The document discusses the history and evolution of the World Wide Web from Web 1.0 to Web 2.0. Web 1.0 featured a read-only web with few content creators and no user interaction. Web 2.0 arose around 2004 and enabled increased user contribution, interaction, and creation of user-generated content through technologies like social media and WiFi. Web 2.0 transformed the web into a more dynamic and community-oriented platform.
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumelaandregoron
The document discusses current trends in information and communication technologies (ICT). It begins by describing the evolution from Web 1.0, which had few content creators and static pages, to Web 2.0 which enabled more user interaction and user-generated content through tools like blogs, wikis, and social media. It then discusses the rise of smartphones that combine functions of multiple devices, and various social media platforms like Facebook, Twitter, Instagram, and Snapchat. The document also covers topics like computer viruses, hacking, phishing, and how to protect against these online threats.
The document discusses today's generation and their use of technology. It notes that while people today are very active with technologies like phones, tablets, and laptops, some are ignorant of the potential harms of overuse. It also comments that the Japanese are very skilled with technology and unique in their gadget-making abilities.
EMPOWERMENT TECHNOLOGY by jessabel & mary graceobus25
The document provides an overview of various topics related to empowerment through technology including:
- ICT and the state of internet technology including web 1.0, 2.0, and 3.0.
- Technology convergence and how different applications merge.
- Popular social media platforms like Facebook, Twitter, Instagram, and Snapchat.
- Online threats like spam, spoofing, phishing, and how to protect computers.
- Steps for contextualized online research including defining topics, identifying resources and evaluating results.
- Using Microsoft Word and Excel for tasks like mail merge, formulas, and functions.
Empowerment technology by mhedilyn and judithmhedilyn8556
This document discusses various topics related to information and communication technology (ICT), including the current state of the internet and web technologies. It explains the evolution from Web 1.0 to Web 2.0 to Web 3.0. Social media platforms like Facebook, Twitter, Instagram, and Snapchat are discussed. The document also covers possible internet dangers and protections, as well as research skills and contextual search methods. Mail merge and label generation in Microsoft Word are explained. Sources of photos and graphics are provided. Digital file formats for images and text are classified.
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONCedricPada
ICT refers to information and communication technologies and includes any devices or applications used for communication like radio, TV, and computers. The document discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also discusses current technologies like social media, technology convergence, and security measures like firewalls and antivirus software. Common issues related to ICT like email spam, phishing, and computer viruses are also explained.
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO LEIBE MAE GERONA APRIL ROSE GARON...LanieGailGato
This document discusses various aspects of mail merge and label generation in Microsoft Word. It provides step-by-step instructions on how to create a recipient list, prepare a publication for mail merge, merge the publication with the recipient list to create individualized documents, and generate labels. The key components of mail merge include the recipient list, publication with merge fields, and merging the publication. Label generation involves setting label options and printing.
empowerment technology by: kier and joverynkiersamaco
This document provides an overview of empowerment technology and discusses various topics related to information and communication technology (ICT). It describes the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also discusses technology convergence, social media platforms, dangers on the internet like spam and viruses, and ways to protect computers. Additionally, it covers research skills, mail merge functions in Microsoft Word, identifying credible online sources, and basics of slide presentation and graphic design.
ICT plays an important role in many aspects of modern society through communication, education, commerce, health services, and more. The document discusses how ICT is used in these areas and others like science, sports, and media. It also covers the evolution of the internet from early Web 1.0 to current versions, common online systems and platforms, and potential online dangers. Guidelines for image and text manipulation and basic graphic design principles are provided.
Empowerment Technology by: Jhames Andre M. Goron and Elijohn G. Gumelaandregoron
The document discusses current trends in information and communication technologies (ICT). It begins by describing the evolution from Web 1.0, which had few content creators and static pages, to Web 2.0 which enabled more user interaction and user-generated content through tools like blogs, wikis, and social media. It then discusses the rise of smartphones that combine functions of multiple devices, and various social media platforms like Facebook, Twitter, Instagram, and Snapchat. The document also covers topics like computer viruses, hacking, phishing, and how to protect against these online threats.
The document discusses today's generation and their use of technology. It notes that while people today are very active with technologies like phones, tablets, and laptops, some are ignorant of the potential harms of overuse. It also comments that the Japanese are very skilled with technology and unique in their gadget-making abilities.
EMPOWERMENT TECHNOLOGY by jessabel & mary graceobus25
The document provides an overview of various topics related to empowerment through technology including:
- ICT and the state of internet technology including web 1.0, 2.0, and 3.0.
- Technology convergence and how different applications merge.
- Popular social media platforms like Facebook, Twitter, Instagram, and Snapchat.
- Online threats like spam, spoofing, phishing, and how to protect computers.
- Steps for contextualized online research including defining topics, identifying resources and evaluating results.
- Using Microsoft Word and Excel for tasks like mail merge, formulas, and functions.
Empowerment technology by mhedilyn and judithmhedilyn8556
This document discusses various topics related to information and communication technology (ICT), including the current state of the internet and web technologies. It explains the evolution from Web 1.0 to Web 2.0 to Web 3.0. Social media platforms like Facebook, Twitter, Instagram, and Snapchat are discussed. The document also covers possible internet dangers and protections, as well as research skills and contextual search methods. Mail merge and label generation in Microsoft Word are explained. Sources of photos and graphics are provided. Digital file formats for images and text are classified.
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONCedricPada
ICT refers to information and communication technologies and includes any devices or applications used for communication like radio, TV, and computers. The document discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also discusses current technologies like social media, technology convergence, and security measures like firewalls and antivirus software. Common issues related to ICT like email spam, phishing, and computer viruses are also explained.
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO LEIBE MAE GERONA APRIL ROSE GARON...LanieGailGato
This document discusses various aspects of mail merge and label generation in Microsoft Word. It provides step-by-step instructions on how to create a recipient list, prepare a publication for mail merge, merge the publication with the recipient list to create individualized documents, and generate labels. The key components of mail merge include the recipient list, publication with merge fields, and merging the publication. Label generation involves setting label options and printing.
empowerment technology by: kier and joverynkiersamaco
This document provides an overview of empowerment technology and discusses various topics related to information and communication technology (ICT). It describes the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also discusses technology convergence, social media platforms, dangers on the internet like spam and viruses, and ways to protect computers. Additionally, it covers research skills, mail merge functions in Microsoft Word, identifying credible online sources, and basics of slide presentation and graphic design.
ICT plays an important role in many aspects of modern society through communication, education, commerce, health services, and more. The document discusses how ICT is used in these areas and others like science, sports, and media. It also covers the evolution of the internet from early Web 1.0 to current versions, common online systems and platforms, and potential online dangers. Guidelines for image and text manipulation and basic graphic design principles are provided.
The document discusses various topics related to information and communication technology (ICT) including its current state, technology convergence, social media platforms, and online dangers. It provides information on how to conduct research including identifying a topic, resources, compiling results, and developing critical thinking skills. Steps are outlined for performing a contextual search, creating a mail merge, generating labels, and developing a presentation in PowerPoint. Sources of photos and graphics as well as common digital file formats are also mentioned.
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepesalvepepe
ICT refers to information and communication technologies and includes any devices or applications used for communication, such as radio, television and computers. The main uses of ICT are for obtaining and sharing information, education, accessing services, and raising social awareness. The document discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0, with Web 1.0 being read-only, Web 2.0 allowing user interaction and user-generated content, and Web 3.0 being data-driven. It also covers topics such as social media, technology convergence in smartphones, and cybersecurity issues like email spam, phishing, and computer viruses.
Empowerment Technology by Glezille Lora & Lorena MastalPadsromel
This document discusses information and communication technology (ICT) and its current state. It describes social media platforms like Facebook, Twitter, and Instagram. It also discusses possible internet dangers like email spam, phishing, and computer viruses. The document outlines methods of online research and contextual search. It provides steps for conducting contextualized online searches and identifying reliable sources. Lastly, it discusses mail merge and label generation in Microsoft Word.
Empowerment technology by ybonne amor and jeshaYbonnica22
This document discusses empowerment through information and communication technology. It provides an overview of ICT, including the evolution from Web 1.0 to Web 2.0 to Web 3.0. It also discusses popular social media platforms like Facebook, Twitter, and Instagram. The document then covers possible internet dangers and protections, as well as research skills and methods for contextualized online searching. It concludes with sections on mail merge and label generation in Microsoft Word and creating slide presentations in PowerPoint.
This document discusses information and communication technology (ICT) and its evolution from Web 1.0 to Web 2.0 to Web 3.0. It also discusses technology convergence, with examples like social media, and some of the dangers online like email spam, phishing, and computer viruses. It provides steps to conduct research and develop skills like critical thinking. Additionally, it outlines the mail merge and label generation process in Microsoft Word and how to create slide presentations in PowerPoint.
The document discusses information and communication technology (ICT) and its evolution from Web 1.0 to Web 3.0. ICT is defined as any electronic device or application used for communication, and includes radio, television and computers. The World Wide Web started as mostly static, "read-only" Web 1.0 sites created by webmasters. Web 2.0 introduced more interactivity through user-generated content and social media. Web 3.0 aims to be more semantic and machine-readable. Examples of social media discussed include Facebook, Twitter, Instagram and Snapchat. The document also covers dangers online like spam, spoofing, phishing and computer viruses, as well as ways to protect computers using firewalls and antivirus
Empowerment technology Josua De Guzman and CharizaPadsromel
The document discusses various topics related to information and communication technology (ICT), including the evolution of the World Wide Web from static Web 1.0 to interactive Web 2.0 to semantic Web 3.0. It also covers popular social media platforms, online dangers like viruses and spam, and basic computer security measures. Additionally, the document explains how to perform mail merges in Microsoft Word and generate labels, as well as identify reliable sources of photos and graphics both online and offline.
ICT refers to all communication technologies including radio, television and computers. It is the main method of communicating and sharing information across different fields like business, engineering, education, health and sports. The evolution of the internet from Web 1.0 to Web 2.0 allowed users to interact and create content, moving from a "read-only" to a "read-write" experience. Popular social media platforms today include Facebook, Twitter and Instagram, which enable sharing content with connections. Basic image editing can be done using both online and offline open source software like GIMP, which allow manipulating photos through tools and options.
This document discusses information and communication technology (ICT). It provides examples of how ICT can be used in different fields like education, commerce, sports, health services, engineering, and travel. It also discusses the evolution of the world wide web from version 1.0 to 2.0 to the developing version 3.0. Other topics covered include technology convergence, social media platforms, dangers online like spam and viruses, and research skills for conducting online searches. The document also provides steps for conducting a contextualized online search and identifying good sources from satirical sources. It concludes with an overview of how to use mail merge and label generation functions.
This document provides guidance to students on improving online search and research skills. It discusses using keywords and Boolean operators like AND, OR to narrow search results. It also covers evaluating the credibility of websites by considering the author's credentials, the purpose and date of the document, and whether the information is objective. Students are asked to conduct searches, evaluate sample websites, and explain the importance of keywords and assessing a website's domain when researching online.
This document discusses empowerment through information and communication technologies. It defines ICT as any communication device or application, and explains how ICT can be used in different fields like education, commerce, sports, health services, engineering, and travel. It then discusses the evolution of the World Wide Web from Web 1.0 to 2.0 to 3.0. Other topics covered include technology convergence, social media platforms, assistive media, dangers online like spam and phishing, and research skills for contextualized searching. Steps for contextualized searching and identifying good sources from satirical sources are provided. The document concludes with an explanation of mail merge and label generation in documents.
This document discusses empowerment through technology and information communication technology (ICT). It provides an introduction to ICT and how it is used in different fields like commerce, engineering, education, health, and more. It discusses the evolution of the World Wide Web from Web 1.0 to Web 2.0 to Web 3.0. It also discusses technology convergence through examples like smartphones. Other topics covered include social media platforms like Facebook, Twitter, and Instagram, assistive media, online safety, and security tools.
This document provides an overview of various topics related to empowerment technology. It includes definitions of information and communication technology, descriptions of the evolution of internet technology from Web 1.0 to 3.0, and explanations of technology convergence and social media. It also discusses dangers of computers like viruses and spam, and how to protect computers. Additional sections cover skills for online research, mail merge functions, satirical news sites, Microsoft Excel, and digital file formats for images and text.
Empowerment Technology By: Zyrhell Rafer and Bretny RocesPadsromel
This document discusses the use of information and communication technology (ICT) and how it has evolved over time. It provides details on:
- ICT being the umbrella term for any communication device or application, including radio, television, computers, etc.
- The evolution of the World Wide Web from static Web 1.0 to more interactive Web 2.0 to the semantic Web 3.0.
- Popular social media platforms like Facebook, Twitter, Instagram, and Snapchat.
- Potential dangers of using technology like email spam, spoofing, phishing, malware, and how to better protect computers and networks.
The document provides instructions for troubleshooting various technology issues including wireless connectivity, mapped drives, creating folders, backing up documents and favorites, checking document properties, using Outlook, monitoring mailbox size, using webmail, troubleshooting interactive whiteboards, cropping pictures, and preventing viruses. It discusses verifying wireless switches are on, adding wireless connections, what mapped drives show, how to create and organize folders, how to back up files and favorites to external media, what document properties show, how to access and manage Outlook and webmail, common interactive board issues and solutions, how to locate and use the crop tool in Picture Manager, and top ways to prevent viruses like keeping definitions updated and not downloading risky files.
Empowerment technology Grecille Mae Gesulga and CatalinoPadsromel
The document discusses various topics related to information and communication technology (ICT). It provides information on the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also discusses popular social media platforms like Facebook, Twitter, and Instagram. Additionally, it outlines some potential dangers of internet use like email spam, phishing, and computer viruses. It provides tips for protecting networks and computers from online threats. The document also discusses contextual search strategies and how to identify satirical news sources.
Tutorial 6 - User-Generated Content on the Internetdpd
The document discusses various methods of real-time communication on the Internet, including push technologies like chat and instant messaging, and pull technologies like mailing lists, newsgroups, and RSS feeds. It covers topics like social networking, blogs, video sharing, mashups, and how to protect privacy and identity online.
empowerment technologies by: aiza martin and patricia obormartinaiza
ICT refers to technologies that provide access to information through telecommunications. It includes the Internet, wireless networks, cell phones, and other communication mediums. The document discusses the evolution of the web from static Web 1.0 to dynamic Web 2.0 that allows user interaction. Web 3.0 will incorporate semantic technology. Other topics covered include social media, online dangers, computer security, research skills, image formats, layout principles, and basic image manipulation tools.
1. The document discusses recent updates and upcoming changes to Facebook's platform, including the new Facebook Dashboard, new FQL tables, and potential future features like Facebook Credits and the Open Graph API.
2. It also mentions some films and events related to Facebook, such as the movie "The Social Network" and the f8 conference in April.
3. The author provides contact details at the end for following their Twitter account or contacting them directly with any other questions.
The document provides information about ICT (Information Communication Technology), the evolution of the web from Web 1.0 to Web 3.0, examples of technology convergence like smartphones, and popular social media platforms. It also discusses online security threats like viruses, worms, trojans, and hackers. Tips are provided for maintaining computer security including using firewalls, automatic updates, and antivirus software. Common digital file formats for images and text are explained, categorizing them as either proprietary, open, uncompressed, lossless, or lossy formats. Specific raster image file formats like JPEG, PNG, GIF, and BMP are outlined along with vector image files.
Empowerment Technology by: Maria Elisa Pal and Rodel Reyesandregoron
ICT refers to information and communication technologies and includes any devices or applications used for communication, such as radio, television and computers. There have been three stages of internet development:
Web 1.0 featured static, read-only web pages with little user interaction. Web 2.0 became more interactive with user-generated content and social media. Web 3.0 aims to be a semantic web driven by data and artificial intelligence. Technology convergence combines different media types into single devices like smartphones. Popular social media platforms allow users to connect and share content globally. Various security threats also emerged with increased internet usage.
The document discusses various topics related to information and communication technology (ICT) including its current state, technology convergence, social media platforms, and online dangers. It provides information on how to conduct research including identifying a topic, resources, compiling results, and developing critical thinking skills. Steps are outlined for performing a contextual search, creating a mail merge, generating labels, and developing a presentation in PowerPoint. Sources of photos and graphics as well as common digital file formats are also mentioned.
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepesalvepepe
ICT refers to information and communication technologies and includes any devices or applications used for communication, such as radio, television and computers. The main uses of ICT are for obtaining and sharing information, education, accessing services, and raising social awareness. The document discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0, with Web 1.0 being read-only, Web 2.0 allowing user interaction and user-generated content, and Web 3.0 being data-driven. It also covers topics such as social media, technology convergence in smartphones, and cybersecurity issues like email spam, phishing, and computer viruses.
Empowerment Technology by Glezille Lora & Lorena MastalPadsromel
This document discusses information and communication technology (ICT) and its current state. It describes social media platforms like Facebook, Twitter, and Instagram. It also discusses possible internet dangers like email spam, phishing, and computer viruses. The document outlines methods of online research and contextual search. It provides steps for conducting contextualized online searches and identifying reliable sources. Lastly, it discusses mail merge and label generation in Microsoft Word.
Empowerment technology by ybonne amor and jeshaYbonnica22
This document discusses empowerment through information and communication technology. It provides an overview of ICT, including the evolution from Web 1.0 to Web 2.0 to Web 3.0. It also discusses popular social media platforms like Facebook, Twitter, and Instagram. The document then covers possible internet dangers and protections, as well as research skills and methods for contextualized online searching. It concludes with sections on mail merge and label generation in Microsoft Word and creating slide presentations in PowerPoint.
This document discusses information and communication technology (ICT) and its evolution from Web 1.0 to Web 2.0 to Web 3.0. It also discusses technology convergence, with examples like social media, and some of the dangers online like email spam, phishing, and computer viruses. It provides steps to conduct research and develop skills like critical thinking. Additionally, it outlines the mail merge and label generation process in Microsoft Word and how to create slide presentations in PowerPoint.
The document discusses information and communication technology (ICT) and its evolution from Web 1.0 to Web 3.0. ICT is defined as any electronic device or application used for communication, and includes radio, television and computers. The World Wide Web started as mostly static, "read-only" Web 1.0 sites created by webmasters. Web 2.0 introduced more interactivity through user-generated content and social media. Web 3.0 aims to be more semantic and machine-readable. Examples of social media discussed include Facebook, Twitter, Instagram and Snapchat. The document also covers dangers online like spam, spoofing, phishing and computer viruses, as well as ways to protect computers using firewalls and antivirus
Empowerment technology Josua De Guzman and CharizaPadsromel
The document discusses various topics related to information and communication technology (ICT), including the evolution of the World Wide Web from static Web 1.0 to interactive Web 2.0 to semantic Web 3.0. It also covers popular social media platforms, online dangers like viruses and spam, and basic computer security measures. Additionally, the document explains how to perform mail merges in Microsoft Word and generate labels, as well as identify reliable sources of photos and graphics both online and offline.
ICT refers to all communication technologies including radio, television and computers. It is the main method of communicating and sharing information across different fields like business, engineering, education, health and sports. The evolution of the internet from Web 1.0 to Web 2.0 allowed users to interact and create content, moving from a "read-only" to a "read-write" experience. Popular social media platforms today include Facebook, Twitter and Instagram, which enable sharing content with connections. Basic image editing can be done using both online and offline open source software like GIMP, which allow manipulating photos through tools and options.
This document discusses information and communication technology (ICT). It provides examples of how ICT can be used in different fields like education, commerce, sports, health services, engineering, and travel. It also discusses the evolution of the world wide web from version 1.0 to 2.0 to the developing version 3.0. Other topics covered include technology convergence, social media platforms, dangers online like spam and viruses, and research skills for conducting online searches. The document also provides steps for conducting a contextualized online search and identifying good sources from satirical sources. It concludes with an overview of how to use mail merge and label generation functions.
This document provides guidance to students on improving online search and research skills. It discusses using keywords and Boolean operators like AND, OR to narrow search results. It also covers evaluating the credibility of websites by considering the author's credentials, the purpose and date of the document, and whether the information is objective. Students are asked to conduct searches, evaluate sample websites, and explain the importance of keywords and assessing a website's domain when researching online.
This document discusses empowerment through information and communication technologies. It defines ICT as any communication device or application, and explains how ICT can be used in different fields like education, commerce, sports, health services, engineering, and travel. It then discusses the evolution of the World Wide Web from Web 1.0 to 2.0 to 3.0. Other topics covered include technology convergence, social media platforms, assistive media, dangers online like spam and phishing, and research skills for contextualized searching. Steps for contextualized searching and identifying good sources from satirical sources are provided. The document concludes with an explanation of mail merge and label generation in documents.
This document discusses empowerment through technology and information communication technology (ICT). It provides an introduction to ICT and how it is used in different fields like commerce, engineering, education, health, and more. It discusses the evolution of the World Wide Web from Web 1.0 to Web 2.0 to Web 3.0. It also discusses technology convergence through examples like smartphones. Other topics covered include social media platforms like Facebook, Twitter, and Instagram, assistive media, online safety, and security tools.
This document provides an overview of various topics related to empowerment technology. It includes definitions of information and communication technology, descriptions of the evolution of internet technology from Web 1.0 to 3.0, and explanations of technology convergence and social media. It also discusses dangers of computers like viruses and spam, and how to protect computers. Additional sections cover skills for online research, mail merge functions, satirical news sites, Microsoft Excel, and digital file formats for images and text.
Empowerment Technology By: Zyrhell Rafer and Bretny RocesPadsromel
This document discusses the use of information and communication technology (ICT) and how it has evolved over time. It provides details on:
- ICT being the umbrella term for any communication device or application, including radio, television, computers, etc.
- The evolution of the World Wide Web from static Web 1.0 to more interactive Web 2.0 to the semantic Web 3.0.
- Popular social media platforms like Facebook, Twitter, Instagram, and Snapchat.
- Potential dangers of using technology like email spam, spoofing, phishing, malware, and how to better protect computers and networks.
The document provides instructions for troubleshooting various technology issues including wireless connectivity, mapped drives, creating folders, backing up documents and favorites, checking document properties, using Outlook, monitoring mailbox size, using webmail, troubleshooting interactive whiteboards, cropping pictures, and preventing viruses. It discusses verifying wireless switches are on, adding wireless connections, what mapped drives show, how to create and organize folders, how to back up files and favorites to external media, what document properties show, how to access and manage Outlook and webmail, common interactive board issues and solutions, how to locate and use the crop tool in Picture Manager, and top ways to prevent viruses like keeping definitions updated and not downloading risky files.
Empowerment technology Grecille Mae Gesulga and CatalinoPadsromel
The document discusses various topics related to information and communication technology (ICT). It provides information on the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also discusses popular social media platforms like Facebook, Twitter, and Instagram. Additionally, it outlines some potential dangers of internet use like email spam, phishing, and computer viruses. It provides tips for protecting networks and computers from online threats. The document also discusses contextual search strategies and how to identify satirical news sources.
Tutorial 6 - User-Generated Content on the Internetdpd
The document discusses various methods of real-time communication on the Internet, including push technologies like chat and instant messaging, and pull technologies like mailing lists, newsgroups, and RSS feeds. It covers topics like social networking, blogs, video sharing, mashups, and how to protect privacy and identity online.
empowerment technologies by: aiza martin and patricia obormartinaiza
ICT refers to technologies that provide access to information through telecommunications. It includes the Internet, wireless networks, cell phones, and other communication mediums. The document discusses the evolution of the web from static Web 1.0 to dynamic Web 2.0 that allows user interaction. Web 3.0 will incorporate semantic technology. Other topics covered include social media, online dangers, computer security, research skills, image formats, layout principles, and basic image manipulation tools.
1. The document discusses recent updates and upcoming changes to Facebook's platform, including the new Facebook Dashboard, new FQL tables, and potential future features like Facebook Credits and the Open Graph API.
2. It also mentions some films and events related to Facebook, such as the movie "The Social Network" and the f8 conference in April.
3. The author provides contact details at the end for following their Twitter account or contacting them directly with any other questions.
The document provides information about ICT (Information Communication Technology), the evolution of the web from Web 1.0 to Web 3.0, examples of technology convergence like smartphones, and popular social media platforms. It also discusses online security threats like viruses, worms, trojans, and hackers. Tips are provided for maintaining computer security including using firewalls, automatic updates, and antivirus software. Common digital file formats for images and text are explained, categorizing them as either proprietary, open, uncompressed, lossless, or lossy formats. Specific raster image file formats like JPEG, PNG, GIF, and BMP are outlined along with vector image files.
Empowerment Technology by: Maria Elisa Pal and Rodel Reyesandregoron
ICT refers to information and communication technologies and includes any devices or applications used for communication, such as radio, television and computers. There have been three stages of internet development:
Web 1.0 featured static, read-only web pages with little user interaction. Web 2.0 became more interactive with user-generated content and social media. Web 3.0 aims to be a semantic web driven by data and artificial intelligence. Technology convergence combines different media types into single devices like smartphones. Popular social media platforms allow users to connect and share content globally. Various security threats also emerged with increased internet usage.
This document discusses information and communication technology (ICT) and how it can be used across different fields like education, commerce, health services, and more. It explains the evolution of the World Wide Web from static Web 1.0 to more interactive Web 2.0 and the emerging data-driven Web 3.0. The document also discusses technology convergence using smartphones as an example. It covers social media platforms and online dangers like spam, spoofing, and hacking. Finally, it provides guidance on contextualized online research and detecting satirical news sources.
This document discusses empowerment through technology. It provides an overview of information and communication technologies (ICT) and how they have evolved from Web 1.0 to Web 2.0 to Web 3.0. It also discusses technology convergence and how different applications have merged. While technology provides many benefits, it also poses some dangers like email spam, phishing, and computer viruses. The document provides tips on how to protect yourself online and conduct safe research.
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagayniniogolo
This document provides an overview of information and communication technology (ICT), including current states of the web, social media platforms, and presentation tools. It discusses ICT as an umbrella term encompassing communication devices and applications. Web 1.0 allowed read-only access to static pages, while Web 2.0 enabled user interaction, participation, and sharing on dynamic pages. Web 3.0 aims to be a read-write-execute web guided by semantic analysis. The document also outlines dangers online like spam, spoofing, phishing, and malware, as well as security measures.
ICT plays an important role in modern society for communication, education, commerce, health services, science, and more. It has transformed how people interact through developments like the internet. Key aspects of ICT discussed include social media, online safety, conducting research, and using tools like mail merge for communication. Formats for digital images and text include proprietary, open, and file formats indicated by extensions.
ICT plays an important role in many aspects of modern society, including communication, education, commerce, health services, science, and media. Some key points about ICT's role include:
- Computers are widely used for communication via mobile phones, email, and social media. They are also used for education, online shopping, sports and recreation, arts, design, and more.
- Advances from Web 1.0 to Web 2.0 to Web 3.0 have made the internet more interactive. Popular online platforms today include social media sites like Facebook and Twitter, as well as search engines, communication apps, and creative content outlets.
- ICT brings risks like computer viruses, phishing scams,
This document discusses empowerment through information and communication technologies (ICT) and provides information on current states of the internet. It describes the evolution from static Web 1.0 to more interactive Web 2.0 and the emerging semantic Web 3.0. The document also discusses technology convergence through examples like smartphones, discusses popular social media platforms, and outlines some dangers of computers like email spam, phishing, and computer viruses. It provides guidance on research skills and contextualizing online searches as well as how to use mail merge functions in Microsoft Word.
Empowerment Technology By: JOAN GOZO AND KENNETH MACUTOPadsromel
This document discusses empowerment through technology. It begins by defining ICT and outlining the evolution from Web 1.0 to 3.0. It then discusses technologies like social media, smartphones, and specific platforms. Dangers of the internet like viruses and hackers are also covered. The document provides guidance on contextualized research including defining terms and outlining steps. It also discusses skills needed for research and summarizes parts of tools like Gmail merge and GIMP image software.
This document discusses the role of information and communication technology (ICT) in various aspects of modern life and society. It covers how ICT is used for communication, education, commerce, health services, science, and media. It also describes the evolution of the internet from Web 1.0 to 3.0 and common online systems and platforms. Some potential online dangers like viruses, spam, and hacking are outlined. The use of social media and popular sites like Facebook, Twitter, and Instagram is also discussed.
This document discusses the role of information and communication technology (ICT) in various aspects of modern life and society. It covers how ICT is used in education, telecommunication, commerce, sports, arts, media, health services, science, and other fields. It also describes the evolution of the internet from Web 1.0 to 3.0 and common online systems, functions, and platforms. Potential online dangers like viruses and hacking are mentioned. Guidelines for image manipulation, graphics layout, and combining text/images are provided. Finally, some basic offline image editing software options are listed.
The document discusses the evolution of the World Wide Web from Web 1.0 to Web 3.0. Web 1.0 allowed only basic static pages with no user interaction. Web 2.0 enabled user-generated content and interaction. Web 3.0 aims to be data-driven with semantic content. Technology convergence brings together different applications and media through social media platforms like Facebook, Twitter, and Instagram. The document also outlines steps for online research and creating presentations with PowerPoint, and discusses digital file formats and image manipulation techniques.
Use Listening Strategies Based on Purpose, Familiarity with the Topic and Levels of Difficulty of Short Texts Listened to provides directions to answer questions about listening strategies. The document contains true/false and multiple choice questions about listening, types of listening like appreciative, empathetic and comprehensive listening. It also defines listening and differentiates it from hearing. Key details include different types of listening, factors that affect listening effectiveness and listening being an important skill.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
4. WEB 1.O
In this stage of internet technology
there were very few web content
creators & many of then so called
‘read only web’.
There were no user INTERACTION
Web is STATIC
The feedback mechanism was thru
private email
No direct comment available
Webmaster Computer Users
The term 2.0 was used around 2004
Internet technology become more & more active
because the social media begins
Internet on this stage become more available to
everyone
The users can now interact , contribute & create
their own internet space & content.
WIFI
User contribution Web Dynamics Community
WEB 2.0
5.
6. Possible Danger in internet
email spam – is the term use to refer to a person who create electronic spam.
Email spoofing – it is usually used by spammers to hide the origin of the spam.
Phishing – practice of trying to get confidential information.
pharming – a dangerous hacker attack on a website.
Spyware – a program installed covertly on a personal computer to collect information and
take control.
Computer worm – it is a dangerous computer program that it replicates itself through a
network.
Trojan horse – it can erase data and can allow access of victims computer also can corrupt
files.
Computer virus – a program that duplicates itself and then infects the computer.
Hacker – a person who is able to enter the control others people computer without
authorization.
7. Protection in danger networks
Security center – is a place where you can set additional protection
from threat to your computer.
Firewall – helps protecting your computer from unauthorized entries,
viruses or worms from the internet or network.
Automatic updates – it upgrades all the security that can help
advance recognizing a threats.
Virus protection – it also prevents other malware from gaining entry
into your computer
8. Research
Contextual search – its an attempt to be more precise in providing the
list documents according to the words used by the user to search the
internet
a good contextual search engine would request for information to
narrow down the result of the search
9. Contextualize method
Contextualize – is to place (something, such as word or ability in a
context )
Research – collecting of information a particular topic.
Strategy – a careful plan or method.
Compilation – the act of process or compiling.
Citation – the act of quoting.
10. Searching method
Identify or choose a topic
Topic or task definition
Identify methods of search
Identify resources of your research
Make your research strategies
Compiling the research result
Evaluate the result of your research
Create a list of your references for citation
11. Steps to make contextualized online
search
Identify method of search
Experiments
Explore
Survey
Identify resources of your research
Wikipedia
Google
Make your research strategies
Compiling the research result
12. Research skills
Practice makes it perfect – the more you do it the better you will be in doing
research.
Critical thinking – it is the ability to digest, reflect and conclude from the
information searched.
Analytical thinking – the ability to look verbalize, conceptualize and gather data
attained.
Problem solving capability – the ability to present solutions or solve problems by
presenting decision based on the given information.
Research presentation – it is ability to present ideas and draw conclusion.
Creativity and developed imagination – it is the ability to look for alternative
solutions to the problems
Computer literacy - knowledge of the various computer application and tools.
13. Steps of contextualize concept
1. Open the Google site.
2. On the upper right side of the window, click the google apps, icon
and click search engine.
3. On the lower right part of the window, click setting and google
search setting pop-up list will appear.
4. Click advance search and the advance search window will appear.
5. Type the keywords that you, would like to search and click the
advanced search button.
14. Identifying good source from satirical
source
Satirical sites are websites that report false stories meant to amuse or
entertain
These sites take their cue from tv shows that report exaggerated
news that are untrue but intriguing and funny
These sites started as spoofs of real public figures such as political
leaders of motive personalities.
Untrue stories should not be shared with your friends family and
contacts.
15. How to detect satirical news
1. If it is too good to be true, then it must be so.
2. If the news did not emanate from reliable news site.
3. If they are from know satirical sites.
16. List of top sources of satirical news
1. Adobo chronicles (adobochronicles.com)
2. So, whats news (sowhatsnews.wordpress.com)
3. Eritas time (eritastimes.com)
4. The professional heckler (professionalheckler.com)
17. American satirical site sites in u.s
The onion (theonion.com)
Click hole (clickhole.com)
Christ wine global media (christwine.org)
18. Mail merge and label generation
it is used automatically add mailing addresses or personalized
information to your publication.
19. Mailing start group commands
1. Mail merge
2. Email merge
3. Select recipients
4. Edit recipients
5. Insert merge field
6. Address block
7. Greeting line
8. Pictures
9. Insert personalized
10. Format
11. hyperlink
20. name function
Email merge – merges data into a publication which will be printed and
mailed
shows step by step mail merge.
Email merge – Merge data into a publication that will be sent as email.
select recipients – chooses the list of the people you intend to send the
letters to you can type your own list.
Edit – recipients list – make changes to the list of recipients.
Insert merge field – adds a field your recipient list.
Address block – adds an address to your letter.
Greeting line – adds a greeting line to your letter.
Picture – adds a picture field from your recipient list to the publication.
Insert personalized hyperlink – insert hyperlink that are customized from
each other
21. Parts of mail merge
1. Recipients list
2. Publication with merge fields
3. Merge publication
22. Step 1 creating a recipient list
1. Click the mailing tab, go to the start group and click select
recipient.
2. On the list of option, select type new list.
3. On the new address list dialog box, click new entry and type the
recipient information.
4. Click ok.
23. Step 2 : prepare your publication
Create your publication in ms. Word
Insert any additional text that you want to apper in every version.
24. Step 3
1. Print
A. CLICK MERGE TO A PRINTER
B. IN THE PRINT SPACE, SELECT THE OPTIONS YOU WANT AND CLICK OK.
2. MERGE NEW PUBLICATION
A. CLICK MERGE TO NEW PUBLICATION
B. IN THE NEW PUBLICATION, CLICK SAVE THIS PUBLICATION.
C. TYPE THE NAME OF YOUR NEW PUBLICATION AND CLICK SAVE .
3. ADD TO EXISTING PUBLICATION
A. CLICK ADD TO EXISTING PUBLICATION
B. ON THE OPEN PUBLICATION DIALOG BOX
25. Generating labels
Labels are used for envelopes that you intend to send out to persons
usually containing the none address or telephone
26. Steps in generating labels
1. Start a new document in the ms word
2. Go to the mailings tab, in the create group.
3. In the address box, type the text you want to be placed on the label.
4. Click the insert address icon if you have an address stored in the
electronic address book
5. To change the font or paragraph formatting, select the text right
click and select the option from the down menu.
27. 6. Click options button and the label options dialog box will appear
7. Select the setting like the type of printer, the supplies that produced
your label sheets and others
8. After you make setting, click ok.
9. Under print, select full page of the same label of single label. Then in
the row and column boxes, enter the numbers that match the number of
row and column on the label sheet
10. Click print
28. MS. Powerpoint
It is an application intended in creating a slide
presentation
29. How to create slide presentation
1. Open ms. Powerpoint application
2. Click new and select your preferred design template
3. Click insert tab menu and insert text word art or any object in the
slide
4. Click home tab to insert new slide in our presentation.
30. Sources of photos and graphics
There are many sources of photos and graphics. They can some direct
from your camera, old pictures , free from internet or purchased from
the internet or stores.
31. Personal and professional photos
Are photos taken y amateur or professional photographer using a
digital camera. Theses images are downloaded and are stored in the
computer. They are sources of images for any project that you may
embark. They re original and definitely something one would like to
work on.
32. Scanned images
Are those that you transfer from printed photos and graphics using
scanning devices which you can transfer to your computer for further
improvement and modification. These are mostly old pictures
photographed before the digital age.
33. Stock photo library
Are several photographs and created images that are available for
sale . They come in cd or dvd format and many of these images are
royalty free, which means that they can be used without additional
fees.
34. Online stock photos
Are found in the world wide web. The www is now the dominant
source of photos and graphics around the globe because of the widely
available choices and reasonable prices, other sites even offer copy
right free photos and other media. One advantage of this set up is
that you do not have to go to place where most of these photos were
taken. Another is that before you purchase or get a picture , you can
view it and if you decide to buy, simply download it to your computer.
35. Online digital file format for images and
text
A computer will have a certain method of encoding information for
storage in the hard drive or any form of computer storage . The ways
of encoding and storing this information to storage is called file –
format, digital file formats are categorized as either proprietary or
open.
36. Proprietary formats
Are owned and controlled by individuals or corporations and the file
format specifications are not available to the public. They are usually
covered by copyright and the owner has exclusive control of the
presend and future technology development of this format an
example of a proprietary format is the one used in the storage for
microsoft word, excel, and powerpoint.
37. Open formats
Are means and ways for storing digital information that are free, can
be used by the public and are not encumbered by copyright or
potents.
38. File format
Are uses suffixes that are added to the end of the filename called
filename extension. The file extension is a means of identifying the
format of the file, with the period before it after the filename.
39. Digital file format are classified into
three major groups
1. Uncompressed or raw format – is usually used for storing original file
format, it is a flexible form but needs bigger memory to store.
2. Lossless file format – is a file format that was compressed to
replicate the original quality but at a reduced file size. This type is
ideal for storing important file ( images, audio, or video).
40. Imaged file format ( raster image
format)
Are standardized means of organizing and storing digital images
two types of image file format
1. Raster image format
2. Vector image format
41. Raster image format
Images faithfully display the color information and image making
them a great choice to display detailed images
Widely supported to web browsers, which is makes them easy to
share.
42. Types of raster images
Jpeg/jpg ( joint photographics expert group) – is an extremely
common format and is typically used sharing photographs
Gif ( graphics interface format) - one of the most commoon images
format on the web
Png ( portable network graphics – supported by current browser
Bmp ( bitmap) – is one of the simplest file formats in raster graphics
Tiff ( tagged image file format ) – recommended for vectorization.
Pcx ( picture exchange) – extended to support true color images.
43. Vector images and vector graphics
Vector images – are lossless files created using mathematical
geometric equations to represent images in digital computer graphics.
Vector graphics – has the advantage or retaining its quality at any
desired imaged, size unlike raster images that appear proxilated
when displayed in expanded images
size………………………………………………………………….
44. Pdf
Encapsulated postscript
Scalable vector graphics
Windows metafile
Examples of these type formats are :
46. Adobe illustrator
Created using paths and lines by point instead of bit maps which
may include objects, color and texts.
Drawing file – a generic drawing created and stored in a vector
formats that uses lines or path to represent iamge.
Drawing exchange format – a developed and introduced by auto desk
the maker of autocad similar to drawing file both is universal so that
autocad can be opened using other program
47. postscript
a page description language developed by adobe that describe the
appearance of a printed page it become an industry standard for
printing and imaging.
Scalable vector graphics – most common vector format on the
internet, developed by the ( www. ) to display vector graphics open
format can be opened by adobe, corel and open graphic program
48. Basic principle of graphics & layout
Layout – is the process of planning and arranging graphics or text in a
page or book.
Symmetrical – a layout may be symmetrical where there are equal
weight of elements on both sides of the page.
Assymmetrical – a layout maybe assymmetrical where there is an
artistic and different intensity on one side of the page.
Text – a text type should be legible, appropriate font face, and
arranged either left justified, or centered the flow of the text and
pictures should be easy to read.
49. Image – should be proportionate, w/ sharp color and high resolution.
Proximity and harmony – the elements should be closed together and
most
Consistency – there should be uniformity on the theme on each page.
Color and shape - use color to create interest by providing variety in
design like the use of color contrast and shape.
Emphasis – there should be one point of interest in a page. The
element to be emphasized should have a different size , color, shape,
or background.
50. PRINCIPLES AND BASIC TECHNIQUES OF IMAGE
MANIPULATION
You can change the background of it does not math the image or
totally the presentation. You can also add efforts to the background.
51. TECHNIQUES OF IMAGE MANIPULATION
BACKGROUNDCOLOR- You can change the background if it does not match the image or the totality of the presentation.
You can also add effects to the background
SHADOW- Using shadow effect will make the image realistic.
Proportion- When combining images, resize the image to make it proportionate and realistic.
Blendingcolor - You can use color blending to match the background with the other elements in the page.
Texture- Adding texture allows you to blend different images.Textures add to the depth of your art.Blending will allow
smooth trasition of one image to another.
Emphasis - There should be a focal point to a page that will attract viewers.The element you want to emphasize should be
sharp,big, and most vibrant in your design.
52. Combining text, graphics and images
Combining text , graphics, and images in your presentation, info
graphics or web page will make your message clear.
Transparent shapes – add simple shapes with slight transparency
behind your text to clearly see the text you want to emphasize.
Fonts and shapes – fonts and shapes should complement with each
other. You can use rounded shapes with rounded fonts and sharp
shapes with sharp fonts.
Text and background - should be aligned to have an organized look.
Clean and clear background – use a clean and clear background for
message to be readable .
53. Basic manipulation using offline or open
source software
Photo editing and designing tools allow you to make manipulate or
edit images , apply , effects, filters and frames , crop add text,
changed background color make photo collage and photo album that
you would like to do in an image
Picasa – it is a google`s free photo manager to edit and orginizing your
photo.
Pain.net – it is a window base alternative to ms point editor .
Google sketch up – it is a free .3d modeling program with tools that
allow you to create 3d models of houses, home renovation,
woodworking projects and others with dimensional accuracy
54. Autodesk pixl – free photo editing tool that is similar to photoshop
and has more than 600 effects
Adobe photoshop – is a tool to create modify, combine and optimize,
digital photos and images.
Gimp or gnu ( image manipulation program ) – it is a free open source
image graphic editing program used for image retouching and editing,
free – form drawing / painting and other specialized tasks.
55. Installing gimp
1. go to www.gimp.org
2. Then click download
3. Select download gimp directly
4. Run the gimp installer
5. Click install
6. Wait for it to finish the installation, then click finish.
56. Different types of slide presentation
ZOHO SHOW
LINKED IN SLIDE SHARE
GOOGLE SLIDE
SLIDE ROCKET
MS. POWERPOINT
PREZI