2. ICT
It is the umbrella that includes any
communication device or application,
encompassing; radio, television, computer and
etc.
Is the main method of communication ,getting
information and education , attaining services
and expressing social advocacies.
3. THE CURRENT STATE OF AN ICT
Web 1.0
There is no user interaction
Read only web
Web pages were static
No direct comment available
4. WEB 2.0
USED AROUND 2004
BECOME MORE AND MORE
INTERACTIVE
USED OF SOCIAL MEDIA BEGINS
THE USER CAN
INTERACT,CONTRIBUTE,AND CREATE
THEIR OWN INTERNET SPACE AND
CONTENT.
5. WEB 3.0
DISCOVERED BY TIM
BERNER’S LEE
REFERRED TO AS SEMANTIC
WEB OR DATA DRIVEN WEB
CONTENT AND RESPONSE
6. TECHNOLOGY CONVERGENCE
IT IS AN EVOLUTION OF
TECHNOLOGICAL DEVELOPMENT
THAT MERGE INTO A NEW
SYSTEM BRINGING TOGETHER
DIFFERENT TYPES OF
APPLICATION AND MEDIA
7. SOME ARE THE DIFFERENT TYPE OF APPLICATIONTHAT CONVERGE
NOWADAYS
SOCIAL MEDIA -IT IS A COLLECTION OF INTERNET BASED
COMMUNICATION TOOLS
-DEDICATED TO ALLOW USER TO INTERACT
FACEBOOK -IT IS A FREE SOCIAL NETWORKING SITE
-ALLOWS IT USER TO CREATE PROFILES
TWEETER -300 MILLION USERS IN 2016
-ALLOWS USER TO MICROBLOG OR
BROADCAST SHORT MESSAGES
CALLED “TWEETS”
INSTAGRAM -ENABLES TO USER TO FREE SHARE
MOBILE PHOTO AND VIDEO EITHER
PUBLICY OR PRIVATELY
SNAPCHAT -DESIGNED FOR PHOTO
SHARING,CHAT,AND MESSAGING
SERVICES
ASSISTIVE MEDIA -FOUNDED IN 1996
-READING SERVICES WITH VISUAL
AND READING IMPAIRMENTS
9. EMAILSPAM
KNOWN AS JUNK EMAIL,USUALLY UNSOLICITED
COMMERCIAL EMAIL SENT FROM ONE SOURCE WITH
IDENTICAL MESSAGE TO SENT TO MULTIPLE
RECIPIENTS.
SPAMMER IS TERM USED TO REFER TO A PERSON WHO
CREATES ELECTRONIC SPAM.
EMAILSPOOFING
A DECEITFUL EMAIL PRACTICE IN WHICH THE SENDER IS CHANGE, SO THAT IT
WOULD APPEAR TO HAVE CAME FROM DIFFERENT SOURCES USUALLY SOMEONE
YOU KNOW.
USUALLY USED BY SPAMMER TO HIDE THE ORIGIN OF THE SPAM.
10. PHISHING
A DECEITFUL PRACTICE OF TRYING TO GET
CONFIDENTIAL INFORMATION SUH AS PASSWORDS
AND USERNAME AND CREDIT CARD DETAILS BY
MAKING IT APPEAR AS IT COMES FROM
TRUSTWORTHY SOURCE.
PHARMING
A DANGEROUS HACKER ATTACK ON A WEBSITE WHICH
DIRECTS ALL TRAFFIC TO THAT WEBSITE TO ANOTHER
FICTITIOUS WEBSITE.
11. SPYWARE
IT IS A COMPUTER PROGRAM THAT IT IS INSTALLED
CONVERTLY ON A PERSON COMPUTER TO COLLECT
INFORMATION OR EVEN TAKE CONTROL OVER THE
COMPUTER WITHOUT KNOWLEDGE OF THE USER.
COMPUTER WORM
IS A DANGEROUS COMPUTER PROGRAM THAT
REPLICATES ITSELF THROUGH A NETWORK.
SOME WORMS DELETE FILES OTHERS DISRUPT
THE NETWORK FUNCTION AND STILL,OTHERS
SEND JUNK MAIL FROM EFFECTED FILES.
12. TROJANHORSE
A MALLICIOUS SOFTWARE FRONTING TO PERFORM A
GOOD TASK BUT CORRECTLY PERFORMS UNDESIRABLE
FUNCTIONS WITH INTENTIONS OF ENTERING THE
COMPUTER WITHOUT THE USER CONSENT.
CAN ERASE DATA ,CAN ALLOW ACCESS THE COMPUTER
VICTIMS
COMPUTERVIRUS
PROGRAM THAT DUPLICATES ITSELF AND INFECTS THE
COMPUTER VIRUS,WHEREIN IT ATTACKS ITSELF TO HOST
PROGRAM AND INFECT OTHER COMPUTER.
ITS SPREAD LIKE A BIOLOGICAL worm
13. HACKER
A PERSON WHO IS ABLE TO ENTER THE CONTROL OTHERS PEOPLE
WITHOUT AUTHORIZATION
BE ABLE TO ENTER ANOTHERS COMPUTER,USUALLR VANDALIZES
THE VICTIMS WEBSITE, STEALS PERSON INFORMATION,OBTAINS
INTELLECTUAL PROPERTY AND PERFOMS CREDIT CARD FRAUD.
15. SECURITY CENTER
THE PLACE WHERE YOU CAN SET
ADDITIONAL PROTECTION FROM
THREAT TO YOUR
COMPUTER,ESPECIALLY WHEN USING
THE INTERNET.
FIREWALL
HELPS IN PROTECTING YOUR COMPUTER FROM
UNAUTORIZED ENTRIES,VIRUSES OR WORMS
FROM THE INTERNET.
16. AUTHOMATIC UPDATES
ANOTHER FEATURE OF WINDOWS WHICH WHEN TURNED ON WILL
AUTOMICALLY DOWNLOAD UPDATES FROM MICROSOFT WINDOWS WEBSITE.
VIRUS PROTECTION
IS USUALLY ABOUT THE CURRENT ANTIVIRUS SOFTWARE INSTALLED IN
YOUR COMPUTER.
ANTIVIRUS
SOFTWARE IS MEANT TO LOCATE,FIND AND REMOVE VIRUS THREATS THAT
ALREADY IN YOUR COMPUTER
17. CONTEXTUAL SEARCH
ATTEMPT TO BE MORE PRECISE IN
PROVIDING THE LIST DOCUMENTS
ACCORDING THE WORDS USED BY
THE USER TO SEARCH THE
INTERNET
A GOOD CONTEXTUAL SEARCH
ENGINE WOULD FOR MORE
INFORMATION TO NARROW DOWN
THE RESULT OF THE SEARCH.
18. STEPS FOR RESEARCH
IDENTIFY OR CHOOSE A TOPIC
TOPIC OR TASK DEFINITION
IDENTIFY METHODS OF RESEARCH
IDENTIFY RESOURCES OF YOUR RESEARCH
COMPILING THE RESEARCH RESULTS
EVALUATE THE RESULT OF YOUR RESEARCH
CREATE A LIST OF YOUR REFENCES FOR CITATION
20. CRITICAL THINKING
IT IS THE ABILITY TO DIGEST, REFLECT,AND
CONCLUDE FROM THE INFORMATION SEARCHED.
ANALYTICAL THINKING
THE ABILITY TO LOOK, VARBALIZE, CONCEPTUALIZE,
AND GATHER DATA ATTUNED TO THE CONTEXT OF
THE SUBJECT.
THE ABILITY TO APPLY SYNTHESIS, FOCUS AND
CRITICAL THINKING TO EXTRACT THE USEFUL
INFORMATION.
21. PROBLEM SOLVING CAPABILITY
THE ABILITY TO PRESENT SOLUTIONS OR SOLVE PROBLEMS BY
PRESENTING A DECITION BASED ON THE GIVEN INFORMATION.
PEOPLE WITH THIS ABILITY ARE ABLE TO DEFINE AND IDENTIFY
THE LATITUDE OF THE PROBLEM AND PRESENT ALL POSSIBLE
SOLUTIONS.
ORGANIZED DATA MINING
IT IS THE ABILITY TO ORGANIZED AND CATALOGUE ALL
COLLECTED MATERIALS EFFICIENTLY DESPITE DATA SIZE.
22. ARCH PRESENTATION
IT RESEIS THE ABILITY TO PRESENT
IDEAS AND DRAW CONCLUSIONS
FROM THE RESEARCH.
BE ABLE TO EXPLAIN IN WRITING
THE PURPOSE, STEPS,GOALS AND
OBJECTIVE OF THE RESEARCH.
CREATIVITY AND
DEVELOPMENT IMAGINATION
IT IS THE ABILITY TO LOOK FOR
ALTERNATIVE SOLUTIONS TO THE
PROBLEMS NEEDED TO SOLVE IN
THE RESEARCH.
23. COMPUTER LITERACY
KNOWLEDGE OF THE VARIOUS
COMPUTER APPLICATIONS AND
TOOLS.
SKILLS IN THE USE OF SOFTWARE
TO DESIGN, AND PRESENT.
24. STEPS in MAKING CONTEXTUALIZE SEARCH
o Open the google first.
o On the upper right side of the window click the google apps a
icon and click search G.
o On the lower right part of the window click settings add the
google search setting POP-UP list win appear.
o Click advance search and advance search window will appear.
25. LIST OF TOP SOURCES OF SATIRICAL NEWS
1. Adobo chronicles
2. SO, WHAT’S NEWS??
3. Erita’s what news word press-com
4. The professional hictler.
26. LIST OF AMERICAN SATIRICAL SITES IN
THE U.S
1. The onion
2. Click hole
3. Christ wire global
27. Mail Merge and Label Generation
• Is used to automatically add mailing addresses or personalized
informantions.
MailMerge Merges data into a
publication which will be
printed and mail shows
step by step mail merge
wizard.
28. Email merge
o Merges data into a publication that will be sent as email
Select recipient list
o Choose the people to intend the letter
Edit recipient list
o Make changes to the list receipient and decide which of them
should receive your letter.
29. Parts of mail merge
Recipient list
Publication with merge fields
Merged
Click ok
30. Step in creating recipient list
1. Creating a recipient list
2. Prepare your publication
3. Create, merged publication
4. Add to existing publication
31. Generating labels
Labels in generating for envelopes
that you intend to send out to
persons usually containing the
name, address or telephone.
32. Steps in generating labels
1. Start a new document in MS world
2. Go to the mailings tab, in the create group, click labels
and the envelope and labels dialog box will appear.
3. In the address box type the text that you want in the label
33. 4.Click the insert address if icon if you have an address stored in
the electronic address box.
5.To exchange the font or paragraph formatting select the text ,
click and select the option from the drop down menu.
6.Click option button and labels option dialog box will appear.
7.Select the settings like the type of printer, the supplier produced
your labels sheet and others.
34. 8.After make the settings click ok
9.Under print select full page of the same label or single
label then in the rows and columns boxes enter the
numbers that match the numbers of rows and columns on
the label sheet for the label that you want to print.
10.Click print
35. How to create slide Presentation
• Open MS PowerPoint application
• Click new and select your preferred design
template
• Click insert tab menu and insert text word or
any object in the slide.
• Click home tab to insert menu slide in.
36. MS EXCEL
Is used to compute costs incurred in the creation
project
Create tables for finding the reasonable
Create reports for business or research that you are
doing.
37. Excel Functions
Sum -calculate the sum of a range of
cells
Average -calculate the arithmetic mean of
the cells
Max -give the maximum value of the
range
Min -give the minimum value of the
range
Count -counts the number of a range in a
cell
If -shows a series of a calculations
38. Sources of Photos and Graphics
There are so many sources of photos and
graphics.
Come direct from your camera, old
pictures, free from internet or purchased
from the internet.
39. Some are the list of sources of photos and graphics
Personal and professional photos
-taken by amateur or professional using camera
-images are downloaded and stored in the computer
-original and definitely something one would like to work on.
40. Scanned images
-those are transferred from printed photos and graphics
-using scanning devices improvement and modification
-mostly old picture photographed from the digital age.
Stock photos library
-images that are available for sale
-come from cd and DVD format
-they can be used without additional fees
41. Online stock photos
-found in the world wide web.
-copyright free photos and other
media
-you do not have go to the places
that you like because there
photos were mostly taken.
42. Online digital formats for images and text
File format
-the ways of encoding and storing information to storage
File format will categorizedinto2;
Proprietaryformats
-controlled by individuals this file format will not available to public
Openfile format
These are used to the public that no one has controlled on them.
43. Digital file format categorized into three major
Uncompressed or raw format
-used for storing original file format it is a flexible
but needs bigger memory to store
Lossless file format
-compressed to replicate the original quality but a
reduced file size
Losy file format
-it is a uncompressed file format
44. Image file format
Raster image file format
-is means of representing digital images in bits of information for storage
Pixel
-is the smallest information of an image
45. Basic principles of graphics and layout
Layout
-is the process of planning and arranging graphics
or text in a page or book.
Graphic
-is an image or visual representation.
Symmetrical
-there should be equal weights or elements or
balance
46. Asymmetrical
-is not balance there is an artistic
Basic principle
Text
Image
Proximity andharmony
Color andshape
Emphasis
47. Combining text , graphics , andimages
In your presentation image make your clearer
Transparent shapes
Add simple shapes with a slight transparency
behind your text to become clearly.
Fonts and shape
Text and background
Clean and clear background
48. Basic manipulation using offline or opensource
software
Manipulation
-photo editing tools allow you to make manipulate or edit
messages
49. Various offline a open source for image editing
Picasa
-google free editing and organize image
Paint.net
-free open source available to window
Googlesketchup
-allow you to create 3d models of houses
Autodesk pixlr
-free editing that similar to Photoshop
50. Adobe Photoshop
-modify and combine and optimize digital
photos and images
Gimp or gnu image manipulation program
-used for image editing and retouching
drawing and painting other specialized tasks.