 SKILLS IN THE USE OF SOFTWARE
TO DESIGN, AND PRESENT.
 STEPS in MAKING CONTEXTUALIZE SEARCH
o Open the google first.
o On the upper right side of the window click the google apps a
icon and click search G.
o On the lower right part of the window click settings add the
google search setting POP-UP list win appear.
o Click advance search and advance search window will appear.
 LIST OF TOP SOURCES OF SATIRICAL NEWS
1. Adobo chronicles
2. SO, WHAT’S NEWS??
3. Erita’s what news word press-com
4. The professional hictler.
LIST OF AMERICAN SATIRICAL SITES IN
THE U.S
1. The onion
2. Click hole
3. Christ wire global
Mail Merge and Label Generation
• Is used to automatically add mailing addresses or personalized
informantions.
 MailMerge Merges data into a
publication which will be
printed and mail shows
step by step mail merge
wizard.
 Email merge
o Merges data into a publication that will be sent as email
 Select recipient list
o Choose the people to intend the letter
 Edit recipient list
o Make changes to the list receipient and decide which of them
should receive your letter.
Parts of mail merge
 Recipient list
 Publication with merge fields
 Merged
 Click ok
Step in creating recipient list
1. Creating a recipient list
2. Prepare your publication
3. Create, merged publication
4. Add to existing publication
Generating labels
 Labels in generating for envelopes
that you intend to send out to
persons usually containing the
name, address or telephone.
 Steps in generating labels
1. Start a new document in MS world
2. Go to the mailings tab, in the create group, click labels
and the envelope and labels dialog box will appear.
3. In the address box type the text that you want in the label
4.Click the insert address if icon if you have an address stored in
the electronic address box.
5.To exchange the font or paragraph formatting select the text ,
click and select the option from the drop down menu.
6.Click option button and labels option dialog box will appear.
7.Select the settings like the type of printer, the supplier produced
your labels sheet and others.
8.After make the settings click ok
9.Under print select full page of the same label or single
label then in the rows and columns boxes enter the
numbers that match the numbers of rows and columns on
the label sheet for the label that you want to print.
10.Click print
How to create slide Presentation
• Open MS PowerPoint application
• Click new and select your preferred design
template
• Click insert tab menu and insert text word or
any object in the slide.
• Click home tab to insert menu slide in.
MS EXCEL
 Is used to compute costs incurred in the creation
project
 Create tables for finding the reasonable
 Create reports for business or research that you are
doing.
Excel Functions
Sum -calculate the sum of a range of
cells
Average -calculate the arithmetic mean of
the cells
Max -give the maximum value of the
range
Min -give the minimum value of the
range
Count -counts the number of a range in a
cell
If -shows a series of a calculations
Sources of Photos and Graphics
 There are so many sources of photos and
graphics.
 Come direct from your camera, old
pictures, free from internet or purchased
from the internet.
Some are the list of sources of photos and graphics
Personal and professional photos
-taken by amateur or professional using camera
-images are downloaded and stored in the computer
-original and definitely something one would like to work on.
Scanned images
-those are transferred from printed photos and graphics
-using scanning devices improvement and modification
-mostly old picture photographed from the digital age.
Stock photos library
-images that are available for sale
-come from cd and DVD format
-they can be used without additional fees
Online stock photos
-found in the world wide web.
-copyright free photos and other
media
-you do not have go to the places
that you like because there
photos were mostly taken.
Online digital formats for images and text
File format
-the ways of encoding and storing information to storage
 File format will categorizedinto2;
 Proprietaryformats
-controlled by individuals this file format will not available to public
 Openfile format
 These are used to the public that no one has controlled on them.
Digital file format categorized into three major
Uncompressed or raw format
-used for storing original file format it is a flexible
but needs bigger memory to store
 Lossless file format
-compressed to replicate the original quality but a
reduced file size
 Losy file format
-it is a uncompressed file format
Image file format
Raster image file format
-is means of representing digital images in bits of information for storage
Pixel
-is the smallest information of an image
Basic principles of graphics and layout
Layout
-is the process of planning and arranging graphics
or text in a page or book.
 Graphic
-is an image or visual representation.
 Symmetrical
-there should be equal weights or elements or
balance
 Asymmetrical
-is not balance there is an artistic
 Basic principle
 Text
 Image
 Proximity andharmony
 Color andshape
 Emphasis
Combining text , graphics , andimages
 In your presentation image make your clearer
 Transparent shapes
 Add simple shapes with a slight transparency
behind your text to become clearly.
 Fonts and shape
 Text and background
 Clean and clear background
Basic manipulation using offline or opensource
software
Manipulation
-photo editing tools allow you to make manipulate or edit
messages
Various offline a open source for image editing
 Picasa
-google free editing and organize image
 Paint.net
-free open source available to window
 Googlesketchup
-allow you to create 3d models of houses
 Autodesk pixlr
-free editing that similar to Photoshop
Adobe Photoshop
-modify and combine and optimize digital
photos and images
Gimp or gnu image manipulation program
-used for image editing and retouching
drawing and painting other specialized tasks.
Gimp windows
 Toolbox
 Tool options
 Image window
 Layers dialog
 Brushes patterns gradients

More Related Content

What's hot

Empowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena MastalEmpowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena MastalPadsromel
 
Empowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny RocesEmpowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny RocesPadsromel
 
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY   diana cerojales and jude bagayEMPOWERMENT TECHNOLOGY   diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagayniniogolo
 
Empowerment technology by ybonne amor and jesha
Empowerment technology by ybonne amor and jeshaEmpowerment technology by ybonne amor and jesha
Empowerment technology by ybonne amor and jeshaYbonnica22
 
Empowerment Technology
Empowerment TechnologyEmpowerment Technology
Empowerment TechnologyLardizabal21
 
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYkillersmile1
 
Lea pagoyo final(1)
Lea pagoyo final(1)Lea pagoyo final(1)
Lea pagoyo final(1)jonaspalen1
 
EMPOWERMENT TECHNOLOGY by jessabel & mary grace
EMPOWERMENT TECHNOLOGY by jessabel & mary graceEMPOWERMENT TECHNOLOGY by jessabel & mary grace
EMPOWERMENT TECHNOLOGY by jessabel & mary graceobus25
 
Information and Communication Technology (ICT) - Empowerment Technologies
Information and Communication Technology (ICT) - Empowerment TechnologiesInformation and Communication Technology (ICT) - Empowerment Technologies
Information and Communication Technology (ICT) - Empowerment TechnologiesMark Jhon Oxillo
 
Divine Gono and Peter Paul Gato
Divine Gono and Peter Paul GatoDivine Gono and Peter Paul Gato
Divine Gono and Peter Paul GatoVineGono
 
Empowerment Technology by:jewelyn,liezel,mary joy,bryll
Empowerment Technology by:jewelyn,liezel,mary joy,bryllEmpowerment Technology by:jewelyn,liezel,mary joy,bryll
Empowerment Technology by:jewelyn,liezel,mary joy,brylljoanagolo4ever
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SJuvywen
 
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology  by: Geraldine Salve Pepe and Lailanie PepeEpowerment Technology  by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepesalvepepe
 
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONImpowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONCedricPada
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyesandregoron
 
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO LEIBE MAE GERONA APRIL ROSE GARON...
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO  LEIBE MAE GERONA APRIL ROSE GARON...EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO  LEIBE MAE GERONA APRIL ROSE GARON...
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO LEIBE MAE GERONA APRIL ROSE GARON...LanieGailGato
 

What's hot (20)

Empowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena MastalEmpowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena Mastal
 
Empowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny RocesEmpowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny Roces
 
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY   diana cerojales and jude bagayEMPOWERMENT TECHNOLOGY   diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagay
 
Empowerment technology by ybonne amor and jesha
Empowerment technology by ybonne amor and jeshaEmpowerment technology by ybonne amor and jesha
Empowerment technology by ybonne amor and jesha
 
Empowerment Technology
Empowerment TechnologyEmpowerment Technology
Empowerment Technology
 
ICT
ICTICT
ICT
 
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
 
Lea pagoyo final(1)
Lea pagoyo final(1)Lea pagoyo final(1)
Lea pagoyo final(1)
 
EMPOWERMENT TECHNOLOGY by jessabel & mary grace
EMPOWERMENT TECHNOLOGY by jessabel & mary graceEMPOWERMENT TECHNOLOGY by jessabel & mary grace
EMPOWERMENT TECHNOLOGY by jessabel & mary grace
 
Internet Research
Internet ResearchInternet Research
Internet Research
 
Information and Communication Technology (ICT) - Empowerment Technologies
Information and Communication Technology (ICT) - Empowerment TechnologiesInformation and Communication Technology (ICT) - Empowerment Technologies
Information and Communication Technology (ICT) - Empowerment Technologies
 
Divine Gono and Peter Paul Gato
Divine Gono and Peter Paul GatoDivine Gono and Peter Paul Gato
Divine Gono and Peter Paul Gato
 
Gwapo
GwapoGwapo
Gwapo
 
Empowerment Technology by:jewelyn,liezel,mary joy,bryll
Empowerment Technology by:jewelyn,liezel,mary joy,bryllEmpowerment Technology by:jewelyn,liezel,mary joy,bryll
Empowerment Technology by:jewelyn,liezel,mary joy,bryll
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1S
 
Etech activity
Etech activityEtech activity
Etech activity
 
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology  by: Geraldine Salve Pepe and Lailanie PepeEpowerment Technology  by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
 
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONImpowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
 
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO LEIBE MAE GERONA APRIL ROSE GARON...
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO  LEIBE MAE GERONA APRIL ROSE GARON...EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO  LEIBE MAE GERONA APRIL ROSE GARON...
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO LEIBE MAE GERONA APRIL ROSE GARON...
 

Similar to Melanie g done 6565

EMPOWERMENT TECHNOLOGIES
EMPOWERMENT TECHNOLOGIESEMPOWERMENT TECHNOLOGIES
EMPOWERMENT TECHNOLOGIESagielyn
 
Activity wendy fritz jamaica 123
Activity wendy fritz jamaica 123Activity wendy fritz jamaica 123
Activity wendy fritz jamaica 123Ybonnica22
 
empowerment technologies by: aiza martin and patricia obor
empowerment technologies  by: aiza martin and patricia oborempowerment technologies  by: aiza martin and patricia obor
empowerment technologies by: aiza martin and patricia obormartinaiza
 
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...joanagolo4ever
 
Ict information communication technology
Ict  information communication technologyIct  information communication technology
Ict information communication technologyniniogolo
 
Empowerment technology
Empowerment technology Empowerment technology
Empowerment technology jonaspalen1
 
How to get genuine windows 7 with low cost
How to get genuine windows 7 with low cost How to get genuine windows 7 with low cost
How to get genuine windows 7 with low cost coldfire007
 
empowerment technology by: kier and joveryn
empowerment technology by: kier and joverynempowerment technology by: kier and joveryn
empowerment technology by: kier and joverynkiersamaco
 
Empowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judithEmpowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judithmhedilyn8556
 
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumela
Empowerment Technology  by: Jhames Andre M. Goron and Elijohn G. GumelaEmpowerment Technology  by: Jhames Andre M. Goron and Elijohn G. Gumela
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumelaandregoron
 
Software. intranet. e crime
Software. intranet. e crimeSoftware. intranet. e crime
Software. intranet. e crimejuliakad84
 
Migo my labs
Migo my labsMigo my labs
Migo my labsrairuta
 
Research Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docxResearch Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docxaudeleypearl
 

Similar to Melanie g done 6565 (18)

EMPOWERMENT TECHNOLOGIES
EMPOWERMENT TECHNOLOGIESEMPOWERMENT TECHNOLOGIES
EMPOWERMENT TECHNOLOGIES
 
Activity wendy fritz jamaica 123
Activity wendy fritz jamaica 123Activity wendy fritz jamaica 123
Activity wendy fritz jamaica 123
 
Larra belle ict
Larra belle ictLarra belle ict
Larra belle ict
 
empowerment technologies by: aiza martin and patricia obor
empowerment technologies  by: aiza martin and patricia oborempowerment technologies  by: aiza martin and patricia obor
empowerment technologies by: aiza martin and patricia obor
 
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
 
Ict information communication technology
Ict  information communication technologyIct  information communication technology
Ict information communication technology
 
Jovanie garin ict
Jovanie garin ictJovanie garin ict
Jovanie garin ict
 
Shane
ShaneShane
Shane
 
Abegail
AbegailAbegail
Abegail
 
Empowerment technology
Empowerment technology Empowerment technology
Empowerment technology
 
How to get genuine windows 7 with low cost
How to get genuine windows 7 with low cost How to get genuine windows 7 with low cost
How to get genuine windows 7 with low cost
 
empowerment technology by: kier and joveryn
empowerment technology by: kier and joverynempowerment technology by: kier and joveryn
empowerment technology by: kier and joveryn
 
Christine
ChristineChristine
Christine
 
Empowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judithEmpowerment technology by mhedilyn and judith
Empowerment technology by mhedilyn and judith
 
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumela
Empowerment Technology  by: Jhames Andre M. Goron and Elijohn G. GumelaEmpowerment Technology  by: Jhames Andre M. Goron and Elijohn G. Gumela
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumela
 
Software. intranet. e crime
Software. intranet. e crimeSoftware. intranet. e crime
Software. intranet. e crime
 
Migo my labs
Migo my labsMigo my labs
Migo my labs
 
Research Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docxResearch Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docx
 

Recently uploaded

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 

Recently uploaded (20)

Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

Melanie g done 6565

  • 2. ICT  It is the umbrella that includes any communication device or application, encompassing; radio, television, computer and etc.  Is the main method of communication ,getting information and education , attaining services and expressing social advocacies.
  • 3. THE CURRENT STATE OF AN ICT Web 1.0  There is no user interaction  Read only web  Web pages were static  No direct comment available
  • 4.  WEB 2.0  USED AROUND 2004  BECOME MORE AND MORE INTERACTIVE  USED OF SOCIAL MEDIA BEGINS  THE USER CAN INTERACT,CONTRIBUTE,AND CREATE THEIR OWN INTERNET SPACE AND CONTENT.
  • 5. WEB 3.0  DISCOVERED BY TIM BERNER’S LEE  REFERRED TO AS SEMANTIC WEB OR DATA DRIVEN WEB CONTENT AND RESPONSE
  • 6. TECHNOLOGY CONVERGENCE  IT IS AN EVOLUTION OF TECHNOLOGICAL DEVELOPMENT THAT MERGE INTO A NEW SYSTEM BRINGING TOGETHER DIFFERENT TYPES OF APPLICATION AND MEDIA
  • 7. SOME ARE THE DIFFERENT TYPE OF APPLICATIONTHAT CONVERGE NOWADAYS SOCIAL MEDIA -IT IS A COLLECTION OF INTERNET BASED COMMUNICATION TOOLS -DEDICATED TO ALLOW USER TO INTERACT FACEBOOK -IT IS A FREE SOCIAL NETWORKING SITE -ALLOWS IT USER TO CREATE PROFILES TWEETER -300 MILLION USERS IN 2016 -ALLOWS USER TO MICROBLOG OR BROADCAST SHORT MESSAGES CALLED “TWEETS” INSTAGRAM -ENABLES TO USER TO FREE SHARE MOBILE PHOTO AND VIDEO EITHER PUBLICY OR PRIVATELY SNAPCHAT -DESIGNED FOR PHOTO SHARING,CHAT,AND MESSAGING SERVICES ASSISTIVE MEDIA -FOUNDED IN 1996 -READING SERVICES WITH VISUAL AND READING IMPAIRMENTS
  • 9. EMAILSPAM  KNOWN AS JUNK EMAIL,USUALLY UNSOLICITED COMMERCIAL EMAIL SENT FROM ONE SOURCE WITH IDENTICAL MESSAGE TO SENT TO MULTIPLE RECIPIENTS.  SPAMMER IS TERM USED TO REFER TO A PERSON WHO CREATES ELECTRONIC SPAM. EMAILSPOOFING  A DECEITFUL EMAIL PRACTICE IN WHICH THE SENDER IS CHANGE, SO THAT IT WOULD APPEAR TO HAVE CAME FROM DIFFERENT SOURCES USUALLY SOMEONE YOU KNOW.  USUALLY USED BY SPAMMER TO HIDE THE ORIGIN OF THE SPAM.
  • 10.  PHISHING  A DECEITFUL PRACTICE OF TRYING TO GET CONFIDENTIAL INFORMATION SUH AS PASSWORDS AND USERNAME AND CREDIT CARD DETAILS BY MAKING IT APPEAR AS IT COMES FROM TRUSTWORTHY SOURCE.  PHARMING  A DANGEROUS HACKER ATTACK ON A WEBSITE WHICH DIRECTS ALL TRAFFIC TO THAT WEBSITE TO ANOTHER FICTITIOUS WEBSITE.
  • 11. SPYWARE  IT IS A COMPUTER PROGRAM THAT IT IS INSTALLED CONVERTLY ON A PERSON COMPUTER TO COLLECT INFORMATION OR EVEN TAKE CONTROL OVER THE COMPUTER WITHOUT KNOWLEDGE OF THE USER. COMPUTER WORM  IS A DANGEROUS COMPUTER PROGRAM THAT REPLICATES ITSELF THROUGH A NETWORK.  SOME WORMS DELETE FILES OTHERS DISRUPT THE NETWORK FUNCTION AND STILL,OTHERS SEND JUNK MAIL FROM EFFECTED FILES.
  • 12.  TROJANHORSE  A MALLICIOUS SOFTWARE FRONTING TO PERFORM A GOOD TASK BUT CORRECTLY PERFORMS UNDESIRABLE FUNCTIONS WITH INTENTIONS OF ENTERING THE COMPUTER WITHOUT THE USER CONSENT.  CAN ERASE DATA ,CAN ALLOW ACCESS THE COMPUTER VICTIMS  COMPUTERVIRUS  PROGRAM THAT DUPLICATES ITSELF AND INFECTS THE COMPUTER VIRUS,WHEREIN IT ATTACKS ITSELF TO HOST PROGRAM AND INFECT OTHER COMPUTER.  ITS SPREAD LIKE A BIOLOGICAL worm
  • 13. HACKER  A PERSON WHO IS ABLE TO ENTER THE CONTROL OTHERS PEOPLE WITHOUT AUTHORIZATION  BE ABLE TO ENTER ANOTHERS COMPUTER,USUALLR VANDALIZES THE VICTIMS WEBSITE, STEALS PERSON INFORMATION,OBTAINS INTELLECTUAL PROPERTY AND PERFOMS CREDIT CARD FRAUD.
  • 14. SOME POSSIBLE WAYS TO PROTECT IN DANGER ONLINE
  • 15.  SECURITY CENTER THE PLACE WHERE YOU CAN SET ADDITIONAL PROTECTION FROM THREAT TO YOUR COMPUTER,ESPECIALLY WHEN USING THE INTERNET. FIREWALL HELPS IN PROTECTING YOUR COMPUTER FROM UNAUTORIZED ENTRIES,VIRUSES OR WORMS FROM THE INTERNET.
  • 16. AUTHOMATIC UPDATES  ANOTHER FEATURE OF WINDOWS WHICH WHEN TURNED ON WILL AUTOMICALLY DOWNLOAD UPDATES FROM MICROSOFT WINDOWS WEBSITE.  VIRUS PROTECTION  IS USUALLY ABOUT THE CURRENT ANTIVIRUS SOFTWARE INSTALLED IN YOUR COMPUTER.  ANTIVIRUS  SOFTWARE IS MEANT TO LOCATE,FIND AND REMOVE VIRUS THREATS THAT ALREADY IN YOUR COMPUTER
  • 17. CONTEXTUAL SEARCH ATTEMPT TO BE MORE PRECISE IN PROVIDING THE LIST DOCUMENTS ACCORDING THE WORDS USED BY THE USER TO SEARCH THE INTERNET A GOOD CONTEXTUAL SEARCH ENGINE WOULD FOR MORE INFORMATION TO NARROW DOWN THE RESULT OF THE SEARCH.
  • 18. STEPS FOR RESEARCH  IDENTIFY OR CHOOSE A TOPIC  TOPIC OR TASK DEFINITION  IDENTIFY METHODS OF RESEARCH  IDENTIFY RESOURCES OF YOUR RESEARCH  COMPILING THE RESEARCH RESULTS  EVALUATE THE RESULT OF YOUR RESEARCH  CREATE A LIST OF YOUR REFENCES FOR CITATION
  • 20.  CRITICAL THINKING  IT IS THE ABILITY TO DIGEST, REFLECT,AND CONCLUDE FROM THE INFORMATION SEARCHED. ANALYTICAL THINKING  THE ABILITY TO LOOK, VARBALIZE, CONCEPTUALIZE, AND GATHER DATA ATTUNED TO THE CONTEXT OF THE SUBJECT.  THE ABILITY TO APPLY SYNTHESIS, FOCUS AND CRITICAL THINKING TO EXTRACT THE USEFUL INFORMATION.
  • 21. PROBLEM SOLVING CAPABILITY  THE ABILITY TO PRESENT SOLUTIONS OR SOLVE PROBLEMS BY PRESENTING A DECITION BASED ON THE GIVEN INFORMATION.  PEOPLE WITH THIS ABILITY ARE ABLE TO DEFINE AND IDENTIFY THE LATITUDE OF THE PROBLEM AND PRESENT ALL POSSIBLE SOLUTIONS. ORGANIZED DATA MINING  IT IS THE ABILITY TO ORGANIZED AND CATALOGUE ALL COLLECTED MATERIALS EFFICIENTLY DESPITE DATA SIZE.
  • 22.  ARCH PRESENTATION  IT RESEIS THE ABILITY TO PRESENT IDEAS AND DRAW CONCLUSIONS FROM THE RESEARCH.  BE ABLE TO EXPLAIN IN WRITING THE PURPOSE, STEPS,GOALS AND OBJECTIVE OF THE RESEARCH. CREATIVITY AND DEVELOPMENT IMAGINATION  IT IS THE ABILITY TO LOOK FOR ALTERNATIVE SOLUTIONS TO THE PROBLEMS NEEDED TO SOLVE IN THE RESEARCH.
  • 23. COMPUTER LITERACY  KNOWLEDGE OF THE VARIOUS COMPUTER APPLICATIONS AND TOOLS.  SKILLS IN THE USE OF SOFTWARE TO DESIGN, AND PRESENT.
  • 24.  STEPS in MAKING CONTEXTUALIZE SEARCH o Open the google first. o On the upper right side of the window click the google apps a icon and click search G. o On the lower right part of the window click settings add the google search setting POP-UP list win appear. o Click advance search and advance search window will appear.
  • 25.  LIST OF TOP SOURCES OF SATIRICAL NEWS 1. Adobo chronicles 2. SO, WHAT’S NEWS?? 3. Erita’s what news word press-com 4. The professional hictler.
  • 26. LIST OF AMERICAN SATIRICAL SITES IN THE U.S 1. The onion 2. Click hole 3. Christ wire global
  • 27. Mail Merge and Label Generation • Is used to automatically add mailing addresses or personalized informantions.  MailMerge Merges data into a publication which will be printed and mail shows step by step mail merge wizard.
  • 28.  Email merge o Merges data into a publication that will be sent as email  Select recipient list o Choose the people to intend the letter  Edit recipient list o Make changes to the list receipient and decide which of them should receive your letter.
  • 29. Parts of mail merge  Recipient list  Publication with merge fields  Merged  Click ok
  • 30. Step in creating recipient list 1. Creating a recipient list 2. Prepare your publication 3. Create, merged publication 4. Add to existing publication
  • 31. Generating labels  Labels in generating for envelopes that you intend to send out to persons usually containing the name, address or telephone.
  • 32.  Steps in generating labels 1. Start a new document in MS world 2. Go to the mailings tab, in the create group, click labels and the envelope and labels dialog box will appear. 3. In the address box type the text that you want in the label
  • 33. 4.Click the insert address if icon if you have an address stored in the electronic address box. 5.To exchange the font or paragraph formatting select the text , click and select the option from the drop down menu. 6.Click option button and labels option dialog box will appear. 7.Select the settings like the type of printer, the supplier produced your labels sheet and others.
  • 34. 8.After make the settings click ok 9.Under print select full page of the same label or single label then in the rows and columns boxes enter the numbers that match the numbers of rows and columns on the label sheet for the label that you want to print. 10.Click print
  • 35. How to create slide Presentation • Open MS PowerPoint application • Click new and select your preferred design template • Click insert tab menu and insert text word or any object in the slide. • Click home tab to insert menu slide in.
  • 36. MS EXCEL  Is used to compute costs incurred in the creation project  Create tables for finding the reasonable  Create reports for business or research that you are doing.
  • 37. Excel Functions Sum -calculate the sum of a range of cells Average -calculate the arithmetic mean of the cells Max -give the maximum value of the range Min -give the minimum value of the range Count -counts the number of a range in a cell If -shows a series of a calculations
  • 38. Sources of Photos and Graphics  There are so many sources of photos and graphics.  Come direct from your camera, old pictures, free from internet or purchased from the internet.
  • 39. Some are the list of sources of photos and graphics Personal and professional photos -taken by amateur or professional using camera -images are downloaded and stored in the computer -original and definitely something one would like to work on.
  • 40. Scanned images -those are transferred from printed photos and graphics -using scanning devices improvement and modification -mostly old picture photographed from the digital age. Stock photos library -images that are available for sale -come from cd and DVD format -they can be used without additional fees
  • 41. Online stock photos -found in the world wide web. -copyright free photos and other media -you do not have go to the places that you like because there photos were mostly taken.
  • 42. Online digital formats for images and text File format -the ways of encoding and storing information to storage  File format will categorizedinto2;  Proprietaryformats -controlled by individuals this file format will not available to public  Openfile format  These are used to the public that no one has controlled on them.
  • 43. Digital file format categorized into three major Uncompressed or raw format -used for storing original file format it is a flexible but needs bigger memory to store  Lossless file format -compressed to replicate the original quality but a reduced file size  Losy file format -it is a uncompressed file format
  • 44. Image file format Raster image file format -is means of representing digital images in bits of information for storage Pixel -is the smallest information of an image
  • 45. Basic principles of graphics and layout Layout -is the process of planning and arranging graphics or text in a page or book.  Graphic -is an image or visual representation.  Symmetrical -there should be equal weights or elements or balance
  • 46.  Asymmetrical -is not balance there is an artistic  Basic principle  Text  Image  Proximity andharmony  Color andshape  Emphasis
  • 47. Combining text , graphics , andimages  In your presentation image make your clearer  Transparent shapes  Add simple shapes with a slight transparency behind your text to become clearly.  Fonts and shape  Text and background  Clean and clear background
  • 48. Basic manipulation using offline or opensource software Manipulation -photo editing tools allow you to make manipulate or edit messages
  • 49. Various offline a open source for image editing  Picasa -google free editing and organize image  Paint.net -free open source available to window  Googlesketchup -allow you to create 3d models of houses  Autodesk pixlr -free editing that similar to Photoshop
  • 50. Adobe Photoshop -modify and combine and optimize digital photos and images Gimp or gnu image manipulation program -used for image editing and retouching drawing and painting other specialized tasks.
  • 51. Gimp windows  Toolbox  Tool options  Image window  Layers dialog  Brushes patterns gradients